Skip to content

Commit 20bc10b

Browse files
committed
removed versions and acrolinx fixes
1 parent ad93eca commit 20bc10b

File tree

1 file changed

+13
-12
lines changed

1 file changed

+13
-12
lines changed

articles/defender-for-cloud/enable-defender-sql-at-scale.md

Lines changed: 13 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -12,9 +12,9 @@ ms.date: 07/14/2024
1212

1313
Microsoft Defender for Cloud's Defender for Databases plan provides security for SQL servers on virtual machines. In order to protect your databases, the Azure Monitoring Agent (AMA) must be implemented to prevent attacks and to identify configuration errors.
1414

15-
When you enable Defender for Databases, it automatically enables the auto provisioning process which configures of all the required agent components necessary for the plan to function. The auto provisioning process includes installation the configuration of the AMA, workspace configuration, and the virtusl machines (VM) extension and solution.
15+
When you enable Defender for Databases, it automatically enables the auto provisioning process that configures of all the required agent components necessary for the plan to function. The auto provisioning process includes installation the configuration of the AMA, workspace configuration, and the virtual machines (VM) extension and solution.
1616

17-
This page explains how you can enable the auto-provisioning process for Defender for Databases across multiple subscriptions simultaneously using PowerShell. This process applies to SQL servers hosted on Azure VMs, on-premises environments, and Azure Arc-enabled SQL servers. You will also learn how to utilize additional functionalities that accommodate a variety of configurations, including:
17+
This page explains how you can enable the autoprovisioning process for Defender for Databases across multiple subscriptions simultaneously using PowerShell. This process applies to SQL servers hosted on Azure VMs, on-premises environments, and Azure Arc-enabled SQL servers, and how to utilize extra functionalities that accommodate various configurations, including:
1818

1919
- Custom data collection rules
2020

@@ -28,27 +28,27 @@ This page explains how you can enable the auto-provisioning process for Defender
2828

2929
- Gain knowledge on:
3030
- [SQL server on VMs](https://azure.microsoft.com/products/virtual-machines/sql-server/)
31-
- [SQL Server enabled by Azure Arc](/sql/sql-server/azure-arc/overview?view=sql-server-ver16)
31+
- [SQL Server enabled by Azure Arc](/sql/sql-server/azure-arc/overview)
3232
- [How to install Log Analytics agent on Windows computers](../azure-monitor/agents/agent-windows.md)
3333
- [How to migrate to Azure Monitor Agent from Log Analytics agent](../azure-monitor/agents/azure-monitor-agent-migration.md)
3434

3535
- [Connect AWS accounts to Microsoft Defender for Cloud](quickstart-onboard-aws.md)
3636
- [Connect your GCP project to Microsoft Defender for Cloud](quickstart-onboard-gcp.md)
3737

38-
- Install Powershell on [Windows](/powershell/scripting/install/installing-powershell-on-windows?view=powershell-7.4), [Linux](/powershell/scripting/install/installing-powershell-on-linux?view=powershell-7.4), [MacOS](/powershell/scripting/install/installing-powershell-on-macos?view=powershell-7.4), or [ARM](/powershell/scripting/install/powershell-on-arm?view=powershell-7.4).
39-
- [Install the following Powershell modules](/powershell/module/powershellget/install-module?view=powershellget-3.x):
38+
- Install PowerShell on [Windows](/powershell/scripting/install/installing-powershell-on-windows), [Linux](/powershell/scripting/install/installing-powershell-on-linux), [macOS](/powershell/scripting/install/installing-powershell-on-macos), or [ARM](/powershell/scripting/install/powershell-on-arm).
39+
- [Install the following PowerShell modules](/powershell/module/powershellget/install-module):
4040
- Az.Resources
4141
- Az.OperationalInsights
4242
- Az.Accounts
4343
- Az
4444
- Az.PolicyInsights
4545
- Az.Security
4646

47-
- Permissions: requires VM contributor, contributor or owner rules.
47+
- Permissions: requires VM contributor, contributor, or owner rules.
4848

49-
## Powershell script parameters and samples
49+
## PowerShell script parameters and samples
5050

51-
The Powershell script that enables Microsoft Defender for SQL on Machines on a given subscription has several parameters that you can customize to fit your needs. The following table lists the parameters and their descriptions:
51+
The PowerShell script that enables Microsoft Defender for SQL on Machines on a given subscription has several parameters that you can customize to fit your needs. The following table lists the parameters and their descriptions:
5252

5353
| Parameter name | Required | Description |
5454
|--|--|--|
@@ -58,15 +58,15 @@ The Powershell script that enables Microsoft Defender for SQL on Machines on a g
5858
| DataCollectionRuleResourceId | Optional | The resource ID of the data collection rule, if you want to use a custom DCR instead of the default one. |
5959
| UserAssignedIdentityResourceId | Optional | The resource ID of the user assigned identity, if you want to use a custom user assigned identity instead of the default one. |
6060

61-
The following is a sample script for when you use a default Log Analytics workspace, data collection rule and managed identity.
61+
The following sample script is applicable when you use a default Log Analytics workspace, data collection rule, and managed identity.
6262

6363
```powershell
6464
Write-Host "------ Enable Defender for SQL on Machines example ------"
6565
$SubscriptionId = "<SubscriptionID>"
6666
.\EnableDefenderForSqlOnMachines.ps1 -SubscriptionId $SubscriptionId -RegisterSqlVmAgnet $RegisterSqlVmAgnet
6767
```
6868

69-
The following is a sample script for when you use a custom Log Analytics workspace, data collection rule and managed identity.
69+
The following sample script is applicable when you use a custom Log Analytics workspace, data collection rule, and managed identity.
7070

7171
```powershell
7272
Write-Host "------ Enable Defender for SQL on Machines example ------"
@@ -80,12 +80,13 @@ $UserAssignedIdentityResourceId = "/subscriptions/<SubscriptionID>/resourceGroup
8080

8181
## Enable Defender for SQL servers on machines at scale
8282

83+
You can enable Defender for SQL servers on machines at scale by following these steps.
8384

84-
1. Open a Powershell window.
85+
1. Open a PowerShell window.
8586

8687
1. Copy the [EnableDefenderForSqlOnMachines.ps1](https://github.com/Azure/Microsoft-Defender-for-Cloud/blob/fd04330a79a4bcd48424bf7a4058f44216bc40e4/Powershell%20scripts/Enable%20Defender%20for%20SQL%20servers%20on%20machines/EnableDefenderForSqlOnMachines.ps1) script.
8788

88-
1. Paste the script into Powershell.
89+
1. Paste the script into PowerShell.
8990

9091
1. Enter parameter information as needed.
9192

0 commit comments

Comments
 (0)