Skip to content

Commit 2c84589

Browse files
Update articles/synapse-analytics/security/workspace-data-exfiltration-protection.md
Co-authored-by: William Assaf MSFT <[email protected]>
1 parent 6198ac4 commit 2c84589

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/synapse-analytics/security/workspace-data-exfiltration-protection.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ This article will explain data exfiltration protection in Azure Synapse Analytic
1414

1515
## Securing data egress from Synapse workspaces
1616
Azure Synapse Analytics workspaces support enabling data exfiltration protection for workspaces. With exfiltration protection, you can guard against malicious insiders accessing your Azure resources and exfiltrating sensitive data to locations outside of your organization’s scope.
17-
At the time of workspace creation, you can choose to configure the workspace with a managed virtual network and additional protection against data exfiltration. When a workspace is created with a [managed virtual network](./synapse-workspace-managed-vnet.md), Data integration and Spark resources are deployed in the managed virtual network. The workspace’s dedicated SQL pools and serverless SQL pools have multi-tenant capabilities and as such, need to exist outside the managed virtual network. For workspaces with data exfiltration protection, resources within the managed virtual network always communicate over [managed private endpoints](./synapse-workspace-managed-private-endpoints.md). The Synapse SQL resources can connect to and query any authorized Azure resources (storage account) using OPENROSETS or EXTERNAL TABLE since the ingress traffic is not controlled by the data exfiltration protection. However, the egress traffic (CREATE EXTERNAL TABLE AS SELECT) will be controlled by the data exfiltration protection.
17+
At the time of workspace creation, you can choose to configure the workspace with a managed virtual network and additional protection against data exfiltration. When a workspace is created with a [managed virtual network](./synapse-workspace-managed-vnet.md), Data integration and Spark resources are deployed in the managed virtual network. The workspace’s dedicated SQL pools and serverless SQL pools have multi-tenant capabilities and as such, need to exist outside the managed virtual network. For workspaces with data exfiltration protection, resources within the managed virtual network always communicate over [managed private endpoints](./synapse-workspace-managed-private-endpoints.md). When data exfiltration protection is enabled, Synapse SQL resources can connect to and query any authorized Azure Storage using OPENROWSETS or EXTERNAL TABLE, since the ingress traffic is not controlled by the data exfiltration protection. However, the egress traffic via [CREATE EXTERNAL TABLE AS SELECT](/sql/t-sql/statements/create-external-table-as-select-transact-sql?view=azure-sqldw-latest&preserve-view=true) will be controlled by the data exfiltration protection.
1818

1919
> [!Note]
2020
> You cannot change the workspace configuration for managed virtual network and data exfiltration protection after the workspace is created.

0 commit comments

Comments
 (0)