Skip to content

Commit 573644d

Browse files
authored
Merge pull request #87247 from VanMSFT/patch-1
Update sql-database-security-tutorial.md
2 parents 5a5b7eb + 5ff2ef3 commit 573644d

File tree

1 file changed

+2
-5
lines changed

1 file changed

+2
-5
lines changed

articles/sql-database/sql-database-security-tutorial.md

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.topic: tutorial
88
author: VanMSFT
99
ms.author: vanto
1010
ms.reviewer: carlrab
11-
ms.date: 07/29/2019
11+
ms.date: 09/03/2019
1212
ms.custom: seoapril2019
1313
---
1414
# Tutorial: Secure a single or pooled database
@@ -52,7 +52,7 @@ For all steps in the tutorial, sign in to [Azure portal](https://portal.azure.co
5252

5353
## Create firewall rules
5454

55-
SQL databases are protected by firewalls in Azure. By default, all connections to the server and database are rejected, except for connections from other Azure services. To learn more, see [Azure SQL Database server-level and database-level firewall rules](sql-database-firewall-configure.md).
55+
SQL databases are protected by firewalls in Azure. By default, all connections to the server and database are rejected. To learn more, see [Azure SQL Database server-level and database-level firewall rules](sql-database-firewall-configure.md).
5656

5757
Set **Allow access to Azure services** to **OFF** for the most secure configuration. Then, create a [reserved IP (classic deployment)](../virtual-network/virtual-networks-reserved-public-ip.md) for the resource that needs to connect, such as an Azure VM or cloud service, and only allow that IP address access through the firewall. If you're using the [resource manager](/azure/virtual-network/virtual-network-ip-addresses-overview-arm) deployment model, a dedicated public IP address is required for each resource.
5858

@@ -82,9 +82,6 @@ To set up a server-level firewall rule:
8282

8383
You can now connect to any database in the server with the specified IP address or IP address range.
8484

85-
> [!IMPORTANT]
86-
> By default, access through the SQL Database firewall is enabled for all Azure services, under **Allow access to Azure services**. Choose **OFF** to disable access for all Azure services.
87-
8885
### Setup database firewall rules
8986

9087
Database-level firewall rules only apply to individual databases. The database will retain these rules during a server failover. Database-level firewall rules can only be configured using Transact-SQL (T-SQL) statements, and only after you've configured a server-level firewall rule.

0 commit comments

Comments
 (0)