Skip to content

Commit 624a121

Browse files
authored
Merge pull request #221148 from MicrosoftDocs/main
12/12 OOB Publish at 7:45AM
2 parents b9baea4 + 5393a52 commit 624a121

File tree

91 files changed

+3534
-202
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

91 files changed

+3534
-202
lines changed

articles/azure-monitor/logs/basic-logs-configure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ By default, all tables in your Log Analytics workspace are Analytics tables, and
5959
| [AMSStreamingEndpointRequests](/azure/azure-monitor/reference/tables/AMSStreamingEndpointRequests) | Azure Media Services information about requests to streaming endpoints. |
6060
| [ContainerAppConsoleLogs](/azure/azure-monitor/reference/tables/containerappconsoleLogs) | Azure Container Apps logs, generated within a Container Apps environment. |
6161
| [ContainerLogV2](/azure/azure-monitor/reference/tables/containerlogv2) | Used in [Container insights](../containers/container-insights-overview.md) and includes verbose text-based log records. |
62-
| [DevCenterDiagnosticLogs](/azure/azure-monitor/reference/tables/DevCenterDiagnosticLogs) | Data plane audit related to Dev Center resources, for example, dev boxes and environments stop, start, deletes. |
62+
| [DevCenterDiagnosticLogs](/azure/azure-monitor/reference/tables/DevCenterDiagnosticLogs) | Dev Center resources data plane audit logs. For example, dev boxes and environment stop, start, delete. |
6363
| [StorageBlobLogs](/azure/azure-monitor/reference/tables/StorageBlobLogs) | Azure Storage blob service logs. |
6464
| [StorageFileLogs](/azure/azure-monitor/reference/tables/StorageFileLogs) | Azure Storage file service logs. |
6565
| [StorageQueueLogs](/azure/azure-monitor/reference/tables/StorageQueueLogs) | Azure Storage queue service logs. |

articles/defender-for-cloud/TOC.yml

Lines changed: 23 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -440,12 +440,31 @@
440440
href: quickstart-enable-database-protections.md
441441
- name: Defender for Azure SQL Databases
442442
items:
443-
- name: Overview
443+
- name: Get started
444444
displayName: database
445445
href: defender-for-sql-introduction.md
446-
- name: Customize SQL information protection policy
447-
displayName: sql, database, data discovery
448-
href: sql-information-protection-policy.md
446+
- name: Vulnerability assessment
447+
items:
448+
- name: Overview
449+
href: sql-azure-vulnerability-assessment-overview.md
450+
- name: Enable vulnerability assessment
451+
href: sql-azure-vulnerability-assessment-enable.md
452+
- name: Manage vulnerability assessments
453+
href: sql-azure-vulnerability-assessment-manage.md
454+
- name: Find and remediate vulnerabilities
455+
href: sql-azure-vulnerability-assessment-find.md
456+
- name: Vulnerability assessment rules
457+
href: sql-azure-vulnerability-assessment-rules.md
458+
- name: Vulnerability assessment rules changelog
459+
href: sql-azure-vulnerability-assessment-rules-changelog.md
460+
- name: Store vulnerability scans in storage
461+
href: /azure/azure-sql/database/sql-database-vulnerability-assessment-storage?toc=/azure/defender-for-cloud/toc.json
462+
- name: Investigate threats
463+
items:
464+
- name: Overview
465+
href: /azure/azure-sql/database/threat-detection-overview?toc=/azure/defender-for-cloud/toc.json
466+
- name: Configure threat detection
467+
href: /azure/azure-sql/database/threat-detection-configure?toc=/azure/defender-for-cloud/toc.json
449468
- name: Defender for SQL servers on machines
450469
items:
451470
- name: Enable Defender for SQL servers on machines

articles/defender-for-cloud/defender-for-sql-introduction.md

Lines changed: 14 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -8,59 +8,46 @@ ms.custom: references_regions
88

99
# Overview of Microsoft Defender for Azure SQL
1010

11-
Microsoft Defender for Azure SQL includes two Microsoft Defender plans that extend Microsoft Defender for Cloud's [data security package](/azure/azure-sql/database/azure-defender-for-sql) to protect your SQL estate regardless of where it is located (Azure, multicloud, or hybrid environments). Microsoft Defender for Azure SQL includes functions that can be used to discover and mitigate potential database vulnerabilities. Defender for Azure SQL can also detect anomalous activities that may be an indication of a threat to your databases.
11+
Microsoft Defender for Azure SQL helps you discover and mitigate potential [database vulnerabilities](sql-azure-vulnerability-assessment-overview.md) and alerts you to [anomalous activities](#advanced-threat-protection) that may be an indication of a threat to your databases.
12+
13+
- [Vulnerability assessment](#discover-and-mitigate-vulnerabilities): Scan databases to discover, track, and remediate vulnerabilities. Learn more about [vulnerability assessment](sql-azure-vulnerability-assessment-overview.md).
14+
- [Threat protection](#advanced-threat-protection): Receive detailed security alerts and recommended actions based on SQL Advanced Threat Protection to provide to mitigate threats. Learn more about [SQL Advanced Threat Protection](/azure/azure-sql/database/threat-detection-overview).
15+
16+
When you enable **Microsoft Defender for Azure SQL**, all supported resources that exist within the subscription are protected. Future resources created on the same subscription will also be protected.
1217

1318
## Availability
1419

1520
|Aspect|Details|
1621
|----|:----|
1722
|Release state:|Generally available (GA)|
1823
|Pricing:|**Microsoft Defender for Azure SQL** is billed as shown on the [pricing page](https://azure.microsoft.com/pricing/details/defender-for-cloud/)|
19-
|Protected SQL versions:|Azure SQL [single databases](/azure/azure-sql/database/single-database-overview) and [elastic pools](/azure/azure-sql/database/elastic-pool-overview)<br>[Azure SQL Managed Instance](/azure/azure-sql/managed-instance/sql-managed-instance-paas-overview)<br>[Azure Synapse Analytics (formerly SQL DW) dedicated SQL pool](../synapse-analytics/sql-data-warehouse/sql-data-warehouse-overview-what-is.md)|
24+
|Protected SQL versions:|Read-write replicas of:<br>- Azure SQL [single databases](/azure/azure-sql/database/single-database-overview) and [elastic pools](/azure/azure-sql/database/elastic-pool-overview)<br>- [Azure SQL Managed Instance](/azure/azure-sql/managed-instance/sql-managed-instance-paas-overview)<br>- [Azure Synapse Analytics (formerly SQL DW) dedicated SQL pool](../synapse-analytics/sql-data-warehouse/sql-data-warehouse-overview-what-is.md)|
2025
|Clouds:|:::image type="icon" source="./media/icons/yes-icon.png"::: Commercial clouds<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Azure Government<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Azure China 21Vianet (**Partial**: Subset of alerts and vulnerability assessment for SQL servers. Behavioral threat protections aren't available.)|
2126

22-
## What does Microsoft Defender for Azure SQL protect?
23-
24-
Microsoft Defender for Azure SQL databases protects:
25-
26-
- [Azure SQL Database](/azure/azure-sql/database/sql-database-paas-overview)
27-
- [Azure SQL Managed Instance](/azure/azure-sql/managed-instance/sql-managed-instance-paas-overview)
28-
- [Dedicated SQL pool in Azure Synapse](../synapse-analytics/sql-data-warehouse/sql-data-warehouse-overview-what-is.md)
29-
30-
When you enabled **Microsoft Defender for Azure SQL**, all supported resources that exist within the subscription are protected. Future resources created on the same subscription will also be protected.
31-
32-
> [!NOTE]
33-
> Microsoft Defender for Azure SQL database currently works for read-write replicas only.
34-
3527
## What are the benefits of Microsoft Defender for Azure SQL?
3628

37-
This plan includes functionality for identifying and mitigating potential database vulnerabilities and detecting anomalous activities that could indicate threats to your databases.
29+
### Discover and mitigate vulnerabilities
3830

39-
A vulnerability assessment service discovers, tracks, and helps you remediate potential database vulnerabilities. Assessment scans provide an overview of your SQL machines' security state, and details of any security findings.
31+
A vulnerability assessment service discovers, tracks, and helps you remediate potential database vulnerabilities. Assessment scans provide an overview of your SQL machines' security state, and details of any security findings. Defender for Azure SQL helps you identify and mitigate potential database vulnerabilities and detecting anomalous activities that could indicate threats to your databases.
4032

4133
Learn more about [vulnerability assessment for Azure SQL Database](/azure/azure-sql/database/sql-vulnerability-assessment).
4234

43-
An advanced threat protection service continuously monitors your SQL servers for threats such as SQL injection, brute-force attacks, and privilege abuse. This service provides action-oriented security alerts in Microsoft Defender for Cloud with details of the suspicious activity, guidance on how to mitigate to the threats, and options for continuing your investigations with Microsoft Sentinel. Learn more about [advanced threat protection](/azure/azure-sql/database/threat-detection-overview).
44-
45-
> [!TIP]
46-
> View the list of security alerts for SQL servers [in the alerts reference page](alerts-reference.md#alerts-sql-db-and-warehouse).
35+
### Advanced threat protection
4736

48-
## What kind of alerts does Microsoft Defender for Azure SQL provide?
37+
An advanced threat protection service continuously monitors your SQL servers for threats such as SQL injection, brute-force attacks, and privilege abuse. This service provides action-oriented security alerts in Microsoft Defender for Cloud with details of the suspicious activity, guidance on how to mitigate to the threats, and options for continuing your investigations with Microsoft Sentinel. Learn more about [advanced threat protection](/azure/azure-sql/database/threat-detection-overview).
4938

5039
Threat intelligence enriched security alerts are triggered when there's:
5140

5241
- **Potential SQL injection attacks** - including vulnerabilities detected when applications generate a faulty SQL statement in the database
5342
- **Anomalous database access and query patterns** - for example, an abnormally high number of failed sign-in attempts with different credentials (a brute force attempt)
5443
- **Suspicious database activity** - for example, a legitimate user accessing an SQL Server from a breached computer which communicated with a crypto-mining C&C server
5544

56-
Alerts include details of the incident that triggered them, as well as recommendations on how to investigate and remediate threats.
45+
Alerts include details of the incident that triggered them, as well as recommendations on how to investigate and remediate threats. Learn more about the [security alerts for SQL servers](alerts-reference.md#alerts-sql-db-and-warehouse).
5746

5847
## Next steps
5948

60-
In this article, you learned about Microsoft Defender for Azure SQL.
61-
62-
For related information, see these resources:
49+
In this article, you learned about Microsoft Defender for Azure SQL. Now you can:
6350

51+
- [Enable Microsoft Defender for Azure SQL](quickstart-enable-database-protections.md)
6452
- [How Microsoft Defender for Azure SQL can protect SQL servers anywhere](https://www.youtube.com/watch?v=V7RdB6RSVpc).
6553
- [Set up email notifications for security alerts](configure-email-notifications.md)
66-
- [Learn more about Microsoft Sentinel](../sentinel/index.yml)

articles/defender-for-cloud/defender-for-sql-on-machines-vulnerability-assessment.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Using Microsoft Defender for Cloud's integrated vulnerability assessment scanner for SQL servers
2+
title: Scan for vulnerabilities on on-premises and Azure Arc-enabled SQL servers
33
description: Learn about Microsoft Defender for SQL servers on machines' integrated vulnerability assessment scanner
44
ms.topic: how-to
55
ms.author: benmansheim
Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
[!INCLUDE applies-md] :::image type="icon" source="../media/applies-to/yes-icon.svg" border="false"::: Azure SQL Database :::image type="icon" source="../media/applies-to/yes-icon.svg" border="false"::: Azure SQL Managed Instance :::image type="icon" source="../media/applies-to/yes-icon.svg" border="false"::: Azure Synapse Analytics
Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
[!NOTE] This article uses the Azure Az PowerShell module, which is the recommended PowerShell module for interacting with Azure. To get started with the Az PowerShell module, see Install Azure PowerShell. To learn how to migrate to the Az PowerShell module, see Migrate Azure PowerShell from AzureRM to Az.
13 KB
Loading
Loading
Loading
10.2 KB
Loading

0 commit comments

Comments
 (0)