You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sql-database/create-auditing-storage-account-vnet-firewall.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
-
title: Audit to storage account under VNet and firewall
3
-
description: Configure auditing to write database events on a storage account under virtual network and firewall
2
+
title: Audit to storage account behind VNet and firewall
3
+
description: Configure auditing to write database events on a storage account behind virtual network and firewall
4
4
services: sql-database
5
5
ms.service: sql-database
6
6
ms.subservice: security
@@ -11,7 +11,7 @@ ms.reviewer: vanto
11
11
ms.date: 03/08/2020
12
12
ms.custom: azure-synapse
13
13
---
14
-
# Write audit to a storage account under VNet and firewall
14
+
# Write audit to a storage account behind VNet and firewall
15
15
16
16
Auditing for [Azure SQL Database](sql-database-technical-overview.md) and [Azure Synapse Analytics](../sql-data-warehouse/sql-data-warehouse-overview-what-is.md) supports writing database events to an [Azure Storage account](../storage/common/storage-account-overview.md) behind a virtual network and firewall.
17
17
@@ -27,7 +27,7 @@ To learn more about how to create a virtual network, see [Quickstart: Create a v
27
27
28
28
## Prerequisites
29
29
30
-
For audit to write to a storage account under a VNet or firewall, the following prerequisites are required:
30
+
For audit to write to a storage account behind a VNet or firewall, the following prerequisites are required:
31
31
32
32
> [!div class="checklist"]
33
33
> * A general-purpose v2 storage account. If you have a general-purpose v1 or blob storage account, [upgrade to a general-purpose v2 storage account](../storage/common/storage-account-upgrade.md). For more information, see [Types of storage accounts](../storage/common/storage-account-overview.md#types-of-storage-accounts).
@@ -46,21 +46,21 @@ Connect to [Azure portal](https://portal.azure.com) with your subscription. Navi
46
46
3. Open **Storage details**
47
47
48
48
> [!NOTE]
49
-
> If the selected Storage account is under VNet, you will see the following message:
49
+
> If the selected Storage account is behind VNet, you will see the following message:
50
50
>
51
51
>`You have selected a storage account that is behind a firewall or in a virtual network. Using this storage: requires an Active Directory admin on the server; enables 'Allow trusted Microsoft services to access this storage account' on the storage account; and creates a server managed identity with 'storage blob data contributor' RBAC.`
52
52
>
53
-
>If you do not see this message, then storage account is not under VNet.
53
+
>If you do not see this message, then storage account is not behind a VNet.
54
54
55
55
3. Select the number of days for the retention period. Then click **OK**. Logs older than the retention period are deleted.
56
56
57
57
4. Select **Save** on your auditing settings.
58
58
59
-
You have succesfully configured audit to write to a storage account under a VNet or firewall.
59
+
You have successfully configured audit to write to a storage account behind a VNet or firewall.
60
60
61
61
## Configure with REST commands
62
62
63
-
As an alternative to using the Azure portal, you can use REST commands to configure audit to write database events on a storage account under a VNet and Firewall.
63
+
As an alternative to using the Azure portal, you can use REST commands to configure audit to write database events on a storage account behind a VNet and Firewall.
64
64
65
65
The sample scripts in this section require you to update the script before you run them. Replace the following values in the scripts:
Copy file name to clipboardExpand all lines: articles/sql-database/sql-database-auditing.md
+8-7Lines changed: 8 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,19 +11,20 @@ ms.reviewer: vanto
11
11
ms.date: 02/11/2020
12
12
ms.custom: azure-synapse
13
13
---
14
-
# Get started with SQL database auditing
14
+
# Azure SQL Auditing
15
15
16
-
Auditing for Azure [SQL Database](sql-database-technical-overview.md) and [Azure Synapse Analytics](../sql-data-warehouse/sql-data-warehouse-overview-what-is.md) tracks database events and writes them to an audit log in your Azure storage account, Log Analytics workspace or Event Hubs. Auditing also:
16
+
Auditing for Azure [SQL Database](sql-database-technical-overview.md) and [Azure Synapse Analytics](../sql-data-warehouse/sql-data-warehouse-overview-what-is.md) tracks database events and writes them to an audit log in your Azure storage account, Log Analytics workspace or Event Hubs.
17
+
18
+
Auditing also:
17
19
18
20
- Helps you maintain regulatory compliance, understand database activity, and gain insight into discrepancies and anomalies that could indicate business concerns or suspected security violations.
19
21
20
22
- Enables and facilitates adherence to compliance standards, although it doesn't guarantee compliance. For more information about Azure programs that support standards compliance, see the [Azure Trust Center](https://gallery.technet.microsoft.com/Overview-of-Azure-c1be3942) where you can find the most current list of SQL Database compliance certifications.
21
23
22
-
23
24
> [!NOTE]
24
25
> This topic applies to Azure SQL server, and to both SQL Database and Azure Synapse Analytics databases that are created on the Azure SQL server. For simplicity, SQL Database is used when referring to both SQL Database and Azure Synapse.
To configure a storage account under a virtual network or firewall you will need an [Active Directory admin](https://docs.microsoft.com/azure/sql-database/sql-database-aad-authentication-configure?tabs=azure-powershell#provision-an-azure-active-directory-administrator-for-your-managed-instance) on the server, enable **Allow trusted Microsoft services to access this storage account** on the storage account. In addition, you need to have the 'Microsoft.Authorization/roleAssignments/write' permission on the selected storage account.
99
+
To configure a storage account behind a virtual network or firewall you will need an [Active Directory admin](https://docs.microsoft.com/azure/sql-database/sql-database-aad-authentication-configure?tabs=azure-powershell#provision-an-azure-active-directory-administrator-for-your-managed-instance) on the server, enable **Allow trusted Microsoft services to access this storage account** on the storage account. In addition, you need to have the 'Microsoft.Authorization/roleAssignments/write' permission on the selected storage account.
99
100
100
101
We recommend you to be [User Access Administrator](../role-based-access-control/built-in-roles.md#user-access-administrator) in order to grant to the managed identity the role 'storage blob data contributor'. To learn more about permissions and role-based access control, see [What is role-based access control (RBAC) for Azure resources?](../role-based-access-control/overview.md) and [Add or remove role assignments using Azure RBAC and the Azure portal](../role-based-access-control/role-assignments-portal.md)
101
102
@@ -194,9 +195,9 @@ If you chose to write audit logs to an Azure storage account, there are several
194
195
195
196
-[Query Extended Events Files](https://sqlscope.wordpress.com/20../../reading-extended-event-files-using-client-side-tools-only/) by using PowerShell.
196
197
197
-
## Log audits to storage account under VNet or firewall
198
+
## Log audits to storage account behind VNet or firewall
198
199
199
-
You can write audit logs to a an Azure Storage account under a VNet or firewall. For specific instructions see, [Write audit to a storage account under VNet and firewall](create-auditing-storage-account-vnet-firewall.md).
200
+
You can write audit logs to a an Azure Storage account behind a VNet or firewall. For specific instructions see, [Write audit to a storage account behind VNet and firewall](create-auditing-storage-account-vnet-firewall.md).
0 commit comments