Skip to content

Commit 67fa3bd

Browse files
committed
Update per call (not under, behind)
1 parent 62b5787 commit 67fa3bd

File tree

3 files changed

+17
-16
lines changed

3 files changed

+17
-16
lines changed

articles/sql-database/create-auditing-storage-account-vnet-firewall.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Audit to storage account under VNet and firewall
3-
description: Configure auditing to write database events on a storage account under virtual network and firewall
2+
title: Audit to storage account behind VNet and firewall
3+
description: Configure auditing to write database events on a storage account behind virtual network and firewall
44
services: sql-database
55
ms.service: sql-database
66
ms.subservice: security
@@ -11,7 +11,7 @@ ms.reviewer: vanto
1111
ms.date: 03/08/2020
1212
ms.custom: azure-synapse
1313
---
14-
# Write audit to a storage account under VNet and firewall
14+
# Write audit to a storage account behind VNet and firewall
1515

1616
Auditing for [Azure SQL Database](sql-database-technical-overview.md) and [Azure Synapse Analytics](../sql-data-warehouse/sql-data-warehouse-overview-what-is.md) supports writing database events to an [Azure Storage account](../storage/common/storage-account-overview.md) behind a virtual network and firewall.
1717

@@ -27,7 +27,7 @@ To learn more about how to create a virtual network, see [Quickstart: Create a v
2727

2828
## Prerequisites
2929

30-
For audit to write to a storage account under a VNet or firewall, the following prerequisites are required:
30+
For audit to write to a storage account behind a VNet or firewall, the following prerequisites are required:
3131

3232
> [!div class="checklist"]
3333
> * A general-purpose v2 storage account. If you have a general-purpose v1 or blob storage account, [upgrade to a general-purpose v2 storage account](../storage/common/storage-account-upgrade.md). For more information, see [Types of storage accounts](../storage/common/storage-account-overview.md#types-of-storage-accounts).
@@ -46,21 +46,21 @@ Connect to [Azure portal](https://portal.azure.com) with your subscription. Navi
4646
3. Open **Storage details**
4747

4848
> [!NOTE]
49-
> If the selected Storage account is under VNet, you will see the following message:
49+
> If the selected Storage account is behind VNet, you will see the following message:
5050
>
5151
>`You have selected a storage account that is behind a firewall or in a virtual network. Using this storage: requires an Active Directory admin on the server; enables 'Allow trusted Microsoft services to access this storage account' on the storage account; and creates a server managed identity with 'storage blob data contributor' RBAC.`
5252
>
53-
>If you do not see this message, then storage account is not under VNet.
53+
>If you do not see this message, then storage account is not behind a VNet.
5454
5555
3. Select the number of days for the retention period. Then click **OK**. Logs older than the retention period are deleted.
5656

5757
4. Select **Save** on your auditing settings.
5858

59-
You have succesfully configured audit to write to a storage account under a VNet or firewall.
59+
You have successfully configured audit to write to a storage account behind a VNet or firewall.
6060

6161
## Configure with REST commands
6262

63-
As an alternative to using the Azure portal, you can use REST commands to configure audit to write database events on a storage account under a VNet and Firewall.
63+
As an alternative to using the Azure portal, you can use REST commands to configure audit to write database events on a storage account behind a VNet and Firewall.
6464

6565
The sample scripts in this section require you to update the script before you run them. Replace the following values in the scripts:
6666

articles/sql-database/sql-database-auditing.md

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -11,19 +11,20 @@ ms.reviewer: vanto
1111
ms.date: 02/11/2020
1212
ms.custom: azure-synapse
1313
---
14-
# Get started with SQL database auditing
14+
# Azure SQL Auditing
1515

16-
Auditing for Azure [SQL Database](sql-database-technical-overview.md) and [Azure Synapse Analytics](../sql-data-warehouse/sql-data-warehouse-overview-what-is.md) tracks database events and writes them to an audit log in your Azure storage account, Log Analytics workspace or Event Hubs. Auditing also:
16+
Auditing for Azure [SQL Database](sql-database-technical-overview.md) and [Azure Synapse Analytics](../sql-data-warehouse/sql-data-warehouse-overview-what-is.md) tracks database events and writes them to an audit log in your Azure storage account, Log Analytics workspace or Event Hubs.
17+
18+
Auditing also:
1719

1820
- Helps you maintain regulatory compliance, understand database activity, and gain insight into discrepancies and anomalies that could indicate business concerns or suspected security violations.
1921

2022
- Enables and facilitates adherence to compliance standards, although it doesn't guarantee compliance. For more information about Azure programs that support standards compliance, see the [Azure Trust Center](https://gallery.technet.microsoft.com/Overview-of-Azure-c1be3942) where you can find the most current list of SQL Database compliance certifications.
2123

22-
2324
> [!NOTE]
2425
> This topic applies to Azure SQL server, and to both SQL Database and Azure Synapse Analytics databases that are created on the Azure SQL server. For simplicity, SQL Database is used when referring to both SQL Database and Azure Synapse.
2526
26-
## <a id="subheading-1"></a>Azure SQL database auditing overview
27+
## <a id="subheading-1"></a>Overview
2728

2829
You can use SQL database auditing to:
2930

@@ -95,7 +96,7 @@ To configure writing audit logs to a storage account, select **Storage** and ope
9596
9697
![storage account](./media/sql-database-auditing-get-started/auditing_select_storage.png)
9798

98-
To configure a storage account under a virtual network or firewall you will need an [Active Directory admin](https://docs.microsoft.com/azure/sql-database/sql-database-aad-authentication-configure?tabs=azure-powershell#provision-an-azure-active-directory-administrator-for-your-managed-instance) on the server, enable **Allow trusted Microsoft services to access this storage account** on the storage account. In addition, you need to have the 'Microsoft.Authorization/roleAssignments/write' permission on the selected storage account.
99+
To configure a storage account behind a virtual network or firewall you will need an [Active Directory admin](https://docs.microsoft.com/azure/sql-database/sql-database-aad-authentication-configure?tabs=azure-powershell#provision-an-azure-active-directory-administrator-for-your-managed-instance) on the server, enable **Allow trusted Microsoft services to access this storage account** on the storage account. In addition, you need to have the 'Microsoft.Authorization/roleAssignments/write' permission on the selected storage account.
99100

100101
We recommend you to be [User Access Administrator](../role-based-access-control/built-in-roles.md#user-access-administrator) in order to grant to the managed identity the role 'storage blob data contributor'. To learn more about permissions and role-based access control, see [What is role-based access control (RBAC) for Azure resources?](../role-based-access-control/overview.md) and [Add or remove role assignments using Azure RBAC and the Azure portal](../role-based-access-control/role-assignments-portal.md)
101102

@@ -194,9 +195,9 @@ If you chose to write audit logs to an Azure storage account, there are several
194195

195196
- [Query Extended Events Files](https://sqlscope.wordpress.com/20../../reading-extended-event-files-using-client-side-tools-only/) by using PowerShell.
196197

197-
## Log audits to storage account under VNet or firewall
198+
## Log audits to storage account behind VNet or firewall
198199

199-
You can write audit logs to a an Azure Storage account under a VNet or firewall. For specific instructions see, [Write audit to a storage account under VNet and firewall](create-auditing-storage-account-vnet-firewall.md).
200+
You can write audit logs to a an Azure Storage account behind a VNet or firewall. For specific instructions see, [Write audit to a storage account behind VNet and firewall](create-auditing-storage-account-vnet-firewall.md).
200201

201202
## <a id="subheading-5"></a>Production practices
202203

articles/sql-database/toc.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -117,7 +117,7 @@
117117

118118
- name: Auditing
119119
items:
120-
- name: Get started with SQL Database auditing
120+
- name: Azure SQL auditing
121121
href: sql-database-auditing.md
122122
- name: Audit to storage account
123123
href: create-auditing-storage-account-vnet-firewall.md

0 commit comments

Comments
 (0)