Skip to content

Commit 7525876

Browse files
authored
Merge pull request #142896 from DavidTrigano/patch-21
Update sql-database-vulnerability-assessment-storage.md
2 parents df8cdf8 + ed9a088 commit 7525876

File tree

1 file changed

+10
-7
lines changed

1 file changed

+10
-7
lines changed

articles/azure-sql/database/sql-database-vulnerability-assessment-storage.md

Lines changed: 10 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -5,8 +5,8 @@ services: sql-database
55
ms.service: sql-db-mi
66
ms.subservice: security
77
ms.topic: how-to
8-
author: barmichal
9-
ms.author: mibar
8+
author: davidtrigano
9+
ms.author: datrigan
1010
ms.reviewer: vanto
1111
ms.date: 12/01/2020
1212
---
@@ -18,18 +18,21 @@ If you are limiting access to your storage account in Azure for certain VNets or
1818

1919
## Enable Azure SQL Database VA scanning access to the storage account
2020

21-
If you have configured your VA storage account to only be accessible by certain networks or services, you'll need to ensure that VA scans for your Azure SQL Database are able to store the scans on the storage account. To find out which storage account is being used, go to your **SQL server** pane in the [Azure portal](https://portal.azure.com), under **Security**, select **Security Center**.
21+
If you have configured your VA storage account to only be accessible by certain networks or services, you'll need to ensure that VA scans for your Azure SQL Database are able to store the scans on the storage account. You can use the existing storage account, or create a new storage account to store VA scan results for all databases on your [logical SQL server](logical-servers.md).
2222

23-
:::image type="content" source="../database/media/azure-defender-for-sql/va-storage.png" alt-text="set up vulnerability assessment":::
24-
25-
You can use the existing storage account, or create a new storage account to store VA scan results for all databases on your [logical SQL server](logical-servers.md).
23+
> [!NOTE]
24+
> The vulnerability assessment service can't access storage accounts protected with firewalls or VNets if they require storage access keys.
2625
2726
Go to your **Resource group** that contains the storage account and access the **Storage account** pane. Under **Settings**, select **Firewall and virtual networks**.
2827

2928
Ensure that **Allow trusted Microsoft services access to this storage account** is checked.
3029

3130
:::image type="content" source="media/sql-database-vulnerability-assessment-storage/storage-allow-microsoft-services.png" alt-text="Screenshot shows Firewall and virtual networks dialog box, with Allow trusted Microsoft services to access this storage account selected.":::
3231

32+
To find out which storage account is being used, go to your **SQL server** pane in the [Azure portal](https://portal.azure.com), under **Security**, select **Security Center**.
33+
34+
:::image type="content" source="../database/media/azure-defender-for-sql/va-storage.png" alt-text="set up vulnerability assessment":::
35+
3336
## Store VA scan results for Azure SQL Managed Instance in a storage account that can be accessed behind a firewall or VNet
3437

3538
Since Managed Instance is not a trusted Microsoft Service and has a different VNet from the storage account, executing a VA scan will result in an error.
@@ -58,4 +61,4 @@ You should now be able to store your VA scans for Managed Instances in your stor
5861

5962
- [Vulnerability Assessment](sql-vulnerability-assessment.md)
6063
- [Create an Azure Storage account](../../storage/common/storage-account-create.md)
61-
- [Azure Defender for SQL](azure-defender-for-sql.md)
64+
- [Azure Defender for SQL](azure-defender-for-sql.md)

0 commit comments

Comments
 (0)