You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sql-database/sql-database-auditing.md
+26-26Lines changed: 26 additions & 26 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.topic: conceptual
8
8
author: DavidTrigano
9
9
ms.author: datrigan
10
10
ms.reviewer: vanto
11
-
ms.date: 03/19/2020
11
+
ms.date: 03/27/2020
12
12
ms.custom: azure-synapse
13
13
---
14
14
# Azure SQL Auditing
@@ -72,36 +72,36 @@ The following section describes the configuration of auditing using the Azure po
72
72
73
73
To configure writing audit logs to a storage account, select **Storage** and open **Storage details**. Select the Azure storage account where logs will be saved, and then select the retention period. Then click **OK**. Logs older than the retention period are deleted.
74
74
75
-
> [!IMPORTANT]
76
-
> - All storage kinds (v1, v2, blob) are supported.
77
-
> - All storage replication configurations are supported.
78
-
> - Storage behind a virtual network and firewall is supported.
79
-
> -**Premium storage** is currently **not supported**.
80
-
> -**Hierarchical namespace** for **Azure Data Lake Storage Gen2 storage account** is currently **not supported**.
81
-
> - Enabling auditing on a paused **Azure SQL Data Warehouse** is not supported. To enable auditing, resume the Data Warehouse.
82
-
>
83
-
> - The default value for retention period is 0 (unlimited retention). You can change this value by moving the **Retention (Days)** slider in **Storage settings** when configuring the storage account for auditing.
84
-
> If you change retention period from 0 (unlimited retention) to any other value, please note that retention will only apply to logs written after retention value was changed (logs written during the period when retention was set to unlimited are preserved, even after retention is enabled)
85
-
> - Customer wishing to configure an immutable log store for their server- or database-level audit events should follow the [instructions provided by Azure Storage](https://docs.microsoft.com/azure/storage/blobs/storage-blob-immutability-policies-manage#enabling-allow-protected-append-blobs-writes) (Please ensure you have selected **Allow additional appends** when you configure the immutable blob storage)
86
-
> - After you've configured your auditing settings, you can turn on the new threat detection feature and configure emails to receive security alerts. When you use threat detection, you receive proactive alerts on anomalous database activities that can indicate potential security threats. For more information, see [Getting started with threat detection](sql-database-threat-detection-get-started.md).
87
-
> - For details about the log format, hierarchy of the storage folder and naming conventions, see the [Blob Audit Log Format Reference](https://go.microsoft.com/fwlink/?linkid=829599).
88
-
> - Azure SQL Database Audit stores 4000 characters of data for character fields in an audit record. When the **statement** or the **data_sensitivity_information** values returned from an auditable action contain more than 4000 characters, any data beyond the first 4000 characters will be **truncated and not audited**.
89
-
> - Audit logs are written to **Append Blobs** in an Azure Blob storage on your Azure subscription
90
-
> - The default auditing policy includes all actions and the following set of action groups, which will audit all the queries and stored procedures executed against the database, as well as successful and failed logins:
91
-
>
92
-
> BATCH_COMPLETED_GROUP<br>
93
-
> SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP<br>
94
-
> FAILED_DATABASE_AUTHENTICATION_GROUP<br>
95
-
>
96
-
> You can configure auditing for different types of actions and action groups using PowerShell, as described in the [Manage SQL database auditing using Azure PowerShell](#subheading-7) section.
97
-
> - When using AAD Authentication, failed logins records will *not* appear in the SQL audit log. To view failed login audit records, you need to visit the [Azure Active Directory portal](../active-directory/reports-monitoring/reference-sign-ins-error-codes.md), which logs details of these events.
#### Log audits to storage account behind VNet or firewall
102
78
103
79
You can write audit logs to a an Azure Storage account behind a VNet or firewall. For specific instructions see, [Write audit to a storage account behind VNet and firewall](create-auditing-storage-account-vnet-firewall.md).
104
80
81
+
#### Remarks
82
+
83
+
- All storage kinds (v1, v2, blob) are supported.
84
+
- All storage replication configurations are supported.
85
+
- Storage behind a virtual network and firewall is supported.
86
+
-**Premium storage** is currently **not supported**.
87
+
-**Hierarchical namespace** for **Azure Data Lake Storage Gen2 storage account** is currently **not supported**.
88
+
- Enabling auditing on a paused **Azure SQL Data Warehouse** is not supported. To enable auditing, resume the Data Warehouse.
89
+
- The default value for retention period is 0 (unlimited retention). You can change this value by moving the **Retention (Days)** slider in **Storage settings** when configuring the storage account for auditing.
90
+
- If you change retention period from 0 (unlimited retention) to any other value, please note that retention will only apply to logs written after retention value was changed (logs written during the period when retention was set to unlimited are preserved, even after retention is enabled).
91
+
- Customer wishing to configure an immutable log store for their server- or database-level audit events should follow the [instructions provided by Azure Storage](https://docs.microsoft.com/azure/storage/blobs/storage-blob-immutability-policies-manage#enabling-allow-protected-append-blobs-writes) (Please ensure you have selected **Allow additional appends** when you configure the immutable blob storage).
92
+
- After you've configured your auditing settings, you can turn on the new threat detection feature and configure emails to receive security alerts. When you use threat detection, you receive proactive alerts on anomalous database activities that can indicate potential security threats. For more information, see [Getting started with threat detection](sql-database-threat-detection-get-started.md).
93
+
- For details about the log format, hierarchy of the storage folder and naming conventions, see the [Blob Audit Log Format Reference](https://go.microsoft.com/fwlink/?linkid=829599).
94
+
- Azure SQL Database Audit stores 4000 characters of data for character fields in an audit record. When the **statement** or the **data_sensitivity_information** values returned from an auditable action contain more than 4000 characters, any data beyond the first 4000 characters will be **truncated and not audited**.
95
+
- Audit logs are written to **Append Blobs** in an Azure Blob storage on your Azure subscription
96
+
- The default auditing policy includes all actions and the following set of action groups, which will audit all the queries and stored procedures executed against the database, as well as successful and failed logins:
97
+
98
+
- BATCH_COMPLETED_GROUP
99
+
- SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP
100
+
- FAILED_DATABASE_AUTHENTICATION_GROUP
101
+
102
+
- You can configure auditing for different types of actions and action groups using PowerShell, as described in the [Manage SQL database auditing using Azure PowerShell](#subheading-7) section.
103
+
- When using AAD Authentication, failed logins records will *not* appear in the SQL audit log. To view failed login audit records, you need to visit the [Azure Active Directory portal](../active-directory/reports-monitoring/reference-sign-ins-error-codes.md), which logs details of these events.
104
+
105
105
### <aid="audit-log-analytics-destination">Audit to Log Analytics destination</a>
106
106
107
107
To configure writing audit logs to a Log Analytics workspace, select **Log Analytics (Preview)** and open **Log Analytics details**. Select or create the Log Analytics workspace where logs will be written and then click **OK**.
0 commit comments