Skip to content

Commit 8b4fb62

Browse files
authored
Merge pull request #109296 from VanMSFT/20200327_audit
Editing SQL Database Auditing article
2 parents a4c71fc + db22fc6 commit 8b4fb62

File tree

1 file changed

+26
-26
lines changed

1 file changed

+26
-26
lines changed

articles/sql-database/sql-database-auditing.md

Lines changed: 26 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.topic: conceptual
88
author: DavidTrigano
99
ms.author: datrigan
1010
ms.reviewer: vanto
11-
ms.date: 03/19/2020
11+
ms.date: 03/27/2020
1212
ms.custom: azure-synapse
1313
---
1414
# Azure SQL Auditing
@@ -72,36 +72,36 @@ The following section describes the configuration of auditing using the Azure po
7272

7373
To configure writing audit logs to a storage account, select **Storage** and open **Storage details**. Select the Azure storage account where logs will be saved, and then select the retention period. Then click **OK**. Logs older than the retention period are deleted.
7474

75-
> [!IMPORTANT]
76-
> - All storage kinds (v1, v2, blob) are supported.
77-
> - All storage replication configurations are supported.
78-
> - Storage behind a virtual network and firewall is supported.
79-
> - **Premium storage** is currently **not supported**.
80-
> - **Hierarchical namespace** for **Azure Data Lake Storage Gen2 storage account** is currently **not supported**.
81-
> - Enabling auditing on a paused **Azure SQL Data Warehouse** is not supported. To enable auditing, resume the Data Warehouse.
82-
>
83-
> - The default value for retention period is 0 (unlimited retention). You can change this value by moving the **Retention (Days)** slider in **Storage settings** when configuring the storage account for auditing.
84-
> If you change retention period from 0 (unlimited retention) to any other value, please note that retention will only apply to logs written after retention value was changed (logs written during the period when retention was set to unlimited are preserved, even after retention is enabled)
85-
> - Customer wishing to configure an immutable log store for their server- or database-level audit events should follow the [instructions provided by Azure Storage](https://docs.microsoft.com/azure/storage/blobs/storage-blob-immutability-policies-manage#enabling-allow-protected-append-blobs-writes) (Please ensure you have selected **Allow additional appends** when you configure the immutable blob storage)
86-
> - After you've configured your auditing settings, you can turn on the new threat detection feature and configure emails to receive security alerts. When you use threat detection, you receive proactive alerts on anomalous database activities that can indicate potential security threats. For more information, see [Getting started with threat detection](sql-database-threat-detection-get-started.md).
87-
> - For details about the log format, hierarchy of the storage folder and naming conventions, see the [Blob Audit Log Format Reference](https://go.microsoft.com/fwlink/?linkid=829599).
88-
> - Azure SQL Database Audit stores 4000 characters of data for character fields in an audit record. When the **statement** or the **data_sensitivity_information** values returned from an auditable action contain more than 4000 characters, any data beyond the first 4000 characters will be **truncated and not audited**.
89-
> - Audit logs are written to **Append Blobs** in an Azure Blob storage on your Azure subscription
90-
> - The default auditing policy includes all actions and the following set of action groups, which will audit all the queries and stored procedures executed against the database, as well as successful and failed logins:
91-
>
92-
> BATCH_COMPLETED_GROUP<br>
93-
> SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP<br>
94-
> FAILED_DATABASE_AUTHENTICATION_GROUP<br>
95-
>
96-
> You can configure auditing for different types of actions and action groups using PowerShell, as described in the [Manage SQL database auditing using Azure PowerShell](#subheading-7) section.
97-
> - When using AAD Authentication, failed logins records will *not* appear in the SQL audit log. To view failed login audit records, you need to visit the [Azure Active Directory portal]( ../active-directory/reports-monitoring/reference-sign-ins-error-codes.md), which logs details of these events.
98-
99-
![storage account](./media/sql-database-auditing-get-started/auditing_select_storage.png)
75+
![storage account](./media/sql-database-auditing-get-started/auditing_select_storage.png)
10076

10177
#### Log audits to storage account behind VNet or firewall
10278

10379
You can write audit logs to a an Azure Storage account behind a VNet or firewall. For specific instructions see, [Write audit to a storage account behind VNet and firewall](create-auditing-storage-account-vnet-firewall.md).
10480

81+
#### Remarks
82+
83+
- All storage kinds (v1, v2, blob) are supported.
84+
- All storage replication configurations are supported.
85+
- Storage behind a virtual network and firewall is supported.
86+
- **Premium storage** is currently **not supported**.
87+
- **Hierarchical namespace** for **Azure Data Lake Storage Gen2 storage account** is currently **not supported**.
88+
- Enabling auditing on a paused **Azure SQL Data Warehouse** is not supported. To enable auditing, resume the Data Warehouse.
89+
- The default value for retention period is 0 (unlimited retention). You can change this value by moving the **Retention (Days)** slider in **Storage settings** when configuring the storage account for auditing.
90+
- If you change retention period from 0 (unlimited retention) to any other value, please note that retention will only apply to logs written after retention value was changed (logs written during the period when retention was set to unlimited are preserved, even after retention is enabled).
91+
- Customer wishing to configure an immutable log store for their server- or database-level audit events should follow the [instructions provided by Azure Storage](https://docs.microsoft.com/azure/storage/blobs/storage-blob-immutability-policies-manage#enabling-allow-protected-append-blobs-writes) (Please ensure you have selected **Allow additional appends** when you configure the immutable blob storage).
92+
- After you've configured your auditing settings, you can turn on the new threat detection feature and configure emails to receive security alerts. When you use threat detection, you receive proactive alerts on anomalous database activities that can indicate potential security threats. For more information, see [Getting started with threat detection](sql-database-threat-detection-get-started.md).
93+
- For details about the log format, hierarchy of the storage folder and naming conventions, see the [Blob Audit Log Format Reference](https://go.microsoft.com/fwlink/?linkid=829599).
94+
- Azure SQL Database Audit stores 4000 characters of data for character fields in an audit record. When the **statement** or the **data_sensitivity_information** values returned from an auditable action contain more than 4000 characters, any data beyond the first 4000 characters will be **truncated and not audited**.
95+
- Audit logs are written to **Append Blobs** in an Azure Blob storage on your Azure subscription
96+
- The default auditing policy includes all actions and the following set of action groups, which will audit all the queries and stored procedures executed against the database, as well as successful and failed logins:
97+
98+
- BATCH_COMPLETED_GROUP
99+
- SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP
100+
- FAILED_DATABASE_AUTHENTICATION_GROUP
101+
102+
- You can configure auditing for different types of actions and action groups using PowerShell, as described in the [Manage SQL database auditing using Azure PowerShell](#subheading-7) section.
103+
- When using AAD Authentication, failed logins records will *not* appear in the SQL audit log. To view failed login audit records, you need to visit the [Azure Active Directory portal]( ../active-directory/reports-monitoring/reference-sign-ins-error-codes.md), which logs details of these events.
104+
105105
### <a id="audit-log-analytics-destination">Audit to Log Analytics destination</a>
106106

107107
To configure writing audit logs to a Log Analytics workspace, select **Log Analytics (Preview)** and open **Log Analytics details**. Select or create the Log Analytics workspace where logs will be written and then click **OK**.

0 commit comments

Comments
 (0)