You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/defender-for-sql-introduction.md
-1Lines changed: 0 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,6 @@ Microsoft Defender for Azure SQL helps you discover and mitigate potential [data
12
12
13
13
-[Vulnerability assessment](#discover-and-mitigate-vulnerabilities): Scan databases to discover, track, and remediate vulnerabilities. Learn more about [vulnerability assessment](sql-azure-vulnerability-assessment-overview.md).
14
14
-[Threat protection](#advanced-threat-protection): Receive detailed security alerts and recommended actions based on SQL Advanced Threat Protection to provide to mitigate threats. Learn more about [SQL Advanced Threat Protection](/azure/azure-sql/database/threat-detection-overview).
15
-
- Identify sensitive information: Create a custom policy to label and classify sensitive information stored in your databases. Learn more about [SQL information protection](sql-information-protection-policy.md).
16
15
17
16
When you enable **Microsoft Defender for Azure SQL**, all supported resources that exist within the subscription are protected. Future resources created on the same subscription will also be protected.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/sql-azure-vulnerability-assessment-enable.md
+4-1Lines changed: 4 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -61,6 +61,9 @@ To enable vulnerability assessment without a storage account, use the express co
61
61
62
62
Now you can go to the [**SQL databases should have vulnerability findings resolved**](https://ms.portal.azure.com/#view/Microsoft_Azure_Security_AzureDefenderForData/SqlVaServersRecommendationDetailsBlade/assessmentKey/82e20e14-edc5-4373-bfc4-f13121257c37) recommendation to see the vulnerabilities found in your databases. You can also run on-demand vulnerability assessment scans to see the current findings.
63
63
64
+
> [!NOTE]
65
+
> Each database is randomly assigned a scan time on a set day of the week. Email notifications are scheduled randomly per server on a set day of the week. The email notification report includes data from all recurring database scans that were executed during the preceding week (does not include on-demand scans).
66
+
64
67
#### Enable express vulnerability assessment at scale
65
68
66
69
If you have SQL resources that do not have Advanced Threat Protection and vulnerability assessment enable, you can use the [SQL vulnerability assessment APIs](sql-azure-vulnerability-assessment-manage.md#manage-vulnerability-assessments-programmatically) to enable SQL vulnerability assessment with the express configuration at scale.
@@ -84,7 +87,7 @@ To enable vulnerability assessment with a storage account, use the classic confi
84
87
1. Configure a storage account where your scan results for all databases on the server or managed instance will be stored. For information about storage accounts, see [About Azure storage accounts](/azure/storage/common/storage-account-create).
85
88
86
89
1. To configure vulnerability assessments to automatically run weekly scans to detect security misconfigurations, set **Periodic recurring scans** to **On**. The results are sent to the email addresses you provide in **Send scan reports to**. You can also send email notification to admins and subscription owners by enabling **Also send email notification to admins and subscription owners**.
87
-
90
+
88
91
> [!NOTE]
89
92
> Each database is randomly assigned a scan time on a set day of the week. Email notifications are scheduled randomly per server on a set day of the week. The email notification report includes data from all recurring database scans that were executed during the preceding week (does not include on-demand scans).
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/sql-azure-vulnerability-assessment-find.md
+14-22Lines changed: 14 additions & 22 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -47,19 +47,19 @@ SQL vulnerability assessment queries the SQL server using publicly available que
47
47
48
48
### On-demand vulnerability scans
49
49
50
-
1.SQL vulnerability assessment scans can also be run on-demand:
50
+
You can run SQL vulnerability assessment scans on-demand:
51
51
52
-
1. From the resource's **Defender for Cloud** page, select **View additional findings in Vulnerability Assessment** to access the scan results from previous scans.
52
+
1. From the resource's **Defender for Cloud** page, select **View additional findings in Vulnerability Assessment** to access the scan results from previous scans.
53
53
54
-
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/view-additional-findings-link.png" alt-text="Opening the scan results and manual scan options.":::
54
+
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/view-additional-findings-link.png" alt-text="Opening the scan results and manual scan options.":::
55
55
56
-
1. To run an on-demand scan to scan your database for vulnerabilities, select **Scan** from the toolbar:
56
+
1. To run an on-demand scan to scan your database for vulnerabilities, select **Scan** from the toolbar:
57
57
58
-
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/on-demand-vulnerability-scan.png" alt-text="Select scan to run an on-demand vulnerability assessment scan of your SQL resource":::
58
+
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/on-demand-vulnerability-scan.png" alt-text="Select scan to run an on-demand vulnerability assessment scan of your SQL resource":::
59
59
60
60
61
-
> [!NOTE]
62
-
> The scan is lightweight and safe. It takes a few seconds to run and is entirely read-only. It doesn't make any changes to your database.
61
+
> [!NOTE]
62
+
> The scan is lightweight and safe. It takes a few seconds to run and is entirely read-only. It doesn't make any changes to your database.
63
63
64
64
### Remediate vulnerabilities
65
65
@@ -120,27 +120,19 @@ SQL vulnerability assessment allows you to specify the region where your data wi
120
120
121
121
### Run on-demand vulnerability scans
122
122
123
-
SQL vulnerability assessment scans can also be run on-demand:
123
+
You can run SQL vulnerability assessment scans on-demand:
124
124
125
-
From the resource'sDefender for Cloudpage, selectView additional findings in vulnerability assessment to access the scan results from previous scans.
125
+
1.From the resource's**Defender for Cloud**page, select**View additional findings in Vulnerability Assessment**to access the scan results from previous scans.
126
126
127
-
To run an on-demand scan to scan your database for vulnerabilities, select Scan from the toolbar:
127
+
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/view-additional-findings-link.png" alt-text="Opening the scan results and manual scan options.":::
128
128
129
-
### Run on-demand scans
129
+
1. To run an on-demand scan to scan your database for vulnerabilities, select **Scan** from the toolbar:
130
130
131
-
1. SQL vulnerability assessment scans can also be run on-demand:
131
+
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/on-demand-vulnerability-scan.png" alt-text="Select scan to run an on-demand vulnerability assessment scan of your SQL resource":::
132
132
133
-
1. From the resource's **Defender for Cloud** page, select **View additional findings in Vulnerability Assessment** to access the scan results from previous scans.
134
133
135
-
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/view-additional-findings-link.png" alt-text="Opening the scan results and manual scan options.":::
136
-
137
-
1. To run an on-demand scan to scan your database for vulnerabilities, select **Scan** from the toolbar:
138
-
139
-
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/on-demand-vulnerability-scan.png" alt-text="Select scan to run an on-demand vulnerability assessment scan of your SQL resource":::
140
-
141
-
142
-
> [!NOTE]
143
-
> The scan is lightweight and safe. It takes a few seconds to run and is entirely read-only. It doesn't make any changes to your database.
134
+
> [!NOTE]
135
+
> The scan is lightweight and safe. It takes a few seconds to run and is entirely read-only. It doesn't make any changes to your database.
To receive regular updates of the vulnerability assessment status for your database, you can use the [customizable Azure Logic Apps template](https://github.com/Azure/Microsoft-Defender-for-Cloud/tree/main/Workflow%20automation/Notify-SQLVulnerabilityReport).
68
66
69
67
Using the template will allow you to:
70
68
@@ -90,7 +88,7 @@ The express configuration is supported in the latest REST API version with the f
| VA settings (GET only is supported for Express Configuration) | User Database |[Database Sql Vulnerability Assessments Settings](/rest/api/sql/2022-05-01-preview/database-sql-vulnerability-assessments-settings)|
93
-
| VA Settings operations | Server |[Sql Vulnerability Assessments Settings](/rest/api/sql/2022-05-01-preview/sql-vulnerability-assessments-settings)<br>[Sql Vulnerability Assessments](/rest/api/sql/2022-05-01-preview/sql-vulnerability-assessments |
91
+
| VA Settings operations | Server |[Sql Vulnerability Assessments Settings](/rest/api/sql/2022-05-01-preview/sql-vulnerability-assessments-settings)<br>[Sql Vulnerability Assessments](/rest/api/sql/2022-05-01-preview/sql-vulnerability-assessments)|
94
92
95
93
### Using Resource Manager templates
96
94
@@ -229,14 +227,16 @@ To change an Azure SQL database from the express vulnerability assessment config
229
227
230
228
### Errors
231
229
232
-
- “Vulnerability Assessment is enabled on this server or one of its underlying databases with an incompatible version” Error:
230
+
“Vulnerability Assessment is enabled on this server or one of its underlying databases with an incompatible version”
231
+
232
+
Possible causes:
233
+
234
+
- Switching to express configuration failed due to a server policy error. This could be due to a transient operation.
233
235
234
-
**Cause**: Switching to express configuration failed due to a server policy error. This could be due to a transient operation.
235
236
**Solution**: Try again to enable the express configuration. If the issue persists, try to disable the Microsoft Defender for SQL in the Azure SQL resource, select **Save**, enable Microsoft Defender for SQL again, and select **Save**.
236
237
237
-
- Switching to express configuration failed due to a database policy error:
238
+
- Switching to express configuration failed due to a database policy error. Database policies aren't visible in the Azure portal for Defender for SQL vulnerability assessment, so we check for them during the validation stage of switching to express configuration.
238
239
239
-
**Cause**: Database policies aren't visible in the Azure portal for Defender for SQL vulnerability assessment, so we check for them during the validation stage of switching to express configuration.
240
240
**Solution**: Disable all database policies for the relevant server and then try to switch to express configuration again.
0 commit comments