You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/powershell-sample-vulnerability-assessment-azure-sql.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: PowerShell Script Sample - Enable vulnerability assessment on a SQL server
2
+
title: PowerShell script sample - Enable vulnerability assessment on a SQL server
3
3
description: In this article, learn how to enable vulnerability assessments on Azure SQL databases with the express configuration using a PowerShell script.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/sql-azure-vulnerability-assessment-enable.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -78,11 +78,11 @@ To enable vulnerability assessment with a storage account, use the classic confi
78
78
79
79
1. Select **Configure** on the link to open the Microsoft Defender for SQL settings pane for either the entire server or managed instance.
80
80
81
-
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/opening-sql-configuration.png" alt-text="Opening the Defender for SQL configuration":::
81
+
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/opening-sql-configuration.png" alt-text="Screenshot of the Defender for SQL configuration":::
82
82
83
83
1. In the **Server settings** page, enter the Microsoft Defender for SQL settings:
84
84
85
-
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/sql-vulnerability-scan-settings.png" alt-text="Configuring the SQL vulnerability assessment scans":::
85
+
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/sql-vulnerability-scan-settings.png" alt-text="Screenshot of configuring the SQL vulnerability assessment scans":::
86
86
87
87
1. Configure a storage account where your scan results for all databases on the server or managed instance will be stored. For information about storage accounts, see [About Azure storage accounts](/azure/storage/common/storage-account-create).
88
88
@@ -99,4 +99,4 @@ Learn more about:
99
99
100
100
-[Microsoft Defender for Azure SQL](defender-for-sql-introduction.md)
101
101
-[Data discovery and classification](/azure/azure-sql/database/data-discovery-and-classification-overview.md)
102
-
-[Storing scan results in a storage account behind firewalls and VNets](/azure/azure-sql/database/sql-database-vulnerability-assessment-storage.md)
102
+
-[storing scan results in a storage account behind firewalls and VNets](/azure/azure-sql/database/sql-database-vulnerability-assessment-storage.md)
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/sql-azure-vulnerability-assessment-find.md
+15-13Lines changed: 15 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -53,11 +53,11 @@ You can run SQL vulnerability assessment scans on-demand:
53
53
54
54
1. From the resource's **Defender for Cloud** page, select **View additional findings in Vulnerability Assessment** to access the scan results from previous scans.
55
55
56
-
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/view-additional-findings-link.png" alt-text="Opening the scan results and manual scan options.":::
56
+
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/view-additional-findings-link.png" alt-text="Screenshot of opening the scan results and manual scan options.":::
57
57
58
58
1. To run an on-demand scan to scan your database for vulnerabilities, select **Scan** from the toolbar:
59
59
60
-
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/on-demand-vulnerability-scan.png" alt-text="Select scan to run an on-demand vulnerability assessment scan of your SQL resource":::
60
+
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/on-demand-vulnerability-scan.png" alt-text="Screenshot of selecting scan to run an on-demand vulnerability assessment scan of your SQL resource":::
61
61
62
62
63
63
> [!NOTE]
@@ -72,7 +72,7 @@ When a vulnerability scan completes, the report is displayed in the Azure portal
72
72
- A summary by severity of the risks
73
73
- A list of the findings for further investigations
74
74
75
-
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/sample-sql-vulnerabilities-report.png" alt-text="Sample scan report from the SQL vulnerability assessment scanner":::
75
+
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/sample-sql-vulnerabilities-report.png" alt-text="Screenshot of sample scan report from the SQL vulnerability assessment scanner":::
76
76
77
77
To remediate the vulnerabilities discovered:
78
78
@@ -83,15 +83,15 @@ To remediate the vulnerabilities discovered:
83
83
> [!TIP]
84
84
> The findings details page includes actionable remediation information explaining how to resolve the issue.
85
85
86
-
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/examining-vulnerability-findings.gif" alt-text="Examining the findings from a vulnerability scan":::
86
+
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/examining-vulnerability-findings.gif" alt-text="Screenshot of examining the findings from a vulnerability scan":::
87
87
88
88
1. As you review your assessment results, you can mark specific results as being an acceptable *baseline* in your environment. A baseline is essentially a customization of how the results are reported. In subsequent scans, results that match the baseline are considered as passes. After you've established your baseline security state, vulnerability assessment only reports on deviations from the baseline. In this way, you can focus your attention on the relevant issues.
89
89
90
-
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/baseline-approval.png" alt-text="Approving a finding as a baseline for future scans":::
90
+
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/baseline-approval.png" alt-text="Screenshot of approving a finding as a baseline for future scans":::
91
91
92
92
1. Any findings you've added to the baseline will now appear as **Passed** with an indication that they've passed because of the baseline changes. There's no need to run another scan for the baseline to take effect.
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/passed-per-custom-baseline.png" alt-text="Screenshot of passed assessments indicating they've passed per custom baseline":::
95
95
96
96
Your vulnerability assessment scans can now be used to ensure that your database maintains a high level of security, and that your organizational policies are met.
97
97
@@ -126,11 +126,11 @@ You can run SQL vulnerability assessment scans on-demand:
126
126
127
127
1. From the resource's **Defender for Cloud** page, select **View additional findings in Vulnerability Assessment** to access the scan results from previous scans.
128
128
129
-
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/view-additional-findings-link.png" alt-text="Opening the scan results and manual scan options.":::
129
+
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/view-additional-findings-link.png" alt-text="Screenshot of opening the scan results and manual scan options.":::
130
130
131
131
1. To run an on-demand scan to scan your database for vulnerabilities, select **Scan** from the toolbar:
132
132
133
-
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/on-demand-vulnerability-scan.png" alt-text="Select scan to run an on-demand vulnerability assessment scan of your SQL resource":::
133
+
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/on-demand-vulnerability-scan.png" alt-text="Screenshot of select scan to run an on-demand vulnerability assessment scan of your SQL resource":::
134
134
135
135
136
136
> [!NOTE]
@@ -145,7 +145,7 @@ When a vulnerability scan completes, the report is displayed in the Azure portal
145
145
- A summary by severity of the risks
146
146
- A list of the findings for further investigations
147
147
148
-
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/sample-sql-vulnerabilities-report.png" alt-text="Sample scan report from the SQL vulnerability assessment scanner":::
148
+
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/sample-sql-vulnerabilities-report.png" alt-text="Screenshot of sample scan report from the SQL vulnerability assessment scanner":::
149
149
150
150
To remediate the vulnerabilities discovered:
151
151
@@ -156,20 +156,22 @@ To remediate the vulnerabilities discovered:
156
156
> [!TIP]
157
157
> The findings details page includes actionable remediation information explaining how to resolve the issue.
158
158
159
-
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/examining-vulnerability-findings.gif" alt-text="Examining the findings from a vulnerability scan":::
159
+
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/examining-vulnerability-findings.gif" alt-text="Screenshot of examining the findings from a vulnerability scan":::
160
160
161
161
1. As you review your assessment results, you can mark specific results as being an acceptable *baseline* in your environment. A baseline is essentially a customization of how the results are reported. In subsequent scans, results that match the baseline are considered as passes. After you've established your baseline security state, vulnerability assessment only reports on deviations from the baseline. In this way, you can focus your attention on the relevant issues.
162
162
163
-
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/baseline-approval.png" alt-text="Approving a finding as a baseline for future scans":::
163
+
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/baseline-approval.png" alt-text="Screenshot of approving a finding as a baseline for future scans":::
164
164
165
165
1. If you change the baselines, use the **Scan** button to run an on-demand scan and view the customized report. Any findings you've added to the baseline will now appear in **Passed** with an indication that they've passed because of the baseline changes.
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/passed-per-custom-baseline.png" alt-text="Screenshot of passed assessments indicating they've passed per custom baseline":::
168
168
169
169
Your vulnerability assessment scans can now be used to ensure that your database maintains a high level of security, and that your organizational policies are met.
170
170
171
+
---
172
+
171
173
## Next steps
172
174
173
175
- Learn more about [Microsoft Defender for Azure SQL](defender-for-sql-introduction.md).
174
176
- Learn more about [data discovery and classification](/azure/azure-sql/database/data-discovery-and-classification-overview.md).
175
-
- Learn more about [Storing vulnerability assessment scan results in a storage account accessible behind firewalls and VNets](/azure/azure-sql/database/sql-database-vulnerability-assessment-storage.md).
177
+
- Learn more about [storing vulnerability assessment scan results in a storage account accessible behind firewalls and VNets](/azure/azure-sql/database/sql-database-vulnerability-assessment-storage.md).
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/sql-azure-vulnerability-assessment-manage.md
+6-4Lines changed: 6 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -287,14 +287,14 @@ To create a rule:
287
287
- Severity
288
288
- Benchmarks
289
289
290
-
:::image type="content" source="media/defender-for-sql-Azure-vulnerability-assessment/disable-rule-vulnerability-findings-sql.png" alt-text="Create a disable rule for VA findings on SQL servers on machines":::
290
+
:::image type="content" source="media/defender-for-sql-Azure-vulnerability-assessment/disable-rule-vulnerability-findings-sql.png" alt-text="Screenshot of create a disable rule for VA findings on SQL servers on machines":::
291
291
292
292
1. Select **Apply rule**. Changes might take up to 24 hrs to take effect.
293
293
1. To view, override, or delete a rule:
294
294
1. Select **Disable rule**.
295
295
1. From the scope list, subscriptions with active rules show as **Rule applied**.
296
296
297
-
:::image type="content" source="media/defender-for-sql-Azure-vulnerability-assessment/modify-rule.png" alt-text="Modify or delete an existing rule":::
297
+
:::image type="content" source="media/defender-for-sql-Azure-vulnerability-assessment/modify-rule.png" alt-text="Screenshot of modify or delete an existing rule":::
298
298
299
299
1. To view or delete the rule, select the ellipsis menu ("...").
300
300
@@ -339,7 +339,7 @@ For a script example, see [Azure SQL vulnerability assessment PowerShell support
339
339
### Azure CLI
340
340
341
341
> [!IMPORTANT]
342
-
> The following Azure CLI commands are for SQL databases hosted on VMs or On-Premise machines. For vulnerability assessments regarding Azure SQL Databases, refer to the Azure portal or PowerShell section.
342
+
> The following Azure CLI commands are for SQL databases hosted on VMs or on-premises machines. For vulnerability assessments regarding Azure SQL Databases, refer to the Azure portal or PowerShell section.
343
343
344
344
You can use Azure CLI commands to programmatically manage your vulnerability assessments. The supported commands are:
345
345
@@ -433,8 +433,10 @@ To handle Boolean types as true/false, set the baseline result with binary input
433
433
}
434
434
```
435
435
436
+
---
437
+
436
438
## Next steps
437
439
438
440
- Learn more about [Microsoft Defender for Azure SQL](defender-for-sql-introduction.md).
439
441
- Learn more about [data discovery and classification](/azure/azure-sql/database/data-discovery-and-classification-overview.md).
440
-
- Learn more about [Storing vulnerability assessment scan results in a storage account accessible behind firewalls and VNets](/azure/azure-sql/database/sql-database-vulnerability-assessment-storage.md).
442
+
- Learn more about [storing vulnerability assessment scan results in a storage account accessible behind firewalls and VNets](/azure/azure-sql/database/sql-database-vulnerability-assessment-storage.md).
- Learn more about [Microsoft Defender for Azure SQL](defender-for-sql-introduction.md).
65
65
- Learn more about [data discovery and classification](/azure/azure-sql/database/data-discovery-and-classification-overview.md).
66
-
- Learn more about [Storing vulnerability assessment scan results in a storage account accessible behind firewalls and VNets](/azure/azure-sql/database/sql-database-vulnerability-assessment-storage.md).
66
+
- Learn more about [storing vulnerability assessment scan results in a storage account accessible behind firewalls and VNets](/azure/azure-sql/database/sql-database-vulnerability-assessment-storage.md).
0 commit comments