Skip to content

Commit 8f3e03b

Browse files
committed
Resolve comments from review
1 parent 95034f4 commit 8f3e03b

8 files changed

+30
-26
lines changed

articles/defender-for-cloud/powershell-sample-vulnerability-assessment-azure-sql.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: PowerShell Script Sample - Enable vulnerability assessment on a SQL server
2+
title: PowerShell script sample - Enable vulnerability assessment on a SQL server
33
description: In this article, learn how to enable vulnerability assessments on Azure SQL databases with the express configuration using a PowerShell script.
44
ms.topic: sample
55
ms.date: 11/29/2022

articles/defender-for-cloud/powershell-sample-vulnerability-assessment-baselines.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: PowerShell Script Sample - Set up baselines on Azure SQL databases
2+
title: PowerShell script sample - Set up baselines on Azure SQL databases
33
description: In this article, learn how to set up baselines for vulnerability assessments on Azure SQL databases using a PowerShell script.
44
ms.topic: sample
55
ms.date: 11/29/2022

articles/defender-for-cloud/sql-azure-vulnerability-assessment-enable.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -78,11 +78,11 @@ To enable vulnerability assessment with a storage account, use the classic confi
7878

7979
1. Select **Configure** on the link to open the Microsoft Defender for SQL settings pane for either the entire server or managed instance.
8080

81-
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/opening-sql-configuration.png" alt-text="Opening the Defender for SQL configuration":::
81+
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/opening-sql-configuration.png" alt-text="Screenshot of the Defender for SQL configuration":::
8282

8383
1. In the **Server settings** page, enter the Microsoft Defender for SQL settings:
8484

85-
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/sql-vulnerability-scan-settings.png" alt-text="Configuring the SQL vulnerability assessment scans":::
85+
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/sql-vulnerability-scan-settings.png" alt-text="Screenshot of configuring the SQL vulnerability assessment scans":::
8686

8787
1. Configure a storage account where your scan results for all databases on the server or managed instance will be stored. For information about storage accounts, see [About Azure storage accounts](/azure/storage/common/storage-account-create).
8888

@@ -99,4 +99,4 @@ Learn more about:
9999

100100
- [Microsoft Defender for Azure SQL](defender-for-sql-introduction.md)
101101
- [Data discovery and classification](/azure/azure-sql/database/data-discovery-and-classification-overview.md)
102-
- [Storing scan results in a storage account behind firewalls and VNets](/azure/azure-sql/database/sql-database-vulnerability-assessment-storage.md)
102+
- [storing scan results in a storage account behind firewalls and VNets](/azure/azure-sql/database/sql-database-vulnerability-assessment-storage.md)

articles/defender-for-cloud/sql-azure-vulnerability-assessment-find.md

Lines changed: 15 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -53,11 +53,11 @@ You can run SQL vulnerability assessment scans on-demand:
5353

5454
1. From the resource's **Defender for Cloud** page, select **View additional findings in Vulnerability Assessment** to access the scan results from previous scans.
5555

56-
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/view-additional-findings-link.png" alt-text="Opening the scan results and manual scan options.":::
56+
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/view-additional-findings-link.png" alt-text="Screenshot of opening the scan results and manual scan options.":::
5757

5858
1. To run an on-demand scan to scan your database for vulnerabilities, select **Scan** from the toolbar:
5959

60-
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/on-demand-vulnerability-scan.png" alt-text="Select scan to run an on-demand vulnerability assessment scan of your SQL resource":::
60+
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/on-demand-vulnerability-scan.png" alt-text="Screenshot of selecting scan to run an on-demand vulnerability assessment scan of your SQL resource":::
6161

6262

6363
> [!NOTE]
@@ -72,7 +72,7 @@ When a vulnerability scan completes, the report is displayed in the Azure portal
7272
- A summary by severity of the risks
7373
- A list of the findings for further investigations
7474

75-
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/sample-sql-vulnerabilities-report.png" alt-text="Sample scan report from the SQL vulnerability assessment scanner":::
75+
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/sample-sql-vulnerabilities-report.png" alt-text="Screenshot of sample scan report from the SQL vulnerability assessment scanner":::
7676

7777
To remediate the vulnerabilities discovered:
7878

@@ -83,15 +83,15 @@ To remediate the vulnerabilities discovered:
8383
> [!TIP]
8484
> The findings details page includes actionable remediation information explaining how to resolve the issue.
8585
86-
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/examining-vulnerability-findings.gif" alt-text="Examining the findings from a vulnerability scan":::
86+
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/examining-vulnerability-findings.gif" alt-text="Screenshot of examining the findings from a vulnerability scan":::
8787

8888
1. As you review your assessment results, you can mark specific results as being an acceptable *baseline* in your environment. A baseline is essentially a customization of how the results are reported. In subsequent scans, results that match the baseline are considered as passes. After you've established your baseline security state, vulnerability assessment only reports on deviations from the baseline. In this way, you can focus your attention on the relevant issues.
8989

90-
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/baseline-approval.png" alt-text="Approving a finding as a baseline for future scans":::
90+
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/baseline-approval.png" alt-text="Screenshot of approving a finding as a baseline for future scans":::
9191

9292
1. Any findings you've added to the baseline will now appear as **Passed** with an indication that they've passed because of the baseline changes. There's no need to run another scan for the baseline to take effect.
9393

94-
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/passed-per-custom-baseline.png" alt-text="Passed assessments indicating they've passed per custom baseline":::
94+
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/passed-per-custom-baseline.png" alt-text="Screenshot of passed assessments indicating they've passed per custom baseline":::
9595

9696
Your vulnerability assessment scans can now be used to ensure that your database maintains a high level of security, and that your organizational policies are met.
9797

@@ -126,11 +126,11 @@ You can run SQL vulnerability assessment scans on-demand:
126126

127127
1. From the resource's **Defender for Cloud** page, select **View additional findings in Vulnerability Assessment** to access the scan results from previous scans.
128128

129-
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/view-additional-findings-link.png" alt-text="Opening the scan results and manual scan options.":::
129+
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/view-additional-findings-link.png" alt-text="Screenshot of opening the scan results and manual scan options.":::
130130

131131
1. To run an on-demand scan to scan your database for vulnerabilities, select **Scan** from the toolbar:
132132

133-
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/on-demand-vulnerability-scan.png" alt-text="Select scan to run an on-demand vulnerability assessment scan of your SQL resource":::
133+
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/on-demand-vulnerability-scan.png" alt-text="Screenshot of select scan to run an on-demand vulnerability assessment scan of your SQL resource":::
134134

135135

136136
> [!NOTE]
@@ -145,7 +145,7 @@ When a vulnerability scan completes, the report is displayed in the Azure portal
145145
- A summary by severity of the risks
146146
- A list of the findings for further investigations
147147

148-
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/sample-sql-vulnerabilities-report.png" alt-text="Sample scan report from the SQL vulnerability assessment scanner":::
148+
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/sample-sql-vulnerabilities-report.png" alt-text="Screenshot of sample scan report from the SQL vulnerability assessment scanner":::
149149

150150
To remediate the vulnerabilities discovered:
151151

@@ -156,20 +156,22 @@ To remediate the vulnerabilities discovered:
156156
> [!TIP]
157157
> The findings details page includes actionable remediation information explaining how to resolve the issue.
158158
159-
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/examining-vulnerability-findings.gif" alt-text="Examining the findings from a vulnerability scan":::
159+
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/examining-vulnerability-findings.gif" alt-text="Screenshot of examining the findings from a vulnerability scan":::
160160

161161
1. As you review your assessment results, you can mark specific results as being an acceptable *baseline* in your environment. A baseline is essentially a customization of how the results are reported. In subsequent scans, results that match the baseline are considered as passes. After you've established your baseline security state, vulnerability assessment only reports on deviations from the baseline. In this way, you can focus your attention on the relevant issues.
162162

163-
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/baseline-approval.png" alt-text="Approving a finding as a baseline for future scans":::
163+
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/baseline-approval.png" alt-text="Screenshot of approving a finding as a baseline for future scans":::
164164

165165
1. If you change the baselines, use the **Scan** button to run an on-demand scan and view the customized report. Any findings you've added to the baseline will now appear in **Passed** with an indication that they've passed because of the baseline changes.
166166

167-
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/passed-per-custom-baseline.png" alt-text="Passed assessments indicating they've passed per custom baseline":::
167+
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/passed-per-custom-baseline.png" alt-text="Screenshot of passed assessments indicating they've passed per custom baseline":::
168168

169169
Your vulnerability assessment scans can now be used to ensure that your database maintains a high level of security, and that your organizational policies are met.
170170

171+
---
172+
171173
## Next steps
172174

173175
- Learn more about [Microsoft Defender for Azure SQL](defender-for-sql-introduction.md).
174176
- Learn more about [data discovery and classification](/azure/azure-sql/database/data-discovery-and-classification-overview.md).
175-
- Learn more about [Storing vulnerability assessment scan results in a storage account accessible behind firewalls and VNets](/azure/azure-sql/database/sql-database-vulnerability-assessment-storage.md).
177+
- Learn more about [storing vulnerability assessment scan results in a storage account accessible behind firewalls and VNets](/azure/azure-sql/database/sql-database-vulnerability-assessment-storage.md).

articles/defender-for-cloud/sql-azure-vulnerability-assessment-manage.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -287,14 +287,14 @@ To create a rule:
287287
- Severity
288288
- Benchmarks
289289

290-
:::image type="content" source="media/defender-for-sql-Azure-vulnerability-assessment/disable-rule-vulnerability-findings-sql.png" alt-text="Create a disable rule for VA findings on SQL servers on machines":::
290+
:::image type="content" source="media/defender-for-sql-Azure-vulnerability-assessment/disable-rule-vulnerability-findings-sql.png" alt-text="Screenshot of create a disable rule for VA findings on SQL servers on machines":::
291291

292292
1. Select **Apply rule**. Changes might take up to 24 hrs to take effect.
293293
1. To view, override, or delete a rule:
294294
1. Select **Disable rule**.
295295
1. From the scope list, subscriptions with active rules show as **Rule applied**.
296296

297-
:::image type="content" source="media/defender-for-sql-Azure-vulnerability-assessment/modify-rule.png" alt-text="Modify or delete an existing rule":::
297+
:::image type="content" source="media/defender-for-sql-Azure-vulnerability-assessment/modify-rule.png" alt-text="Screenshot of modify or delete an existing rule":::
298298

299299
1. To view or delete the rule, select the ellipsis menu ("...").
300300

@@ -339,7 +339,7 @@ For a script example, see [Azure SQL vulnerability assessment PowerShell support
339339
### Azure CLI
340340

341341
> [!IMPORTANT]
342-
> The following Azure CLI commands are for SQL databases hosted on VMs or On-Premise machines. For vulnerability assessments regarding Azure SQL Databases, refer to the Azure portal or PowerShell section.
342+
> The following Azure CLI commands are for SQL databases hosted on VMs or on-premises machines. For vulnerability assessments regarding Azure SQL Databases, refer to the Azure portal or PowerShell section.
343343
344344
You can use Azure CLI commands to programmatically manage your vulnerability assessments. The supported commands are:
345345

@@ -433,8 +433,10 @@ To handle Boolean types as true/false, set the baseline result with binary input
433433
}
434434
```
435435

436+
---
437+
436438
## Next steps
437439

438440
- Learn more about [Microsoft Defender for Azure SQL](defender-for-sql-introduction.md).
439441
- Learn more about [data discovery and classification](/azure/azure-sql/database/data-discovery-and-classification-overview.md).
440-
- Learn more about [Storing vulnerability assessment scan results in a storage account accessible behind firewalls and VNets](/azure/azure-sql/database/sql-database-vulnerability-assessment-storage.md).
442+
- Learn more about [storing vulnerability assessment scan results in a storage account accessible behind firewalls and VNets](/azure/azure-sql/database/sql-database-vulnerability-assessment-storage.md).

articles/defender-for-cloud/sql-azure-vulnerability-assessment-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -57,10 +57,10 @@ Configuration modes benefits and limitations comparison:
5757
| Apply baseline | Will take effect **without** rescanning the database | Will take effect **only after** rescanning the database |
5858
| Single rule scan result size | Maximum of 1 MB | Unlimited |
5959
| Email notifications | • Logic Apps | • Internal scheduler<br>• Logic Apps |
60-
| Scan export | TBD | Excel format |
60+
| Scan export | Not supported | Excel format |
6161

6262
## Next steps
6363

6464
- Learn more about [Microsoft Defender for Azure SQL](defender-for-sql-introduction.md).
6565
- Learn more about [data discovery and classification](/azure/azure-sql/database/data-discovery-and-classification-overview.md).
66-
- Learn more about [Storing vulnerability assessment scan results in a storage account accessible behind firewalls and VNets](/azure/azure-sql/database/sql-database-vulnerability-assessment-storage.md).
66+
- Learn more about [storing vulnerability assessment scan results in a storage account accessible behind firewalls and VNets](/azure/azure-sql/database/sql-database-vulnerability-assessment-storage.md).

articles/defender-for-cloud/sql-azure-vulnerability-assessment-rules-changelog.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: SQL vulnerability assessment rules changelog
2+
title: SQL vulnerability assessment rules changelog for Microsoft Defender for Cloud
33
description: Changelog for SQL vulnerability assessment rules with SQL Server, Azure SQL Database, Azure SQL Managed Instance, and Azure Synapse Analytics
44
ms.author: cesanu
55
author: CESANU

articles/defender-for-cloud/sql-azure-vulnerability-assessment-rules.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: SQL vulnerability assessment rules reference guide
2+
title: SQL vulnerability assessment rules reference for Microsoft Defender for Cloud
33
description: List of rule titles and descriptions for SQL Server, Azure SQL Database, Azure SQL Managed Instance, and Azure Synapse Analytics
44
ms.author: cesanu
55
author: CESANU

0 commit comments

Comments
 (0)