Skip to content

Commit 9968ff0

Browse files
authored
Merge pull request #267221 from dcurwin/fix-formatting-feb26-2024
Fix formatting
2 parents c171cb2 + 0fabfea commit 9968ff0

9 files changed

+56
-68
lines changed

articles/defender-for-cloud/sql-azure-vulnerability-assessment-enable.md

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,7 @@ When you enable the Defender for Azure SQL plan in Defender for Cloud, Defender
2929
When you enable the Defender for Azure SQL plan in Defender for Cloud, Defender for Cloud automatically enables Advanced Threat Protection and vulnerability assessment with the express configuration for all Azure SQL databases in the selected subscription.
3030

3131
You can enable vulnerability assessment in two ways:
32+
3233
- [Express configuration](#express-configuration)
3334
- [Classic configuration](#classic-configuration)
3435

@@ -37,10 +38,10 @@ You can enable vulnerability assessment in two ways:
3738
**To enable vulnerability assessment without a storage account, using the express configuration**:
3839

3940
1. Sign in to the [Azure portal](https://portal.azure.com/).
40-
1. Open the specific Azure SQL Database resource.
41+
1. Open the specific Azure SQL Database resource.
4142
1. Under the Security heading, select **Defender for Cloud**.
4243
1. Enable the express configuration of vulnerability assessment:
43-
44+
4445
- **If vulnerability assessment is not configured**, select **Enable** in the notice that prompts you to enable the vulnerability assessment express configuration, and confirm the change.
4546

4647
:::image type="content" source="media/sql-azure-vulnerability-assessment-enable/enable-express-vulnerability-assessment.png" alt-text="Screenshot of notice to enable the express vulnerability assessment configuration in the Defender for Cloud settings for a SQL server.":::
@@ -55,15 +56,15 @@ You can enable vulnerability assessment in two ways:
5556
> [!IMPORTANT]
5657
> Baselines and scan history are not migrated.
5758
58-
:::image type="content" source="media/sql-azure-vulnerability-assessment-enable/migrate-to-express-vulnerability-assessment.png" alt-text="Screenshot of notice to migrate from the classic to the express vulnerability assessment configuration in the Defender for Cloud settings for a SQL server.":::
59+
:::image type="content" source="media/sql-azure-vulnerability-assessment-enable/migrate-to-express-vulnerability-assessment.png" alt-text="Screenshot of notice to migrate from classic to express vulnerability assessment configuration in the Defender for Cloud settings for a SQL server.":::
5960

6061
You can also select **Configure** and then select **Enable** in the Microsoft Defender for SQL settings:
61-
62+
6263
:::image type="content" source="media/sql-azure-vulnerability-assessment-enable/migrate-to-express-vulnerability-assessment-configure.png" alt-text="Screenshot of notice to migrate from the classic to the express vulnerability assessment configuration in the Microsoft Defender for SQL settings.":::
6364

6465
Now you can go to the [**SQL databases should have vulnerability findings resolved**](https://ms.portal.azure.com/#view/Microsoft_Azure_Security_AzureDefenderForData/SqlVaServersRecommendationDetailsBlade/assessmentKey/82e20e14-edc5-4373-bfc4-f13121257c37) recommendation to see the vulnerabilities found in your databases. You can also run on-demand vulnerability assessment scans to see the current findings.
6566

66-
> [!NOTE]
67+
> [!NOTE]
6768
> Each database is randomly assigned a scan time on a set day of the week.
6869
6970
#### Enable express vulnerability assessment at scale
@@ -90,12 +91,12 @@ To enable vulnerability assessment with a storage account, use the classic confi
9091

9192
1. To configure vulnerability assessments to automatically run weekly scans to detect security misconfigurations, set **Periodic recurring scans** to **On**. The results are sent to the email addresses you provide in **Send scan reports to**. You can also send email notification to admins and subscription owners by enabling **Also send email notification to admins and subscription owners**.
9293

93-
> [!NOTE]
94+
> [!NOTE]
9495
> Each database is randomly assigned a scan time on a set day of the week. Email notifications are scheduled randomly per server on a set day of the week. The email notification report includes data from all recurring database scans that were executed during the preceding week (does not include on-demand scans).
9596
9697
---
9798

98-
## Next steps
99+
## Related content
99100

100101
Learn more about:
101102

articles/defender-for-cloud/sql-azure-vulnerability-assessment-manage.md

Lines changed: 6 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Manage vulnerability findings in your Azure SQL databases
3-
description: Learn how to remediate software vulnerabilities and disable findings with the express configuration on Azure SQL Database, Azure SQL Managed Instance, and Azure Synapse Analytics.
3+
description: Learn how to remediate software vulnerabilities and disable findings with the express configuration.
44
author: dcurwin
55
ms.author: dacurwin
66
ms.date: 06/14/2023
@@ -32,7 +32,7 @@ If the vulnerability settings show the option to configure a storage account, yo
3232

3333
### View scan history
3434

35-
Select **Scan History** in the vulnerability assessment pane to view a history of all scans previously run on this database.
35+
Select **Scan History** in the vulnerability assessment pane to view a history of all scans previously run on this database.
3636

3737
Express configuration doesn't store scan results if they're identical to previous scans. The scan time shown in the scan history is the time of the last scan where the scan results changed.
3838

@@ -178,7 +178,7 @@ Here are several examples to how you can set up baselines using ARM templates:
178178
}
179179
```
180180

181-
#### Using PowerShell
181+
#### Using PowerShell
182182

183183
Express configuration isn't supported in PowerShell cmdlets but you can use PowerShell to invoke the latest vulnerability assessment capabilities using REST API, for example:
184184

@@ -211,7 +211,7 @@ To change an Azure SQL database from the express vulnerability assessment config
211211
-RecurringScansInterval Weekly `
212212
-ScanResultsContainerName "vulnerability-assessment"
213213
```
214-
214+
215215
You might have to tweak `Update-AzSqlServerVulnerabilityAssessmentSetting` according to [Store Vulnerability Assessment scan results in a storage account accessible behind firewalls and VNets](/azure/azure-sql/database/sql-database-vulnerability-assessment-storage).
216216

217217
#### Errors
@@ -227,8 +227,8 @@ Possible causes:
227227
- Switching to express configuration failed due to a database policy error. Database policies aren't visible in the Azure portal for Defender for SQL vulnerability assessment, so we check for them during the validation stage of switching to express configuration.
228228

229229
**Solution**: Disable all database policies for the relevant server and then try to switch to express configuration again.
230-
- Consider using the [provided PowerShell script](powershell-sample-vulnerability-assessment-azure-sql.md) for assistance.
231230

231+
- Consider using the [provided PowerShell script](powershell-sample-vulnerability-assessment-azure-sql.md) for assistance.
232232

233233
## Classic configuration
234234

@@ -248,6 +248,7 @@ Typical scenarios might include:
248248
- Disable findings from benchmarks that aren't of interest for a defined scope
249249

250250
> [!IMPORTANT]
251+
>
251252
> - To disable specific findings, you need permissions to edit a policy in Azure Policy. Learn more in [Azure RBAC permissions in Azure Policy](../governance/policy/overview.md#azure-rbac-permissions-in-azure-policy).
252253
> - Disabled findings will still be included in the weekly SQL vulnerability assessment email report.
253254
> - Disabled rules are shown in the "Not applicable" section of the scan results.
@@ -308,8 +309,6 @@ You can use Azure PowerShell cmdlets to programmatically manage your vulnerabili
308309
| [Update-AzSqlInstanceDatabaseVulnerabilityAssessmentSetting](/powershell/module/az.sql/Update-AzSqlInstanceDatabaseVulnerabilityAssessmentSetting) | Updates the vulnerability assessment settings of a managed database. |
309310
| [Update-AzSqlInstanceVulnerabilityAssessmentSetting](/powershell/module/az.sql/Update-AzSqlInstanceVulnerabilityAssessmentSetting) | Updates the vulnerability assessment settings of a managed instance. |
310311

311-
312-
313312
For a script example, see [Azure SQL vulnerability assessment PowerShell support](/archive/blogs/sqlsecurity/azure-sql-vulnerability-assessment-now-with-powershell-support).
314313

315314
#### Azure CLI
@@ -409,7 +408,6 @@ To handle Boolean types as true/false, set the baseline result with binary input
409408
}
410409
```
411410

412-
413411
---
414412

415413
## Next steps
@@ -418,5 +416,3 @@ To handle Boolean types as true/false, set the baseline result with binary input
418416
- Learn more about [data discovery and classification](/azure/azure-sql/database/data-discovery-and-classification-overview).
419417
- Learn more about [storing vulnerability assessment scan results in a storage account accessible behind firewalls and VNets](/azure/azure-sql/database/sql-database-vulnerability-assessment-storage).
420418
- Check out [common questions](faq-defender-for-databases.yml) about Azure SQL databases.
421-
422-

articles/defender-for-cloud/sql-azure-vulnerability-assessment-overview.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ You can configure vulnerability assessment for your SQL databases with either:
4444

4545
### What's the difference between the express and classic configuration?
4646

47-
Configuration modes benefits and limitations comparison:
47+
Configuration modes benefits and limitations comparison:
4848

4949
| Parameter | Express configuration | Classic configuration |
5050
|--|--|--|
@@ -60,7 +60,6 @@ Configuration modes benefits and limitations comparison:
6060
| Scan export | Azure Resource Graph | Excel format, Azure Resource Graph |
6161
| Supported Clouds | :::image type="icon" source="./media/icons/yes-icon.png"::: Commercial clouds<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Azure Government<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Microsoft Azure operated by 21Vianet | :::image type="icon" source="./media/icons/yes-icon.png"::: Commercial clouds<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Azure Government<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Azure operated by 21Vianet |
6262

63-
6463
## Next steps
6564

6665
- Enable [SQL vulnerability assessments](sql-azure-vulnerability-assessment-enable.md)

articles/defender-for-cloud/sql-azure-vulnerability-assessment-rules-changelog.md

Lines changed: 16 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,6 @@
11
---
22
title: SQL vulnerability assessment rules changelog
33
description: Changelog for SQL vulnerability assessment rules with SQL Server, Azure SQL Database, Azure SQL Managed Instance, and Azure Synapse Analytics
4-
ms.author: cesanu
5-
author: CESANU
6-
ms.reviewer: wiassaf, vanto, mathoma
74
ms.date: 11/29/2022
85
ms.topic: reference
96
---
@@ -16,53 +13,53 @@ This article details the changes made to the SQL vulnerability assessment servic
1613

1714
|Rule ID |Rule Title |Change details |
1815
|---------|---------|---------|
19-
|VA1018 |Latest updates should be installed |Logic change |
16+
|VA1018 |Latest updates should be installed |Logic change |
2017

2118
## July 2023
2219

2320
|Rule ID |Rule Title |Change details |
2421
|---------|---------|---------|
25-
|VA2129 |Changes to signed modules should be authorized |Logic change |
22+
|VA2129 |Changes to signed modules should be authorized |Logic change |
2623

2724
## June 2022
2825

2926
|Rule ID |Rule Title |Change details |
3027
|---------|---------|---------|
31-
|VA2129 |Changes to signed modules should be authorized |Logic change |
32-
|VA1219 |Transparent data encryption should be enabled |Logic change |
33-
|VA1047 |Password expiration check should be enabled for all SQL logins |Logic change |
28+
|VA2129 |Changes to signed modules should be authorized |Logic change |
29+
|VA1219 |Transparent data encryption should be enabled |Logic change |
30+
|VA1047 |Password expiration check should be enabled for all SQL logins |Logic change |
3431

3532
## January 2022
3633

3734
|Rule ID |Rule Title |Change details |
3835
|---------|---------|---------|
39-
|VA1288 |Sensitive data columns should be classified |Removed rule |
40-
|VA1054 |Minimal set of principals should be members of fixed high impact database roles |Logic change |
41-
|VA1220 |Database communication using TDS should be protected through TLS |Logic change |
42-
|VA2120 |Features that may affect security should be disabled |Logic change |
43-
|VA2129 |Changes to signed modules should be authorized |Logic change |
36+
|VA1288 |Sensitive data columns should be classified |Removed rule |
37+
|VA1054 |Minimal set of principals should be members of fixed high impact database roles |Logic change |
38+
|VA1220 |Database communication using TDS should be protected through TLS |Logic change |
39+
|VA2120 |Features that may affect security should be disabled |Logic change |
40+
|VA2129 |Changes to signed modules should be authorized |Logic change |
4441

4542
## June 2021
4643

4744
|Rule ID |Rule Title |Change details |
4845
|---------|---------|---------|
49-
|VA1220 |Database communication using TDS should be protected through TLS |Logic change |
50-
|VA2108 |Minimal set of principals should be members of fixed high impact database roles |Logic change |
46+
|VA1220 |Database communication using TDS should be protected through TLS |Logic change |
47+
|VA2108 |Minimal set of principals should be members of fixed high impact database roles |Logic change |
5148

5249

5350
## December 2020
5451

5552
|Rule ID |Rule Title |Change details |
5653
|---------|---------|---------|
57-
|VA1017 |Execute permissions on xp_cmdshell from all users (except dbo) should be revoked |Title and description change|
54+
|VA1017 |Execute permissions on xp_cmdshell from all users (except dbo) should be revoked |Title and description change|
5855
|VA1021 |Global temporary stored procedures should be removed |Removed rule |
5956
|VA1024 |C2 Audit Mode should be enabled |Removed rule |
6057
|VA1042 |Database ownership chaining should be disabled for all databases except for `master`, `msdb`, and `tempdb` |Description change |
6158
|VA1044 |Remote Admin Connections should be disabled unless specifically required |Title and description change |
6259
|VA1047 |Password expiration check should be enabled for all SQL logins |Title and description change |
63-
|VA1051 |AUTO_CLOSE should be disabled on all databases |Description change |
64-
|VA1053 |Account with default name 'sa' should be renamed or disabled |Description change |
65-
|VA1067 |Database Mail XPs should be disabled when it is not in use | Title and description change |
60+
|VA1051 |AUTO_CLOSE should be disabled on all databases |Description change |
61+
|VA1053 |Account with default name 'sa' should be renamed or disabled |Description change |
62+
|VA1067 |Database Mail XPs should be disabled when it is not in use | Title and description change |
6663
|VA1068 |Server permissions shouldn't be granted directly to principals |Logic change |
6764
|VA1069 |Permissions to select from system tables and views should be revoked from non-sysadmins |Removed rule |
6865
|VA1090 |Ensure all Government Off The Shelf (GOTS) and Custom Stored Procedures are encrypted |Removed rule |

0 commit comments

Comments
 (0)