Skip to content

Commit 9ca7d5c

Browse files
Merge pull request #277415 from ElazarK/wi261430-upcoming-sql
sql upcoming change
2 parents 1a6c32a + 16aeee5 commit 9ca7d5c

File tree

1 file changed

+21
-1
lines changed

1 file changed

+21
-1
lines changed

articles/defender-for-cloud/upcoming-changes.md

Lines changed: 21 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Important upcoming changes
33
description: Upcoming changes to Microsoft Defender for Cloud that you might need to be aware of and for which you might need to plan.
44
ms.topic: overview
5-
ms.date: 06/03/2024
5+
ms.date: 06/10/2024
66
---
77

88
# Important upcoming changes to Microsoft Defender for Cloud
@@ -25,6 +25,7 @@ If you're looking for the latest release notes, you can find them in the [What's
2525

2626
| Planned change | Announcement date | Estimated date for change |
2727
|--|--|--|
28+
| [SQL vulnerability assessment automatic enablement using express configuration on unconfigured servers](#sql-vulnerability-assessment-automatic-enablement-using-express-configuration-on-unconfigured-servers) | June 10, 2024 | July 10, 2024 |
2829
| [Changes to identity recommendations](#changes-to-identity-recommendations) | June 3, 2024 | July 2024 |
2930
| [Removal of FIM over AMA and release of new version over Defender for Endpoint](#removal-of-fim-over-ama-and-release-of-new-version-over-defender-for-endpoint) | May 1, 2024 | June 2024 |
3031
| [Deprecation of system update recommendations](#deprecation-of-system-update-recommendations) | May 1, 2024 | May 2024 |
@@ -47,6 +48,25 @@ If you're looking for the latest release notes, you can find them in the [What's
4748
| [Deprecating two security incidents](#deprecating-two-security-incidents) | | November 2023 |
4849
| [Defender for Cloud plan and strategy for the Log Analytics agent deprecation](#defender-for-cloud-plan-and-strategy-for-the-log-analytics-agent-deprecation) | | August 2024 |
4950

51+
## SQL vulnerability assessment automatic enablement using express configuration on unconfigured servers
52+
53+
**Announcement date: June 10, 2024**
54+
55+
**Estimated date for change: July 10, 2024**
56+
57+
Originally, SQL Vulnerability Assessment (VA) with Express Configuration was only automatically enabled on servers where Microsoft Defender for SQL was activated after the introduction of Express Configuration in December 2022.
58+
59+
We will be updating all Azure SQL Servers that had Microsoft Defender for SQL activated before December 2022 and had no existing SQL VA policy in place, to have SQL Vulnerability Assessment (SQL VA) automatically enabled with Express Configuration.
60+
61+
The implementation of this change will be gradual, spanning several weeks, and does not require any action on the user’s part.
62+
63+
> [!NOTE]
64+
> This change applies to Azure SQL Servers where Microsoft Defender for SQL was activated either at the Azure subscription level or at the individual server level.
65+
>
66+
> Servers with an existing classic configuration (whether valid or invalid) will not be affected by this change.
67+
>
68+
> Upon activation, the recommendation ‘SQL databases should have vulnerability findings resolved’ may appear and could potentially impact your secure score.
69+
5070
## Changes to identity recommendations
5171

5272
**Announcement date: June 3, 2024**

0 commit comments

Comments
 (0)