You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/upcoming-changes.md
+21-1Lines changed: 21 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Important upcoming changes
3
3
description: Upcoming changes to Microsoft Defender for Cloud that you might need to be aware of and for which you might need to plan.
4
4
ms.topic: overview
5
-
ms.date: 06/03/2024
5
+
ms.date: 06/10/2024
6
6
---
7
7
8
8
# Important upcoming changes to Microsoft Defender for Cloud
@@ -25,6 +25,7 @@ If you're looking for the latest release notes, you can find them in the [What's
25
25
26
26
| Planned change | Announcement date | Estimated date for change |
27
27
|--|--|--|
28
+
|[SQL vulnerability assessment automatic enablement using express configuration on unconfigured servers](#sql-vulnerability-assessment-automatic-enablement-using-express-configuration-on-unconfigured-servers)| June 10, 2024 | July 10, 2024 |
28
29
|[Changes to identity recommendations](#changes-to-identity-recommendations)| June 3, 2024 | July 2024 |
29
30
|[Removal of FIM over AMA and release of new version over Defender for Endpoint](#removal-of-fim-over-ama-and-release-of-new-version-over-defender-for-endpoint)| May 1, 2024 | June 2024 |
30
31
|[Deprecation of system update recommendations](#deprecation-of-system-update-recommendations)| May 1, 2024 | May 2024 |
@@ -47,6 +48,25 @@ If you're looking for the latest release notes, you can find them in the [What's
47
48
|[Deprecating two security incidents](#deprecating-two-security-incidents)|| November 2023 |
48
49
|[Defender for Cloud plan and strategy for the Log Analytics agent deprecation](#defender-for-cloud-plan-and-strategy-for-the-log-analytics-agent-deprecation)|| August 2024 |
49
50
51
+
## SQL vulnerability assessment automatic enablement using express configuration on unconfigured servers
52
+
53
+
**Announcement date: June 10, 2024**
54
+
55
+
**Estimated date for change: July 10, 2024**
56
+
57
+
Originally, SQL Vulnerability Assessment (VA) with Express Configuration was only automatically enabled on servers where Microsoft Defender for SQL was activated after the introduction of Express Configuration in December 2022.
58
+
59
+
We will be updating all Azure SQL Servers that had Microsoft Defender for SQL activated before December 2022 and had no existing SQL VA policy in place, to have SQL Vulnerability Assessment (SQL VA) automatically enabled with Express Configuration.
60
+
61
+
The implementation of this change will be gradual, spanning several weeks, and does not require any action on the user’s part.
62
+
63
+
> [!NOTE]
64
+
> This change applies to Azure SQL Servers where Microsoft Defender for SQL was activated either at the Azure subscription level or at the individual server level.
65
+
>
66
+
> Servers with an existing classic configuration (whether valid or invalid) will not be affected by this change.
67
+
>
68
+
> Upon activation, the recommendation ‘SQL databases should have vulnerability findings resolved’ may appear and could potentially impact your secure score.
0 commit comments