Skip to content

Commit ae6bf5c

Browse files
committed
Acrolinx fixes
1 parent c7fd033 commit ae6bf5c

File tree

1 file changed

+14
-14
lines changed

1 file changed

+14
-14
lines changed

articles/defender-for-cloud/sql-azure-vulnerability-assessment-manage.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ If the vulnerability settings show the option to configure a storage account, yo
2828

2929
Select **Scan History** in the vulnerability assessment pane to view a history of all scans previously run on this database. Select a particular scan in the list to view the detailed results of that scan.
3030

31-
Express configuration does not store scan results if they are identical to previous scans, so the history page updates only when the status of a finding changes.
31+
Express configuration doesn't store scan results if they're identical to previous scans, so the history page updates only when the status of a finding changes.
3232

3333
## Disable specific findings from Microsoft Defender for Cloud (preview)
3434

@@ -54,17 +54,17 @@ To create a rule:
5454
- Benchmarks
5555

5656
1. Create a disable rule for VA findings on SQL servers on machines
57-
1. Select Apply rule. Changes might take up to 24hrs to take effect.
57+
1. Select Apply rule. Changes might take up to 24 hrs to take effect.
5858
1. To view, override, or delete a rule:
5959
1. Select Disable rule.
6060
1. From the scope list, subscriptions with active rules show as Rule applied.
6161
1. To view or delete the rule, select the ellipsis menu ("...").
6262

6363
## Configure email notifications using Azure Logic Apps
6464

65-
In order to receive regular updates of your databases’ vulnerability assessment status you can use the following customizable Azure Logic Apps template:
66-
https://github.com/Azure/Microsoft-Defender-for-Cloud/tree/main/Workflow%20automation/Notify-SQLVulnerabilityReport
65+
To receive regular updates of the vulnerability assessment status for your database, you can use the following customizable Azure Logic Apps template:
6766

67+
https://github.com/Azure/Microsoft-Defender-for-Cloud/tree/main/Workflow%20automation/Notify-SQLVulnerabilityReport
6868

6969
Using the template will allow you to:
7070

@@ -96,7 +96,7 @@ The express configuration is supported in the latest REST API version with the f
9696

9797
To configure vulnerability assessment baselines by using Azure Resource Manager templates, use the `Microsoft.Sql/servers/databases/vulnerabilityAssessments/rules/baselines` type. Make sure that `vulnerabilityAssessments` is enabled before you add baselines.
9898

99-
Here are several examples to how you can setup baselines using ARM templates:
99+
Here are several examples to how you can set up baselines using ARM templates:
100100

101101
- Setup batch baseline based on latest scan results:
102102

@@ -143,7 +143,7 @@ Here are several examples to how you can setup baselines using ARM templates:
143143
}
144144
```
145145

146-
- Setup baseline for a specific rule:
146+
- Set up baseline for a specific rule:
147147

148148
```json
149149
{
@@ -159,7 +159,7 @@ Here are several examples to how you can setup baselines using ARM templates:
159159
}
160160
```
161161

162-
- Setup batch baselines on master database based on latest scan results:
162+
- Set up batch baselines on the master database based on latest scan results:
163163

164164
```json
165165
{
@@ -174,7 +174,7 @@ Here are several examples to how you can setup baselines using ARM templates:
174174

175175
### Using PowerShell
176176

177-
Express configuration is not supported in PowerShell cmdlets but you can use PowerShell to invoke the latest vulnerability assessment capabilities using REST API, for example:
177+
Express configuration isn't supported in PowerShell cmdlets but you can use PowerShell to invoke the latest vulnerability assessment capabilities using REST API, for example:
178178

179179
- [Enable express configuration](powershell-sample-vulnerability-assessment-azure-sql.md) on an Azure SQL Server
180180
- [Setup baselines](powershell-sample-vulnerability-assessment-baselines.md) based on latest scan results for all databases in an Azure SQL Server
@@ -183,7 +183,7 @@ Express configuration is not supported in PowerShell cmdlets but you can use Pow
183183

184184
### What happens to the old scan results and baselines after I switch to express configuration?
185185

186-
Old results and baselines settings remain available on your storage account, but will not be updated or used by the system. When express configuration is enabled, customers do not have direct access to the result and baseline data because it is stored on internal Microsoft storage.
186+
Old results and baselines settings remain available on your storage account, but won't be updated or used by the system. When express configuration is enabled, customers don't have direct access to the result and baseline data because it's stored on internal Microsoft storage.
187187

188188
### Is there a way with express configuration to get the weekly email report that is provided in the classic configuration?
189189

@@ -199,7 +199,7 @@ SQL vulnerability assessment reports all vulnerabilities and misconfigurations i
199199

200200
### Can I revert back to the classic configuration?
201201

202-
Yes. You can revert back to the classic configuration using the existing REST APIs and PowerShell cmdlets. When you revert back to the classic configuration you see a notification in the Azure portal to change to the express configuration.
202+
Yes. You can revert back to the classic configuration using the existing REST APIs and PowerShell cmdlets. When you revert back to the classic configuration, you see a notification in the Azure portal to change to the express configuration.
203203

204204
### Will we see express configuration for other types of SQL?
205205

@@ -236,7 +236,7 @@ To change an Azure SQL database from the express vulnerability assessment config
236236

237237
- Switching to express configuration failed due to a database policy error:
238238

239-
**Cause**: Database policies are not visible in the Azure Portal for Defender for SQL vulnerability assessment, so we check for them during the validation stage of switching to express configuration.
239+
**Cause**: Database policies aren't visible in the Azure portal for Defender for SQL vulnerability assessment, so we check for them during the validation stage of switching to express configuration.
240240
**Solution**: Disable all database policies for the relevant server and then try to switch to express configuration again.
241241

242242
### [Classic configuration](#tab/classic)
@@ -272,7 +272,7 @@ To create a rule:
272272

273273
:::image type="content" source="media/defender-for-sql-Azure-vulnerability-assessment/disable-rule-vulnerability-findings-sql.png" alt-text="Create a disable rule for VA findings on SQL servers on machines":::
274274

275-
1. Select **Apply rule**. Changes might take up to 24hrs to take effect.
275+
1. Select **Apply rule**. Changes might take up to 24 hrs to take effect.
276276
1. To view, override, or delete a rule:
277277
1. Select **Disable rule**.
278278
1. From the scope list, subscriptions with active rules show as **Rule applied**.
@@ -389,8 +389,8 @@ Here's an example for defining Baseline Rule VA2065 to `master` database and VA1
389389

390390
For `master` database and `user` database, the resource names are defined differently:
391391

392-
- Master database - "name": "[concat(parameters('server_name'),'/', parameters('database_name') , '/default/VA2065/<b>master</b>')]",
393-
- User database - "name": "[concat(parameters('server_name'),'/', parameters('database_name') , '/default/VA2065/<b>default</b>')]",
392+
- Master database - "name": "[concat(parameters('server_name'),'/', parameters('database_name'), '/default/VA2065/<b>master</b>')]",
393+
- User database - "name": "[concat(parameters('server_name'),'/', parameters('database_name'), '/default/VA2065/<b>default</b>')]",
394394

395395
To handle Boolean types as true/false, set the baseline result with binary input like "1"/"0".
396396

0 commit comments

Comments
 (0)