You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/sql-azure-vulnerability-assessment-enable.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -78,11 +78,11 @@ To enable vulnerability assessment with a storage account, use the classic confi
78
78
79
79
1. Select **Configure** on the link to open the Microsoft Defender for SQL settings pane for either the entire server or managed instance.
80
80
81
-
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/opening-sql-configuration.png" alt-text="Screenshot of the Defender for SQL configuration":::
81
+
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/opening-sql-configuration.png" alt-text="Screenshot of the Defender for SQL configuration.":::
82
82
83
83
1. In the **Server settings** page, enter the Microsoft Defender for SQL settings:
84
84
85
-
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/sql-vulnerability-scan-settings.png" alt-text="Screenshot of configuring the SQL vulnerability assessment scans":::
85
+
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/sql-vulnerability-scan-settings.png" alt-text="Screenshot of configuring the SQL vulnerability assessment scans.":::
86
86
87
87
1. Configure a storage account where your scan results for all databases on the server or managed instance will be stored. For information about storage accounts, see [About Azure storage accounts](/azure/storage/common/storage-account-create).
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/sql-azure-vulnerability-assessment-find.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -57,7 +57,7 @@ You can run SQL vulnerability assessment scans on-demand:
57
57
58
58
1. To run an on-demand scan to scan your database for vulnerabilities, select **Scan** from the toolbar:
59
59
60
-
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/on-demand-vulnerability-scan.png" alt-text="Screenshot of selecting scan to run an on-demand vulnerability assessment scan of your SQL resource":::
60
+
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/on-demand-vulnerability-scan.png" alt-text="Screenshot of selecting scan to run an on-demand vulnerability assessment scan of your SQL resource.":::
61
61
62
62
63
63
> [!NOTE]
@@ -72,7 +72,7 @@ When a vulnerability scan completes, the report is displayed in the Azure portal
72
72
- A summary by severity of the risks
73
73
- A list of the findings for further investigations
74
74
75
-
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/sample-sql-vulnerabilities-report.png" alt-text="Screenshot of sample scan report from the SQL vulnerability assessment scanner":::
75
+
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/sample-sql-vulnerabilities-report.png" alt-text="Screenshot of sample scan report from the SQL vulnerability assessment scanner.":::
76
76
77
77
To remediate the vulnerabilities discovered:
78
78
@@ -87,11 +87,11 @@ To remediate the vulnerabilities discovered:
87
87
88
88
1. As you review your assessment results, you can mark specific results as being an acceptable *baseline* in your environment. A baseline is essentially a customization of how the results are reported. In subsequent scans, results that match the baseline are considered as passes. After you've established your baseline security state, vulnerability assessment only reports on deviations from the baseline. In this way, you can focus your attention on the relevant issues.
89
89
90
-
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/baseline-approval.png" alt-text="Screenshot of approving a finding as a baseline for future scans":::
90
+
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/baseline-approval.png" alt-text="Screenshot of approving a finding as a baseline for future scans.":::
91
91
92
92
1. Any findings you've added to the baseline will now appear as **Passed** with an indication that they've passed because of the baseline changes. There's no need to run another scan for the baseline to take effect.
93
93
94
-
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/passed-per-custom-baseline.png" alt-text="Screenshot of passed assessments indicating they've passed per custom baseline":::
94
+
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/passed-per-custom-baseline.png" alt-text="Screenshot of passed assessments indicating they've passed per custom baseline.":::
95
95
96
96
Your vulnerability assessment scans can now be used to ensure that your database maintains a high level of security, and that your organizational policies are met.
97
97
@@ -130,7 +130,7 @@ You can run SQL vulnerability assessment scans on-demand:
130
130
131
131
1. To run an on-demand scan to scan your database for vulnerabilities, select **Scan** from the toolbar:
132
132
133
-
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/on-demand-vulnerability-scan.png" alt-text="Screenshot of select scan to run an on-demand vulnerability assessment scan of your SQL resource":::
133
+
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/on-demand-vulnerability-scan.png" alt-text="Screenshot of select scan to run an on-demand vulnerability assessment scan of your SQL resource.":::
134
134
135
135
136
136
> [!NOTE]
@@ -145,7 +145,7 @@ When a vulnerability scan completes, the report is displayed in the Azure portal
145
145
- A summary by severity of the risks
146
146
- A list of the findings for further investigations
147
147
148
-
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/sample-sql-vulnerabilities-report.png" alt-text="Screenshot of sample scan report from the SQL vulnerability assessment scanner":::
148
+
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/sample-sql-vulnerabilities-report.png" alt-text="Screenshot of sample scan report from the SQL vulnerability assessment scanner.":::
149
149
150
150
To remediate the vulnerabilities discovered:
151
151
@@ -160,11 +160,11 @@ To remediate the vulnerabilities discovered:
160
160
161
161
1. As you review your assessment results, you can mark specific results as being an acceptable *baseline* in your environment. A baseline is essentially a customization of how the results are reported. In subsequent scans, results that match the baseline are considered as passes. After you've established your baseline security state, vulnerability assessment only reports on deviations from the baseline. In this way, you can focus your attention on the relevant issues.
162
162
163
-
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/baseline-approval.png" alt-text="Screenshot of approving a finding as a baseline for future scans":::
163
+
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/baseline-approval.png" alt-text="Screenshot of approving a finding as a baseline for future scans.":::
164
164
165
165
1. If you change the baselines, use the **Scan** button to run an on-demand scan and view the customized report. Any findings you've added to the baseline will now appear in **Passed** with an indication that they've passed because of the baseline changes.
166
166
167
-
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/passed-per-custom-baseline.png" alt-text="Screenshot of passed assessments indicating they've passed per custom baseline":::
167
+
:::image type="content" source="media/defender-for-sql-azure-vulnerability-assessment/passed-per-custom-baseline.png" alt-text="Screenshot of passed assessments indicating they've passed per custom baseline.":::
168
168
169
169
Your vulnerability assessment scans can now be used to ensure that your database maintains a high level of security, and that your organizational policies are met.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/sql-azure-vulnerability-assessment-manage.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -287,14 +287,14 @@ To create a rule:
287
287
- Severity
288
288
- Benchmarks
289
289
290
-
:::image type="content" source="media/defender-for-sql-Azure-vulnerability-assessment/disable-rule-vulnerability-findings-sql.png" alt-text="Screenshot of create a disable rule for VA findings on SQL servers on machines":::
290
+
:::image type="content" source="media/defender-for-sql-Azure-vulnerability-assessment/disable-rule-vulnerability-findings-sql.png" alt-text="Screenshot of create a disable rule for VA findings on SQL servers on machines.":::
291
291
292
292
1. Select **Apply rule**. Changes might take up to 24 hrs to take effect.
293
293
1. To view, override, or delete a rule:
294
294
1. Select **Disable rule**.
295
295
1. From the scope list, subscriptions with active rules show as **Rule applied**.
296
296
297
-
:::image type="content" source="media/defender-for-sql-Azure-vulnerability-assessment/modify-rule.png" alt-text="Screenshot of modify or delete an existing rule":::
297
+
:::image type="content" source="media/defender-for-sql-Azure-vulnerability-assessment/modify-rule.png" alt-text="Screenshot of modify or delete an existing rule.":::
298
298
299
299
1. To view or delete the rule, select the ellipsis menu ("...").
0 commit comments