Skip to content

Commit f0a9383

Browse files
authored
Merge pull request #263490 from dcurwin/replace-click-jan18-2024
Fix formatting
2 parents e22659e + dd5c024 commit f0a9383

File tree

1 file changed

+19
-30
lines changed

1 file changed

+19
-30
lines changed

articles/defender-for-cloud/sql-information-protection-policy.md

Lines changed: 19 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -13,28 +13,23 @@ SQL information protection's [data discovery and classification mechanism](/azur
1313

1414
The classification mechanism is based on the following two elements:
1515

16-
- **Labels** – The main classification attributes, used to define the *sensitivity level of the data* stored in the column.
16+
- **Labels** – The main classification attributes, used to define the *sensitivity level of the data* stored in the column.
1717
- **Information Types** – Provides additional granularity into the *type of data* stored in the column.
1818

19-
The information protection policy options within Defender for Cloud provide a predefined set of labels and information types which serve as the defaults for the classification engine. You can customize the policy, according to your organization's needs, as described below.
19+
The information protection policy options within Defender for Cloud provide a predefined set of labels and information types that serve as the defaults for the classification engine. You can customize the policy, according to your organization's needs, as described below.
2020

2121
:::image type="content" source="./media/sql-information-protection-policy/sql-information-protection-policy-page.png" alt-text="The page showing your SQL information protection policy.":::
22-
23-
24-
2522

2623
## How do I access the SQL information protection policy?
2724

2825
There are three ways to access the information protection policy:
2926

3027
- **(Recommended)** From the **Environment settings** page of Defender for Cloud
31-
- From the security recommendation "Sensitive data in your SQL databases should be classified"
28+
- From the security recommendation *Sensitive data in your SQL databases should be classified*
3229
- From the Azure SQL DB data discovery page
3330

3431
Each of these is shown in the relevant tab below.
3532

36-
37-
3833
### [**From Defender for Cloud's settings**](#tab/sqlip-tenant)
3934

4035
<a name="sqlip-tenant"></a>
@@ -48,15 +43,13 @@ From Defender for Cloud's **Environment settings** page, select **SQL informatio
4843
4944
:::image type="content" source="./media/sql-information-protection-policy/environment-settings-link-to-information-protection.png" alt-text="Accessing the SQL Information Protection policy from the environment settings page of Microsoft Defender for Cloud.":::
5045

51-
52-
5346
### [**From Defender for Cloud's recommendation**](#tab/sqlip-db)
5447

5548
<a name="sqlip-db"></a>
5649

5750
### Access the policy from the Defender for Cloud recommendation
5851

59-
Use Defender for Cloud's recommendation, "Sensitive data in your SQL databases should be classified", to view the data discovery and classification page for your database. There, you'll also see the columns discovered to contain information that we recommend you classify.
52+
Use Defender for Cloud's recommendation, *Sensitive data in your SQL databases should be classified*, to view the data discovery and classification page for your database. There, you'll also see the columns discovered to contain information that we recommend you classify.
6053

6154
1. From Defender for Cloud's **Recommendations** page, search for the recommendation **Sensitive data in your SQL databases should be classified**.
6255

@@ -68,8 +61,6 @@ Use Defender for Cloud's recommendation, "Sensitive data in your SQL databases s
6861

6962
:::image type="content" source="./media/sql-information-protection-policy/access-policy-from-security-center-recommendation.png" alt-text="Opening the SQL information protection policy from the relevant recommendation in Microsoft Defender for Cloud's":::
7063

71-
72-
7364
### [**From Azure SQL**](#tab/sqlip-azuresql)
7465

7566
<a name="sqlip-azuresql"></a>
@@ -86,7 +77,7 @@ Use Defender for Cloud's recommendation, "Sensitive data in your SQL databases s
8677

8778
:::image type="content" source="./media/sql-information-protection-policy/access-policy-from-azure-sql.png" alt-text="Opening the SQL information protection policy from Azure SQL.":::
8879

89-
---
80+
---
9081

9182
## Customize your information types
9283

@@ -97,52 +88,50 @@ To manage and customize information types:
9788
:::image type="content" source="./media/sql-information-protection-policy/manage-types.png" alt-text="Manage information types for your information protection policy.":::
9889

9990
1. To add a new type, select **Create information type**. You can configure a name, description, and search pattern strings for the information type. Search pattern strings can optionally use keywords with wildcard characters (using the character '%'), which the automated discovery engine uses to identify sensitive data in your databases, based on the columns' metadata.
100-
91+
10192
:::image type="content" source="./media/sql-information-protection-policy/configure-new-type.png" alt-text="Configure a new information type for your information protection policy.":::
10293

103-
1. You can also modify the built-in types by adding additional search pattern strings, disabling some of the existing strings, or by changing the description.
94+
1. You can also modify the built-in types by adding additional search pattern strings, disabling some of the existing strings, or by changing the description.
10495

10596
> [!TIP]
106-
> You can't delete built-in types or change their names.
97+
> You can't delete built-in types or change their names.
10798
108-
1. **Information types** are listed in order of ascending discovery ranking, meaning that the types higher in the list will attempt to match first. To change the ranking between information types, drag the types to the right spot in the table, or use the **Move up** and **Move down** buttons to change the order.
99+
1. **Information types** are listed in order of ascending discovery ranking, meaning that the types higher in the list attempt to match first. To change the ranking between information types, drag the types to the right spot in the table, or use the **Move up** and **Move down** buttons to change the order.
109100

110-
1. Select **OK** when you are done.
101+
1. Select **OK** when you're done.
111102

112-
1. After you completed managing your information types, be sure to associate the relevant types with the relevant labels, by clicking **Configure** for a particular label, and adding or deleting information types as appropriate.
103+
1. After you completed managing your information types, be sure to associate the relevant types with the relevant labels, by selecting **Configure** for a particular label, and adding or deleting information types as appropriate.
113104

114105
1. To apply your changes, select **Save** in the main **Labels** page.
115-
116106

117107
## Exporting and importing a policy
118108

119-
You can download a JSON file with your defined labels and information types, edit the file in the editor of your choice, and then import the updated file.
109+
You can download a JSON file with your defined labels and information types, edit the file in the editor of your choice, and then import the updated file.
120110

121111
:::image type="content" source="./media/sql-information-protection-policy/export-import.png" alt-text="Exporting and importing your information protection policy.":::
122112

123113
> [!NOTE]
124-
> You'll need tenant level permissions to import a policy file.
125-
114+
> You'll need tenant level permissions to import a policy file.
126115
127116
## Permissions
128117

129-
To customize the information protection policy for your Azure tenant, you'll need the following actions on the tenant's root management group:
130-
- Microsoft.Security/informationProtectionPolicies/read
131-
- Microsoft.Security/informationProtectionPolicies/write
118+
To customize the information protection policy for your Azure tenant, you need the following actions on the tenant's root management group:
119+
120+
- Microsoft.Security/informationProtectionPolicies/read
121+
- Microsoft.Security/informationProtectionPolicies/write
132122

133123
Learn more in [Grant and request tenant-wide visibility](tenant-wide-permissions-management.md).
134124

135125
## Manage SQL information protection using Azure PowerShell
136126

137127
- [Get-AzSqlInformationProtectionPolicy](/powershell/module/az.security/get-azsqlinformationprotectionpolicy): Retrieves the effective tenant SQL information protection policy.
138128
- [Set-AzSqlInformationProtectionPolicy](/powershell/module/az.security/set-azsqlinformationprotectionpolicy): Sets the effective tenant SQL information protection policy.
139-
140129

141130
## Next steps
142-
131+
143132
In this article, you learned about defining an information protection policy in Microsoft Defender for Cloud. To learn more about using SQL Information Protection to classify and protect sensitive data in your SQL databases, see [Azure SQL Database Data Discovery and Classification](/azure/azure-sql/database/data-discovery-and-classification-overview).
144133

145134
For more information on security policies and data security in Defender for Cloud, see the following articles:
146-
135+
147136
- [Setting security policies in Microsoft Defender for Cloud](tutorial-security-policy.md): Learn how to configure security policies for your Azure subscriptions and resource groups
148137
- [Microsoft Defender for Cloud data security](data-security.md): Learn how Defender for Cloud manages and safeguards data

0 commit comments

Comments
 (0)