Skip to content

Commit fb65574

Browse files
authored
Merge pull request #283543 from CESANU/patch-27
Update defender-for-sql-on-machines-vulnerability-assessment.md
2 parents 11e21e3 + 653d60c commit fb65574

File tree

3 files changed

+16
-1
lines changed

3 files changed

+16
-1
lines changed

articles/defender-for-cloud/defender-for-sql-on-machines-vulnerability-assessment.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -141,6 +141,9 @@ Metadata information about the connected machine is also collected. Specifically
141141

142142
You can specify the region where your SQL Vulnerability Assessment data will be stored by choosing the Log Analytics workspace location. Microsoft might replicate to other regions for data resiliency, but Microsoft does not replicate data outside the geography.
143143

144+
> [!NOTE]
145+
> Changing the Defender for SQL on Machines plan's Log Analytics workspace will reset the scan results and baseline settings. If you revert to the original Log Analytics workspace within 90 days the the scan results and baseline settings will be made available again.
146+
144147
## Next step
145148

146149
> [!div class="nextstepaction"]

articles/defender-for-cloud/faq-defender-for-databases.yml

Lines changed: 12 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,13 +38,24 @@ sections:
3838
3939
Performance always varies between environments, machines, and loads. The statements are provided as a general guideline, not a guarantee for any individual deployment.
4040
41+
- question: |
42+
I changed the Log Analytics workspace for Defender for SQL on Machines and lost all my scan results and baselines settings. What happened?
43+
answer: |
44+
The scan results and baselines are not stored in the Log Analytics workspace but are linked to it. Changing the workspace will reset the scan results and baseline settings. However, if you revert to the original workspace within 90 days, the scan results and baseline settings will be restored. [Read more](defender-for-sql-on-machines-vulnerability-assessment.md#data-residency)
45+
4146
- question: |
4247
What happens to the old scan results and baselines after I switch to express configuration?
4348
answer: |
4449
Old results and baselines settings remain available on your storage account, but won't be updated or used by the system. You don't need to maintain these files for SQL vulnerability assessment to work after you switch to express configuration, but you can keep your old baseline definitions for future reference.
4550
4651
When express configuration is enabled, you don't have direct access to the result and baseline data because it's stored on internal Microsoft storage.
4752
53+
- question: |
54+
Why is my Azure SQL Server marked as unhealthy for "SQL servers should have vulnerability assessment configured", even though I’ve properly set it up using classic configuration?
55+
answer: |
56+
The policy behind this recommendation checks for the existence of subassessments for the server. With classic configuration, system databases are scanned only if at least one user database exists. Therefore, a server without any user databases will not have scans or reported scan results, causing the policy to remain unhealthy.
57+
Switching to express configuration will enable scheduled and manual scans for system databases, thus mitigating this issue.
58+
4859
- question: |
4960
Can I set up recurring scans with express configuration?
5061
answer: |
@@ -99,4 +110,4 @@ additionalContent: |
99110
## Next steps
100111
101112
[Learn about Defender for Databases](quickstart-enable-database-protections.md)
102-
113+

articles/defender-for-cloud/sql-azure-vulnerability-assessment-overview.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -52,6 +52,7 @@ Configuration modes benefits and limitations comparison:
5252
| Supported Policy Scope | • Subscription<br>• Server | • Subscription<br>• Server<br>• Database |
5353
| Dependencies | None | Azure storage account |
5454
| Recurring scan | • Always active<br>• Scan scheduling is internal and not configurable | • Configurable on/off<br>Scan scheduling is internal and not configurable |
55+
| System databases scan | • Scheduled scan<br>• Manual scan | • Scheduled scan only if there's one user database or more<br>• Manual scan every time a user database is scanned |
5556
| Supported Rules | All vulnerability assessment rules for the supported resource type. | All vulnerability assessment rules for the supported resource type. |
5657
| Baseline Settings | • Batch – several rules in one command<br>• Set by latest scan results<br>• Single rule | • Single rule |
5758
| Apply baseline | Will take effect **without** rescanning the database | Will take effect **only after** rescanning the database |

0 commit comments

Comments
 (0)