Skip to content

Commit f9846b0

Browse files
authored
Merge pull request #33649 from MicrosoftDocs/main
3/28/2025 PM Publish
2 parents 253bdac + 88420f4 commit f9846b0

8 files changed

+28
-31
lines changed

azure-sql/database/service-tiers-sql-database-vcore.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -294,11 +294,8 @@ For information on current generation hardware availability, see [Feature Availa
294294

295295
#### Fsv2-series
296296

297-
Fsv2-series hardware for Azure SQL Database will be retired October 1, 2026. To minimize service disruption and maintain price-performance, transition to Hyperscale premium-series or Standard-series (Gen5) hardware.
297+
Fsv2-series hardware for Azure SQL Database will be retired October 1, 2026. To minimize service disruption and maintain price-performance, transition to Hyperscale premium-series or Standard-series (Gen5) hardware. For more information, see [Retirement Notice: Azure SQL Database FSV2-series offer](https://azure.microsoft.com/updates?id=485030). For most databases and workloads, Hyperscale premium-series or Standard-series (Gen5) hardware provide similar or better price performance than Fsv2. To make sure, please validate this with your specific database and workloads.
298298

299-
For most databases and workloads, Hyperscale premium-series or Standard-series (Gen5) hardware provide similar or better price performance than Fsv2. To make sure, please validate this with your specific database and workloads.
300-
301-
- Similar to [Hyperscale premium-series](#hyperscale-premium-series) hardware configurations, Fsv2-series is powered by the latest CPU and memory technology from Intel and AMD, allowing customers to take advantage of the latest hardware while using databases and elastic pools in the General Purpose service tier.
302299
- Fsv2 provides less memory and `tempdb` per vCore than other hardware, so workloads sensitive to those limits might perform better on standard-series (Gen5).
303300
- Fsv2-series is only supported in the General Purpose tier.
304301

azure-sql/database/transparent-data-encryption-byok-overview.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: Bring Your Own Key (BYOK) support for transparent data encryption (
55
author: Pietervanhove
66
ms.author: pivanho
77
ms.reviewer: wiassaf, vanto, mathoma, randolphwest
8-
ms.date: 02/04/2025
8+
ms.date: 03/28/2025
99
ms.service: azure-sql
1010
ms.subservice: security
1111
ms.topic: conceptual
@@ -35,7 +35,7 @@ Managing the TDE protector at the database level in Azure SQL Database is availa
3535
> [!NOTE]
3636
> In this article, the terms Customer Managed Key (CMK) and Bring Your Own Key (BYOK) are used interchangeably, but they represent some differences.
3737
> - **Customer Managed Key (CMK)** - The customer manages the key lifecycle, including key creation, rotation, and deletion. The key is stored in [Azure Key Vault](/azure/key-vault/general/overview) or [Azure Key Vault Managed HSM](/azure/key-vault/managed-hsm/overview) and used for encryption of the Database Encryption Key (DEK) in Azure SQL, SQL Server on Azure VM, and SQL Server on-premises.
38-
> - **Bring Your Own Key (BYOK)** - The customer securely brings or imports their own key from an on-premises hardware security module (HSM) into Azure Key Vault or Azure Key Vault Managed HSM. Such imported keys may be used as any other key in Azure Key Vault, including as a Customer Managed Key for encryption of the DEK. For more information, see [Import HSM-protected keys to Managed HSM (BYOK)](/azure/key-vault/managed-hsm/hsm-protected-keys-byok).
38+
> - **Bring Your Own Key (BYOK)** - The customer securely brings or imports their own key from an on-premises hardware security module (HSM) into Azure Key Vault or Azure Key Vault Managed HSM. Such imported keys might be used as any other key in Azure Key Vault, including as a Customer Managed Key for encryption of the DEK. For more information, see [Import HSM-protected keys to Managed HSM (BYOK)](/azure/key-vault/managed-hsm/hsm-protected-keys-byok).
3939
4040
Customer-managed TDE provides the following benefits to the customer:
4141

@@ -106,7 +106,7 @@ Auditors can use Azure Monitor to review key vault AuditEvent logs, if logging i
106106

107107
### Requirements for configuring TDE protector
108108

109-
- TDE protector can only be an asymmetric, RSA, or RSA HSM key. The supported key lengths are 2048 bits and 3072 bits.
109+
- TDE protector can only be an asymmetric, RSA, or RSA HSM key. The supported key lengths are 2,048 bits and 3,072 bits.
110110

111111
- The key activation date (if set) must be a date and time in the past. Expiration date (if set) must be a future date and time.
112112

@@ -244,7 +244,7 @@ Once a database is encrypted with TDE using a key from Key Vault, any newly gene
244244
To restore a backup encrypted with a TDE protector from Key Vault, make sure that the key material is available to the target server. Therefore, we recommend that you keep all the old versions of the TDE protector in key vault, so database backups can be restored.
245245

246246
> [!IMPORTANT]
247-
> At any moment there can be not more than one TDE protector set for a server. It's the key marked with "Make the key the default TDE protector" in the Azure portal pane. However, multiple additional keys can be linked to a server without marking them as a TDE protector. These keys aren't used for protecting DEK, but can be used during restore from a backup, if backup file is encrypted with the key with the corresponding thumbprint.
247+
> There can't be more than one TDE protector set for a server at any moment. The key marked with **Make the key the default TDE protector** in the Azure portal pane is the TDE protector. However, multiple keys can be linked to a server without marking them as a TDE protector. These keys aren't used for protecting the DEK, but can be used during restore from a backup, if the backup file is encrypted with the key with the corresponding thumbprint.
248248
249249
If the key that is needed for restoring a backup is no longer available to the target server, the following error message is returned on the restore try:
250250
"Target server `<Servername>` doesn't have access to all AKV URIs created between \<Timestamp #1> and \<Timestamp #2>. Retry operation after restoring all AKV URIs."

docs/relational-databases/security/encryption/always-encrypted-enclaves-provision-keys.md

Lines changed: 6 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: "Provision enclave-enabled keys"
44
author: PieterVanhove
55
ms.author: pivanho
66
ms.reviewer: vanto
7-
ms.date: 04/05/2023
7+
ms.date: 03/28/2025
88
ms.service: sql
99
ms.subservice: security
1010
ms.custom: devx-track-azurepowershell
@@ -25,7 +25,7 @@ The tool will also digitally sign the column master properties with the column m
2525
The `ENCLAVE_COMPUTATIONS` is immutable, meaning, you can't change it once you define the column master key in the metadata. To enable enclave computations using a column encryption key, that a given column master key encrypts, you need to rotate the column master key and replace it with an enclave-enabled column master key. See [Rotate enclave-enabled keys](always-encrypted-enclaves-rotate-keys.md).
2626

2727
> [!NOTE]
28-
> Currently, both SSMS and PowerShell support enclave-enabled column master keys stored in Azure Key Vault or Windows Certificate Store. Hardware security modules (using CNG or CAPI) are not supported.
28+
> Currently, both SSMS and PowerShell support enclave-enabled column master keys stored in Azure Key Vault or Windows Certificate Store. Hardware security modules (using CNG or CAPI) aren't supported.
2929
3030
To create an enclave-enabled column encryption key, you need to ensure that you select an enclave-enabled column master key to encrypt the new key.
3131

@@ -49,14 +49,14 @@ To provision an enclave-enabled column master key, follow the steps in [Provisio
4949
![Allow enclave computations](./media/always-encrypted-enclaves/allow-enclave-computations.png)
5050

5151
> [!NOTE]
52-
> The **Allow enclave computations** checkbox appears only if a secure enclave is configured for your database. If you are using [!INCLUDE[ssNoVersion](../../../includes/ssnoversion-md.md)], see [Configure the secure enclave in SQL Server](always-encrypted-enclaves-configure-enclave-type.md). If you are using [!INCLUDE [ssazure-sqldb](../../../includes/ssazure-sqldb.md)], see [Enable Always Encrypted with secure enclaves for your Azure SQL Database](/azure/azure-sql/database/always-encrypted-enclaves-enable).
52+
> The **Allow enclave computations** checkbox appears only if a secure enclave is configured for your database. If you're using [!INCLUDE[ssNoVersion](../../../includes/ssnoversion-md.md)], see [Configure the secure enclave in SQL Server](always-encrypted-enclaves-configure-enclave-type.md). If you're using [!INCLUDE [ssazure-sqldb](../../../includes/ssazure-sqldb.md)], see [Enable Always Encrypted with secure enclaves for your Azure SQL Database](/azure/azure-sql/database/always-encrypted-enclaves-enable).
5353
5454
> [!TIP]
5555
> To check if a column master key is enclave-enabled, right-click on it in Object Explorer and select **Properties**. If the key is enclave-enabled, **Enclave Computations: Allowed** appears in the window showing the properties of the key. Alternatively, you can use the [sys.column_master_keys (Transact-SQL)](../../system-catalog-views/sys-column-master-keys-transact-sql.md) view.
5656
5757
### Provision enclave-enabled column encryption keys with the New Column Encryption Key dialog
5858

59-
To provision an enclave-enabled column encryption key, follow the steps in [Provision Column Encryption Keys with the New Column Encryption Key Dialog](configure-always-encrypted-keys-using-ssms.md#provision-column-encryption-keys-with-the-new-column-encryption-key-dialog). When selecting a column master key, make sure it is enclave-enabled.
59+
To provision an enclave-enabled column encryption key, follow the steps in [Provision Column Encryption Keys with the New Column Encryption Key Dialog](configure-always-encrypted-keys-using-ssms.md#provision-column-encryption-keys-with-the-new-column-encryption-key-dialog). When selecting a column master key, make sure it's enclave-enabled.
6060

6161
> [!TIP]
6262
> To check if a column encryption key is enclave-enabled, right-click on it in Object Explorer and select **Properties**. If the key is enclave-enabled, **Enclave Computations: Allowed** appears in the window showing the properties of the key.
@@ -72,7 +72,7 @@ The SqlServer PowerShell module extends the [**New-SqlCertificateStoreColumnMas
7272
Provisioning enclave-enabled column encryption keys is no different from provisioning column encryption keys that aren't enclave-enabled. You just need to make sure that a column master key used to encrypt the new column encryption key is enclave-enabled.
7373

7474
> [!NOTE]
75-
> The SqlServer PowerShell module does not currently support provisioning enclave-enabled keys stored in hardware security modules (using CNG or CAPI).
75+
> The SqlServer PowerShell module doesn't currently support provisioning enclave-enabled keys stored in hardware security modules (using CNG or CAPI).
7676
7777
### Example - provision enclave-enabled keys using Windows Certificate Store
7878

@@ -150,15 +150,12 @@ $cekName = "CEK1"
150150
New-SqlColumnEncryptionKey -Name $cekName -InputObject $database -ColumnMasterKey $cmkName -KeyVaultAccessToken $keyVaultAccessToken
151151
```
152152

153-
## Next steps
153+
## Related content
154154

155155
- [Run Transact-SQL statements using secure enclaves](always-encrypted-enclaves-query-columns.md)
156156
- [Configure column encryption in-place using Always Encrypted with secure enclaves](always-encrypted-enclaves-configure-encryption.md)
157157
- [Enable Always Encrypted with secure enclaves for existing encrypted columns](always-encrypted-enclaves-enable-for-encrypted-columns.md)
158158
- [Develop applications using Always Encrypted with secure enclaves](always-encrypted-enclaves-client-development.md)
159-
160-
## See also
161-
162159
- [Getting started using Always Encrypted with secure enclaves](/azure/azure-sql/database/always-encrypted-enclaves-getting-started)
163160
- [Manage keys for Always Encrypted with secure enclaves](always-encrypted-enclaves-manage-keys.md)
164161
- [CREATE COLUMN MASTER KEY (Transact-SQL)](../../../t-sql/statements/create-column-master-key-transact-sql.md)

docs/relational-databases/security/encryption/always-encrypted-enclaves.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn about the Always Encrypted with secure enclaves feature for S
44
author: Pietervanhove
55
ms.author: pivanho
66
ms.reviewer: vanto
7-
ms.date: 02/03/2025
7+
ms.date: 03/28/2025
88
ms.service: sql
99
ms.subservice: security
1010
ms.topic: conceptual
@@ -143,7 +143,7 @@ The operations supported inside the secure enclaves are:
143143
| [SELECT - GROUP BY- Transact-SQL](../../../t-sql/queries/select-group-by-transact-sql.md) | Supported | Supported | Not supported |
144144

145145
> [!NOTE]
146-
> The above operations inside secure enclaves require randomized encryption. Deterministic encryption is not supported. Equality comparison remains the operation available for columns using deterministic encryption.
146+
> The above operations inside secure enclaves require randomized encryption. Deterministic encryption isn't supported. Equality comparison remains the operation available for columns using deterministic encryption.
147147
>
148148
> The [compatibility level](../../../t-sql/statements/alter-database-transact-sql-compatibility-level.md) of the database should be set to SQL Server 2022 (160) or higher.
149149
>

docs/relational-databases/security/encryption/configure-always-encrypted-using-powershell.md

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to import and use the SqlServer PowerShell module, which
44
author: Pietervanhove
55
ms.author: pivanho
66
ms.reviewer: vanto
7-
ms.date: 04/05/2023
7+
ms.date: 03/28/2025
88
ms.service: sql
99
ms.subservice: security
1010
ms.topic: how-to
@@ -17,11 +17,11 @@ The SqlServer PowerShell module provides cmdlets for configuring [Always Encrypt
1717

1818
## Security Considerations when using PowerShell to Configure Always Encrypted
1919

20-
Because the primary goal of Always Encrypted is to ensure encrypted sensitive data is safe, even if the database system gets compromised, executing a PowerShell script that processes keys or sensitive data on the SQL Server computer can reduce or defeat the benefits of the feature. For additional security-related recommendations, see [Security Considerations for Key Management](overview-of-key-management-for-always-encrypted.md#security-considerations-for-key-management).
20+
Because the primary goal of Always Encrypted is to ensure encrypted sensitive data is safe, even if the database system gets compromised, executing a PowerShell script that processes keys or sensitive data on the SQL Server computer can reduce or defeat the benefits of the feature. For more security-related recommendations, see [Security Considerations for Key Management](overview-of-key-management-for-always-encrypted.md#security-considerations-for-key-management).
2121

2222
You can use PowerShell to manage Always Encrypted keys both with and without role separation, providing control over who has access to the actual encryption keys in the key store, and who has access to the database.
2323

24-
For additional recommendations, see [Security Considerations for Key Management](overview-of-key-management-for-always-encrypted.md#security-considerations-for-key-management).
24+
For more recommendations, see [Security Considerations for Key Management](overview-of-key-management-for-always-encrypted.md#security-considerations-for-key-management).
2525

2626
## Prerequisites
2727

@@ -76,10 +76,11 @@ $database | Get-SqlColumnMasterKey
7676
```
7777

7878
### Using SQL Server PowerShell Provider
79-
The [SQL Server PowerShell Provider](/powershell/sql-server/sql-server-powershell-provider) exposes the hierarchy of SQL Server objects in paths similar to file system paths. With SQL Server PowerShell, you can navigate the paths using Windows PowerShell aliases similar to the commands you typically use to navigate file system paths. Once you navigate to the target instance and the database, the subsequent cmdlets target that database, as shown in the following example.
79+
80+
The [SQL Server PowerShell Provider](/powershell/sql-server/sql-server-powershell-provider) exposes the hierarchy of SQL Server objects in paths similar to file system paths. With SQL Server PowerShell, you can navigate the paths using Windows PowerShell aliases similar to the commands you typically use to navigate file system paths. Once you navigate to the target instance and the database, the subsequent cmdlets target that database, as shown in the following example.
8081

8182
> [!NOTE]
82-
> This method of connecting to a database works only for SQL Server (it is not supported in Azure SQL Database).
83+
> This method of connecting to a database works only for SQL Server (it isn't supported in Azure SQL Database).
8384
8485
```PowerShell
8586
# Import the SqlServer module.
@@ -135,7 +136,7 @@ The following PowerShell cmdlets are available for Always Encrypted:
135136

136137

137138

138-
## See Also
139+
## Related content
139140

140141
- [Always Encrypted](../../../relational-databases/security/encryption/always-encrypted-database-engine.md)
141142
- [Overview of key management for Always Encrypted](../../../relational-databases/security/encryption/overview-of-key-management-for-always-encrypted.md)

docs/sql-server/install/hardware-and-software-requirements-for-installing-sql-server-2019.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,8 @@ title: "SQL Server 2019: Hardware & software requirements"
33
description: A list of hardware, software, and operating system requirements for installing and running SQL Server 2019.
44
author: MikeRayMSFT
55
ms.author: mikeray
6-
ms.date: 03/03/2025
6+
ms.reviewer: randolphwest
7+
ms.date: 03/28/2025
78
ms.service: sql
89
ms.subservice: release-landing
910
ms.topic: conceptual
@@ -67,7 +68,7 @@ The following memory and processor requirements apply to all editions of [!INCLU
6768
| Internet | Internet functionality requires Internet access (fees might apply). |
6869
| Memory \* | **Minimum:**<br /><br />Express Editions: 512 MB<br />All other editions: 1 GB<br />**Recommended:**<br />Express Editions: 1 GB<br />All other editions: At least 4 GB and should be increased as database size increases to ensure optimal performance. |
6970
| Processor Speed | **Minimum:** x64 Processor: 1.4 GHz<br /><br />**Recommended:** 2.0 GHz or faster |
70-
| Processor Type | x64 Processor: AMD Opteron, AMD Athlon 64, Intel Xeon with Intel EM64T support, Intel Pentium IV with EM64T support |
71+
| Processor Type | x64 Processor: All Intel and AMD x86-64 CPUs with [64 cores or less per NUMA node](../compute-capacity-limits-by-edition-of-sql-server.md#numa-64) |
7172

7273
> [!NOTE]
7374
> Installation of [!INCLUDE [ssCurrent](../../includes/ssnoversion-md.md)] is supported on x64 processors only. It is no longer supported on x86 processors.

docs/sql-server/install/hardware-and-software-requirements-for-installing-sql-server-2022.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: A list of hardware, software, and operating system requirements for
44
author: MikeRayMSFT
55
ms.author: mikeray
66
ms.reviewer: randolphwest, jopilov, rdorr
7-
ms.date: 11/21/2024
7+
ms.date: 03/28/2025
88
ms.service: sql
99
ms.subservice: release-landing
1010
ms.topic: conceptual
@@ -68,7 +68,7 @@ The following memory and processor requirements apply to all editions of [!INCLU
6868
| Internet | Internet functionality requires Internet access (fees can apply). |
6969
| Memory <sup>1</sup> | **Minimum:**<br /><br />Express Editions: 512 MB<br /><br />All other editions: 1 GB<br /><br />**Recommended:**<br /><br />Express Editions: 1 GB<br /><br />All other editions: At least 4 GB and should be increased as database size increases to ensure optimal performance. |
7070
| Processor Speed | **Minimum:** x64 Processor: 1.4 GHz<br /><br />**Recommended:** 2.0 GHz or faster |
71-
| Processor Type | x64 Processor: AMD Opteron, AMD Athlon 64, Intel Xeon with Intel EM64T support, Intel Pentium IV with EM64T support |
71+
| Processor Type | x64 Processor: All Intel and AMD x86-64 CPUs with [64 cores or less per NUMA node](../compute-capacity-limits-by-edition-of-sql-server.md#numa-64) |
7272

7373
<sup>1</sup> The minimum memory required for installing the [!INCLUDE [ssDQSServer](../../includes/ssdqsserver-md.md)] component in [!INCLUDE [ssDQSnoversion](../../includes/ssdqsnoversion-md.md)] (DQS) is 2 GB of RAM, which is different from the [!INCLUDE [ssnoversion-md](../../includes/ssnoversion-md.md)] minimum memory requirement. For information about installing DQS, see [Install Data Quality Services](../../data-quality-services/install-windows/install-data-quality-services.md).
7474

0 commit comments

Comments
 (0)