Skip to content

Latest commit

 

History

History
519 lines (324 loc) · 40.1 KB

File metadata and controls

519 lines (324 loc) · 40.1 KB
title What are Extended Security Updates?
description Learn about Extended Security Updates enabled by Azure Arc, for your end-of-support and end-of-life SQL Server products such as SQL Server 2012.
author rwestMSFT
ms.author randolphwest
ms.date 12/20/2023
ms.service sql
ms.subservice install
ms.topic conceptual
ms.custom
references_regions
monikerRange >=sql-server-2016

What are Extended Security Updates for SQL Server?

[!INCLUDE esu-table]

Extended Security Updates (ESUs) are available for [!INCLUDE ssSQL11].

This article provides information how to receive Extended Security Updates (ESUs) for versions of [!INCLUDE ssnoversion-md] that are out of extended support.

ESUs are made available if needed, once a security vulnerability is discovered and is rated as Critical by the Microsoft Security Response Center (MSRC). Therefore, there's no regular release cadence for [!INCLUDE ssNoVersion] ESUs.

ESUs don't include:

  • New features
  • Functional improvements
  • Customer-requested fixes

[!INCLUDE SQL Server end of support]

For information about ESU pricing, see Plan your Windows Server 2012/2012 R2 and SQL Server 2012 end-of-support.

For more information about other options, see End of support options.

You can also review the Frequently asked questions.

Overview

Once [!INCLUDE ssNoVersion] has reached the end of its support lifecycle, you can sign up for an Extended Security Update (ESU) subscription for your servers and remain protected for up to three years, until you're ready to upgrade to a newer version of [!INCLUDE ssNoVersion] or migrate to Azure SQL.

The method of receiving Extended Security Updates depends on where your [!INCLUDE ssNoVersion] is running.

  • SQL Server on Azure Virtual Machines. ESUs are free and enabled by default.

  • SQL Server on-premises or a hosted environment. ESUs are free on the following Azure services:

    • Azure Stack HCI

    • Azure Stack Hub

  • SQL Server on-premises or a hosted environment, and connected to Azure Arc. You can use Extended Security Updates enabled by Azure Arc to enable ESU as a monthly subscription. The updates can be automatically installed when they're available. You also benefit from the features that [[!INCLUDE ssazurearc]](../azure-arc/overview.md) provides. If you migrate your [!INCLUDE ssNoVersion] to Azure or upgrade the subscription, charges then automatically stop. You can cancel the ESU subscription manually at any time.

  • SQL Server on-premises or in a hosted environment, and not connected to Azure Arc. You can purchase the ESU SKU through the Volume Licensing Service Center (VLSC), and manually register your [!INCLUDE ssNoVersion] instances on the Azure portal to receive the patches. For more information, see Register disconnected SQL Server instances for ESUs later in this article.

    [!NOTE]
    Connecting or registering instances is free of charge. Both connected and registered instances don't incur additional charges when downloading ESUs, which are delivered through the Azure portal.

[!INCLUDE msCoName] recommends applying ESU patches as soon as they're available to keep your [!INCLUDE ssNoVersion] instance protected. For detailed information about ESUs, see the ESU FAQ page.

Support

ESUs don't include technical support for either on-premises or hosted environments. For on-premises environments, you can receive technical support on workloads covered by ESUs through additional active support contracts such as Software Assurance or Premier/Unified Support. Alternatively, if you're hosting on Azure, you can use an Azure Support plan to get technical support.

ESU availability and deployment

ESUs are available to customers running their workload in Azure, on-premises, or hosted environments.

Azure workloads

If you migrate your workloads to an Azure service (for more information, see the Overview section), you'll have access to ESUs for [!INCLUDE ssSQL11] for up to three years after the End of Support, at no additional charge above the cost of running the Azure service. You don't need Software Assurance to receive ESUs in Azure.

Azure services running [!INCLUDE ssNoVersion] receive ESUs automatically through existing [!INCLUDE ssNoVersion] update channels or Windows Update. You don't need to install the [!INCLUDE ssnoversion-md] IaaS Agent extension to download ESU patches on an Azure SQL Virtual Machine.

Note

For [!INCLUDE ssnoversion-md] workloads deployed to Nutanix Cloud Clusters, which operate on Azure bare-metal infrastructure, or for Azure Stack, you must follow the same process as on-premises or hosted environments not connected to Azure Arc.

On-premises or hosted environments connected to Azure Arc

If you have Software Assurance, you can use Extended Security Updates enabled by Azure Arc, to subscribe to ESUs for up to three years after the End of Support date, under one of the following agreements:

  • Enterprise Agreement (EA)
  • Enterprise Agreement Subscription (EAS)
  • Server and Cloud Enrollment (SCE)
  • Enrollment for Education Solutions (EES)

You're billed through your Azure subscription only for the servers that you enabled for ESUs, and only if they run an eligible version of [!INCLUDE ssNoVersion]. See instructions on how to subscribe to Extended Security Updates enabled by Azure Arc later in this article.

On-premises or hosted environments not connected to Azure Arc

If you have Software Assurance, you can purchase an Extended Security Update (ESU) plan for up to three years after the End of Support date, under one of the following agreements:

  • Enterprise Agreement (EA)
  • Enterprise Agreement Subscription (EAS)
  • Server and Cloud Enrollment (SCE)
  • Enrollment for Education Solutions (EES)

You can purchase ESUs only for the servers you need to cover. ESUs can be purchased directly from [!INCLUDE msCoName] or a [!INCLUDE msCoName] licensing partner.

Customers covered by ESU agreements must follow these steps to download and deploy an ESU patch:

  • Register disconnected SQL Server instances for ESUs.
  • Once registered, whenever ESU patches are released, a download link is provided in the Azure portal to download the package.
  • The downloaded package can be deployed to your on-premises or hosted environments manually, or through the update orchestration solution you use in your organization, such as Microsoft Endpoint Configuration Manager.

For more information, see the Extended Security Updates frequently asked questions.

Subscribe to Extended Security Updates enabled by Azure Arc

If your on-premises or hosted environment [!INCLUDE ssnoversion-md] instances are connected to Azure Arc, you can enable ESUs as a subscription, which provides you with the flexibility to cancel at any time without having to separately purchase an ESU SKU. The ESU subscription enables automated deployment of the patches as they are released.

You can subscribe to Extended Security Updates by modifying [!INCLUDE ssnoversion-md] configuration. See [Configure [!INCLUDE ssazurearc]](../azure-arc/manage-configuration.md).

The following steps subscribe to ESUs using the Azure portal:

  1. When you connect your [!INCLUDE ssnoversion-md] instance to Azure Arc, you can see the ESU status option in the Overview pane. The default for all new instances is N/A.

    :::image type="content" source="media/sql-server-extended-security-updates/extended-security-updates-not-applicable.png" alt-text="Screenshot showing the Overview pane for a SQL Server instance. ESU status is highlighted.":::

  2. Select N/A, and navigate to the SQL Server Configuration pane. In the License Type section, select License with Software Assurance.

    :::image type="content" source="media/sql-server-extended-security-updates/extended-security-updates-license-with-software-assurance.png" alt-text="Screenshot showing the option to select for Software Assurance." lightbox="media/sql-server-extended-security-updates/extended-security-updates-license-with-software-assurance.png":::

  3. Select Subscribe to Extended Security Updates, and select Save.

    :::image type="content" source="media/sql-server-extended-security-updates/extended-security-updates-subscribe-save.png" alt-text="Screenshot showing the Subscribe to ESU option highlighted." lightbox="media/sql-server-extended-security-updates/extended-security-updates-subscribe-save.png":::

Note

To subscribe to Extended Security Updates, you must have License type set to Pay-as-you-go or License with Software assurance. Otherwise, the Extended Security Updates option will be disabled.

The following command enables the ESU subscription using Azure PowerShell. Replace the following values for your own environment:

  • <resource_group>
  • <machine_name>
  • <azure_region>
# Updated settings object
$Settings = @{ SqlManagement = @{ IsEnabled = $true }; enableSecurityUpdates = $true }
New-AzConnectedMachineExtension -Name "WindowsAgent.SqlServer" -ResourceGroupName { <resource_group> } -MachineName { <machine_name> } -Location { <azure_region> } -Publisher "Microsoft.AzureData" -Settings $Settings -ExtensionType "WindowsAgent.SqlServer"

Warning

The update command overwrites all settings. If your extension settings have a list of excluded [!INCLUDE ssNoVersion] instances, you must specify the full exclusion list with the update command.

If you have multiple [!INCLUDE ssNoVersion] instances eligible for ESUs, you can subscribe in bulk using the Modify License Type PowerShell script, which allows you to configure the ESU setting for one of:

  • all Azure Arc-enabled machines a specific resource group,
  • an Azure subscription, or
  • all Azure subscriptions your Azure account has access to.

The script preserves all the existing settings. It's published as an open source [!INCLUDE ssNoVersion] sample and includes step-by-step instructions.

The following command enables the ESU subscription using Azure CLI. Replace the following values for your own environment:

  • <machine_name>
  • <resource_group>
az connectedmachine extension update --machine-name "<machine_name>" -g "<resource_group>" --name "WindowsAgent.SqlServer" --type "WindowsAgent.SqlServer" --publisher "Microsoft.AzureData" --settings '{ enableSecurityUpdates=$true, "SqlManagement": {"IsEnabled":true} }'

Warning

The update command overwrites all settings. If your extension settings have a list of excluded [!INCLUDE ssNoVersion] instances, you must specify the full exclusion list with the update command.


Important

If you disconnect your [!INCLUDE ssNoVersion] instance from Azure Arc, the ESU charges stop, and you won't have access to the new ESUs. If you haven't manually canceled your ESU subscription using Azure portal or API, the access to ESUs are immediately restored once you reconnect your [!INCLUDE ssNoVersion] instance to Azure Arc, and the ESU charges resume. These charges include the time of disconnection. For more information about what happens when you disconnect your [!INCLUDE ssNoVersion] instances, see Extended Security Updates: Frequently asked questions.

Subscribe to Extended Security Updates at scale using Azure Policy

You can activate the ESU subscription on multiple Arc-enabled machines using an Azure policy definition called Subscribe eligible Arc-enabled SQL Servers instances to Extended Security Updates. When you create an assignment of this policy definition to a scope of your choice, it enables ESU on all Arc-enabled machines that have the Azure extension for SQL Server installed. If any of these machines have a qualified [!INCLUDE ssnoversion-md] instance, the ESU subscription is activated immediately.

Use the following steps to activate this policy:

  1. Navigate to Azure Policy in the Azure portal and choose Definitions.
  2. Search for Subscribe eligible Arc-enabled SQL Servers instances to Extended Security Updates and right-click on the policy.
  3. Select Assign policy.
  4. Select a subscription and optionally a resource group as a scope.
  5. Make sure the policy enforcement is set to Enabled.
  6. On the Parameters tab, set the value of Enable Extended Security Updates to True.
  7. On the Remediation tab:
    1. Select Create remediation task for this policy to be applied to existing resources. If not selected, the policy is applied to the newly created resources only.
    2. Select Create a Managed Identity and choose System assigned managed identity (recommended) or User assigned managed identity, which has Azure Extension for SQL Server Deployment and Reader permissions.
    3. Select the identity's location.
  8. Select Review + Create.
  9. Select Create.

Understand ESU subscription billing

The ESU license extends support for critical updates for three more years. When using volume licensing SKUs, you must purchase an ESU subscription for year 1, and then add year 2 and year 3. When you use ESU subscriptions to obtain ESU coverage, you have the additional benefit of canceling the subscription and all future charges without penalty at any time.

Billing for SQL Server 2012 ESUs

Because the ESU subscription option became available in year 2 of the [!INCLUDE ssSQL11] extended support period, most customers already purchased the year 1 ESU SKU, which ended on July 11, 2023. You can sign up for the ESU subscription at any time within year 2, and your bill reflects the cost of continuous ESU coverage. After you sign up for the ESU subscription, your next monthly bill includes a one-time billback charge for each [!INCLUDE ssSQL11] instance with an active ESU subscription, from July 12, 2023, to the date of activation. From this point, each server is billed on an hourly basis. Both billback and regular hourly charges use the hourly rate (core count) x (100% of year 2 ESU license price) / 730. So, the size of the billback charge depends on how much time has passed since July 12, 2023, until the activation time. For more information about ESU pricing, see Plan your Windows Server 2012/2012 R2 and SQL Server 2012 end-of-support.

Billing for SQL Server 2014 ESUs

Unlike with [!INCLUDE ssSQL11], the ESU subscription for [!INCLUDE ssSQL14] is available from year 1 of the extended support period, which starts on July 10, 2024. You can sign up for it at any time before or after that date. If you sign up before that date, you only see the hourly ESU charges starting at midnight on July 10, 2024. If you sign up after July 10, 2024, your next month's bill includes a billback charge from July 10, 2024, to the date of activation.

Billing during the connectivity loss and other disruptions

If your [!INCLUDE ssnoversion-md] instance loses connectivity, the billing stops, and the subscription is suspended. To make sure that intermittent disconnection doesn't negatively affect your ESU coverage, we automatically reactivate it if the [!INCLUDE ssnoversion-md] instance reconnects within 30 days, without penalty. In that case, you see an additional billback charge for the days since the last day your server was connected. If you manually terminate the ESU subscription and then reactivate it within 30 days, there's also no penalty. Your bill includes an additional charge for the time since you canceled the subscription. If the server reconnects after 30 days of disconnection, the subscription is terminated. To resume the ESU coverage, you need to activate a new ESU subscription and pay all the associated billback charges.

Important

The billback charges are recorded within the first hour of the ESU subscription, and look like single hourly charges for the [!INCLUDE ssnoversion-md] instances that have the ESU subscriptions enabled. Because the amount reflects the accumulated costs since July 11, 2023 for [!INCLUDE ssSQL11], or July 10, 2024 for [!INCLUDE ssSQL14], it is much higher than the regular hourly ESU charges. This is expected, and it should be a one-time charge. During the following months you should only see the regular hourly charges. Additional billback charges could be added in cases of the connectivity disruptions, but they are typically much smaller amounts.

View ESU subscriptions

You can use Azure Resource Graph to query the ESU subscriptions. The following example shows how you can view all eligible [!INCLUDE sssql11-md] instances and their ESU subscription status.

resources
| where type == 'microsoft.azurearcdata/sqlserverinstances'
| extend Version = properties.version
| extend Edition = properties.edition
| extend containerId = tolower(tostring (properties.containerResourceId))
| where Version contains "2012"
| where Edition in ("Enterprise", "Standard")
| where isnotempty(containerId)
| project containerId, SQL_instance = name, Version, Edition
| join kind=inner (
    resources
    | where type == "microsoft.hybridcompute/machines"
    | extend machineId = tolower(tostring(id))
    | project machineId, Machine_name = name
)
on $left.containerId == $right.machineId
| join kind=inner (
    resources
    | where type == "microsoft.hybridcompute/machines/extensions"
    | where properties.type in ("WindowsAgent.SqlServer","LinuxAgent.SqlServer")
    | extend machineIdHasSQLServerExtensionInstalled = tolower(iff(id contains "/extensions/WindowsAgent.SqlServer" or id contains "/extensions/LinuxAgent.SqlServer", substring(id, 0, indexof(id, "/extensions/")), ""))
    | project machineIdHasSQLServerExtensionInstalled, Extension_State = properties.provisioningState, License_Type = properties.settings.LicenseType, ESU = iff(notnull(properties.settings.enableExtendedSecurityUpdates), iff(properties.settings.enableExtendedSecurityUpdates == true,"enabled","disabled"), ""), Extension_Version = properties.instanceView.typeHandlerVersion
)
on $left.machineId == $right.machineIdHasSQLServerExtensionInstalled
| project-away machineId, containerId, machineIdHasSQLServerExtensionInstalled

Cancel Extended Security Updates enabled by Azure Arc

You can cancel Extended Security Updates enabled by Azure Arc at any time using the Azure portal, Azure PowerShell, or Azure CLI. The cancellation immediately stops the ESU charges.

The following steps cancel the ESU subscription using the Azure portal:

  1. Navigate to your connected [!INCLUDE ssNoVersion] instance. The ESU status option in the Overview pane shows the value Enabled.

  2. Select Enabled, and navigate to the SQL Server Configuration pane.

  3. In the Extended Security Updates section, select Unsubscribe from to Extended Security Updates, then select Save.

The following command cancels the ESU subscription using Azure PowerShell. Replace the following values for your own environment:

  • <resource_group>
  • <machine_name>
  • <azure_region>
# Updated settings object
$Settings = @{ SqlManagement = @{ IsEnabled = $true }; enableSecurityUpdates = $false }
New-AzConnectedMachineExtension -Name "WindowsAgent.SqlServer" -ResourceGroupName { <resource_group> } -MachineName { <machine_name> } -Location { <azure_region> } -Publisher "Microsoft.AzureData" -Settings $Settings -ExtensionType "WindowsAgent.SqlServer"

Warning

The update command overwrites all settings. If your extension settings have a list of excluded [!INCLUDE ssNoVersion] instances, you must specify the full exclusion list with the update command.

If you have multiple [!INCLUDE ssNoVersion] instances eligible for ESUs, you can cancel in bulk using the Modify License Type PowerShell script, which allows you to configure the ESU setting for one of:

  • all Azure Arc-enabled machines a specific resource group,
  • an Azure subscription, or
  • all Azure subscriptions your Azure account has access to.

The script preserves all the existing settings. It's published as an open source [!INCLUDE ssNoVersion] sample and includes step-by-step instructions.

The following command cancels the ESU subscription using Azure CLI. Replace the following values for your own environment:

  • <machine_name>
  • <resource_group>
az connectedmachine extension update --machine-name "<machine_name>" -g "<resource_group>" --name "WindowsAgent.SqlServer" --type "WindowsAgent.SqlServer" --publisher "Microsoft.AzureData" --settings '{ enableSecurityUpdates=$false, "SqlManagement": {"IsEnabled":true} }'

Warning

The update command overwrites all settings. If your extension settings have a list of excluded [!INCLUDE ssNoVersion] instances, you must specify the full exclusion list with the update command.


Important

Don't cancel Extended Security Updates enabled by Azure Arc before or after migrating to Azure. When you migrate your on-premises [!INCLUDE ssNoVersion] instances to [!INCLUDE ssNoVersion] on Azure Virtual Machines or Azure VMware Solutions, the ESU charges will stop automatically, but you continue to have full access to the Extended Security Updates. For more information, see Extended Security Updates: Frequently asked questions.

Register Extended Security Updates purchased through volume licensing

If you purchased an ESU product through volume licensing (VL), you must register the purchased product on the Azure portal to enable access to previous or future Extended Security Updates. If you purchased the ESU product for the [!INCLUDE ssnoversion-md] instances that aren't connected to Azure Arc, you must first register these servers on the Azure portal. If you purchased the ESU product for the Arc-enabled [!INCLUDE ssnoversion-md] instances, you don't need to register these servers as they are already connected to Azure Arc. To finalize the registration of the ESU VL product, you must link the ESU invoice.

Register disconnected SQL Server instances on Azure portal

If your on-premises or hosted environment [!INCLUDE ssnoversion-md] instances can't be connected to Azure Arc, you can manually register your [!INCLUDE ssNoVersion] instances in the Azure portal to enable access to the ESUs. If you prefer to take advantage of the flexibility of Extended Security Updates enabled by Azure Arc, connect your server to Azure Arc. To connect, follow the steps in Automatically connect your SQL Server to Azure Arc.

The following example shows how to manually register your [!INCLUDE ssnoversion-md] instances in a disconnected state, in the Azure portal.

Prerequisites

  1. If you don't already have an Azure subscription, you can create an account using one of the following methods:

  2. The user creating disconnected Arc-enabled [!INCLUDE ssnoversion-md] resources must have the following permissions:

    • Microsoft.AzureArcData/sqlServerInstances/read
    • Microsoft.AzureArcData/sqlServerInstances/write

    Users can be assigned to the Azure Connected SQL Server Onboarding role to get those specific permissions, or they can be assigned to built-in roles such as Contributor or Owner that have these permissions. For more information, see Assign Azure roles using the Azure portal.

  3. Register the Microsoft.AzureArcData resource provider in your Azure subscription:

    • Sign in to the Azure portal.

    • Navigate to your subscription, and select Resource providers.

    • If the Microsoft.AzureArcData resource provider isn't listed, you can add it to your subscription using the Register option.

  4. If you use Azure policies that only allow the creation of specific resource types, you need to allow the Microsoft.AzureArcData/sqlServerInstances resource type. If it isn't allowed, the SQLServerInstances_Update operation fails with a 'deny' Policy action log entry in the activity log of the subscription.

You can either register a single SQL Server instance, or upload a CSV file to register multiple SQL Server instances in bulk.

Single SQL Server instance

  1. Sign into the Azure portal.

  2. Navigate to Azure Arc and select Infrastructure > SQL Servers.

  3. To register a disconnected machine, select Add from the menu at the top of the screen.

    :::image type="content" source="media/sql-server-extended-security-updates/extended-security-updates-empty-list.png" alt-text="Screenshot of an empty list of SQL Servers on the Azure Arc portal." lightbox="media/sql-server-extended-security-updates/extended-security-updates-empty-list.png":::

  4. Select Register Servers to add a disconnected [!INCLUDE ssnoversion-md] instance.

    :::image type="content" source="media/sql-server-extended-security-updates/extended-security-updates-add-connected-or-registered.png" alt-text="Screenshot of the two options for adding connected or registered servers.":::

  5. On the next screen, you can choose to add a single or multiple [!INCLUDE ssnoversion-md] instances. The option for Single SQL Instance is selected by default.

    :::image type="content" source="media/sql-server-extended-security-updates/extended-security-updates-add-sql-registration-options.png" alt-text="Screenshot of the Add SQL Registrations options.":::

  6. Choose the Subscription and Resource group for your registered [!INCLUDE ssnoversion-md] instance.

  7. Provide the required information as is detailed in this table, and then select Next:

    Value Description Additional information
    Instance Name Enter the output of command SELECT @@SERVERNAME, such as MyServer\Instance01. If you have a named instance, you must replace the backslash (\) with a hyphen (-). For example, MyServer\Instance01 becomes MyServer-Instance01.
    SQL Server Version Select your version from the dropdown list.
    Edition Select the applicable edition from the dropdown list: Datacenter, Developer (free to deploy if purchased ESUs), Enterprise, Standard, Web, Workgroup.
    Cores Enter the number of cores for this instance
    Host Type Select the applicable host type from the dropdown list: Virtual machine (on-premises), Physical Server (on-premises), Azure Virtual Machine, Amazon EC2, Google Compute Engine, Other.
  8. You must confirm that you have the rights to receive Extended Security Updates, using the checkbox provided. The ESU checkbox is only visible when you select [!INCLUDE sssql11-md].

Now you can continue to the Confirmation section.

Multiple SQL Server instances in bulk

Multiple [!INCLUDE ssNoVersion] instances can be registered in bulk by uploading a .CSV file. Once your .CSV file has been formatted correctly, you can follow these steps to bulk register your [!INCLUDE ssNoVersion] instances with Azure Arc:

  1. Sign into the Azure portal.

  2. Navigate to Azure Arc and select Infrastructure > SQL Servers.

  3. To register a disconnected machine, select Add from the menu at the top of the screen.

    :::image type="content" source="media/sql-server-extended-security-updates/extended-security-updates-empty-list.png" alt-text="Screenshot of an empty list of SQL Servers on the Azure Arc portal." lightbox="media/sql-server-extended-security-updates/extended-security-updates-empty-list.png":::

  4. Select Register Servers to add a disconnected [!INCLUDE ssnoversion-md] instance.

    :::image type="content" source="media/sql-server-extended-security-updates/extended-security-updates-add-connected-or-registered.png" alt-text="Screenshot of the two options for adding connected or registered servers.":::

  5. On this screen, you can choose to add a single or multiple [!INCLUDE ssnoversion-md] instances. Select the option for Multiple SQL Instances.

    :::image type="content" source="media/sql-server-extended-security-updates/extended-security-updates-multiple-sql-instances.png" alt-text="Screenshot of the Multiple SQL Instances option.":::

  6. Select the Browse icon to upload the CSV file containing multiple disconnected [!INCLUDE ssnoversion-md] instances.

  7. You must confirm that you have the rights to receive Extended Security Updates, using the checkbox provided.

Now you can continue to the Confirmation section.

Confirmation

  1. We recommend you use a year-specific tag to link your [!INCLUDE ssnoversion-md] instances to your ESU invoice number for easy reference. For example:

    • First year: Year1InvoiceID
    • Second year: Year2InvoiceID
    • Third year: Year3InvoiceID

    [!NOTE]
    If you use Azure services such as Azure Dedicated Host, Azure VMware Solution, Azure Nutanix Solution, and Azure Stack (Hub, Edge, and HCI), you can set the ESU invoice number to InvoiceNotNeeded.

    The Year2EntitlementConfirmed tag is automatically filled in.

    :::image type="content" source="media/sql-server-extended-security-updates/extended-security-updates-tags.png" alt-text="Screenshot of confirmation tags.":::

  2. Before you can add your [!INCLUDE ssnoversion-md] instances, you must agree to the terms of use and privacy policy.

    :::image type="content" source="media/sql-server-extended-security-updates/extended-security-updates-terms.png" alt-text="Screenshot of the terms of use.":::

  3. Once you've added your [!INCLUDE ssnoversion-md] instances, you'll see them in the portal after a few minutes. Because they were added manually, they always show in a disconnected state, with the description Registered.

    :::image type="content" source="media/sql-server-extended-security-updates/extended-security-updates-connected-servers.png" alt-text="Screenshot of two registered SQL Server instances on the Azure Arc portal." lightbox="media/sql-server-extended-security-updates/extended-security-updates-connected-servers.png":::

Formatting requirements for CSV file

  • Values are comma-separated

  • Values aren't single or double-quoted

  • Values can include letters, numbers, hyphens (-), and underscores (_). No other special characters can be used. If you have a named instance, you must replace the backslash (\) with a hyphen (-). For example, MyServer\Instance01 becomes MyServer-Instance01.

  • Column names are case-sensitive and must be named as follows:

    • name
    • version
    • edition
    • cores
    • hostType

Example CSV file

The CSV file should look like this:

name,version,edition,cores,hostType
Server1-SQL2012,SQL Server 2012,Enterprise,12,Other Physical Server
Server2-SQL2012,SQL Server 2012,Enterprise,24,Other Physical Server
Server3-SQL2012,SQL Server 2012,Enterprise,12,Azure Virtual Machine
Server4-SQL2012,SQL Server 2012,Standard,8,Azure VMware Solution

Link ESU invoice

You can use the Purchase Order Number under Invoice Summary in their Microsoft invoice (as shown in the following screenshot) to link the ESU purchase with the registration of [!INCLUDE ssnoversion-md] instances.

:::image type="content" source="media/sql-server-extended-security-updates/extended-security-updates-invoice-sample.png" alt-text="Sample invoice with Purchase Order Number highlighted.":::

Follow these steps to link an ESU invoice to your Azure Arc [!INCLUDE ssnoversion-md] instances to get access to extended updates. This example includes both Connected and Registered servers.

  1. Sign into the Azure portal.

  2. Navigate to Azure Arc and select SQL Server instances.

  3. Use the checkboxes next to each [!INCLUDE ssnoversion-md] instance you would like to link, and then select Link ESU invoice.

    :::image type="content" source="media/sql-server-extended-security-updates/extended-security-updates-invoice-select.png" alt-text="Screenshot of all SQL Server instances on the Azure Arc section." lightbox="media/sql-server-extended-security-updates/extended-security-updates-invoice-select.png":::

  4. Fill in the ESU invoice number in the Invoice ID section, and then select Link invoice.

    :::image type="content" source="media/sql-server-extended-security-updates/extended-security-updates-invoice-save.png" alt-text="Screenshot of the invoice ID on the Link ESU invoice page." lightbox="media/sql-server-extended-security-updates/extended-security-updates-invoice-save.png":::

  5. The servers you linked to the ESU invoice now show a valid ESU expiration date.

    :::image type="content" source="media/sql-server-extended-security-updates/extended-security-updates-invoice-linked.png" alt-text="Screenshot of SQL Server instances with a valid ESU expiration value." lightbox="media/sql-server-extended-security-updates/extended-security-updates-invoice-linked.png":::

Important

If you purchased an ESU VL product for disconnected [!INCLUDE ssnoversion-md] servers, you should only select the instances with the Status of Registered. If you purchased an ESU VL product for [!INCLUDE ssnoversion-md] instances enabled by Azure Arc, you should only select the instances with the Status of Connected.

Download ESUs

Once your [!INCLUDE ssNoVersion] instances have been registered with Azure Arc, you can download the Extended Security Update packages using the link found in the Azure portal, if and when they're made available.

To download ESUs, follow these steps:

  1. Sign into the Azure portal.

  2. Navigate to Azure Arc and select SQL Server instances.

  3. Select a server from the list.

    :::image type="content" source="media/sql-server-extended-security-updates/extended-security-updates-list-of-servers.png" alt-text="Screenshot of a list of servers, with one server highlighted." lightbox="media/sql-server-extended-security-updates/extended-security-updates-list-of-servers.png":::

  4. Download security updates from here, if and when they're made available.

    :::image type="content" source="media/sql-server-extended-security-updates/extended-security-updates-available-updates.png" alt-text="Screenshot of available security updates." lightbox="media/sql-server-extended-security-updates/extended-security-updates-available-updates.png":::

Supported regions

[!INCLUDE azure-arc-data-regions]

Government regions aren't supported. For more information, see Can customers get free Extended Security Updates on Azure Government regions?

Frequently asked questions

For the full list of frequently asked questions, review the Extended Security Updates: Frequently asked questions.

Related content