Skip to content

Commit 1bceadc

Browse files
huypubrwestMSFTMashaMSFTnzagorac-msStacyrch140
authored
11/18 AM Publish (#35869)
* SQL Server 2025 GA * Updated CES limitations around online index operations (#35794) * Updated CES limitations around online index operations CES does not support online index operations. I have added a clarification on this. * Update docs/relational-databases/track-changes/change-event-streaming/configure.md --------- Co-authored-by: nzagorac-ms <118456134+nzagorac-ms@users.noreply.github.com> * DACPAC * Linux 2025 release * SQL Server migration in Azure Arc (#35736) * SQL Server migration in Azure Arc * pencil edit --------- Co-authored-by: Stacy Chambers <102548089+Stacyrch140@users.noreply.github.com> * 20251118 deleted logical server restore notes (#35822) Co-authored-by: Jay Patel <jaypatel@microsoft.com> * [AFTER IGNITE] Update sql-data-sync-data-sql-server-sql-database.md (#35811) * Learn Editor: Update sql-data-sync-data-sql-server-sql-database.md * Learn Editor: Update sql-data-sync-data-sql-server-sql-database.md * 20251112 note edit --------- Co-authored-by: WilliamDAssafMSFT <74387232+WilliamDAssafMSFT@users.noreply.github.com> * Refine formatting of vector_embeddings in AI_GENERATE_EMBEDDINGS table definition (#35834) * Port updated instructions from SupportArticles-docs (#35833) Clarified the instruction to restart SQL Server services after modifying the configuration. * Updating CES configure page (#35797) * Update DTA CLI article for GA (#35680) * Update release notes for JDBC driver version 13.2 (#35828) * Update release notes for JDBC driver version 13.2 Updated the release notes for the JDBC driver to reflect the breaking change regarding VECTOR data type support and its implications. * Acrolinx suggestions * Linux updates for GA (#35853) * 20251118 security overview edit pass (#35824) Co-authored-by: Pieter Vanhove <pieter.vanhove@microsoft.com> * [AFTER IGNITE] 20251113 edit pass, add Fabric DW applicability (#35827) * 20251118 edit pass, add Fabric DW applicability * 20251118 acrolinx * raising acrolinx --------- Co-authored-by: Diana Richards <v-dirichards@microsoft.com> --------- Co-authored-by: Randolph West MSFT <97149825+rwestMSFT@users.noreply.github.com> Co-authored-by: Masha Thomas (MSFT) <32783170+MashaMSFT@users.noreply.github.com> Co-authored-by: nzagorac-ms <118456134+nzagorac-ms@users.noreply.github.com> Co-authored-by: Stacy Chambers <102548089+Stacyrch140@users.noreply.github.com> Co-authored-by: William Assaf MSFT <74387232+WilliamDAssafMSFT@users.noreply.github.com> Co-authored-by: Jay Patel <jaypatel@microsoft.com> Co-authored-by: Hugo Queiroz <65417957+HugoMSFT@users.noreply.github.com> Co-authored-by: Mike Ray <15928587+MikeRayMSFT@users.noreply.github.com> Co-authored-by: Sloan Haywood <haywood.sloan@yahoo.com> Co-authored-by: David Engel <davidengel@microsoft.com> Co-authored-by: Pieter Vanhove <pieter.vanhove@microsoft.com> Co-authored-by: Diana Richards <v-dirichards@microsoft.com>
1 parent 7e5ea71 commit 1bceadc

71 files changed

Lines changed: 1377 additions & 390 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

azure-sql/database/deleted-logical-server-restore.md

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: Learn about restoring a deleted logical server in Azure SQL Databas
55
author: WilliamDAssafMSFT
66
ms.author: wiassaf
77
ms.reviewer: dinethi, jaypatel
8-
ms.date: 09/11/2025
8+
ms.date: 11/18/2025
99
ms.service: azure-sql-database
1010
ms.subservice: backup-restore
1111
ms.topic: how-to
@@ -21,7 +21,7 @@ monikerRange: "=azuresql || =azuresql-db"
2121
This article provides steps to restore an Azure SQL Database server, also known as a logical server, if it was accidentally deleted.
2222

2323
> [!IMPORTANT]
24-
> This feature is in preview and is currently only enabled for certain subscriptions.
24+
> Currently, the ability to restore a deleted logical server is in preview. The ability to restore a deleted logical server is enabled only for specific subscriptions, and also for all SQL logical servers that are at least two years old.
2525
2626
You can restore a deleted Azure SQL logical server and its underlying databases with one of the following two methods:
2727

@@ -82,10 +82,10 @@ Use the following steps to restore your deleted Azure SQL logical server using [
8282
Install-Module Az.Accounts -Repository PSGallery
8383
```
8484

85-
1. Use the `Az.Tools.Installer` to install the NuGet package.
85+
1. Update the `Az.Sql` module to the latest version.
8686

8787
```powershell
88-
Install-AzModule -Path https://azposhpreview.blob.core.windows.net/public/Az.Sql.5.2.0.nupkg
88+
Update-Module Az.Sql -Force
8989
```
9090

9191
1. Sign in and connect to your Azure account.
@@ -112,7 +112,9 @@ Use the following steps to restore your deleted Azure SQL logical server using [
112112

113113
Once the logical server is restored, restoring the databases is next. Look in the **Deleted databases** tab on the **Backups** page, by browsing to the server resource in Azure portal. For more information, see [Restore a database from a backup in Azure SQL Database](recovery-using-backups.md).
114114

115-
## Delete the logical server without recovery using PowerShell and REST API
115+
<a id="delete-the-logical-server-without-recovery-using-powershell-and-rest-api"></a>
116+
117+
## Delete the logical server without possibility of recovery using PowerShell and REST API
116118

117119
Follow these steps to set up the variables needed to hard-delete the soft-deleted logical server, using PowerShell to invoke a REST API call.
118120

azure-sql/database/logins-create-manage.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ When a user attempts to connect to a database, they provide a user account and a
5858
- A **login** is an individual account in the `master` database, to which a user account in one or more databases can be linked. With a login, the credential information for the user account is stored with the login.
5959
- A **user account** is an individual account in any database that might be, but doesn't have to be, linked to a login. With a user account that isn't linked to a login, the credential information is stored with the user account.
6060

61-
[**Authorization**](security-overview.md#authorization) to access data and perform various actions are managed using database roles and explicit permissions. Authorization refers to the permissions assigned to a user, and determines what that user is allowed to do. Authorization is controlled by your user account's database [role memberships](/sql/relational-databases/security/authentication-access/database-level-roles) and [object-level permissions](/sql/relational-databases/security/permissions-database-engine). As a best practice, you should grant users the least privileges necessary.
61+
[**Authorization**](security-overview.md#authorization-and-access-management) to access data and perform various actions are managed using database roles and explicit permissions. Authorization refers to the permissions assigned to a user, and determines what that user is allowed to do. Authorization is controlled by your user account's database [role memberships](/sql/relational-databases/security/authentication-access/database-level-roles) and [object-level permissions](/sql/relational-databases/security/permissions-database-engine). As a best practice, you should grant users the least privileges necessary.
6262

6363
## Existing logins and user accounts after creating a new database
6464

76.2 KB
Loading

azure-sql/database/media/security-overview/azure-database-ae.png renamed to azure-sql/database/media/security-overview/always-encrypted.png

File renamed without changes.
-17.2 KB
Binary file not shown.

azure-sql/database/media/security-overview/azure-database-ddm.png renamed to azure-sql/database/media/security-overview/dynamic-data-masking.png

File renamed without changes.

azure-sql/database/media/security-overview/azure-database-rls.png renamed to azure-sql/database/media/security-overview/row-level-security.png

File renamed without changes.

azure-sql/database/security-overview.md

Lines changed: 43 additions & 32 deletions
Large diffs are not rendered by default.

azure-sql/database/sql-data-sync-data-sql-server-sql-database.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: This overview introduces SQL Data Sync for Azure, which allows you
44
author: WilliamDAssafMSFT
55
ms.author: wiassaf
66
ms.reviewer: mathoma, hudequei
7-
ms.date: 11/03/2025
7+
ms.date: 11/12/2025
88
ms.service: azure-sql-database
99
ms.subservice: sql-data-sync
1010
ms.topic: concept-article
@@ -77,6 +77,11 @@ Data Sync isn't the preferred solution for the following scenarios:
7777
| **Advantages** | - Active-active support<br/>- Bi-directional between on-premises and Azure SQL Database | - Lower latency<br/>- Transactional consistency<br/>- Reuse existing topology after migration <br/>-Azure SQL Managed Instance support |
7878
| **Disadvantages** | - No transactional consistency<br/>- Higher performance impact | - Can't publish from Azure SQL Database <br/>- High maintenance cost |
7979

80+
> [!CAUTION]
81+
> **SQL Data Sync requires SQL authentication** for connections to the hub and member databases. Microsoft Entra (Azure AD) authentication isn't supported by SQL Data Sync.
82+
> Because SQL authentication relies on static passwords, it doesn't benefit from modern protections like multifactor authentication (MFA), Conditional Access, or managed identities. This can increase exposure for the entire SQL instance to credential theft, brute‑force attacks, and operational overhead for password rotation and policy enforcement.
83+
> Where possible, prefer solutions that support Microsoft Entra authentication or managed identities. Since SQL Data Sync is scheduled for retirement, migrate to an alternative that aligns with your organization's security standards.
84+
8085
## Private link for Data Sync
8186

8287
> [!NOTE]

azure-sql/includes/sql-managed-instance/azure-sql-managed-instance-link-check-network.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,11 @@ To use the SQL Agent to test network connectivity, you need the following requir
1818
- The user doing the test must have [permissions to create a job](/sql/ssms/agent/configure-a-user-to-create-and-manage-sql-server-agent-jobs) (either as a **sysadmin** or belongs to the SQLAgentOperator role for `msdb`) for both SQL Server and SQL Managed Instance.
1919
- The SQL Server Agent service must be [running](/sql/ssms/agent/start-stop-or-pause-the-sql-server-agent-service) on SQL Server. Since the Agent is on by default on SQL Managed Instance, no additional action is necessary.
2020

21+
Consider the following:
22+
- To avoid false negatives, all firewalls along the network path must allow Internet Control Message Protocol (ICMP) traffic.
23+
- To avoid false positives, all firewalls along the network path must allow traffic on the proprietary SQL Server UCS protocol. Blocking the protocol can lead to a successful connection test, but the link fails to create.
24+
- Advanced firewall setups with packet-level guardrails in place need to be properly configured to properly allow traffic between SQL Server and SQL Managed Instance.
25+
2126

2227
### [SSMS](#tab/ssms)
2328

0 commit comments

Comments
 (0)