Skip to content

Commit 3d6dea1

Browse files
authored
Merge pull request #19916 from MicrosoftDocs/release-arcee-ga
Publish to live - out of band because it was my fault
2 parents 212ef3d + 50cc65d commit 3d6dea1

9 files changed

Lines changed: 285 additions & 115 deletions

File tree

docs/sql-server/azure-arc/assess.md

Lines changed: 28 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Configure on-demand SQL Assessment on an SQL Server on Azure Arc-en
44
author: anosov1960
55
ms.author: sashan
66
ms.reviewer: mikeray
7-
ms.date: 04/06/2021
7+
ms.date: 07/30/2021
88
ms.topic: conceptual
99
ms.prod: sql
1010
---
@@ -15,11 +15,11 @@ SQL Assessment provides a mechanism to evaluate your configuration of SQL Server
1515
## Prerequisites
1616

1717
* Your Windows-based SQL Server instance is connected to Azure Arc. Follow the instructions to [onboard your SQL Server instance to Arc-enabled SQL Server](connect.md).
18-
18+
1919
> [!NOTE]
2020
> On-demand SQL Assessment is currently limited to SQL Server running on Windows machines. This will not work for SQL on Linux machines.
2121
22-
* The Microsoft Monitoring Agent (MMA) extension must be installed and configured on the machine. View the [Install MMA](configure-advanced-data-security.md#install-microsoft-monitoring-agent-mma) article for instructions. You can also get more information on the [Log Analytics Agent](/azure/azure-monitor/platform/log-analytics-agent) article.
22+
* The Microsoft Monitoring Agent (MMA) must be installed and configured on the machine. View the [Install MMA](configure-advanced-data-security.md#install-microsoft-monitoring-agent-mma) article for instructions. You can also get more information on the [Log Analytics Agent](/azure/azure-monitor/platform/log-analytics-agent) article.
2323

2424
* Your SQL Server instance must have the [TCP/IP protocol enabled](../../database-engine/configure-windows/enable-or-disable-a-server-network-protocol.md).
2525

@@ -34,43 +34,44 @@ SQL Assessment provides a mechanism to evaluate your configuration of SQL Server
3434
> [!div class="mx-imgBorder"]
3535
> [ ![Screenshot showing the Environment Health screen of a SQL Server - Azure Arc resource.](media/assess/sql-assessment-heading-sql-server-arc.png) ](media/assess/sql-assessment-heading-sql-server-arc.png#lightbox)
3636
37-
> [!IMPORTANT]
38-
> If MMA extension is not installed, you will not be able to initiate the on-demand SQL Assessment.
37+
> [!IMPORTANT]
38+
> If the MMA extension is not installed, you can't initiate the on-demand SQL Assessment.
3939
40-
2. Select the account type. If you have a Managed service account, it will allow you to initiate SQL Assessment directly from the Portal. Specify the account name.
40+
2. Select the account type. If you have a Managed service account, it will allow you to initiate SQL Assessment directly from the portal. Specify the account name.
4141

42-
> [!NOTE]
43-
> Specifying a *Managed service account* will activate the **Configure SQL Assessment** button so you could initiate the assessment from the Portal by deploying a *CustomScriptExtension*. Because only one *CustomScriptExtension* can be deployed at a time, the script extension for SQL Assessment
44-
will be automatically removed after execution. If you already have another *CustomScriptExtension* deployed to the hosting machine, the **Configure SQL Assessment** button will not be activated.
42+
> [!NOTE]
43+
> Specifying a *Managed service account* activates the **Configure SQL Assessment** button so you can initiate the assessment from the portal by deploying a *CustomScriptExtension*. Because you can only deploy one *CustomScriptExtension* at a time, the script extension for SQL Assessment will be automatically removed after execution.
44+
>
45+
> If you already have another *CustomScriptExtension* deployed to the hosting machine, the **Configure SQL Assessment** button will not be activated.
4546
46-
3. Specify a working directory on the data collection machine if you want to change the default. By default, `C:\sql_assessment\work_dir` is used. During collection and analysis, data is temporarily stored in that folder. If the folder doesn't exist, it's created automatically.
47+
3. Specify a working directory on the data collection machine if you want to change the default. By default, `C:\sql_assessment\work_dir` is used. During collection and analysis, the assessment temporarily stores data in that folder. If the folder doesn't exist, the assessment creates it automatically.
4748

48-
4. If you initiate SQL Assessment from the Portal by clicking **Configure SQL Assessment**, a standard deployment bubble will show up.
49+
4. If you initiate SQL Assessment from the portal by clicking **Configure SQL Assessment**, the portal presents a standard deployment bubble.
4950

50-
> [!div class="mx-imgBorder"]
51+
> [!div class="mx-imgBorder"]
5152
> [ ![Screenshot showing deploymentof the CustomScriptExtension.](media/assess/sql-assessment-custom-script-deployment.png) ](media/assess/sql-assessment-custom-script-deployment.png#lightbox)
5253
53-
5. If you prefer initiating SQL Assessment from the target machine, click **Download configuration script**, copy the downloaded script to the target machine and and execute one of the following code blocks in a admin instance of **powershell.exe**:
54+
Alternatively, you can initiate SQL Assessment from the target machine. Click **Download configuration script**, copy the downloaded script to the target machine and and execute one of the following code blocks in a admin instance of **powershell.exe**:
5455

55-
* _Domain account_: You'll be prompted for the user account and password.
56+
* _Domain account_: You'll be prompted for the user account and password.
5657

57-
```powershell
58-
Set-ExecutionPolicy -Scope Process -ExecutionPolicy Bypass -Force
59-
& '.\AddSqlAssessment.ps1'
60-
```
58+
```powershell
59+
Set-ExecutionPolicy -Scope Process -ExecutionPolicy Bypass -Force
60+
& '.\AddSqlAssessment.ps1'
61+
```
6162

62-
* _Managed Service Account (MSA)_
63+
* _Managed Service Account (MSA)_
6364

64-
```powershell
65-
Set-ExecutionPolicy -Scope Process -ExecutionPolicy Bypass -Force
66-
& '.\AddSqlAssessment.ps1' -ManagedServiceAccountName <MSA account name>
67-
```
65+
```powershell
66+
Set-ExecutionPolicy -Scope Process -ExecutionPolicy Bypass -Force
67+
& '.\AddSqlAssessment.ps1' -ManagedServiceAccountName <MSA account name>
68+
```
6869
69-
> [!NOTE]
70-
> The script schedules a task named *SQLAssessment*, which triggers data collection. This task executes within an hour after you've run the script. It then repeats every seven days.
70+
> [!NOTE]
71+
> The script schedules a task named *SQLAssessment*, which triggers data collection. This task executes within an hour after you've run the script. It then repeats every seven days.
7172
72-
> [!TIP]
73-
> You can modify the task to run on a different date and time or even force it to run immediately. In the the task scheduler library, find **Microsoft** > **Operations Management Suite** > **AOI\*\*\*** > **Assessments** > **SQLAssessment**.
73+
> [!TIP]
74+
> You can modify the task to run on a different date and time or even force it to run immediately. In the the task scheduler library, find **Microsoft** > **Operations Management Suite** > **AOI\*\*\*** > **Assessments** > **SQLAssessment**.
7475
7576
## View SQL Assessment results
7677

docs/sql-server/azure-arc/configure-advanced-data-security.md

Lines changed: 9 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -5,24 +5,23 @@ description: Configure advanced data security for an instance of SQL Server on A
55
author: anosov1960
66
ms.author: sashan
77
ms.reviewer: mikeray
8-
ms.date: 04/06/2021
8+
ms.date: 07/30/2021
99
ms.topic: conceptual
1010
ms.prod: sql
1111
---
1212
# Configure advanced data security | SQL Server on Azure Arc-enabled servers
1313

14-
You can enable advanced data security for your SQL Server instances on premises by following these steps.
14+
You can enable advanced data security for your SQL Server instances on-premises by following these steps.
1515

1616
## Prerequisites
1717

1818
* Your Windows-based SQL Server instance is connected to Azure Arc. Follow the instructions to [onboard your SQL Server instance to Arc-enabled SQL Server](connect.md).
1919

2020
> [!NOTE]
21-
> Azure Defender currently limited to SQL Server running on Windows machines. This will not work for SQL on Linux machines.
21+
> Azure Defender is only supported for SQL Server instances on Windows machines. This will not work for SQL Server on Linux machines.
2222
2323
* Your user account is assigned one of the [Security Center Roles (RBAC)](/azure/security-center/security-center-permissions)
2424

25-
2625
## Create a Log Analytics workspace
2726

2827
1. Search for __Log Analytics workspaces__ resource type and add a new one through the creation blade.
@@ -32,21 +31,21 @@ You can enable advanced data security for your SQL Server instances on premises
3231
> [!NOTE]
3332
> You can use a Log Analytics workspace in any region so if you already have one, you can use it. But we recommend creating it in the same region where your __Machine - Azure Arc__ resource is created.
3433
35-
1. Go to the overview page of the Log Analytics workspace resource and select Windows, Linux and other sources. Copy the workspace ID and primary key for later use.
34+
1. Go to the overview page of the Log Analytics workspace resource and select **Windows, Linux, and other sources**. Copy the workspace ID and primary key for later use.
3635

3736
![Log analytics workspace blade](media/configure-advanced-data-security/log-analytics-workspace-blade.png)
3837

3938
## Install Microsoft Monitoring Agent (MMA)
4039

41-
The next step is needed only if you have not yet configured the MMA agent on the remote machine yet.
40+
The next step is needed only if you have not yet configured MMA on the remote machine.
4241

4342
1. Select the __Machine - Azure Arc__ resource for the virtual or physical server where the SQL Server instance is installed and add the extension __Microsoft Monitoring Agent - Azure Arc__ using the **Extensions** feature. When asked to configure the Log Analytics workspace, use the workspace ID and primary you saved in the previous step.
4443

4544
![Install MMA](media/configure-advanced-data-security/install-mma-extension.png)
4645

47-
1. After validation succeeds, click **Create** to start the MMA Arc Extension deployment workflow. When deployment completes the status will be updated to **Succeeded**.
46+
1. After validation succeeds, click **Create** to start the MMA Arc Extension deployment workflow. When the deployment completes, the status updates to **Succeeded**.
4847

49-
1. For more details, see [Extension management with Azure Arc](/azure/azure-arc/servers/manage-vm-extensions)
48+
1. For more information, see [Extension management with Azure Arc](/azure/azure-arc/servers/manage-vm-extensions).
5049

5150
## Enable Azure Defender
5251

@@ -61,7 +60,7 @@ Next, you need to enable Azure Defender for SQL Server instance.
6160
![Upgrade workspace](media/configure-advanced-data-security/enable-azure-defender.png)
6261

6362
> [!NOTE]
64-
> The first scan to generate the vulnerability assessment will happen within 24 hours after enabling advanced data security. After that, auto scans will be performed every week on Sunday.
63+
> The first scan to generate the vulnerability assessment happens within 24 hours after enabling advanced data security. After that, auto scans are be performed every week on Sunday.
6564
6665
## Explore
6766

@@ -84,7 +83,7 @@ Explore security anomalies and threats in Azure Security Center.
8483
![Alert mitigation](media/configure-advanced-data-security/brute-force-alert-mitigation.png)
8584

8685
> [!NOTE]
87-
> The general __Security Center__ link at the top of the page does not use the Preview portal URL so your __SQL Server - Azure Arc__ resources will not be visible there. We recommend following the links for the individual recommendations or alerts.
86+
> The general __Security Center__ link at the top of the page does not use the preview portal URL so your __SQL Server - Azure Arc__ resources are not be visible there. Follow the links for the individual recommendations or alerts.
8887
8988
## Next steps
9089

0 commit comments

Comments
 (0)