You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
SQL Vulnerability Assessment is an easy to use tool that can help you discover, track, and remediate potential database vulnerabilities. Use it to proactively improve your database security.
20
+
SQL vulnerability assessment is an easy to use tool that can help you discover, track, and remediate potential database vulnerabilities. Use it to proactively improve your database security.
22
21
23
-
Vulnerability Assessment is **supported for SQL Server 2012 and later**, and can also be run on [Azure SQL Database](/azure/sql-database/sql-vulnerability-assessment).
22
+
The vulnerability assessment tool is available in [SQL Server Management Studio (SSMS)](../../ssms/download-sql-server-management-studio-ssms.md) for SQL Server 2012 or later.
24
23
25
-
## Vulnerability Assessment features
26
-
SQL Vulnerability Assessment (VA) is a service that provides visibility into your security state, and includes actionable steps to resolve security issues and enhance your database security. It can help you:
27
-
- Meet compliance requirements that require database scan reports.
28
-
- Meet data privacy standards.
29
-
- Monitor a dynamic database environment where changes are difficult to track.
24
+
> [!TIP]
25
+
> For a comprehensive solution with advanced threat protection capabilities, use [Azure Defender for SQL Servers on machines](https://docs.microsoft.com/azure/security-center/defender-for-sql-introduction). To use Azure Defender, your SQL Server must be connected to Azure.
26
+
>
27
+
> For Azure SQL Database, Azure Synapse Analytics, and SQL Managed Instance, use [Azure Defender for SQL Database](https://docs.microsoft.com/azure/security-center/defender-for-sql-introduction).
28
+
29
+
## Vulnerability assessment features
30
+
SQL vulnerability assessment (VA) is a service that provides visibility into your security state, and includes actionable steps to resolve security issues and enhance your database security. It can help you:
31
+
- Meet compliance requirements that require database scan reports
32
+
- Meet data privacy standards
33
+
- Monitor a dynamic database environment where changes are difficult to track
30
34
31
35
The VA service runs a scan directly on your database. The service employs a knowledge base of rules that flag security vulnerabilities and highlight deviations from best practices, such as misconfigurations, excessive permissions, and unprotected sensitive data. The rules are based on Microsoft's recommended best practices, and focus on the security issues that present the biggest risks to your database and its valuable data. These rules also represent many of the requirements from various regulatory bodies to meet their compliance standards.
32
36
33
37
Results of the scan include actionable steps to resolve each issue and provide customized remediation scripts where applicable. An assessment report can be customized for your environment, by setting an acceptable baseline for permission configurations, feature configurations and database settings.
34
38
35
39
## Prerequisites
36
-
This feature is only available on SQL Server Management Studio (SSMS) v17.4 or later. Please make sure you are using the latest version. You can find the latest version [here](../../ssms/download-sql-server-management-studio-ssms.md).
40
+
This feature is only available on SQL Server Management Studio (SSMS) v17.4 or later. You can find the latest version [here](../../ssms/download-sql-server-management-studio-ssms.md).
37
41
38
42
## Getting started
39
-
To get started with running a Vulnerability Assessment on your database, follow these steps:
43
+
To run a vulnerability scan on your database, follow these steps:
40
44
1. Open **SQL Server Management Studio**.
41
45
42
46
2. Connect to an instance of the SQL Server Database Engine or localhost.
43
47
44
-
3. Expand **Databases**, right-click a database, point to **Tasks**, select **Vulnerability Assessment**, and click on**Scan for Vulnerabilities...**
48
+
3. Expand **Databases**, right-click a database, point to **Tasks**, select **Vulnerability assessment**, and select**Scan for Vulnerabilities...**
45
49
46
50
4. You can run a scan that checks for server-level issues by scanning one of the system databases. Expand **System Databases**, right-click the **master** database, point to **Tasks**, select **Vulnerability Assessment**, and click on **Scan for Vulnerabilities...**
47
51
@@ -52,9 +56,9 @@ Use the following steps to run and manage vulnerability assessments on your data
52
56
53
57
### 1. Run a scan
54
58
55
-
The Scan For Vulnerabilities dialog allows you to specify the location where scans will be saved. You can leave the default location or click **Browse...** to save the scan results to a different location.
59
+
The **Scan For Vulnerabilities** dialog allows you to specify the location where scans will be saved. You can leave the default location or click **Browse...** to save the scan results to a different location.
56
60
57
-
When you are ready to scan, click**OK** to scan your database for vulnerabilities.
61
+
When you are ready to scan, select**OK** to scan your database for vulnerabilities.
58
62
59
63
> [!NOTE]
60
64
> The scan is lightweight and safe. It takes a few seconds to run, and is entirely read-only. It does not make any changes to your database.
@@ -89,21 +93,21 @@ After you complete setting up your **Rule Baselines**, run a new scan to view th
89
93
90
94
### 6. Open a previously run scan
91
95
92
-
You can view the results of previously run Vulnerability Assessments at any time by opening an existing scan. Do so by right-clicking a database, pointing to **Tasks**, selecting **Vulnerability Assessment**, and clicking on **Open Existing Scan...**Select the scan results file you would like to view and click**Open**.
96
+
You can view the results of previously run vulnerability assessments at any time by opening an existing scan. Do so by right-clicking a database, pointing to **Tasks**, selecting **Vulnerability Assessment**, and selecting **Open Existing Scan...**. Select the scan results file you would like to view and select**Open**.
93
97
94
98
You can also open an existing scan result via the **File->Open** menu. Select **Vulnerability Assessment...** and open the **scans** directory to find the scan result you wish to view.
VA can now be used to monitor that your databases maintain a high level of security at all times, and that your organizational policies are met. If compliance reports are required, VA reports can be helpful to facilitate the compliance process.
99
103
100
-
## Manage Vulnerability Assessments using PowerShell
101
-
You can use PowerShell cmdlets to programmatically manage Vulnerability Assessments for your SQL Servers. The cmdlets can be used to run assessments programmatically, export the results and manage baselines.
104
+
## Manage vulnerability assessments using PowerShell
105
+
You can use PowerShell cmdlets to programmatically manage vulnerability assessments for your SQL Servers. The cmdlets can be used to run assessments programmatically, export the results and manage baselines.
102
106
To get started, download the latest [SqlServer PowerShell module](https://www.powershellgallery.com/packages/SqlServer/) from the PowerShell Gallery site. You can learn more [here](/archive/blogs/sqlsecurity/powershell-cmdlets-for-managing-sql-vulnerability-assessments).
103
107
104
108
## Next steps
105
-
Learn more about SQL Vulnerability Assessment using the following resources:
106
-
-[Running a Vulnerability Assessment on Azure SQL Database](/azure/sql-database/sql-vulnerability-assessment)
107
-
-[Channel 9 video demonstrating the use of Vulnerability Assessment](https://channel9.msdn.com/Shows/Data-Exposed/Track-and-remediate-potential-database-vulnerabilities-with-SQL-Vulnerability-Assessment)
109
+
Learn more about SQL vulnerability assessment using the following resources:
110
+
-[Running a vulnerability assessment scan on Azure SQL Database](/azure/sql-database/sql-vulnerability-assessment)
111
+
-[Channel 9 video demonstrating the use of vulnerability assessments](https://channel9.msdn.com/Shows/Data-Exposed/Track-and-remediate-potential-database-vulnerabilities-with-SQL-Vulnerability-Assessment)
Copy file name to clipboardExpand all lines: docs/ssdt/download-sql-server-data-tools-ssdt.md
+13-13Lines changed: 13 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -88,10 +88,10 @@ The installer lists available Visual Studio instances to add SSDT tools. If Visu
88
88
89
89
## SSDT for VS 2017 (standalone installer)
90
90
91
-
:::image type="icon" source="media/download.png" border="false"::: **[Download SSDT for Visual Studio 2017 (15.9.7)](https://go.microsoft.com/fwlink/?linkid=2151759)**
91
+
:::image type="icon" source="media/download.png" border="false"::: **[Download SSDT for Visual Studio 2017 (15.9.8)](https://go.microsoft.com/fwlink/?linkid=2161172)**
92
92
93
93
> [!IMPORTANT]
94
-
> * Before installing SSDT for Visual Studio 2017 (15.9.7), uninstall *Analysis Services Projects* and *Reporting Services Projects* extensions if they are already installed, and close all VS instances.
94
+
> * Before installing SSDT for Visual Studio 2017 (15.9.8), uninstall *Analysis Services Projects* and *Reporting Services Projects* extensions if they are already installed, and close all VS instances.
95
95
> * Removed the inbox component Power Query Source for SQL Server 2017. Now we have announced Power Query Source for SQL Server 2017 & 2019 as out-of-box component, which can be downloaded [here](https://www.microsoft.com/download/details.aspx?id=100619).
96
96
> * To design packages using Oracle and Teradata connectors and targeting an earlier version of SQL Server prior to SQL 2019, in addition to the [Microsoft Oracle Connector for SQL 2019](https://www.microsoft.com/download/details.aspx?id=58228) and [Microsoft Teradata Connector for SQL 2019](https://www.microsoft.com/download/details.aspx?id=100599), you need to also install the corresponding version of Microsoft Connector for Oracle and Teradata by Attunity.
97
97
> *[Microsoft Connector Version 5.0 for Oracle and Teradata by Attunity targeting SQL Server 2017](https://www.microsoft.com/download/details.aspx?id=55179)
@@ -111,17 +111,17 @@ SSDT for Visual Studio 2017 has the same [system requirements](/visualstudio/pro
111
111
112
112
This release of **SSDT for VS 2017** can be installed in the following languages:
| Integration Services (SSIS) | Add ExecuteOnProxy property on Execute SQL Task and Execute Process Task so as to support [enabling self-hosted Integration Runtime as proxy](https://docs.microsoft.com/azure/data-factory/self-hosted-integration-runtime-proxy-ssis). |
54
+
| Integration Services (SSIS) | Allow connectivity retry for OLE DB connection manager via exposing ConnectRetryCount and ConnectRetryInterval properties. |
55
+
| Integration Services (SSIS) | List available locations based on selected subscription in Integration Runtime Creation Wizard. |
56
+
| Integration Services (SSIS) | Fixed an issue that test connection on Analysis Services connection manager may fail due to fail to load managed ADAL component. |
57
+
| Integration Services (SSIS) | Fixed some issues related to accessibility and high DPI. |
58
+
59
+
### Known issues
60
+
61
+
| Known issue | Details |
62
+
| :---------- | :------ |
63
+
| SSIS Execute Package Task doesn't support debugging when ExecuteOutOfProcess is set to True. | This issue applies only to debugging. Save, deploy, and execution via DTExec.exe or SSIS catalog isn't affected. |
Copy file name to clipboardExpand all lines: docs/t-sql/functions/objectproperty-transact-sql.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -161,6 +161,7 @@ OBJECTPROPERTY ( id , property )
161
161
## Exceptions
162
162
Returns NULL on error or if a caller does not have permission to view the object.
163
163
164
+
## Permissions
164
165
A user can only view the metadata of securables that the user owns or on which the user has been granted permission. This means that metadata-emitting, built-in functions such as OBJECTPROPERTY may return NULL if the user does not have any permission on the object. For more information, see [Metadata Visibility Configuration](../../relational-databases/security/metadata-visibility-configuration.md).
Copy file name to clipboardExpand all lines: docs/tools/configuration-manager/connecting-using-ipv6.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,7 @@ ms.author: maghan
18
18
monikerRange: ">=sql-server-2016"
19
19
---
20
20
# Connecting Using IPv6
21
-
[!INCLUDE [SQL Server Windows Only - ASDBMI ](../../includes/applies-to-version/sql-windows-only-asdbmi.md)]
21
+
[!INCLUDE [SQL Server Windows Only](../../includes/applies-to-version/sql-windows-only.md)]
22
22
[!INCLUDE[ssNoVersion](../../includes/ssnoversion-md.md)] and [!INCLUDE[ssNoVersion](../../includes/ssnoversion-md.md)] Native Client fully support both Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6). When Windows is configured with IPv6 [!INCLUDE[ssNoVersion](../../includes/ssnoversion-md.md)], components automatically recognize the existence of IPv6. No special [!INCLUDE[ssNoVersion](../../includes/ssnoversion-md.md)] configuration is necessary.
23
23
24
24
Support includes but is not limited to the following:
0 commit comments