Skip to content

Commit 7a5ecfe

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/sql-docs-pr into release-remove-sscurrent-tag
2 parents 32ade4b + a4b41bb commit 7a5ecfe

7 files changed

Lines changed: 90 additions & 43 deletions

File tree

docs/relational-databases/security/sql-vulnerability-assessment.md

Lines changed: 31 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -1,47 +1,51 @@
11
---
2-
title: "SQL Vulnerability Assessment | Microsoft Docs"
3-
description: Use the SQL Vulnerability Assessment tool to help discover, track, and remediate potential database vulnerabilities in SQL Server.
2+
title: "Vulnerability assessment for SQL Server"
3+
description: Use the vulnerability assessment scanner to discover, track, and remediate potential database vulnerabilities in SQL Server.
44
ms.custom: ""
5-
ms.date: "11/30/2017"
5+
ms.date: "04/26/2021"
66
ms.prod: sql
77
ms.prod_service: "security, sql-database"
8-
ms.reviewer: ""
98
ms.technology: security
109
ms.topic: conceptual
1110
helpviewer_keywords:
1211
- "SQL Vulnerability Assessment"
13-
author: yualan
14-
ms.author: alayu
15-
monikerRange: "=azuresqldb-current||>=sql-server-2016||>=sql-server-linux-2017||=azuresqldb-mi-current"
12+
author: davidtrigano
13+
ms.author: datrigan
14+
monikerRange: ">=sql-server-2016"
1615
---
17-
# SQL Vulnerability Assessment
16+
# Vulnerability assessment for SQL Server
1817

19-
[!INCLUDE [SQL Server Azure SQL Database](../../includes/applies-to-version/sql-asdb.md)]
18+
[!INCLUDE [SQL Server](../../includes/applies-to-version/sqlserver.md)]
2019

21-
SQL Vulnerability Assessment is an easy to use tool that can help you discover, track, and remediate potential database vulnerabilities. Use it to proactively improve your database security.
20+
SQL vulnerability assessment is an easy to use tool that can help you discover, track, and remediate potential database vulnerabilities. Use it to proactively improve your database security.
2221

23-
Vulnerability Assessment is **supported for SQL Server 2012 and later**, and can also be run on [Azure SQL Database](/azure/sql-database/sql-vulnerability-assessment).
22+
The vulnerability assessment tool is available in [SQL Server Management Studio (SSMS)](../../ssms/download-sql-server-management-studio-ssms.md) for SQL Server 2012 or later.
2423

25-
## Vulnerability Assessment features
26-
SQL Vulnerability Assessment (VA) is a service that provides visibility into your security state, and includes actionable steps to resolve security issues and enhance your database security. It can help you:
27-
- Meet compliance requirements that require database scan reports.
28-
- Meet data privacy standards.
29-
- Monitor a dynamic database environment where changes are difficult to track.
24+
> [!TIP]
25+
> For a comprehensive solution with advanced threat protection capabilities, use [Azure Defender for SQL Servers on machines](https://docs.microsoft.com/azure/security-center/defender-for-sql-introduction). To use Azure Defender, your SQL Server must be connected to Azure.
26+
>
27+
> For Azure SQL Database, Azure Synapse Analytics, and SQL Managed Instance, use [Azure Defender for SQL Database](https://docs.microsoft.com/azure/security-center/defender-for-sql-introduction).
28+
29+
## Vulnerability assessment features
30+
SQL vulnerability assessment (VA) is a service that provides visibility into your security state, and includes actionable steps to resolve security issues and enhance your database security. It can help you:
31+
- Meet compliance requirements that require database scan reports
32+
- Meet data privacy standards
33+
- Monitor a dynamic database environment where changes are difficult to track
3034

3135
The VA service runs a scan directly on your database. The service employs a knowledge base of rules that flag security vulnerabilities and highlight deviations from best practices, such as misconfigurations, excessive permissions, and unprotected sensitive data. The rules are based on Microsoft's recommended best practices, and focus on the security issues that present the biggest risks to your database and its valuable data. These rules also represent many of the requirements from various regulatory bodies to meet their compliance standards.
3236

3337
Results of the scan include actionable steps to resolve each issue and provide customized remediation scripts where applicable. An assessment report can be customized for your environment, by setting an acceptable baseline for permission configurations, feature configurations and database settings.
3438

3539
## Prerequisites
36-
This feature is only available on SQL Server Management Studio (SSMS) v17.4 or later. Please make sure you are using the latest version. You can find the latest version [here](../../ssms/download-sql-server-management-studio-ssms.md).
40+
This feature is only available on SQL Server Management Studio (SSMS) v17.4 or later. You can find the latest version [here](../../ssms/download-sql-server-management-studio-ssms.md).
3741

3842
## Getting started
39-
To get started with running a Vulnerability Assessment on your database, follow these steps:
43+
To run a vulnerability scan on your database, follow these steps:
4044
1. Open **SQL Server Management Studio**.
4145

4246
2. Connect to an instance of the SQL Server Database Engine or localhost.
4347

44-
3. Expand **Databases**, right-click a database, point to **Tasks**, select **Vulnerability Assessment**, and click on **Scan for Vulnerabilities...**
48+
3. Expand **Databases**, right-click a database, point to **Tasks**, select **Vulnerability assessment**, and select **Scan for Vulnerabilities...**
4549

4650
4. You can run a scan that checks for server-level issues by scanning one of the system databases. Expand **System Databases**, right-click the **master** database, point to **Tasks**, select **Vulnerability Assessment**, and click on **Scan for Vulnerabilities...**
4751

@@ -52,9 +56,9 @@ Use the following steps to run and manage vulnerability assessments on your data
5256

5357
### 1. Run a scan
5458

55-
The Scan For Vulnerabilities dialog allows you to specify the location where scans will be saved. You can leave the default location or click **Browse...** to save the scan results to a different location.
59+
The **Scan For Vulnerabilities** dialog allows you to specify the location where scans will be saved. You can leave the default location or click **Browse...** to save the scan results to a different location.
5660

57-
When you are ready to scan, click **OK** to scan your database for vulnerabilities.
61+
When you are ready to scan, select **OK** to scan your database for vulnerabilities.
5862

5963
> [!NOTE]
6064
> The scan is lightweight and safe. It takes a few seconds to run, and is entirely read-only. It does not make any changes to your database.
@@ -89,21 +93,21 @@ After you complete setting up your **Rule Baselines**, run a new scan to view th
8993

9094
### 6. Open a previously run scan
9195

92-
You can view the results of previously run Vulnerability Assessments at any time by opening an existing scan. Do so by right-clicking a database, pointing to **Tasks**, selecting **Vulnerability Assessment**, and clicking on **Open Existing Scan...** Select the scan results file you would like to view and click **Open**.
96+
You can view the results of previously run vulnerability assessments at any time by opening an existing scan. Do so by right-clicking a database, pointing to **Tasks**, selecting **Vulnerability Assessment**, and selecting **Open Existing Scan...**. Select the scan results file you would like to view and select **Open**.
9397

9498
You can also open an existing scan result via the **File->Open** menu. Select **Vulnerability Assessment...** and open the **scans** directory to find the scan result you wish to view.
9599

96100
![open existing scan](media/sql-vulnerability-assessment/7-ssmsopenexistingscan.png)
97101

98102
VA can now be used to monitor that your databases maintain a high level of security at all times, and that your organizational policies are met. If compliance reports are required, VA reports can be helpful to facilitate the compliance process.
99103

100-
## Manage Vulnerability Assessments using PowerShell
101-
You can use PowerShell cmdlets to programmatically manage Vulnerability Assessments for your SQL Servers. The cmdlets can be used to run assessments programmatically, export the results and manage baselines.
104+
## Manage vulnerability assessments using PowerShell
105+
You can use PowerShell cmdlets to programmatically manage vulnerability assessments for your SQL Servers. The cmdlets can be used to run assessments programmatically, export the results and manage baselines.
102106
To get started, download the latest [SqlServer PowerShell module](https://www.powershellgallery.com/packages/SqlServer/) from the PowerShell Gallery site. You can learn more [here](/archive/blogs/sqlsecurity/powershell-cmdlets-for-managing-sql-vulnerability-assessments).
103107

104108
## Next steps
105-
Learn more about SQL Vulnerability Assessment using the following resources:
106-
- [Running a Vulnerability Assessment on Azure SQL Database](/azure/sql-database/sql-vulnerability-assessment)
107-
- [Channel 9 video demonstrating the use of Vulnerability Assessment](https://channel9.msdn.com/Shows/Data-Exposed/Track-and-remediate-potential-database-vulnerabilities-with-SQL-Vulnerability-Assessment)
109+
Learn more about SQL vulnerability assessment using the following resources:
110+
- [Running a vulnerability assessment scan on Azure SQL Database](/azure/sql-database/sql-vulnerability-assessment)
111+
- [Channel 9 video demonstrating the use of vulnerability assessments](https://channel9.msdn.com/Shows/Data-Exposed/Track-and-remediate-potential-database-vulnerabilities-with-SQL-Vulnerability-Assessment)
108112

109113

docs/relational-databases/system-catalog-views/sys-database-scoped-credentials-transact-sql.md

Lines changed: 15 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,17 +25,31 @@ monikerRange: "=azuresqldb-current||=azure-sqldw-latest||>=sql-server-2016||>=sq
2525

2626
Returns one row for each database scoped credential in the database.
2727

28+
::: moniker range="=sql-server-2016"
2829
|Column name|Data type|Description|
2930
|-----------------|---------------|-----------------|
3031
|name|**sysname**|Name of the database scoped credential. Is unique in the database.|
3132
|credential_id|**int**|ID of the database scoped credential. Is unique in the database.|
32-
|principal_id|**int**|ID of the database principal who owns the key.|
3333
|credential_identity|**nvarchar(4000)**|Name of the identity to use. This will generally be a Windows user. It does not have to be unique.|
3434
|create_date|**datetime**|Time at which the database scoped credential was created.|
3535
|modify_date|**datetime**|Time at which the database scoped credential was last modified.|
3636
|target_type|**nvarchar(100)**|Type of database scoped credential. Returns `NULL` for database scoped credentials.|
3737
|target_id|**int**|ID of the object that the database scoped credential is mapped to. Returns 0 for database scoped credentials|
38+
::: moniker-end
3839

40+
::: moniker range=">=sql-server-2017||=azuresqldb-current||=azure-sqldw-latest||>=sql-server-linux-2017||=azuresqldb-mi-current"
41+
|Column name|Data type|Description|
42+
|-----------------|---------------|-----------------|
43+
|name|**sysname**|Name of the database scoped credential. Is unique in the database.|
44+
|credential_id|**int**|ID of the database scoped credential. Is unique in the database.|
45+
|principal_id|**int**|ID of the database principal who owns the key.|
46+
|credential_identity|**nvarchar(4000)**|Name of the identity to use. This will generally be a Windows user. It does not have to be unique.|
47+
|create_date|**datetime**|Time at which the database scoped credential was created.|
48+
|modify_date|**datetime**|Time at which the database scoped credential was last modified.|
49+
|target_type|**nvarchar(100)**|Type of database scoped credential. Returns `NULL` for database scoped credentials.|
50+
|target_id|**int**|ID of the object that the database scoped credential is mapped to. Returns 0 for database scoped credentials|
51+
::: moniker-end
52+
3953
## Permissions
4054
Requires `CONTROL` permission on the database.
4155

docs/relational-databases/system-functions/sys-fn-my-permissions-transact-sql.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,11 @@ GO
7676
```
7777

7878
If DEFAULT is supplied as the value of *securable* or *securable_class*, the value will be interpreted as NULL.
79-
79+
80+
81+
## Permissions
82+
Requires membership in the public role.
83+
8084
## Examples
8185

8286
### A. Listing effective permissions on the server

docs/ssdt/download-sql-server-data-tools-ssdt.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -88,10 +88,10 @@ The installer lists available Visual Studio instances to add SSDT tools. If Visu
8888

8989
## SSDT for VS 2017 (standalone installer)
9090

91-
:::image type="icon" source="media/download.png" border="false"::: **[Download SSDT for Visual Studio 2017 (15.9.7)](https://go.microsoft.com/fwlink/?linkid=2151759)**
91+
:::image type="icon" source="media/download.png" border="false"::: **[Download SSDT for Visual Studio 2017 (15.9.8)](https://go.microsoft.com/fwlink/?linkid=2161172)**
9292

9393
> [!IMPORTANT]
94-
> * Before installing SSDT for Visual Studio 2017 (15.9.7), uninstall *Analysis Services Projects* and *Reporting Services Projects* extensions if they are already installed, and close all VS instances.
94+
> * Before installing SSDT for Visual Studio 2017 (15.9.8), uninstall *Analysis Services Projects* and *Reporting Services Projects* extensions if they are already installed, and close all VS instances.
9595
> * Removed the inbox component Power Query Source for SQL Server 2017. Now we have announced Power Query Source for SQL Server 2017 & 2019 as out-of-box component, which can be downloaded [here](https://www.microsoft.com/download/details.aspx?id=100619).
9696
> * To design packages using Oracle and Teradata connectors and targeting an earlier version of SQL Server prior to SQL 2019, in addition to the [Microsoft Oracle Connector for SQL 2019](https://www.microsoft.com/download/details.aspx?id=58228) and [Microsoft Teradata Connector for SQL 2019](https://www.microsoft.com/download/details.aspx?id=100599), you need to also install the corresponding version of Microsoft Connector for Oracle and Teradata by Attunity.
9797
> * [Microsoft Connector Version 5.0 for Oracle and Teradata by Attunity targeting SQL Server 2017](https://www.microsoft.com/download/details.aspx?id=55179)
@@ -111,17 +111,17 @@ SSDT for Visual Studio 2017 has the same [system requirements](/visualstudio/pro
111111

112112
This release of **SSDT for VS 2017** can be installed in the following languages:
113113

114-
* [Chinese (Simplified)](https://go.microsoft.com/fwlink/?linkid=2151759&clcid=0x804)
115-
* [Chinese (Traditional)](https://go.microsoft.com/fwlink/?linkid=2151759&clcid=0x404)
116-
* [English (United States)](https://go.microsoft.com/fwlink/?linkid=2151759&clcid=0x409)
117-
* [French](https://go.microsoft.com/fwlink/?linkid=2151759&clcid=0x40c)
118-
* [German](https://go.microsoft.com/fwlink/?linkid=2151759&clcid=0x407)
119-
* [Italian](https://go.microsoft.com/fwlink/?linkid=2151759&clcid=0x410)
120-
* [Japanese](https://go.microsoft.com/fwlink/?linkid=2151759&clcid=0x411)
121-
* [Korean](https://go.microsoft.com/fwlink/?linkid=2151759&clcid=0x412)
122-
* [Portuguese (Brazil)](https://go.microsoft.com/fwlink/?linkid=2151759&clcid=0x416)
123-
* [Russian](https://go.microsoft.com/fwlink/?linkid=2151759&clcid=0x419)
124-
* [Spanish](https://go.microsoft.com/fwlink/?linkid=2151759&clcid=0x40a)
114+
* [Chinese (Simplified)](https://go.microsoft.com/fwlink/?linkid=2161172&clcid=0x804)
115+
* [Chinese (Traditional)](https://go.microsoft.com/fwlink/?linkid=2161172&clcid=0x404)
116+
* [English (United States)](https://go.microsoft.com/fwlink/?linkid=2161172&clcid=0x409)
117+
* [French](https://go.microsoft.com/fwlink/?linkid=2161172&clcid=0x40c)
118+
* [German](https://go.microsoft.com/fwlink/?linkid=2161172&clcid=0x407)
119+
* [Italian](https://go.microsoft.com/fwlink/?linkid=2161172&clcid=0x410)
120+
* [Japanese](https://go.microsoft.com/fwlink/?linkid=2161172&clcid=0x411)
121+
* [Korean](https://go.microsoft.com/fwlink/?linkid=2161172&clcid=0x412)
122+
* [Portuguese (Brazil)](https://go.microsoft.com/fwlink/?linkid=2161172&clcid=0x416)
123+
* [Russian](https://go.microsoft.com/fwlink/?linkid=2161172&clcid=0x419)
124+
* [Spanish](https://go.microsoft.com/fwlink/?linkid=2161172&clcid=0x40a)
125125

126126
### Considerations and limitations
127127

docs/ssdt/release-notes-ssdt.md

Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -40,6 +40,30 @@ GeneMi , 2019/03/22.
4040
P.S. there's no need to keep this large HTML comment indefinitely.
4141
-->
4242

43+
## 15.9.8,  SSDT for VS 2017
44+
45+
_Released:_   Apr 27, 2021
46+
_Build Number:_   14.0.16236.0
47+
_SSDT for Visual Studio 2017._
48+
49+
### What's New?
50+
51+
| New Item | Details |
52+
|-----------------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------|
53+
| Integration Services (SSIS) | Add ExecuteOnProxy property on Execute SQL Task and Execute Process Task so as to support [enabling self-hosted Integration Runtime as proxy](https://docs.microsoft.com/azure/data-factory/self-hosted-integration-runtime-proxy-ssis). |
54+
| Integration Services (SSIS) | Allow connectivity retry for OLE DB connection manager via exposing ConnectRetryCount and ConnectRetryInterval properties. |
55+
| Integration Services (SSIS) | List available locations based on selected subscription in Integration Runtime Creation Wizard. |
56+
| Integration Services (SSIS) | Fixed an issue that test connection on Analysis Services connection manager may fail due to fail to load managed ADAL component. |
57+
| Integration Services (SSIS) | Fixed some issues related to accessibility and high DPI. |
58+
59+
### Known issues
60+
61+
| Known issue | Details |
62+
| :---------- | :------ |
63+
| SSIS Execute Package Task doesn't support debugging when ExecuteOutOfProcess is set to True. | This issue applies only to debugging. Save, deploy, and execution via DTExec.exe or SSIS catalog isn't affected. |
64+
|   |   |
65+
66+
4367
## 15.9.7,  SSDT for VS 2017
4468

4569
_Released:_   Jan 5, 2021

docs/t-sql/functions/objectproperty-transact-sql.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -161,6 +161,7 @@ OBJECTPROPERTY ( id , property )
161161
## Exceptions
162162
Returns NULL on error or if a caller does not have permission to view the object.
163163

164+
## Permissions
164165
A user can only view the metadata of securables that the user owns or on which the user has been granted permission. This means that metadata-emitting, built-in functions such as OBJECTPROPERTY may return NULL if the user does not have any permission on the object. For more information, see [Metadata Visibility Configuration](../../relational-databases/security/metadata-visibility-configuration.md).
165166

166167
## Remarks

docs/tools/configuration-manager/connecting-using-ipv6.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.author: maghan
1818
monikerRange: ">=sql-server-2016"
1919
---
2020
# Connecting Using IPv6
21-
[!INCLUDE [SQL Server Windows Only - ASDBMI ](../../includes/applies-to-version/sql-windows-only-asdbmi.md)]
21+
[!INCLUDE [SQL Server Windows Only](../../includes/applies-to-version/sql-windows-only.md)]
2222
[!INCLUDE[ssNoVersion](../../includes/ssnoversion-md.md)] and [!INCLUDE[ssNoVersion](../../includes/ssnoversion-md.md)] Native Client fully support both Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6). When Windows is configured with IPv6 [!INCLUDE[ssNoVersion](../../includes/ssnoversion-md.md)], components automatically recognize the existence of IPv6. No special [!INCLUDE[ssNoVersion](../../includes/ssnoversion-md.md)] configuration is necessary.
2323

2424
Support includes but is not limited to the following:

0 commit comments

Comments
 (0)