Skip to content

Commit e0f563e

Browse files
authored
Merge pull request #31087 from MicrosoftDocs/main
7/10/2024 PM Publish
2 parents d7e537a + 5019016 commit e0f563e

26 files changed

Lines changed: 208 additions & 400 deletions

.openpublishing.redirection.azure-sql.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -110,6 +110,11 @@
110110
"redirect_url": "/azure/azure-sql/managed-instance/high-availability-sla-local-zone-redundancy",
111111
"redirect_document_id": true
112112
},
113+
{
114+
"source_path_from_root": "/azure-sql/managed-instance/november-2022-feature-wave-enroll.md",
115+
"redirect_url": "/azure/azure-sql/managed-instance/doc-changes-updates-release-notes-whats-new#november-2022-feature-wave",
116+
"redirect_document_id": false
117+
},
113118
{
114119
"source_path_from_root": "/azure-sql/managed-instance/azure-app-sync-network-configuration.md",
115120
"redirect_url": "/azure/azure-sql/managed-instance/",

azure-sql/database/sql-database-vulnerability-assessment-storage.md

Lines changed: 3 additions & 60 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: Provides instructions on how to store Vulnerability Assessment (VA)
55
author: cesanu
66
ms.author: cesanu
77
ms.reviewer: wiassaf, vanto, mathoma
8-
ms.date: 01/16/2023
8+
ms.date: 07/10/2024
99
ms.service: sql-db-mi
1010
ms.subservice: security
1111
ms.topic: how-to
@@ -61,13 +61,10 @@ To find out which storage account is being used, do the following steps:
6161

6262
Since Azure SQL Managed Instance isn't a trusted Microsoft Service and has a different VNet from the storage account, executing a VA scan will result in an error.
6363

64-
> [!NOTE]
65-
> It is highly recommended to make sure your Azure SQL Managed Instances are enrolled to the [November 2022 feature wave](/azure/azure-sql/managed-instance/november-2022-feature-wave-enroll) which will allow much simpler configuration of SQL Vulnerability Assessment when the storage account is behind a firewall or VNET.
64+
To support VA scans on SQL managed instances, follow these steps:
6665

67-
To support VA scans on Azure SQL Managed Instances that **have the November 2022 feature wave installed**, follow the below steps:
66+
1. On the **Overview** pane for the SQL managed instance resource in the Azure portal, note the value under **Virtual network / subnet**.
6867

69-
1. Under the Azure SQL Managed Instance's **Overview** page, note the value under **Virtual network / subnet**.
70-
7168
1. Head to the **Networking** page in the storage account where SQL VA is configured to store the scan results.
7269

7370
1. Under the **Firewalls and virtual networks** tab, under **Public network access** select **Enabled from selected virtual networks and IP addresses**.
@@ -76,60 +73,6 @@ To support VA scans on Azure SQL Managed Instances that **have the November 2022
7673

7774
:::image type="content" source="media/sql-database-vulnerability-assessment-storage/storage-networking-post-nov-22-wave.png" alt-text="Screenshot of storage account networking settings for Nov22 feature wave (and up)." lightbox="media/sql-database-vulnerability-assessment-storage/storage-networking-post-nov-22-wave.png":::
7875

79-
To support VA scans on Azure SQL Managed Instances that **do not have the November 2022 feature wave installed**, follow the below steps:
80-
81-
1. In the **SQL managed instance** pane, under the **Overview** heading, click the **Virtual network/subnet** link. This takes you to the **Virtual network** pane.
82-
83-
:::image type="content" source="../managed-instance/media/public-endpoint-configure/mi-overview.png" alt-text="Screenshot of the SQL managed instance overview section.":::
84-
85-
1. Under **Settings**, select **Subnets**. Click **+ Subnet** in the new pane to add a subnet. For more information, see [Manage subnets](/azure/virtual-network/virtual-network-manage-subnet).
86-
87-
:::image type="content" source="media/sql-database-vulnerability-assessment-storage/mi-add-subnet.png" alt-text="Screenshot shows a list of subnets and the add subnet option." lightbox="media/sql-database-vulnerability-assessment-storage/mi-add-subnet.png" :::
88-
89-
1. Traffic from the instance in the default managed instance subnet to Azure Resource Manager must be routed through the internet. Therefore, a route with the next hop being the internet and the destination tag being the appropriate UDR tag for the Azure Resource Manager address range must be assigned to the subnet where the managed instance is located.
90-
This route will be added automatically in new deployments, but needs to be added again if it was removed.
91-
92-
:::image type="content" source="media/sql-database-vulnerability-assessment-storage/managed-instance-post-nov-22-required-routing-settings.png" alt-text="Screenshot that shows the required route for the November 22 feature wave and later." lightbox="media/sql-database-vulnerability-assessment-storage/managed-instance-post-nov-22-required-routing-settings.png":::
93-
94-
1. The new subnet should have the following configurations:
95-
96-
:::image type="content" source="media/sql-database-vulnerability-assessment-storage/mi-add-subnet-details.png" alt-text="Screenshot shows a subnet called VA and its settings.":::
97-
98-
- NAT gateway: **None**
99-
- Network security group: **None**
100-
- Route table: **None**
101-
- SERVICE ENDPOINTS - services: **None selected**
102-
- SUBNET DELEGATION - Delegate subnet to a service: **None**
103-
- NETWORK POLICY FOR PRIVATE ENDPOINTS - Private endpoint network policy: **None selected**
104-
105-
1. Head to the storage account where SQL VA is configured to store the scan results and click the **Private endpoint connections** tab, then click **+ Private endpoint**
106-
107-
:::image type="content" source="media/sql-database-vulnerability-assessment-storage/storage-networking-firewalls-and-networking.png" alt-text="Screenshot shows Firewalls and virtual networks settings.":::
108-
109-
:::image type="content" source="media/sql-database-vulnerability-assessment-storage/storage-networking-private-endpoint-connections.png" alt-text="Screenshot shows add private endpoint button.":::
110-
111-
1. Choose the details for your private endpoint (it's suggested to put it in the same RG and the same region).
112-
113-
:::image type="content" source="media/sql-database-vulnerability-assessment-storage/storage-create-private-endpoint-basics.png" alt-text="Screenshot shows private endpoint creation Basics tab.":::
114-
115-
1. Choose **blob** for the **Target sub-resource**
116-
117-
:::image type="content" source="media/sql-database-vulnerability-assessment-storage/storage-create-private-endpoint-resource.png" alt-text="Screenshot shows private endpoint creation Resource tab.":::
118-
119-
1. Select the virtual network of the SQL MI (from step 1) and choose the subnet you created (step 3):
120-
121-
:::image type="content" source="media/sql-database-vulnerability-assessment-storage/storage-create-private-endpoint-virtual-network.png" alt-text="Screenshot shows private endpoint creation Virtual Network tab.":::
122-
123-
1. Select **Integrate with private DNS zone** (should be default) and choose the other default values
124-
125-
:::image type="content" source="media/sql-database-vulnerability-assessment-storage/storage-create-private-endpoint-dns.png" alt-text="Screenshot shows private endpoint creation DNS tab.":::
126-
127-
1. Continue to the **Review + Create** tab and click **Create**. Once the deployment is done you should see this in the **Private endpoint connections** tab under the Network section of the Storage account:
128-
129-
:::image type="content" source="media/sql-database-vulnerability-assessment-storage/storage-networking-post-config.png" alt-text="Screenshot shows storage Networking Private endpoint connections post configuration." lightbox="media/sql-database-vulnerability-assessment-storage/storage-networking-post-config.png":::
130-
131-
You should now be able to store your VA scans for Azure SQL Managed Instances in your storage account.
132-
13376
## Troubleshoot vulnerability assessment scan-related issues
13477

13578
Troubleshoot common issues related to vulnerability assessment scans.

0 commit comments

Comments
 (0)