You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: azure-sql/database/sql-database-vulnerability-assessment-storage.md
+3-60Lines changed: 3 additions & 60 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ description: Provides instructions on how to store Vulnerability Assessment (VA)
5
5
author: cesanu
6
6
ms.author: cesanu
7
7
ms.reviewer: wiassaf, vanto, mathoma
8
-
ms.date: 01/16/2023
8
+
ms.date: 07/10/2024
9
9
ms.service: sql-db-mi
10
10
ms.subservice: security
11
11
ms.topic: how-to
@@ -61,13 +61,10 @@ To find out which storage account is being used, do the following steps:
61
61
62
62
Since Azure SQL Managed Instance isn't a trusted Microsoft Service and has a different VNet from the storage account, executing a VA scan will result in an error.
63
63
64
-
> [!NOTE]
65
-
> It is highly recommended to make sure your Azure SQL Managed Instances are enrolled to the [November 2022 feature wave](/azure/azure-sql/managed-instance/november-2022-feature-wave-enroll) which will allow much simpler configuration of SQL Vulnerability Assessment when the storage account is behind a firewall or VNET.
64
+
To support VA scans on SQL managed instances, follow these steps:
66
65
67
-
To support VA scans on Azure SQL Managed Instances that **have the November 2022 feature wave installed**, follow the below steps:
66
+
1. On the **Overview** pane for the SQL managed instance resource in the Azure portal, note the value under **Virtual network / subnet**.
68
67
69
-
1. Under the Azure SQL Managed Instance's **Overview** page, note the value under **Virtual network / subnet**.
70
-
71
68
1. Head to the **Networking** page in the storage account where SQL VA is configured to store the scan results.
72
69
73
70
1. Under the **Firewalls and virtual networks** tab, under **Public network access** select **Enabled from selected virtual networks and IP addresses**.
@@ -76,60 +73,6 @@ To support VA scans on Azure SQL Managed Instances that **have the November 2022
76
73
77
74
:::image type="content" source="media/sql-database-vulnerability-assessment-storage/storage-networking-post-nov-22-wave.png" alt-text="Screenshot of storage account networking settings for Nov22 feature wave (and up)." lightbox="media/sql-database-vulnerability-assessment-storage/storage-networking-post-nov-22-wave.png":::
78
75
79
-
To support VA scans on Azure SQL Managed Instances that **do not have the November 2022 feature wave installed**, follow the below steps:
80
-
81
-
1. In the **SQL managed instance** pane, under the **Overview** heading, click the **Virtual network/subnet** link. This takes you to the **Virtual network** pane.
82
-
83
-
:::image type="content" source="../managed-instance/media/public-endpoint-configure/mi-overview.png" alt-text="Screenshot of the SQL managed instance overview section.":::
84
-
85
-
1. Under **Settings**, select **Subnets**. Click **+ Subnet** in the new pane to add a subnet. For more information, see [Manage subnets](/azure/virtual-network/virtual-network-manage-subnet).
86
-
87
-
:::image type="content" source="media/sql-database-vulnerability-assessment-storage/mi-add-subnet.png" alt-text="Screenshot shows a list of subnets and the add subnet option." lightbox="media/sql-database-vulnerability-assessment-storage/mi-add-subnet.png" :::
88
-
89
-
1. Traffic from the instance in the default managed instance subnet to Azure Resource Manager must be routed through the internet. Therefore, a route with the next hop being the internet and the destination tag being the appropriate UDR tag for the Azure Resource Manager address range must be assigned to the subnet where the managed instance is located.
90
-
This route will be added automatically in new deployments, but needs to be added again if it was removed.
91
-
92
-
:::image type="content" source="media/sql-database-vulnerability-assessment-storage/managed-instance-post-nov-22-required-routing-settings.png" alt-text="Screenshot that shows the required route for the November 22 feature wave and later." lightbox="media/sql-database-vulnerability-assessment-storage/managed-instance-post-nov-22-required-routing-settings.png":::
93
-
94
-
1. The new subnet should have the following configurations:
95
-
96
-
:::image type="content" source="media/sql-database-vulnerability-assessment-storage/mi-add-subnet-details.png" alt-text="Screenshot shows a subnet called VA and its settings.":::
97
-
98
-
- NAT gateway: **None**
99
-
- Network security group: **None**
100
-
- Route table: **None**
101
-
- SERVICE ENDPOINTS - services: **None selected**
102
-
- SUBNET DELEGATION - Delegate subnet to a service: **None**
1. Head to the storage account where SQL VA is configured to store the scan results and click the **Private endpoint connections** tab, then click **+ Private endpoint**
106
-
107
-
:::image type="content" source="media/sql-database-vulnerability-assessment-storage/storage-networking-firewalls-and-networking.png" alt-text="Screenshot shows Firewalls and virtual networks settings.":::
1. Select **Integrate with private DNS zone** (should be default) and choose the other default values
124
-
125
-
:::image type="content" source="media/sql-database-vulnerability-assessment-storage/storage-create-private-endpoint-dns.png" alt-text="Screenshot shows private endpoint creation DNS tab.":::
126
-
127
-
1. Continue to the **Review + Create** tab and click **Create**. Once the deployment is done you should see this in the **Private endpoint connections** tab under the Network section of the Storage account:
0 commit comments