Skip to content

Commit f95a64a

Browse files
authored
Merge pull request #25242 from AlizaBernstein/WI-45775-Update-ASC-branding-to-MDC
WI-45775-Updating screens for MDC SQL
2 parents a1471bc + cb865aa commit f95a64a

7 files changed

Lines changed: 40 additions & 36 deletions

azure-sql/database/azure-defender-for-sql.md

Lines changed: 12 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Microsoft Defender for SQL
33
description: Learn about functionality for managing your database vulnerabilities and detecting anomalous activities that could indicate a threat to your database in Azure SQL Database, Azure SQL Managed Instance, or Azure Synapse.
44
author: bmansheim
55
ms.author: benmansheim
6-
ms.date: 06/15/2022
6+
ms.date: 01/16/2023
77
ms.service: sql-db-mi
88
ms.subservice: security
99
ms.topic: conceptual
@@ -19,10 +19,11 @@ Microsoft Defender for SQL is a Defender plan in Microsoft Defender for Cloud. M
1919
## What are the benefits of Microsoft Defender for SQL?
2020

2121
Microsoft Defender for SQL provides a set of advanced SQL security capabilities, including SQL Vulnerability Assessment and Advanced Threat Protection.
22+
2223
- [Vulnerability Assessment](/azure/defender-for-cloud/sql-azure-vulnerability-assessment-overview) is an easy-to-configure service that can discover, track, and help you remediate potential database vulnerabilities. It provides visibility into your security state, and it includes actionable steps to resolve security issues and enhance your database fortifications.
2324
- [Advanced Threat Protection](threat-detection-overview.md) detects anomalous activities indicating unusual and potentially harmful attempts to access or exploit your database. It continuously monitors your database for suspicious activities, and it provides immediate security alerts on potential vulnerabilities, Azure SQL injection attacks, and anomalous database access patterns. Advanced Threat Protection alerts provide details of the suspicious activity and recommend action on how to investigate and mitigate the threat.
2425

25-
Enable Microsoft Defender for SQL once to enable all these included features. With one click, you can enable Microsoft Defender for all databases on your [server](logical-servers.md) in Azure or in your SQL Managed Instance. Enabling or managing Microsoft Defender for SQL settings requires belonging to the [SQL security manager](/azure/role-based-access-control/built-in-roles#sql-security-manager) role, or one of the database or server admin roles.
26+
Enable Microsoft Defender for SQL once to enable all these included features. With one select, you can enable Microsoft Defender for all databases on your [server](logical-servers.md) in Azure or in your SQL Managed Instance. Enabling or managing Microsoft Defender for SQL settings requires belonging to the [SQL security manager](/azure/role-based-access-control/built-in-roles#sql-security-manager) role, or one of the database or server admin roles.
2627

2728
For more information about Microsoft Defender for SQL pricing, see the [Microsoft Defender for Cloud pricing page](https://azure.microsoft.com/pricing/details/security-center/).
2829

@@ -46,15 +47,15 @@ To enable Microsoft Defender for Azure SQL Database at the subscription level fr
4647
1. Select the relevant subscription.
4748
1. Change the plan setting to **On**.
4849

49-
:::image type="content" source="media/azure-defender-for-sql/enable-azure-defender-sql-subscription-level.png" alt-text="Enabling Microsoft Defender for Azure SQL Database at the subscription level.":::
50+
:::image type="content" source="media/azure-defender-for-sql/defender-sql-subscription-level.png" alt-text="Screenshot showing enabling Microsoft Defender for Azure SQL Database at the subscription level." lightbox="media/azure-defender-for-sql/defender-sql-subscription-level.png":::
5051

5152
1. Select **Save**.
5253

53-
### Enable Microsoft Defender plans programatically
54+
### Enable Microsoft Defender plans programatically
5455

55-
The flexibility of Azure allows for a number of programmatic methods for enabling Microsoft Defender plans.
56+
The flexibility of Azure allows for several programmatic methods for enabling Microsoft Defender plans.
5657

57-
Use any of the following tools to enable Microsoft Defender for your subscription:
58+
Use any of the following tools to enable Microsoft Defender for your subscription:
5859

5960
| Method | Instructions |
6061
|--------------|----------------------|
@@ -63,7 +64,6 @@ Use any of the following tools to enable Microsoft Defender for your subscriptio
6364
| PowerShell | [Set-AzSecurityPricing](/powershell/module/az.security/set-azsecuritypricing) |
6465
| Azure Policy | [Bundle Pricings](https://github.com/Azure/Azure-Security-Center/blob/master/Pricing%20%26%20Settings/ARM%20Templates/Set-ASC-Bundle-Pricing.json) |
6566

66-
6767
### Enable Microsoft Defender for Azure SQL Database at the resource level
6868

6969
We recommend enabling Microsoft Defender plans at the subscription level so that new resources are automatically protected. However, if you have an organizational reason to enable Microsoft Defender for Cloud at the server level, use the following steps:
@@ -72,7 +72,7 @@ We recommend enabling Microsoft Defender plans at the subscription level so that
7272
1. Under the **Security** heading, select **Defender for Cloud**.
7373
1. Select **Enable Microsoft Defender for SQL**.
7474

75-
:::image type="content" source="media/azure-defender-for-sql/enable-azure-defender.png" alt-text="Enable Microsoft Defender for SQL from within Azure SQL databases.":::
75+
:::image type="content" source="media/azure-defender-for-sql/enable-defender-sql.png" alt-text="Screenshot showing Enable Microsoft Defender for SQL from within Azure SQL databases." lightbox="media/azure-defender-for-sql/enable-defender-sql.png":::
7676

7777
> [!NOTE]
7878
> A storage account is automatically created and configured to store your **Vulnerability Assessment** scan results. If you've already enabled Microsoft Defender for another server in the same resource group and region, then the existing storage account is used.
@@ -85,19 +85,18 @@ To view and manage Microsoft Defender for SQL settings:
8585

8686
1. From the **Security** area of your server or managed instance, select **Defender for Cloud**.
8787

88-
On this page, you'll see the status of Microsoft Defender for SQL:
88+
On this page, you'll see the status of Microsoft Defender for SQL(disabled or enabled):
8989

90-
:::image type="content" source="media/azure-defender-for-sql/status-of-defender-for-sql.png" alt-text="Checking the status of Microsoft Defender for SQL inside Azure SQL databases.":::
90+
:::image type="content" source="media/azure-defender-for-sql/enable-defender-sql-enabled-disabled.png" alt-text="Screenshot showing status as enabled or disabled." lightbox="media/azure-defender-for-sql/enable-defender-sql-enabled-disabled.png":::
9191

9292
1. If Microsoft Defender for SQL is enabled, you'll see a **Configure** link as shown in the previous graphic. To edit the settings for Microsoft Defender for SQL, select **Configure**.
9393

94-
:::image type="content" source="media/azure-defender-for-sql/security-server-settings.png" alt-text="Settings for Microsoft Defender for SQL.":::
94+
:::image type="content" source="media/azure-defender-for-sql/defender-sql-configure.png" alt-text="Screenshot showing Configure screen for Microsoft Defender for SQL." lightbox="media/azure-defender-for-sql/defender-sql-configure.png":::
9595

9696
1. Make the necessary changes and select **Save**.
9797

98-
9998
## Next steps
10099

101100
- Learn more about [Vulnerability Assessment](/azure/defender-for-cloud/sql-azure-vulnerability-assessment-overview)
102101
- Learn more about [Advanced Threat Protection](threat-detection-configure.md)
103-
- Learn more about [Microsoft Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction)
102+
- Learn more about [Microsoft Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction)
23.1 KB
Loading
73.9 KB
Loading
16.2 KB
Loading
88.9 KB
Loading
46.2 KB
Loading

azure-sql/database/sql-database-vulnerability-assessment-storage.md

Lines changed: 28 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -4,33 +4,34 @@ description: Provides instructions on how to store Vulnerability Assessment (VA)
44
ms.author: cesanu
55
author: CESANU
66
ms.reviewer: wiassaf, vanto, mathoma
7-
ms.date: 11/10/2021
7+
ms.date: 01/16/2023
88
ms.service: sql-db-mi
99
ms.subservice: security
1010
ms.topic: how-to
1111
monikerRange: "= azuresql || = azuresql-db || = azuresql-mi"
1212
---
1313

1414
# Store Vulnerability Assessment scan results in a storage account accessible behind firewalls and VNets
15+
1516
[!INCLUDE[appliesto-sqldb-sqlmi-asa](../includes/appliesto-sqldb-sqlmi-asa.md)]
1617

17-
If you are limiting access to your storage account in Azure for certain VNets or services, you'll need to enable the appropriate configuration so that Vulnerability Assessment (VA) scanning for SQL Databases or Managed Instances have access to that storage account.
18+
If you're limiting access to your storage account in Azure for certain VNets or services, you'll need to enable the appropriate configuration so that Vulnerability Assessment (VA) scanning for SQL Databases or Azure SQL Managed Instances have access to that storage account.
1819

1920
## Prerequisites
2021

21-
1. The SQL Vulnerability Assessment service needs permission to the storage account to save baseline and scan results. There are three methods:
22+
1. The SQL Vulnerability Assessment service needs permission to the storage account to save baseline and scan results. There are three methods:
23+
2224
- **Use Storage Account key**: Azure creates the SAS key and saves it (though we don't save the account key)
2325
- **Use Storage SAS key**: The SAS key must have: Write | List | Read | Delete permissions
2426
- **Use SQL Server managed identity**: The SQL Server must have a managed identity. The storage account must have a role assignment for the SQL Managed Identity as [Storage Blob Data Contributor](/azure/role-based-access-control/built-in-roles#storage-blob-data-contributor). When you apply the settings, the VA fields storageContainerSasKey and storageAccountAccessKey must be empty. When storage is behind a firewall or virtual network, then the SQL managed identity is required.
2527

28+
When you use the Azure portal to save SQL VA settings, Azure checks if you have permission to assign a new role assignment for the managed identity as [Storage Blob Data Contributor](/azure/role-based-access-control/built-in-roles#storage-blob-data-contributor) on the storage. If permissions are assigned, Azure uses SQL Server managed identity, otherwise Azure uses the key method.
2629

27-
When you use the Azure portal to save SQL VA settings, Azure checks if you have permission to assign a new role assignment for the managed identity as [Storage Blob Data Contributor](/azure/role-based-access-control/built-in-roles#storage-blob-data-contributor) on the storage. If permissions are assigned, Azure uses SQL Server managed identity, otherwise Azure uses the key method.
28-
29-
2. If using Azure Storage lifecycle management policies, avoid moving files on the container used by VA to the archive access tier. Reading scan results or baseline configurations stored in archive access tier is not supported.
30+
If using Azure Storage lifecycle management policies, avoid moving files on the container used by VA to the archive access tier. Reading scan results or baseline configurations stored in archive access tier isn't supported.
3031

3132
## Enable Azure SQL Database VA scanning access to the storage account
3233

33-
If you have configured your VA storage account to only be accessible by certain networks or services, you'll need to ensure that VA scans for your Azure SQL Database are able to store the scans on the storage account. You can use the existing storage account, or create a new storage account to store VA scan results for all databases on your [logical SQL server](logical-servers.md).
34+
If you've configured your VA storage account to only be accessible by certain networks or services, you'll need to ensure that VA scans for your Azure SQL Database are able to store the scans on the storage account. You can use the existing storage account, or create a new storage account to store VA scan results for all databases on your [logical SQL server](logical-servers.md).
3435

3536
> [!NOTE]
3637
> The vulnerability assessment service can't access storage accounts protected with firewalls or VNets if they require storage access keys.
@@ -39,40 +40,44 @@ Go to your **Resource group** that contains the storage account and access the *
3940

4041
Ensure that **Allow trusted Microsoft services access to this storage account** is checked.
4142

42-
:::image type="content" source="media/sql-database-vulnerability-assessment-storage/storage-allow-microsoft-services.png" alt-text="Screenshot shows Firewall and virtual networks dialog box, with Allow trusted Microsoft services to access this storage account selected.":::
43+
:::image type="content" source="media/sql-database-vulnerability-assessment-storage/storage-allow-microsoft-services.png" alt-text="Screenshot showing Firewall and virtual networks dialog box, with Allow trusted Microsoft services to access this storage account selected.":::
4344

44-
To find out which storage account is being used, go to your **SQL server** pane in the [Azure portal](https://portal.azure.com), under **Security**, and then select **Defender for Cloud**.
45+
To find out which storage account is being used, do the following steps:
4546

46-
:::image type="content" source="../database/media/azure-defender-for-sql/va-storage.png" alt-text="set up vulnerability assessment":::
47+
1. Go to your **SQL server** pane in the [Azure portal](https://portal.azure.com).
48+
1. Under **Security**, select **Defender for Cloud**.
49+
1. Select **Configure**.
50+
51+
:::image type="content" source="../database/media/azure-defender-for-sql/storage-account.png" alt-text="Screenshot showing setup vulnerability assessment.":::
4752

4853
> [!NOTE]
4954
> You can set up email alerts to notify users in your organization to view or access the scan reports. To do this, ensure that you have SQL Security Manager and Storage Blob Data Reader permissions.
5055
5156
## Store VA scan results for Azure SQL Managed Instance in a storage account that can be accessed behind a firewall or VNet
5257

53-
Since Managed Instance is not a trusted Microsoft Service and has a different VNet from the storage account, executing a VA scan will result in an error.
58+
Since Azure SQL Managed Instance isn't a trusted Microsoft Service and has a different VNet from the storage account, executing a VA scan will result in an error.
5459

55-
To support VA scans on Managed Instances, follow the below steps:
60+
To support VA scans on Azure SQL Managed Instances, follow the below steps:
5661

57-
1. In the **SQL managed instance** pane, under the **Overview** heading, click the **Virtual network/subnet** link. This takes you to the **Virtual network** pane.
62+
1. In the **SQL managed instance** pane, under the **Overview** heading, select the **Virtual network/subnet** link. This link takes you to the **Virtual network** pane.
5863

59-
:::image type="content" source="../managed-instance/media/public-endpoint-configure/mi-overview.png" alt-text="mi-overview2":::
64+
:::image type="content" source="../managed-instance/media/public-endpoint-configure/mi-overview.png" alt-text="Screenshot showing mi-overview2.":::
6065

61-
1. Under **Settings**, select **Subnets**. Click **Subnet** in the new pane to add a subnet, and delegate it to *Microsoft.Sql\managedInstance*. For more information, see [Manage subnets](/azure/virtual-network/virtual-network-manage-subnet).
66+
1. Under **Settings**, select **Subnets**. Select **Subnet** in the new pane to add a subnet, and delegate it to *Microsoft.Sql\managedInstance*. For more information, see [Manage subnets](/azure/virtual-network/virtual-network-manage-subnet).
6267

6368
:::image type="content" source="media/sql-database-vulnerability-assessment-storage/mi-subnets.png" alt-text="Screenshot shows a subnet that has been delegated Microsoft.sql\managedInstance.":::
6469

65-
1. In your **Virtual network** pane, under **Settings**, select **Service endpoints**. Click **Add** in the new pane, and add the *Microsoft.Storage* Service as a new service endpoint. Make sure the *ManagedInstance* Subnet is selected. Click **Add**.
70+
1. In your **Virtual network** pane, under **Settings**, select **Service endpoints**. Select **Add** in the new pane, and add the *Microsoft.Storage* Service as a new service endpoint. Make sure the *ManagedInstance* Subnet is selected. Select **Add**.
6671

6772
:::image type="content" source="media/sql-database-vulnerability-assessment-storage/mi-service-endpoint.png" alt-text="Screenshot shows Add service endpoints, where you add the Microsoft.Storage Service as an endpoint.":::
6873

69-
1. Go to your **Storage account** that you've selected to store your VA scans. Under **Settings**, select **Firewall and virtual networks**. Click on **Add existing virtual network**. Select your managed instance virtual network and subnet, and click **Add**.
74+
1. Go to your **Storage account** that you've selected to store your VA scans. Under **Settings**, select **Firewall and virtual networks**. Select **Add existing virtual network**. Select your managed instance virtual network and subnet, and then select **Add**.
7075

7176
:::image type="content" source="media/sql-database-vulnerability-assessment-storage/storage-firewall.png" alt-text="Screenshot shows the Firewalls and virtual networks pane, which contains the Add existing virtual network link.":::
7277

73-
You should now be able to store your VA scans for Managed Instances in your storage account.
78+
You should now be able to store your VA scans for Azure SQL Managed Instances in your storage account.
7479

75-
## Troubleshoot vulnerability assessment scan-related issues
80+
## Troubleshoot vulnerability assessment scan-related issues
7681

7782
Troubleshoot common issues related to vulnerability assessment scans.
7883

@@ -90,7 +95,7 @@ The storage account in which vulnerability assessment scan results are saved mus
9095

9196
If any of these requirements aren't met, saving changes to vulnerability assessment settings fails.
9297

93-
#### Permissions
98+
#### Permissions
9499

95100
The following permissions are required to save changes to vulnerability assessment settings:
96101

@@ -112,9 +117,9 @@ The storage account might not appear in the storage account picker for several r
112117

113118
### Failure to open an email link for scan results or can't view scan results
114119

115-
You might not be able to open a link in a notification email about scan results or to view scan results if you don't have the required permissions or if you use a browser that doesn't support opening or displaying scan results.
120+
You might not be able to open a link in a notification email about scan results, or to view scan results if you don't have the required permissions, or if you use a browser that doesn't support opening or displaying scan results.
116121

117-
#### Permissions
122+
#### Required permissions
118123

119124
The following permissions are required to open links in email notifications about scan results or to view scan results:
120125

@@ -129,4 +134,4 @@ The Firefox browser doesn't support opening or displaying scan results view. We
129134

130135
- [Vulnerability Assessment](/azure/defender-for-cloud/sql-azure-vulnerability-assessment-overview)
131136
- [Create an Azure Storage account](/azure/storage/common/storage-account-create)
132-
- [Microsoft Defender for SQL](azure-defender-for-sql.md)
137+
- [Microsoft Defender for SQL](azure-defender-for-sql.md)

0 commit comments

Comments
 (0)