Skip to content

Commit fb5a609

Browse files
authored
Merge pull request #25529 from cmcclister/cm-linkfix-20230112-0
LinkFix: sql-docs-pr (2023-01) - 0
2 parents 14fbeb1 + 307080c commit fb5a609

50 files changed

Lines changed: 102 additions & 116 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

azure-sql/database/azure-defender-for-sql.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ Microsoft Defender for SQL is a Defender plan in Microsoft Defender for Cloud. M
1919
## What are the benefits of Microsoft Defender for SQL?
2020

2121
Microsoft Defender for SQL provides a set of advanced SQL security capabilities, including SQL Vulnerability Assessment and Advanced Threat Protection.
22-
- [Vulnerability Assessment](sql-vulnerability-assessment.md) is an easy-to-configure service that can discover, track, and help you remediate potential database vulnerabilities. It provides visibility into your security state, and it includes actionable steps to resolve security issues and enhance your database fortifications.
22+
- [Vulnerability Assessment](/azure/defender-for-cloud/sql-azure-vulnerability-assessment-overview) is an easy-to-configure service that can discover, track, and help you remediate potential database vulnerabilities. It provides visibility into your security state, and it includes actionable steps to resolve security issues and enhance your database fortifications.
2323
- [Advanced Threat Protection](threat-detection-overview.md) detects anomalous activities indicating unusual and potentially harmful attempts to access or exploit your database. It continuously monitors your database for suspicious activities, and it provides immediate security alerts on potential vulnerabilities, Azure SQL injection attacks, and anomalous database access patterns. Advanced Threat Protection alerts provide details of the suspicious activity and recommend action on how to investigate and mitigate the threat.
2424

2525
Enable Microsoft Defender for SQL once to enable all these included features. With one click, you can enable Microsoft Defender for all databases on your [server](logical-servers.md) in Azure or in your SQL Managed Instance. Enabling or managing Microsoft Defender for SQL settings requires belonging to the [SQL security manager](/azure/role-based-access-control/built-in-roles#sql-security-manager) role, or one of the database or server admin roles.
@@ -98,6 +98,6 @@ To view and manage Microsoft Defender for SQL settings:
9898

9999
## Next steps
100100

101-
- Learn more about [Vulnerability Assessment](sql-vulnerability-assessment.md)
101+
- Learn more about [Vulnerability Assessment](/azure/defender-for-cloud/sql-azure-vulnerability-assessment-overview)
102102
- Learn more about [Advanced Threat Protection](threat-detection-configure.md)
103-
- Learn more about [Microsoft Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction)
103+
- Learn more about [Microsoft Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction)

azure-sql/database/connect-query-nodejs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ To complete this quickstart, you need:
3232
| Action | SQL Database | SQL Managed Instance | SQL Server on Azure VM |
3333
|:--- |:--- |:---|:---|
3434
| Create| [Portal](single-database-create-quickstart.md) | [Portal](../managed-instance/instance-create-quickstart.md) | [Portal](../virtual-machines/windows/sql-vm-create-portal-quickstart.md)
35-
|| [CLI](scripts/create-and-configure-database-cli.md) | [Bicep](/azure/azure-sql/managed-instance/create-bicep-quickstart) |
35+
|| [CLI](scripts/create-and-configure-database-cli.md) | [Bicep](../managed-instance/create-bicep-quickstart.md) |
3636
|| [PowerShell](scripts/create-and-configure-database-powershell.md) | [PowerShell](../managed-instance/scripts/create-configure-managed-instance-powershell.md) | [PowerShell](../virtual-machines/windows/sql-vm-create-powershell-quickstart.md)
3737
| Configure | [Server-level IP firewall rule](firewall-create-server-level-portal-quickstart.md)| [Connectivity from a VM](../managed-instance/connect-vm-instance-configure.md)|
3838
|||[Connectivity from on-premises](../managed-instance/point-to-site-p2s-configure.md) | [Connect to a SQL Server instance](../virtual-machines/windows/sql-vm-create-portal-quickstart.md)

azure-sql/database/high-availability-sla.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -95,7 +95,7 @@ The zone-redundant version of the high availability architecture is illustrated
9595
- For zone redundant availability, choosing a [maintenance window](./maintenance-window.md) other than the default is currently available in [select regions](maintenance-window.md#azure-region-support).
9696

9797
> [!IMPORTANT]
98-
> For zone redundant availability, choosing a [maintenance window](/azure/azure-sql/database/maintenance-window) other than the default is currently available in [select regions](/azure/azure-sql/database/maintenance-window?view=azuresql&preserve-view=true#azure-region-support).
98+
> For zone redundant availability, choosing a [maintenance window](./maintenance-window.md) other than the default is currently available in [select regions](./maintenance-window.md?preserve-view=true&view=azuresql#azure-region-support).
9999
100100
During preview, zone redundancy for SQL Managed Instance is available in the Business Critical service tier and supported in the following regions:
101101

@@ -277,4 +277,4 @@ Azure SQL Database and Azure SQL Managed Instance feature a built-in high availa
277277
- Learn about [Service Fabric](/azure/service-fabric/service-fabric-overview)
278278
- Learn about [Azure Traffic Manager](/azure/traffic-manager/traffic-manager-overview)
279279
- Learn [How to initiate a manual failover on SQL Managed Instance](../managed-instance/user-initiated-failover.md)
280-
- For more options for high availability and disaster recovery, see [Business Continuity](business-continuity-high-availability-disaster-recover-hadr-overview.md)
280+
- For more options for high availability and disaster recovery, see [Business Continuity](business-continuity-high-availability-disaster-recover-hadr-overview.md)

azure-sql/database/manage-data-after-migrating-to-database.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -234,7 +234,7 @@ With Query Performance Insights, you can get tailored recommendations for your d
234234

235235
### Security optimization
236236

237-
SQL Database provides actionable security recommendations to help you secure your data and threat detection for identifying and investigating suspicious database activities that may pose a potential thread to the database. [Vulnerability assessment](sql-vulnerability-assessment.md) is a database scanning and reporting service that allows you to monitor the security state of your databases at scale and identify security risks and drift from a security baseline defined by you. After every scan, a customized list of actionable steps and remediation scripts is provided, as well as an assessment report that can be used to help meet compliance requirements.
237+
SQL Database provides actionable security recommendations to help you secure your data and threat detection for identifying and investigating suspicious database activities that may pose a potential thread to the database. [Vulnerability assessment](/azure/defender-for-cloud/sql-azure-vulnerability-assessment-overview) is a database scanning and reporting service that allows you to monitor the security state of your databases at scale and identify security risks and drift from a security baseline defined by you. After every scan, a customized list of actionable steps and remediation scripts is provided, as well as an assessment report that can be used to help meet compliance requirements.
238238

239239
With Microsoft Defender for Cloud, you identify the security recommendations across the board and quickly apply them.
240240

azure-sql/database/outbound-firewall-rule-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.topic: conceptual
1717
Outbound firewall rules limit network traffic from the Azure SQL [logical server](logical-servers.md) to a customer defined list of Azure Storage accounts and Azure SQL logical servers. Any attempt to access storage accounts or databases not in this list is denied. The following [Azure SQL Database](sql-database-paas-overview.md) features support this feature:
1818

1919
- [Auditing](auditing-overview.md)
20-
- [Vulnerability assessment](sql-vulnerability-assessment.md)
20+
- [Vulnerability assessment](/azure/defender-for-cloud/sql-azure-vulnerability-assessment-overview)
2121
- [Import/Export service](database-import-export-azure-services-off.md)
2222
- [OPENROWSET](/sql/t-sql/functions/openrowset-transact-sql)
2323
- [Bulk Insert](/sql/t-sql/statements/bulk-insert-transact-sql)
@@ -122,4 +122,4 @@ az sql server outbound-firewall-rule delete -g sql-server-group -s sql-server-na
122122
[1]: media/outbound-firewall-rules/Step1.jpg
123123
[2]: media/outbound-firewall-rules/Step2.jpg
124124
[3]: media/outbound-firewall-rules/Step3.jpg
125-
[4]: media/outbound-firewall-rules/Step4.jpg
125+
[4]: media/outbound-firewall-rules/Step4.jpg

azure-sql/database/security-best-practice.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -714,7 +714,7 @@ Proactively improve your database security by discovering and remediating potent
714714
**Further resources**
715715

716716
- [SQL Vulnerability Assessment](/sql/relational-databases/security/sql-vulnerability-assessment)
717-
- [SQL Vulnerability Assessment service helps you identify database vulnerabilities](sql-vulnerability-assessment.md)
717+
- [SQL Vulnerability Assessment service helps you identify database vulnerabilities](/azure/defender-for-cloud/sql-azure-vulnerability-assessment-overview)
718718

719719
### Identify and tag sensitive data
720720

@@ -801,4 +801,4 @@ Most security standards address data availability in terms of operational contin
801801

802802
## Next steps
803803

804-
- See [An overview of Azure SQL Database security capabilities](security-overview.md)
804+
- See [An overview of Azure SQL Database security capabilities](security-overview.md)

azure-sql/database/security-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -135,7 +135,7 @@ Dynamic data masking limits sensitive data exposure by masking it to non-privile
135135

136136
### Vulnerability assessment
137137

138-
[Vulnerability assessment](sql-vulnerability-assessment.md) is an easy to configure service that can discover, track, and help remediate potential database vulnerabilities with the goal to proactively improve overall database security. Vulnerability assessment (VA) is part of the Microsoft Defender for SQL offering, which is a unified package for advanced SQL security capabilities. Vulnerability assessment can be accessed and managed via the central Microsoft Defender for SQL portal.
138+
[Vulnerability assessment](/azure/defender-for-cloud/sql-azure-vulnerability-assessment-overview) is an easy to configure service that can discover, track, and help remediate potential database vulnerabilities with the goal to proactively improve overall database security. Vulnerability assessment (VA) is part of the Microsoft Defender for SQL offering, which is a unified package for advanced SQL security capabilities. Vulnerability assessment can be accessed and managed via the central Microsoft Defender for SQL portal.
139139

140140
### Data discovery and classification
141141

azure-sql/database/sql-database-paas-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -174,7 +174,7 @@ SQL Database provides a range of [built-in security and compliance features](/az
174174

175175
Microsoft Defender for SQL is a unified package for advanced SQL security capabilities. It includes functionality for managing your database vulnerabilities, and detecting anomalous activities that might indicate a threat to your database. It provides a single location for enabling and managing these capabilities.
176176

177-
- [Vulnerability assessment](sql-vulnerability-assessment.md):
177+
- [Vulnerability assessment](/azure/defender-for-cloud/sql-azure-vulnerability-assessment-overview):
178178

179179
This service can discover, track, and help you remediate potential database vulnerabilities. It provides visibility into your security state, and includes actionable steps to resolve security issues, and enhance your database fortifications.
180180
- [Threat detection](threat-detection-configure.md):
@@ -245,4 +245,4 @@ Patching is generally not noticeable if you [employ retry logic](develop-overvie
245245
- [Azure PowerShell samples for SQL Database](powershell-script-content-guide.md)
246246

247247
- For information about new capabilities as they're announced, see [Azure Roadmap for SQL Database](https://azure.microsoft.com/roadmap/?category=databases).
248-
- See the [Azure SQL Database blog](https://azure.microsoft.com/blog/topics/database), where SQL Server product team members blog about SQL Database news and features.
248+
- See the [Azure SQL Database blog](https://azure.microsoft.com/blog/topics/database), where SQL Server product team members blog about SQL Database news and features.

azure-sql/database/sql-database-vulnerability-assessment-rules-changelog.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -103,5 +103,5 @@ This article details the changes made to the SQL Vulnerability Assessment servic
103103
## Next steps
104104

105105
- [SQL Vulnerability Assessment rules](sql-database-vulnerability-assessment-rules.md)
106-
- [SQL Vulnerability Assessment overview](sql-vulnerability-assessment.md)
107-
- [Store Vulnerability Assessment scan results in a storage account accessible behind firewalls and VNets](sql-database-vulnerability-assessment-storage.md)
106+
- [SQL Vulnerability Assessment overview](/azure/defender-for-cloud/sql-azure-vulnerability-assessment-overview)
107+
- [Store Vulnerability Assessment scan results in a storage account accessible behind firewalls and VNets](sql-database-vulnerability-assessment-storage.md)

azure-sql/database/sql-database-vulnerability-assessment-rules.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ This article lists the set of built-in rules that are used to flag security vuln
1818

1919
The rules shown in your database scans depend on the SQL version and platform that was scanned.
2020

21-
To learn about how to implement Vulnerability Assessment in Azure, see [Implement Vulnerability Assessment](./sql-vulnerability-assessment.md#configure-vulnerability-assessment).
21+
To learn about how to implement Vulnerability Assessment in Azure, see [Implement Vulnerability Assessment](/azure/defender-for-cloud/sql-azure-vulnerability-assessment-overview#configure-vulnerability-assessment).
2222

2323
For a list of changes to these rules, see [SQL Vulnerability Assessment rules changelog](sql-database-vulnerability-assessment-rules-changelog.md).
2424

@@ -196,5 +196,5 @@ SQL Vulnerability Assessment rules have five categories, which are in the follow
196196

197197
## Next steps
198198

199-
- [Vulnerability Assessment](sql-vulnerability-assessment.md)
199+
- [Vulnerability Assessment](/azure/defender-for-cloud/sql-azure-vulnerability-assessment-overview)
200200
- [SQL Vulnerability Assessment rules changelog](sql-database-vulnerability-assessment-rules-changelog.md)

0 commit comments

Comments
 (0)