E585 Merge pull request #25568 from MicrosoftDocs/main · Demivan/sql-docs@fe2ee99 · GitHub
[go: up one dir, main page]

Skip to content

Commit fe2ee99

Browse files
authored
Merge pull request #25568 from MicrosoftDocs/main
1/13/2023 PM Publish
2 parents 2634159 + 8ce9c8e commit fe2ee99

File tree

165 files changed

+423
-446
lines changed
  • reporting-services
  • sql-server
  • ssms
  • t-sql
  • Some content is hidden

    Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

    165 files changed

    +423
    -446
    lines changed

    azure-sql/database/azure-defender-for-sql.md

    Lines changed: 3 additions & 3 deletions
    Original file line numberDiff line numberDiff line change
    @@ -19,7 +19,7 @@ Microsoft Defender for SQL is a Defender plan in Microsoft Defender for Cloud. M
    1919
    ## What are the benefits of Microsoft Defender for SQL?
    2020

    2121
    Microsoft Defender for SQL provides a set of advanced SQL security capabilities, including SQL Vulnerability Assessment and Advanced Threat Protection.
    22-
    - [Vulnerability Assessment](sql-vulnerability-assessment.md) is an easy-to-configure service that can discover, track, and help you remediate potential database vulnerabilities. It provides visibility into your security state, and it includes actionable steps to resolve security issues and enhance your database fortifications.
    22+
    - [Vulnerability Assessment](/azure/defender-for-cloud/sql-azure-vulnerability-assessment-overview) is an easy-to-configure service that can discover, track, and help you remediate potential database vulnerabilities. It provides visibility into your security state, and it includes actionable steps to resolve security issues and enhance your database fortifications.
    2323
    - [Advanced Threat Protection](threat-detection-overview.md) detects anomalous activities indicating unusual and potentially harmful attempts to access or exploit your database. It continuously monitors your database for suspicious activities, and it provides immediate security alerts on potential vulnerabilities, Azure SQL injection attacks, and anomalous database access patterns. Advanced Threat Protection alerts provide details of the suspicious activity and recommend action on how to investigate and mitigate the threat.
    2424

    2525
    Enable Microsoft Defender for SQL once to enable all these included features. With one click, you can enable Microsoft Defender for all databases on your [server](logical-servers.md) in Azure or in your SQL Managed Instance. Enabling or managing Microsoft Defender for SQL settings requires belonging to the [SQL security manager](/azure/role-based-access-control/built-in-roles#sql-security-manager) role, or one of the database or server admin roles.
    @@ -98,6 +98,6 @@ To view and manage Microsoft Defender for SQL settings:
    9898

    9999
    ## Next steps
    100100

    101-
    - Learn more about [Vulnerability Assessment](sql-vulnerability-assessment.md)
    101+
    - Learn more about [Vulnerability Assessment](/azure/defender-for-cloud/sql-azure-vulnerability-assessment-overview)
    102102
    - Learn more about [Advanced Threat Protection](threat-detection-configure.md)
    103-
    - Learn more about [Microsoft Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction)
    103+
    - Learn more about [Microsoft Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction)

    azure-sql/database/connect-query-nodejs.md

    Lines changed: 1 addition & 1 deletion
    Original file line numberDiff line numberDiff line change
    @@ -32,7 +32,7 @@ To complete this quickstart, you need:
    3232
    | Action | SQL Database | SQL Managed Instance | SQL Server on Azure VM |
    3333
    |:--- |:--- |:---|:---|
    3434
    | Create| [Portal](single-database-create-quickstart.md) | [Portal](../managed-instance/instance-create-quickstart.md) | [Portal](../virtual-machines/windows/sql-vm-create-portal-quickstart.md)
    35-
    || [CLI](scripts/create-and-configure-database-cli.md) | [Bicep](/azure/azure-sql/managed-instance/create-bicep-quickstart) |
    35+
    || [CLI](scripts/create-and-configure-database-cli.md) | [Bicep](../managed-instance/create-bicep-quickstart.md) |
    3636
    || [PowerShell](scripts/create-and-configure-database-powershell.md) | [PowerShell](../managed-instance/scripts/create-configure-managed-instance-powershell.md) | [PowerShell](../virtual-machines/windows/sql-vm-create-powershell-quickstart.md)
    3737
    | Configure | [Server-level IP firewall rule](firewall-create-server-level-portal-quickstart.md)| [Connectivity from a VM](../managed-instance/connect-vm-instance-configure.md)|
    3838
    |||[Connectivity from on-premises](../managed-instance/point-to-site-p2s-configure.md) | [Connect to a SQL Server instance](../virtual-machines/windows/sql-vm-create-portal-quickstart.md)

    azure-sql/database/high-availability-sla.md

    Lines changed: 2 additions & 2 deletions
    Original file line numberDiff line numberDiff line change
    @@ -95,7 +95,7 @@ The zone-redundant version of the high availability architecture is illustrated
    9595
    - For zone redundant availability, choosing a [maintenance window](./maintenance-window.md) other than the default is currently available in [select regions](maintenance-window.md#azure-region-support).
    9696

    9797
    > [!IMPORTANT]
    98-
    > For zone redundant availability, choosing a [maintenance window](/azure/azure-sql/database/maintenance-window) other than the default is currently available in [select regions](/azure/azure-sql/database/maintenance-window?view=azuresql&preserve-view=true#azure-region-support).
    98+
    > For zone redundant availability, choosing a [maintenance window](./maintenance-window.md) other than the default is currently available in [select regions](./maintenance-window.md?preserve-view=true&view=azuresql#azure-region-support).
    9999
    100100
    During preview, zone redundancy for SQL Managed Instance is available in the Business Critical service tier and supported in the following regions:
    101101

    @@ -277,4 +277,4 @@ Azure SQL Database and Azure SQL Managed Instance feature a built-in high availa
    277277
    - Learn about [Service Fabric](/azure/service-fabric/service-fabric-overview)
    278278
    - Learn about [Azure Traffic Manager](/azure/traffic-manager/traffic-manager-overview)
    279279
    - Learn [How to initiate a manual failover on SQL Managed Instance](../managed-instance/user-initiated-failover.md)
    280-
    - For more options for high availability and disaster recovery, see [Business Continuity](business-continuity-high-availability-disaster-recover-hadr-overview.md)
    280+
    - For more options for high availability and disaster recovery, see [Business Continuity](business-continuity-high-availability-disaster-recover-hadr-overview.md)

    azure-sql/database/manage-data-after-migrating-to-database.md

    Lines changed: 1 addition & 1 deletion
    Original file line numberDiff line numberDiff line change
    @@ -234,7 +234,7 @@ With Query Performance Insights, you can get tailored recommendations for your d
    234234

    235235
    ### Security optimization
    236236

    237-
    SQL Database provides actionable security recommendations to help you secure your data and threat detection for identifying and investigating suspicious database activities that may pose a potential thread to the database. [Vulnerability assessment](sql-vulnerability-assessment.md) is a database scanning and reporting service that allows you to monitor the security state of your databases at scale and identify security risks and drift from a security baseline defined by you. After every scan, a customized list of actionable steps and remediation scripts is provided, as well as an assessment report that can be used to help meet compliance requirements.
    237+
    SQL Database provides actionable security recommendations to help you secure your data and threat detection for identifying and investigating suspicious database activities that may pose a potential thread to the database. [Vulnerability assessment](/azure/defender-for-cloud/sql-azure-vulnerability-assessment-overview) is a database scanning and reporting service that allows you to monitor the security state of your databases at scale and identify security risks and drift from a security baseline defined by you. After every scan, a customized list of actionable steps and remediation scripts is provided, as well as an assessment report that can be used to help meet compliance requirements.
    238238

    239239
    With Microsoft Defender for Cloud, you identify the security recommendations across the board and quickly apply them.
    240240

    azure-sql/database/outbound-firewall-rule-overview.md

    Lines changed: 2 additions & 2 deletions
    Original file line numberDiff line numberDiff line change
    @@ -17,7 +17,7 @@ ms.topic: conceptual
    1717
    Outbound firewall rules limit network traffic from the Azure SQL [logical server](logical-servers.md) to a customer defined list of Azure Storage accounts and Azure SQL logical servers. Any attempt to access storage accounts or databases not in this list is denied. The following [Azure SQL Database](sql-database-paas-overview.md) features support this feature:
    1818

    1919
    - [Auditing](auditing-overview.md)
    20-
    - [Vulnerability assessment](sql-vulnerability-assessment.md)
    20+
    - [Vulnerability assessment](/azure/defender-for-cloud/sql-azure-vulnerability-assessment-overview)
    2121
    - [Import/Export service](database-import-export-azure-services-off.md)
    2222
    - [OPENROWSET](/sql/t-sql/functions/openrowset-transact-sql)
    2323
    - [Bulk Insert](/sql/t-sql/statements/bulk-insert-transact-sql)
    @@ -122,4 +122,4 @@ az sql server outbound-firewall-rule delete -g sql-server-group -s sql-server-na
    122122
    [1]: media/outbound-firewall-rules/Step1.jpg
    123123
    [2]: media/outbound-firewall-rules/Step2.jpg
    124124
    [3]: media/outbound-firewall-rules/Step3.jpg
    125-
    [4]: media/outbound-firewall-rules/Step4.jpg
    125+
    [4]: media/outbound-firewall-rules/Step4.jpg

    azure-sql/database/security-best-practice.md

    Lines changed: 2 additions & 2 deletions
    Original file line numberDiff line numberDiff line change
    @@ -714,7 +714,7 @@ Proactively improve your database security by discovering and remediating potent
    714714
    **Further resources**
    715715

    716716
    - [SQL Vulnerability Assessment](/sql/relational-databases/security/sql-vulnerability-assessment)
    717-
    - [SQL Vulnerability Assessment service helps you identify database vulnerabilities](sql-vulnerability-assessment.md)
    717+
    - [SQL Vulnerability Assessment service helps you identify database vulnerabilities](/azure/defender-for-cloud/sql-azure-vulnerability-assessment-overview)
    718718

    719719
    ### Identify and tag sensitive data
    720720

    @@ -801,4 +801,4 @@ Most security standards address data availability in terms of operational contin
    801801

    802802
    ## Next steps
    803803

    804-
    - See [An overview of Azure SQL Database security capabilities](security-overview.md)
    804+
    - See [An overview of Azure SQL Database security capabilities](security-overview.md)

    azure-sql/database/security-overview.md

    Lines changed: 1 addition & 1 deletion
    Original file line numberDiff line numberDiff line change
    @@ -135,7 +135,7 @@ Dynamic data masking limits sensitive data exposure by masking it to non-privile
    135135

    136136
    ### Vulnerability assessment
    137137

    138-
    [Vulnerability assessment](sql-vulnerability-assessment.md) is an easy to configure service that can discover, track, and help remediate potential database vulnerabilities with the goal to proactively improve overall database security. Vulnerability assessment (VA) is part of the Microsoft Defender for SQL offering, which is a unified package for advanced SQL security capabilities. Vulnerability assessment can be accessed and managed via the central Microsoft Defender for SQL portal.
    138+
    [Vulnerability assessment](/azure/defender-for-cloud/sql-azure-vulnerability-assessment-overview) is an easy to configure service that can discover, track, and help remediate potential database vulnerabilities with the goal to proactively improve overall database security. Vulnerability assessment (VA) is part of the Microsoft Defender for SQL offering, which is a unified package for advanced SQL security capabilities. Vulnerability assessment can be accessed and managed via the central Microsoft Defender for SQL portal.
    139139

    140140
    ### Data discovery and classification
    141141

    azure-sql/database/sql-database-paas-overview.md

    Lines changed: 2 additions & 2 deletions
    Original file line numberDiff line numberDiff line change
    @@ -174,7 +174,7 @@ SQL Database provides a range of [built-in security and compliance features](/az
    174174

    175175
    Microsoft Defender for SQL is a unified package for advanced SQL security capabilities. It includes functionality for managing your database vulnerabilities, and detecting anomalous activities that might indicate a threat to your database. It provides a single location for enabling and managing these capabilities.
    176176

    177-
    - [Vulnerability assessment](sql-vulnerability-assessment.md):
    177+
    - [Vulnerability assessment](/azure/defender-for-cloud/sql-azure-vulnerability-assessment-overview):
    178178

    179179
    This service can discover, track, and help you remediate potential database vulnerabilities. It provides visibility into your security state, and includes actionable steps to resolve security issues, and enhance your database fortifications.
    180180
    - [Threat detection](threat-detection-configure.md):
    @@ -245,4 +245,4 @@ Patching is generally not noticeable if you [employ retry logic](develop-overvie
    245245
    - [Azure PowerShell samples for SQL Database](powershell-script-content-guide.md)
    246246

    247247
    - For information about new capabilities as they're announced, see [Azure Roadmap for SQL Database](https://azure.microsoft.com/roadmap/?category=databases).
    248-
    - See the [Azure SQL Database blog](https://azure.microsoft.com/blog/topics/database), where SQL Server product team members blog about SQL Database news and features.
    248+
    - See the [Azure SQL Database blog](https://azure.microsoft.com/blog/topics/database), where SQL Server product team members blog about SQL Database news and features.

    azure-sql/database/sql-database-vulnerability-assessment-rules-changelog.md

    Lines changed: 2 additions & 2 deletions
    Original file line numberDiff line numberDiff line change
    @@ -103,5 +103,5 @@ This article details the changes made to the SQL Vulnerability Assessment servic
    103103
    ## Next steps
    104104

    105105
    - [SQL Vulnerability Assessment rules](sql-database-vulnerability-assessment-rules.md)
    106-
    - [SQL Vulnerability Assessment overview](sql-vulnerability-assessment.md)
    107-
    - [Store Vulnerability Assessment scan results in a storage account accessible behind firewalls and VNets](sql-database-vulnerability-assessment-storage.md)
    106+
    - [SQL Vulnerability Assessment overview](/azure/defender-for-cloud/sql-azure-vulnerability-assessment-overview)
    107+
    - [Store Vulnerability Assessment scan results in a storage account accessible behind firewalls and VNets](sql-database-vulnerability-assessment-storage.md)

    azure-sql/database/sql-database-vulnerability-assessment-rules.md

    Lines changed: 2 additions & 2 deletions
    Original file line numberDiff line numberDiff line change
    @@ -18,7 +18,7 @@ This article lists the set of built-in rules that are used to flag security vuln
    1818

    1919
    The rules shown in your database scans depend on the SQL version and platform that was scanned.
    2020

    21-
    To learn about how to implement Vulnerability Assessment in Azure, see [Implement Vulnerability Assessment](./sql-vulnerability-assessment.md#configure-vulnerability-assessment).
    21+
    To learn about how to implement Vulnerability Assessment in Azure, see [Implement Vulnerability Assessment](/azure/defender-for-cloud/sql-azure-vulnerability-assessment-overview#configure-vulnerability-assessment).
    2222

    2323
    For a list of changes to these rules, see [SQL Vulnerability Assessment rules changelog](sql-database-vulnerability-assessment-rules-changelog.md).
    2424

    @@ -196,5 +196,5 @@ SQL Vulnerability Assessment rules have five categories, which are in the follow
    196196

    197197
    ## Next steps
    198198

    199-
    - [Vulnerability Assessment](sql-vulnerability-assessment.md)
    199+
    - [Vulnerability Assessment](/azure/defender-for-cloud/sql-azure-vulnerability-assessment-overview)
    200200
    - [SQL Vulnerability Assessment rules changelog](sql-database-vulnerability-assessment-rules-changelog.md)

    0 commit comments

    Comments
     (0)
    0