Επεξεργασία

Κοινή χρήση μέσω


Enable vulnerability assessment on your Azure SQL databases classic configuration

In this article, you learn how to enable vulnerability assessment classic, so you can find and remediate database vulnerabilities. We recommend that you enable vulnerability assessment using the express configuration so you aren't dependent on a storage account.

Prerequisites

Enable vulnerability assessment classic configuration

When you enable the Defender for Azure SQL plan in Defender for Cloud, Defender for Cloud automatically enables Advanced Threat Protection and vulnerability assessment with the classic configuration for all Azure SQL databases in the selected subscription.

When you enable the Defender for Azure SQL plan in Defender for Cloud, Defender for Cloud automatically enables Advanced Threat Protection and vulnerability assessment with the express configuration for all Azure SQL databases in the selected subscription.

If you have Azure SQL databases with vulnerability assessment enabled in the classic configuration, you can enable the express configuration so that assessments don't require a storage account.

If you have Azure SQL databases with vulnerability assessment disabled, you can enable vulnerability assessment with the classic configuration.

To enable vulnerability assessment with a storage account, use the classic configuration:

  1. In the Azure portal, open the specific resource in Azure SQL Database, SQL Managed Instance Database, or Azure Synapse.

  2. Under the Security heading, select Defender for Cloud.

  3. Select Configure on the link to open the Microsoft Defender for SQL settings pane for either the entire server or managed instance.

    Screenshot of the Defender for SQL configuration.

  4. In the Server settings page, enter the Microsoft Defender for SQL settings:

    Screenshot of configuring the SQL vulnerability assessment scans.

    1. Configure a storage account where your scan results for all databases on the server or managed instance will be stored. For information about storage accounts, see About Azure storage accounts.

    2. To configure vulnerability assessments to automatically run weekly scans to detect security misconfigurations, set Periodic recurring scans to On. The results are sent to the email addresses you provide in Send scan reports to. You can also send email notification to admins and subscription owners by enabling Also send email notification to admins and subscription owners.

    Note

    Each database is randomly assigned a scan time on a set day of the week. Email notifications are scheduled randomly per server on a set day of the week. The email notification report includes data from all recurring database scans that were executed during the preceding week (does not include on-demand scans).

Learn more about: