Az 3.0.0 的移轉指南
本文件說明 Az 2.0.0 和 3.0.0 版本之間的變更
- Az 3.0.0 的遷移指南
- 批次
- 計算
- HDInsight
- IotHub
- RecoveryServices
-
資源
-
與舊版
Az.Batch
不相容
-
與舊版
- ServiceFabric
-
Sql
Get-AzSqlDatabaseSecureConnectionPolicy
Get-AzSqlDatabaseIndexRecommendations
Get-AzSqlDatabaseRestorePoints
Get-AzSqlDatabaseAuditing
Set-AzSqlDatabaseAuditing
Get-AzSqlServerAuditing
Set-AzSqlServerAuditing
Get-AzSqlServerAdvancedThreatProtectionSettings
Clear-AzSqlServerAdvancedThreatProtectionSettings
Update-AzSqlServerAdvancedThreatProtectionSettings
Get-AzSqlDatabaseAdvancedThreatProtectionSettings
Update-AzSqlDatabaseAdvancedThreatProtectionSettings
Clear-AzSqlDatabaseAdvancedThreatProtectionSettings
Update-AzSqlDatabaseVulnerabilityAssessmentSettings
Get-AzSqlDatabaseVulnerabilityAssessmentSettings
Clear-AzSqlDatabaseVulnerabilityAssessmentSettings
Update-AzSqlInstanceDatabaseVulnerabilityAssessmentSettings
Get-AzSqlInstanceDatabaseVulnerabilityAssessmentSettings
Clear-AzSqlInstanceDatabaseVulnerabilityAssessmentSettings
Update-AzSqlInstanceVulnerabilityAssessmentSettings
Get-AzSqlInstanceVulnerabilityAssessmentSettings
Clear-AzSqlInstanceVulnerabilityAssessmentSettings
Update-AzSqlServerVulnerabilityAssessmentSettings
Get-AzSqlServerVulnerabilityAssessmentSettings
Clear-AzSqlServerVulnerabilityAssessmentSettings
Get-AzSqlServerAdvancedThreatProtectionPolicy
Get-AzSqlServerThreatDetectionPolicy
Remove-AzSqlServerThreatDetectionPolicy
Set-AzSqlServerThreatDetectionPolicy
Get-AzSqlDatabaseThreatDetectionPolicy
Set-AzSqlDatabaseThreatDetectionPolicy
Remove-AzSqlDatabaseThreatDetectionPolicy
批
Get-AzBatchNodeAgentSku
- 已移除
Get-AzBatchNodeAgentSku
,並將它取代為Get-AzBatchSupportedImage
。 -
Get-AzBatchSupportedImage
會傳回與Get-AzBatchNodeAgentSku
相同的數據,但格式較易記。 - 現在也會傳回新的未驗證映像。 也會包含每個影像
Capabilities
和BatchSupportEndOfLife
的其他資訊。
以前
$Context = Get-AzBatchAccountKeys -AccountName "ContosoBatchAccount"
Get-AzBatchNodeAgentSku -BatchContext $Context
後
$Context = Get-AzBatchAccountKey -AccountName "ContosoBatchAccount"
Get-AzBatchSupportedImage -BatchContext $Context
舊版與 Az.Resources 模組不相容
'Az.Batch' 模組的版本 2.0.1 與 'Az.Resources' 模組的舊版(1.7.0 版或更早版本)不相容。 匯入 『Az.Batch』 模組 2.0.1 版時,這會導致無法匯入 'Az.Resources' 模組 1.7.0 版。 若要修正此問題,只要將 'Az.Resources' 模組更新為 1.7.1 版或更新版本,或只是安裝最新版的 'Az' 模組即可。
計算
New-AzDiskConfig
當 CreateOption 為 Upload 時,會使用 UploadSizeInBytes
參數,而不是 New-AzDiskConfig
DiskSizeGB
以前
$diskconfig = New-AzDiskConfig -Location 'Central US' -DiskSizeGB 1023 -SkuName Standard_LRS -OsType Windows -CreateOption Upload -DiskIOPSReadWrite 500 -DiskMBpsReadWrite 8
之後
$diskconfig = New-AzDiskConfig -Location 'Central US' -UploadSizeInBytes 1023 * 1024 * 1024 * 1024 -SkuName Standard_LRS -OsType Windows -CreateOption Upload -DiskIOPSReadWrite 500 -DiskMBpsReadWrite 8
HDInsight
Get-AzHDInsightJobOutput
- 已更新
Get-AzHDInsightJobOutput
Cmdlet,以支援對記憶體金鑰的細微角色型存取。 - 具有 HDInsight 叢集作員、參與者或擁有者角色的使用者將不會受到影響。
- 只有讀取者角色的用戶必須明確指定
DefaultStorageAccountKey
參數。
以前
Get-AzHDInsightJobOutput -ClusterName $clusterName -JobId $jobId
之後
Get-AzHDInsightJobOutput -ClusterName $clusterName -JobId $jobId -DefaultStorageAccountKey $storageAccountKey
Add-AzHDInsightConfigValues
Cmdlet Add-AzHDInsightConfigValue
移除了與 Add-AzHDInsightConfigValues
相關的別名。
以前
使用已被取代的別名
Add-AzHDInsightConfigValues
後
Add-AzHDInsightConfigValue
Disable-AzHDInsightMonitoring
已新增 Disable-AzHDInsightMonitoring
Cmdlet。 使用此 Cmdlet 來停用 HDInsight 叢集中的監視(取代 Disable-AzHDInsightOperationsManagementSuite
和 Disable-AzHDInsightOMS
)。
以前
Disable-AzHDInsightOMS -Name testcluster
Disable-AzHDInsightOperationsManagementSuite -Name testcluster
後
Disable-AzHDInsightMonitoring -Name testcluster
Enable-AzHDInsightMonitoring
已新增 Enable-AzHDInsightMonitoring
Cmdlet。 使用此 Cmdlet 在 HDInsight 叢集中啟用監視功能(取代 Enable-AzHDInsightOperationsManagementSuite
和 Enable-AzHDInsightOMS
)。
以前
Enable-AzHDInsightOMS Enable-AzHDInsightMonitoring -Name testcluster -WorkspaceId 1d364e89-bb71-4503-aa3d-a23535aea7bd -PrimaryKey <key for workspace 1d364e89-bb71-4503-aa3d-a23535aea7bd>
Enable-AzHDInsightOperationsManagementSuite Enable-AzHDInsightMonitoring -Name testcluster -WorkspaceId 1d364e89-bb71-4503-aa3d-a23535aea7bd -PrimaryKey <key for workspace 1d364e89-bb71-4503-aa3d-a23535aea7bd>
之後
Enable-AzHDInsightMonitoring Enable-AzHDInsightMonitoring -Name testcluster -WorkspaceId 1d364e89-bb71-4503-aa3d-a23535aea7bd -PrimaryKey <key for workspace 1d364e89-bb71-4503-aa3d-a23535aea7bd>
Get-AzHDInsightMonitoring
已新增 Get-AzHDInsightMonitoring
Cmdlet。 使用此 Cmdlet 取得 Azure HDInsight 叢集中監視安裝的狀態(取代 Get-AzHDInsightOperationsManagementSuite
和 Get-AzHDInsightOMS
)。
以前
Get-AzHDInsightOMS -Name testcluster
Get-AzHDInsightOperationsManagementSuite -Name testcluster
之後
Get-AzHDInsightMonitoring -Name testcluster
Get-AzHDInsightProperty
Cmdlet Get-HDInsightProperty
移除了指向 Get-AzHDInsightProperties
的別名。
以前
使用已被取代的別名
Get-AzHDInsightProperties -Location "East US 2"
之後
Get-AzHDInsightProperty -Location "East US 2"
Grant-AzHDInsightRdpServicesAccess
已移除 Grant-AzHDInsightRdpServicesAccess
和 Revoke-AzHDInsightRdpServicesAccess
Cmdlet。 因為不支援使用 Windows OS 類型的叢集,因此不再需要這些專案。 請改用LinuxOS類型建立叢集。
Remove-AzHDInsightCluster
Remove-AzHDInsightCluster
的輸出類型已從 Microsoft.Azure.Management.HDInsight.Models.ClusterGetResponse
變更為 bool
。
以前
$cluster = Remove-AzHDInsightCluster -ClusterName "your-hadoop-001"
之後
Remove-AzHDInsightCluster -ClusterName "your-hadoop-001" -PassThru
True
Revoke-AzHDInsightRdpServicesAccess
Cmdlet 已被棄用。 它是無可替代的。
Set-AzHDInsightGatewayCredential
Set-AzHDInsightGatewayCredential
的輸出類型已從 HttpConnectivitySettings
變更為 AzureHDInsightGatewaySettings
。
IotHub
New-AzIotHubImportDevices
拿掉此別名,請改用 New-AzIotHubImportDevice
。
以前
New-AzIotHubImportDevices -ResourceGroupName "myresourcegroup" -Name "myiothub" -InputBlobContainerUri "https://mystorageaccount.blob.core.windows.net/mystoragecontainer?sv=2015-04-05&ss=bfqt&sr=c&srt=sco&sp=rwdl&se=2016-10-27T04:01:48Z&st=2016-10-26T20:01:48Z&spr=https&sig=QqpIhHsIMF8hNuFO%3D" -OutputBlobContainerUri "https://mystorageaccount.blob.core.windows.net/?sv=2015-04-05&ss=bfqt&sr=c&srt=sco&sp=rwdl&se=2016-10-27T04:01:48Z&st=2016-10-26T20:01:48Z&spr=https&sig=QqpIhHsIMF8hNuFO%3D"
之後
New-AzIotHubImportDevice -ResourceGroupName "myresourcegroup" -Name "myiothub" -InputBlobContainerUri "https://mystorageaccount.blob.core.windows.net/mystoragecontainer?sv=2015-04-05&ss=bfqt&sr=c&srt=sco&sp=rwdl&se=2016-10-27T04:01:48Z&st=2016-10-26T20:01:48Z&spr=https&sig=QqpIhHsIMF8hNuFO%3D" -OutputBlobContainerUri "https://mystorageaccount.blob.core.windows.net/?sv=2015-04-05&ss=bfqt&sr=c&srt=sco&sp=rwdl&se=2016-10-27T04:01:48Z&st=2016-10-26T20:01:48Z&spr=https&sig=QqpIhHsIMF8hNuFO%3D"
New-AzIotHubExportDevices
拿掉此別名,請改用 New-AzIotHubExportDevice
。
以前
New-AzIotHubExportDevices -ResourceGroupName "myresourcegroup" -Name "myiothub" -ExportBlobContainerUri "https://mystorageaccount.blob.core.windows.net/mystoragecontainer?sv=2015-04-05&ss=bfqt&sr=c&srt=sco&sp=rwdl&se=2016-10-27T04:01:48Z&st=2016-10-26T20:01:48Z&spr=https&sig=QqpIhHsIMF8hNuFO%3D" -ExcludeKeys
後
New-AzIotHubExportDevice -ResourceGroupName "myresourcegroup" -Name "myiothub" -ExportBlobContainerUri "https://mystorageaccount.blob.core.windows.net/mystoragecontainer?sv=2015-04-05&ss=bfqt&sr=c&srt=sco&sp=rwdl&se=2016-10-27T04:01:48Z&st=2016-10-26T20:01:48Z&spr=https&sig=QqpIhHsIMF8hNuFO%3D" -ExcludeKeys
Add-AzIotHubEventHubConsumerGroup
參數 EventHubEndPointName
已被廢棄且未被替換,因為 IotHub 只有一個內建端點(“events”),可以處理系統和裝置訊息。
以前
Add-AzIotHubEventHubConsumerGroup -ResourceGroupName "myresourcegroup" -Name "myiothub" -EventHubConsumerGroupName "myconsumergroup" -EventHubEndpointName "/EventHubEndpointName"
之後
Add-AzIotHubEventHubConsumerGroup -ResourceGroupName "myresourcegroup" -Name "myiothub" -EventHubConsumerGroupName "myconsumergroup"
Get-AzIotHubEventHubConsumerGroup
參數 EventHubEndPointName
已被棄用,且未被替換,因為 IotHub 只有一個內建端點(“events”)可以處理系統和裝置訊息。
以前
Get-AzIotHubEventHubConsumerGroup -ResourceGroupName "myresourcegroup" -Name "myiothub" -EventHubEndpointName "/EventHubEndpointName"
後
Get-AzIotHubEventHubConsumerGroup -ResourceGroupName "myresourcegroup" -Name "myiothub"
Remove-AzIotHubEventHubConsumerGroup
參數 EventHubEndPointName
已被棄用,且未被替代,因為 IotHub 只有一個內建端點「events」,可以處理系統和裝置訊息。
以前
Remove-AzIotHubEventHubConsumerGroup -ResourceGroupName "myresourcegroup" -Name "myiothub" -EventHubConsumerGroupName myconsumergroup -EventHubEndpointName "/EventHubEndpointName"
後
Remove-AzIotHubEventHubConsumerGroup -ResourceGroupName "myresourcegroup" -Name "myiothub" -EventHubConsumerGroupName myconsumergroup
Set-AzIotHub
參數 OperationsMonitoringProperties
已被棄用,且未被取代,因為 IotHub 不再使用內建端點(「operationsMonitoringEvents」)。
RecoveryServices
Edit-AzRecoveryServicesAsrRecoveryPlan
ASRRecoveryPlanGroup.ReplicationProtectedItems
,ASRRecoveryPlanGroup.StartGroupActions
和 ASRRecoveryPlanGroup.EndGroupActions
會從輸出中移除。
Get-AzRecoveryServicesAsrRecoveryPlan
ASRRecoveryPlanGroup.ReplicationProtectedItems
,ASRRecoveryPlanGroup.StartGroupActions
和 ASRRecoveryPlanGroup.EndGroupActions
會從輸出中移除。
New-AzRecoveryServicesAsrReplicationProtectedItem
參數 IncludeDiskId 已變更為支援直接寫入 Azure Site Recovery 中的受控磁碟。
以前
$job = New-AzRecoveryServicesAsrReplicationProtectedItem -RecoveryAzureStorageAccountId $recoveryAzureStorageAccountId -IncludeDiskId $includeDiskId -VMwareToAzure -Account $fabric.FabricSpecificDetails.RunAsAccounts[0] -RecoveryResourceGroupId $RecoveryResourceGroupId -RecoveryAzureNetworkId $RecoveryAzureNetworkId -name $name -ProcessServer $fabric.FabricSpecificDetails.ProcessServers[0] -ProtectableItem $protectableItem -ProtectionContainerMapping $pcm -RecoveryAzureSubnetName $RecoveryAzureSubnetName -RecoveryVmName $RecoveryVmName -LogStorageAccountId $LogStorageAccountId
之後
$disk1 = New-AzRecoveryServicesAsrInMageAzureV2DiskInput -DiskId $diskId -LogStorageAccountId $logStorageAccountId -DiskType $diskType
$disk2 = New-AzRecoveryServicesAsrInMageAzureV2DiskInput -DiskId $diskId2 -LogStorageAccountId $logStorageAccountId -DiskType $diskType2
$job = New-AzRecoveryServicesAsrReplicationProtectedItem -VMwareToAzure -Account $fabric.FabricSpecificDetails.RunAsAccounts[0] -RecoveryResourceGroupId $RecoveryResourceGroupId -RecoveryAzureNetworkId $RecoveryAzureNetworkId -name $name -ProcessServer $fabric.FabricSpecificDetails.ProcessServers[0] -ProtectableItem $protectableItem -ProtectionContainerMapping $pcm -RecoveryAzureSubnetName $RecoveryAzureSubnetName -RecoveryVmName $RecoveryVmName -LogStorageAccountId $LogStorageAccountId -InMageAzureV2DiskInput $disk1,$disk2
資源
舊版與 Az.Batch 模組不相容
'Az.Resources' 模組 1.7.1 版與舊版的 'Az.Batch' 模組不相容。 匯入『Az.Resources』模組 1.7.1 版時,這會導致無法匯入『Az.Batch』模組 1.1.2 版。 若要修正此問題,請將 'Az.Batch' 模組更新為 2.0.1 版或更新版本,或只是安裝最新版的 'Az' 模組。
ServiceFabric
Add-ServiceFabricApplicationCertificate
已移除 Add-ServiceFabricApplicationCertificate
,因為 Add-AzVmssSecret
涵蓋此案例。
以前
Add-AzServiceFabricApplicationCertificate -ResourceGroupName "Group1" -Name "Contoso01SFCluster" -SecretIdentifier "http://keyVaultName.vault.contoso.net/secrets/secretName/secretVersion"
之後
$Vault = Get-AzKeyVault -VaultName "ContosoVault"
$CertConfig = New-AzVmssVaultCertificateConfig -CertificateUrl "http://keyVaultName.vault.contoso.net/secrets/secretName/secretVersion" -CertificateStore "Certificates"
$VMSS = New-AzVmssConfig
Add-AzVmssSecret -VirtualMachineScaleSet $VMSS -SourceVaultId $Vault.ResourceId -VaultCertificate $CertConfig
Sql
Get-AzSqlDatabaseSecureConnectionPolicy
請注意,安全連線功能已被棄用,因此該命令已被移除。 請使用 Azure 入口網站中的 [SQL 資料庫] 刀鋒視窗來檢視連接字串
Get-AzSqlDatabaseIndexRecommendations
移除 Get-AzSqlDatabaseIndexRecommendations
別名。 請改用 Get-AzSqlDatabaseIndexRecommendation
。
Get-AzSqlDatabaseRestorePoints
移除 Get-AzSqlDatabaseRestorePoints
別名。 請改用 Get-AzSqlDatabaseRestorePoint
。
Get-AzSqlDatabaseAuditing
- cmdlet
Get-AzSqlDatabaseAudit
取代這個 cmdlet。 - 輸出類型從現有的類型:'Microsoft.Azure.Commands.Sql.Auditing.Model.DatabaseBlobAuditingSettingsModel' 變更為新的類型:'Microsoft.Azure.Commands.Sql.Auditing.Model.DatabaseAuditingSettingsModel',並移除屬性
AuditState
和StorageAccountName
。 與StorageAccountSubscriptionId
。 腳本可以從新的StorageAccountResourceId
屬性擷取記憶體帳戶資訊。
以前
PS C:\> Get-AzSqlDatabaseAuditing -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -DatabaseName "Database01"
DatabaseName : database01
AuditAction : {}
AuditActionGroup : {SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP, FAILED_DATABASE_AUTHENTICATION_GROUP,
BATCH_COMPLETED_GROUP, ...}
ResourceGroupName : resourcegroup01
ServerName : server01
AuditState : Enabled
StorageAccountName : mystorage
StorageKeyType : Primary
RetentionInDays : 0
StorageAccountSubscriptionId : 7fe3301d-31d3-4668-af5e-211a890ba6e3
PredicateExpression : statement <> 'select 1'
後
PS C:\> Get-AzSqlDatabaseAudit -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -DatabaseName "Database01"
ServerName : server01
DatabaseName : database01
AuditAction : {}
ResourceGroupName : resourcegroup01
AuditActionGroup : {SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP, FAILED_DATABASE_AUTHENTICATION_GROUP,
BATCH_COMPLETED_GROUP, ...}
PredicateExpression : statement <> 'select 1'
BlobStorageTargetState : Enabled
StorageAccountResourceId : /subscriptions/7fe3301d-31d3-4668-af5e-211a890ba6e3/resourceGroups/resourcegroup01/providers/Microsoft.Storage/storageAccounts/mystorage
StorageKeyType : Primary
RetentionInDays : 0
EventHubTargetState : Enabled
EventHubName : eventHubName
EventHubAuthorizationRuleResourceId : EventHubAuthorizationRuleResourceId
LogAnalyticsTargetState : Enabled
WorkspaceResourceId : "/subscriptions/4b9e8510-67ab-4e9a-95a9-e2f1e570ea9c/resourceGroups/insights-integration/providers/Microsoft.OperationalInsights/workspaces/viruela2"
Set-AzSqlDatabaseAuditing
- cmdlet
Set-AzSqlDatabaseAudit
正在取代此 cmdlet。 - 輸出類型從現有的類型 :'Microsoft.Azure.Commands.Sql.Auditing.Model.DatabaseBlobAuditingSettingsModel' 變更為新的類型 :'bool'
以前
Set-AzSqlDatabaseAuditing -State Enabled -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -StorageAccountName "Storage22" -DatabaseName "Database01"
後
Set-AzSqlDatabaseAudit -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -DatabaseName "Database01" -BlobStorageTargetState Enabled -StorageAccountResourceId "/subscriptions/7fe3301d-31d3-4668-af5e-211a890ba6e3/resourceGroups/resourcegroup01/providers/Microsoft.Storage/storageAccounts/mystorage"
Get-AzSqlServerAuditing
- cmdlet
Get-AzSqlServerAudit
正在取代此 cmdlet。 - 輸出類型從現有的類型 'Microsoft.Azure.Commands.Sql.Auditing.Model.DatabaseBlobAuditingSettingsModel' 變更為新的類型 'Microsoft.Azure.Commands.Sql.Auditing.Model.ServerAuditingSettingsModel'。 會移除屬性
AuditState
、StorageAccountName
和StorageAccountSubscriptionId
。 使用StorageAccountName
和StorageAccountSubscriptionId
Proeprties 的腳本可以從新的StorageAccountResourceId
屬性擷取此資訊。
以前
PS C:\> Get-AzSqlServerAuditing -ResourceGroupName "resourcegroup01" -ServerName "server01"
AuditActionGroup : {SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP, FAILED_DATABASE_AUTHENTICATION_GROUP, BATCH_COMPLETED_GROUP, ...}
ResourceGroupName : resourcegroup01
ServerName : server01
AuditState : Enabled
StorageAccountName : mystorage
StorageKeyType : Primary
RetentionInDays : 0
StorageAccountSubscriptionId : 7fe3301d-31d3-4668-af5e-211a890ba6e3
PredicateExpression : statement <> 'select 1'
之後
PS C:\> Get-AzSqlServerAudit -ResourceGroupName "resourcegroup01" -ServerName "server01"
ServerName : server01
ResourceGroupName : resourcegroup01
AuditActionGroup : {SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP, FAILED_DATABASE_AUTHENTICATION_GROUP, BATCH_COMPLETED_GROUP, ...}
PredicateExpression : statement <> 'select 1'
BlobStorageTargetState : Enabled
StorageAccountResourceId : /subscriptions/7fe3301d-31d3-4668-af5e-211a890ba6e3/resourceGroups/resourcegroup01/providers/Microsoft.Storage/storageAccounts/mystorage
StorageKeyType : Primary
RetentionInDays : 0
EventHubTargetState : Enabled
EventHubName : eventHubName
EventHubAuthorizationRuleResourceId : EventHubAuthorizationRuleResourceId
LogAnalyticsTargetState : Enabled
WorkspaceResourceId : "/subscriptions/4b9e8510-67ab-4e9a-95a9-e2f1e570ea9c/resourceGroups/insights-integration/providers/Microsoft.OperationalInsights/workspaces/viruela2"
Set-AzSqlServerAuditing
- Cmdlet
Set-AzSqlServerAudit
正在取代此 cmdlet。 - 輸出類型從現有的類型 :'Microsoft.Azure.Commands.Sql.Auditing.Model.DatabaseBlobAuditingSettingsModel' 變更為新的類型 :'bool'
以前
Set-AzSqlServerAuditing -State Enabled -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -StorageAccountName "Storage22"
後
PS C:\> Set-AzSqlServerAudit -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -BlobStorageTargetState Enabled -StorageAccountResourceId "/subscriptions/7fe3301d-31d3-4668-af5e-211a890ba6e3/resourceGroups/resourcegroup01/providers/Microsoft.Storage/storageAccounts/mystorage"
Get-AzSqlServerAdvancedThreatProtectionSettings
Cmdlet Get-AzSqlServerAdvancedThreatProtectionSettings
會由 Get-AzSqlServerAdvancedThreatProtectionSetting
取代
以前
Get-AzSqlServerAdvancedThreatProtectionSettings -ResourceGroupName "ResourceGroup11" -ServerName "Server01"
後
Get-AzSqlServerAdvancedThreatProtectionSetting -ResourceGroupName "ResourceGroup11" -ServerName "Server01"
Clear-AzSqlServerAdvancedThreatProtectionSettings
Cmdlet Clear-AzSqlServerAdvancedThreatProtectionSettings
已被 Clear-AzSqlServerAdvancedThreatProtectionSetting
取代
以前
Clear-AzSqlServerAdvancedThreatProtectionSettings -ResourceGroupName "ResourceGroup11" -ServerName "Server01"
之後
Clear-AzSqlServerAdvancedThreatProtectionSetting -ResourceGroupName "ResourceGroup11" -ServerName "Server01"
Update-AzSqlServerAdvancedThreatProtectionSettings
Cmdlet Update-AzSqlServerAdvancedThreatProtectionSettings
會由 Update-AzSqlServerAdvancedThreatProtectionSetting
取代
以前
Update-AzSqlServerAdvancedThreatProtectionSettings -ResourceGroupName "ResourceGroup11" -ServerName "Server01" -NotificationRecipientsEmails "admin01@contoso.com;secadmin@contoso.com" -EmailAdmins $False -ExcludedDetectionType "Sql_Injection_Vulnerability","SQL_Injection" -StorageAccountName "mystorageAccount"
後
Update-AzSqlServerAdvancedThreatProtectionSetting -ResourceGroupName "ResourceGroup11" -ServerName "Server01" -NotificationRecipientsEmails "admin01@contoso.com;secadmin@contoso.com" -EmailAdmins $False -ExcludedDetectionType "Sql_Injection_Vulnerability","SQL_Injection" -StorageAccountName "mystorageAccount"
Get-AzSqlDatabaseAdvancedThreatProtectionSettings
Cmdlet Get-AzSqlDatabaseAdvancedThreatProtectionSettings
已被 Get-AzSqlDatabaseAdvancedThreatProtectionSetting
取代
以前
Get-AzSqlDatabaseAdvancedThreatProtectionSettings -ResourceGroupName "ResourceGroup11" -ServerName "Server01" -DatabaseName "Database01"
之後
Get-AzSqlDatabaseAdvancedThreatProtectionSetting -ResourceGroupName "ResourceGroup11" -ServerName "Server01" -DatabaseName "Database01"
Update-AzSqlDatabaseAdvancedThreatProtectionSettings
Cmdlet Update-AzSqlDatabaseAdvancedThreatProtectionSettings
會被 Update-AzSqlDatabaseAdvancedThreatProtectionSetting
替換
以前
Update-AzSqlDatabaseAdvancedThreatProtectionSettings -ResourceGroupName "ResourceGroup11" -ServerName "Server01" -DatabaseName "Database01" -NotificationRecipientsEmails "admin01@contoso.com;secadmin@contoso.com" -EmailAdmins $False -ExcludedDetectionType "Sql_Injection_Vulnerability", "SQL_Injection" -StorageAccountName "mystorageAccount"
之後
Update-AzSqlDatabaseAdvancedThreatProtectionSetting -ResourceGroupName "ResourceGroup11" -ServerName "Server01" -DatabaseName "Database01" -NotificationRecipientsEmails "admin01@contoso.com;secadmin@contoso.com" -EmailAdmins $False -ExcludedDetectionType "Sql_Injection_Vulnerability", "SQL_Injection" -StorageAccountName "mystorageAccount"
Clear-AzSqlDatabaseAdvancedThreatProtectionSettings
Cmdlet Clear-AzSqlDatabaseAdvancedThreatProtectionSettings
被 Clear-AzSqlDatabaseAdvancedThreatProtectionSetting
替換
以前
Clear-AzSqlDatabaseAdvancedThreatProtectionSettings -ResourceGroupName "ResourceGroup11" -ServerName "Server01" -DatabaseName "Database01"
之後
Clear-AzSqlDatabaseAdvancedThreatProtectionSetting -ResourceGroupName "ResourceGroup11" -ServerName "Server01" -DatabaseName "Database01"
Update-AzSqlDatabaseVulnerabilityAssessmentSettings
Cmdlet Update-AzSqlDatabaseVulnerabilityAssessmentSettings
被 Update-AzSqlDatabaseVulnerabilityAssessmentSetting
替換
以前
Update-AzSqlDatabaseVulnerabilityAssessmentSettings `
-ResourceGroupName "ResourceGroup01"`
-ServerName "Server01"`
-DatabaseName "Database01" `
-StorageAccountName "mystorage" `
-ScanResultsContainerName "vulnerability-assessment" `
-RecurringScansInterval Weekly `
-EmailSubscriptionAdmins $true `
-NotificationEmail @("mail1@mail.com" , "mail2@mail.com")
後
Update-AzSqlDatabaseVulnerabilityAssessmentSetting `
-ResourceGroupName "ResourceGroup01"`
-ServerName "Server01"`
-DatabaseName "Database01" `
-StorageAccountName "mystorage" `
-ScanResultsContainerName "vulnerability-assessment" `
-RecurringScansInterval Weekly `
-EmailSubscriptionAdmins $true `
-NotificationEmail @("mail1@mail.com" , "mail2@mail.com")
Get-AzSqlDatabaseVulnerabilityAssessmentSettings
Cmdlet Get-AzSqlDatabaseVulnerabilityAssessmentSettings
被 Get-AzSqlDatabaseVulnerabilityAssessmentSetting
取代
以前
Get-AzSqlDatabaseVulnerabilityAssessmentSettings `
-ResourceGroupName "ResourceGroup01" `
-ServerName "Server01" `
-DatabaseName "Database01"
之後
Get-AzSqlDatabaseVulnerabilityAssessmentSetting `
-ResourceGroupName "ResourceGroup01" `
-ServerName "Server01" `
-DatabaseName "Database01"
Clear-AzSqlDatabaseVulnerabilityAssessmentSettings
Cmdlet Clear-AzSqlDatabaseVulnerabilityAssessmentSettings
被 Clear-AzSqlDatabaseVulnerabilityAssessmentSetting
替換
以前
Clear-AzSqlDatabaseVulnerabilityAssessmentSettings `
-ResourceGroupName "ResourceGroup01" `
-ServerName "Server01" `
-DatabaseName "Database01"
之後
Clear-AzSqlDatabaseVulnerabilityAssessmentSetting `
-ResourceGroupName "ResourceGroup01" `
-ServerName "Server01" `
-DatabaseName "Database01"
Update-AzSqlInstanceDatabaseVulnerabilityAssessmentSettings
Cmdlet Update-AzSqlInstanceDatabaseVulnerabilityAssessmentSettings
被 Update-AzSqlInstanceDatabaseVulnerabilityAssessmentSetting
取代
以前
Update-AzSqlInstanceDatabaseVulnerabilityAssessmentSettings `
-ResourceGroupName "ResourceGroup01" `
-InstanceName "ManagedInstance01" `
-DatabaseName "Database01" `
-StorageAccountName "mystorage" `
-ScanResultsContainerName "vulnerability-assessment" `
-RecurringScansInterval Weekly `
-EmailSubscriptionAdmins $true `
-NotificationEmail @("mail1@mail.com" , "mail2@mail.com")
後
Update-AzSqlInstanceDatabaseVulnerabilityAssessmentSetting `
-ResourceGroupName "ResourceGroup01" `
-InstanceName "ManagedInstance01" `
-DatabaseName "Database01" `
-StorageAccountName "mystorage" `
-ScanResultsContainerName "vulnerability-assessment" `
-RecurringScansInterval Weekly `
-EmailSubscriptionAdmins $true `
-NotificationEmail @("mail1@mail.com" , "mail2@mail.com")
Get-AzSqlInstanceDatabaseVulnerabilityAssessmentSettings
Cmdlet Get-AzSqlInstanceDatabaseVulnerabilityAssessmentSettings
被 Get-AzSqlInstanceDatabaseVulnerabilityAssessmentSetting
取代
以前
Get-AzSqlInstanceDatabaseVulnerabilityAssessmentSettings `
-ResourceGroupName "ResourceGroup01" `
-ServerName "Server01" `
-DatabaseName "Database01"
之後
Get-AzSqlInstanceDatabaseVulnerabilityAssessmentSetting `
-ResourceGroupName "ResourceGroup01" `
-ServerName "Server01" `
-DatabaseName "Database01"
Clear-AzSqlInstanceDatabaseVulnerabilityAssessmentSettings
Cmdlet Clear-AzSqlInstanceDatabaseVulnerabilityAssessmentSettings
會被 Clear-AzSqlInstanceDatabaseVulnerabilityAssessmentSetting
取代
以前
Clear-AzSqlInstanceDatabaseVulnerabilityAssessmentSettings `
-ResourceGroupName "ResourceGroup01" `
-ServerName "Server01" `
-DatabaseName "Database01"
之後
Clear-AzSqlInstanceDatabaseVulnerabilityAssessmentSetting `
-ResourceGroupName "ResourceGroup01" `
-ServerName "Server01" `
-DatabaseName "Database01"
Update-AzSqlInstanceVulnerabilityAssessmentSettings
Cmdlet Update-AzSqlInstanceVulnerabilityAssessmentSettings
被 Update-AzSqlInstanceVulnerabilityAssessmentSetting
替換
以前
Update-AzSqlInstanceVulnerabilityAssessmentSettings `
-ResourceGroupName "ResourceGroup01" `
-InstanceName "ManagedInstance01" `
-StorageAccountName "mystorage" `
-ScanResultsContainerName "vulnerability-assessment" `
-RecurringScansInterval Weekly `
-EmailSubscriptionAdmins $true `
-NotificationEmail @("mail1@mail.com" , "mail2@mail.com")
後
Update-AzSqlInstanceVulnerabilityAssessmentSetting `
-ResourceGroupName "ResourceGroup01" `
-InstanceName "ManagedInstance01" `
-StorageAccountName "mystorage" `
-ScanResultsContainerName "vulnerability-assessment" `
-RecurringScansInterval Weekly `
-EmailSubscriptionAdmins $true `
-NotificationEmail @("mail1@mail.com" , "mail2@mail.com")
Get-AzSqlInstanceVulnerabilityAssessmentSettings
Cmdlet Get-AzSqlInstanceVulnerabilityAssessmentSettings
被 Get-AzSqlInstanceVulnerabilityAssessmentSetting
取代
以前
Get-AzSqlInstanceVulnerabilityAssessmentSettings `
-ResourceGroupName "ResourceGroup01" `
-ServerName "Server01" `
-DatabaseName "Database01"
後
Get-AzSqlInstanceVulnerabilityAssessmentSetting `
-ResourceGroupName "ResourceGroup01" `
-ServerName "Server01" `
-DatabaseName "Database01"
Clear-AzSqlInstanceVulnerabilityAssessmentSettings
Cmdlet Clear-AzSqlInstanceVulnerabilityAssessmentSettings
會由 Clear-AzSqlInstanceVulnerabilityAssessmentSetting
取代
以前
Clear-AzSqlInstanceVulnerabilityAssessmentSettings `
-ResourceGroupName "ResourceGroup01" `
-ServerName "Server01" `
-DatabaseName "Database01"
之後
Clear-AzSqlInstanceVulnerabilityAssessmentSetting `
-ResourceGroupName "ResourceGroup01" `
-ServerName "Server01" `
-DatabaseName "Database01"
Update-AzSqlServerVulnerabilityAssessmentSettings
Cmdlet Update-AzSqlServerVulnerabilityAssessmentSettings
會由 Update-AzSqlServerVulnerabilityAssessmentSetting
取代
以前
Update-AzSqlServerVulnerabilityAssessmentSettings `
-ResourceGroupName "ResourceGroup01"`
-ServerName "Server01"`
-StorageAccountName "mystorage" `
-ScanResultsContainerName "vulnerability-assessment" `
-RecurringScansInterval Weekly `
-EmailSubscriptionAdmins $true `
-NotificationEmail @("mail1@mail.com" , "mail2@mail.com")
之後
Update-AzSqlServerVulnerabilityAssessmentSetting `
-ResourceGroupName "ResourceGroup01"`
-ServerName "Server01"`
-StorageAccountName "mystorage" `
-ScanResultsContainerName "vulnerability-assessment" `
-RecurringScansInterval Weekly `
-EmailSubscriptionAdmins $true `
-NotificationEmail @("mail1@mail.com" , "mail2@mail.com")
Get-AzSqlServerVulnerabilityAssessmentSettings
Cmdlet Get-AzSqlServerVulnerabilityAssessmentSettings
被 Get-AzSqlServerVulnerabilityAssessmentSetting
取代
以前
Get-AzSqlServerVulnerabilityAssessmentSettings `
-ResourceGroupName "ResourceGroup01" `
-ServerName "Server01" `
-DatabaseName "Database01"
之後
Get-AzSqlServerVulnerabilityAssessmentSetting `
-ResourceGroupName "ResourceGroup01" `
-ServerName "Server01" `
-DatabaseName "Database01"
Clear-AzSqlServerVulnerabilityAssessmentSettings
Cmdlet Clear-AzSqlServerVulnerabilityAssessmentSettings
會被 Clear-AzSqlServerVulnerabilityAssessmentSetting
替換
以前
Clear-AzSqlServerVulnerabilityAssessmentSettings `
-ResourceGroupName "ResourceGroup01" `
-ServerName "Server01" `
-DatabaseName "Database01"
之後
Clear-AzSqlDatabaseVulnerabilityAssessmentSetting `
-ResourceGroupName "ResourceGroup01" `
-ServerName "Server01" `
-DatabaseName "Database01"
Get-AzSqlServerAdvancedThreatProtectionPolicy
Cmdlet Get-AzSqlServerAdvancedThreatProtectionPolicy
已被刪除且沒有替換任何 Cmdlet
Get-AzSqlServerThreatDetectionPolicy
Cmdlet Get-AzSqlServerThreatDetectionPolicy
會被 Get-AzSqlServerThreatDetectionSetting
替換
以前
PS C:\> Get-AzSqlServerThreatDetectionPolicy -ResourceGroupName "ResourceGroup11" -ServerName "Server01"
ResourceGroupName : ResourceGroup11
ServerName : Server01
ThreatDetectionState : Enabled
NotificationRecipientsEmails : admin@myCompany.com
StorageAccountName : mystorage
EmailAdmins : True
ExcludedDetectionTypes : {}
RetentionInDays : 0
之後
PS C:\> Get-AzSqlServerAdvancedThreatProtectionSetting -ResourceGroupName "ResourceGroup11" -ServerName "Server01"
ResourceGroupName : ResourceGroup11
ServerName : Server01
ThreatDetectionState : Enabled
NotificationRecipientsEmails : admin@myCompany.com
StorageAccountName : mystorage
EmailAdmins : True
ExcludedDetectionTypes : {}
RetentionInDays : 0
Remove-AzSqlServerThreatDetectionPolicy
Cmdlet Remove-AzSqlServerThreatDetectionPolicy
被 Clear-AzSqlServerAdvancedThreatProtectionSetting
替換
以前
Remove-AzSqlServerThreatDetectionPolicy -ResourceGroupName "ResourceGroup11" -ServerName "Server01"
之後
Clear-AzSqlServerAdvancedThreatProtectionSetting -ResourceGroupName "ResourceGroup11" -ServerName "Server01"
Set-AzSqlServerThreatDetectionPolicy
Cmdlet Set-AzSqlServerThreatDetectionPolicy
會由 Update-AzSqlServerAdvancedThreatProtectionSetting
取代
以前
Set-AzSqlServerThreatDetectionPolicy -ResourceGroupName "ResourceGroup11" -ServerName "Server01" -NotificationRecipientsEmails "admin01@contoso.com;secadmin@contoso.com" -EmailAdmins $False -ExcludedDetectionType "Sql_Injection_Vulnerability","SQL_Injection" -StorageAccountName "mystorageAccount"
之後
Update-AzSqlServerAdvancedThreatProtectionSetting -ResourceGroupName "ResourceGroup11" -ServerName "Server01" -NotificationRecipientsEmails "admin01@contoso.com;secadmin@contoso.com" -EmailAdmins $False -ExcludedDetectionType "Sql_Injection_Vulnerability","SQL_Injection" -StorageAccountName "mystorageAccount"
Get-AzSqlDatabaseThreatDetectionPolicy
Cmdlet Get-AzSqlDatabaseThreatDetectionPolicy
被 Get-AzSqlDatabaseThreatDetectionSetting
取代
以前
PS C:\> Get-AzSqlDatabaseThreatDetectionPolicy -ResourceGroupName "ResourceGroup11" -ServerName "Server01" -DatabaseName "Database01"
DatabaseName : Database01
ResourceGroupName : ResourceGroup11
ServerName : Server01
ThreatDetectionState : Enabled
NotificationRecipientsEmails : admin@myCompany.com
StorageAccountName : mystorage
EmailAdmins : True
ExcludedDetectionTypes : {}
RetentionInDays : 0
後
PS C:\> Get-AzSqlDatabaseAdvancedThreatProtectionSetting -ResourceGroupName "ResourceGroup11" -ServerName "Server01" -DatabaseName "Database01"
DatabaseName : Database01
ResourceGroupName : ResourceGroup11
ServerName : Server01
ThreatDetectionState : Enabled
NotificationRecipientsEmails : admin@myCompany.com
StorageAccountName : mystorage
EmailAdmins : True
ExcludedDetectionTypes : {}
RetentionInDays : 0
Set-AzSqlDatabaseThreatDetectionPolicy
Cmdlet Set-AzSqlDatabaseThreatDetectionPolicy
會被 Update-AzSqlDatabaseAdvancedThreatProtectionSetting
取代
以前
Set-AzSqlDatabaseThreatDetectionPolicy -ResourceGroupName "ResourceGroup11" -ServerName "Server01" -DatabaseName "Database01" -NotificationRecipientsEmails "admin01@contoso.com;secadmin@contoso.com" -EmailAdmins $False -ExcludedDetectionType "Sql_Injection_Vulnerability", "SQL_Injection" -StorageAccountName "mystorageAccount"
後
Update-AzSqlDatabaseAdvancedThreatProtectionSetting -ResourceGroupName "ResourceGroup11" -ServerName "Server01" -DatabaseName "Database01" -NotificationRecipientsEmails "admin01@contoso.com;secadmin@contoso.com" -EmailAdmins $False -ExcludedDetectionType "Sql_Injection_Vulnerability", "SQL_Injection" -StorageAccountName "mystorageAccount"
Remove-AzSqlDatabaseThreatDetectionPolicy
Cmdlet Remove-AzSqlDatabaseThreatDetectionPolicy
被 Clear-AzSqlDatabaseAdvancedThreatProtectionSetting
取代
以前
Remove-AzSqlDatabaseThreatDetectionPolicy -ResourceGroupName "ResourceGroup11" -ServerName "Server01" -DatabaseName "Database01"
後
Clear-AzSqlDatabaseAdvancedThreatProtectionSetting -ResourceGroupName "ResourceGroup11" -ServerName "Server01" -DatabaseName "Database01"