You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/sql-server/azure-arc/assess.md
+28-27Lines changed: 28 additions & 27 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Configure on-demand SQL Assessment on an SQL Server on Azure Arc-en
4
4
author: anosov1960
5
5
ms.author: sashan
6
6
ms.reviewer: mikeray
7
-
ms.date: 04/06/2021
7
+
ms.date: 07/30/2021
8
8
ms.topic: conceptual
9
9
ms.prod: sql
10
10
---
@@ -15,11 +15,11 @@ SQL Assessment provides a mechanism to evaluate your configuration of SQL Server
15
15
## Prerequisites
16
16
17
17
* Your Windows-based SQL Server instance is connected to Azure Arc. Follow the instructions to [onboard your SQL Server instance to Arc-enabled SQL Server](connect.md).
18
-
18
+
19
19
> [!NOTE]
20
20
> On-demand SQL Assessment is currently limited to SQL Server running on Windows machines. This will not work for SQL on Linux machines.
21
21
22
-
* The Microsoft Monitoring Agent (MMA) extension must be installed and configured on the machine. View the [Install MMA](configure-advanced-data-security.md#install-microsoft-monitoring-agent-mma) article for instructions. You can also get more information on the [Log Analytics Agent](/azure/azure-monitor/platform/log-analytics-agent) article.
22
+
* The Microsoft Monitoring Agent (MMA) must be installed and configured on the machine. View the [Install MMA](configure-advanced-data-security.md#install-microsoft-monitoring-agent-mma) article for instructions. You can also get more information on the [Log Analytics Agent](/azure/azure-monitor/platform/log-analytics-agent) article.
23
23
24
24
* Your SQL Server instance must have the [TCP/IP protocol enabled](../../database-engine/configure-windows/enable-or-disable-a-server-network-protocol.md).
25
25
@@ -34,43 +34,44 @@ SQL Assessment provides a mechanism to evaluate your configuration of SQL Server
34
34
> [!div class="mx-imgBorder"]
35
35
> [](media/assess/sql-assessment-heading-sql-server-arc.png#lightbox)
36
36
37
-
> [!IMPORTANT]
38
-
> If MMA extension is not installed, you will not be able to initiate the on-demand SQL Assessment.
37
+
> [!IMPORTANT]
38
+
> If the MMA extension is not installed, you can't initiate the on-demand SQL Assessment.
39
39
40
-
2. Select the account type. If you have a Managed service account, it will allow you to initiate SQL Assessment directly from the Portal. Specify the account name.
40
+
2. Select the account type. If you have a Managed service account, it will allow you to initiate SQL Assessment directly from the portal. Specify the account name.
41
41
42
-
> [!NOTE]
43
-
> Specifying a *Managed service account* will activate the **Configure SQL Assessment** button so you could initiate the assessment from the Portal by deploying a *CustomScriptExtension*. Because only one *CustomScriptExtension* can be deployed at a time, the script extension for SQL Assessment
44
-
will be automatically removed after execution. If you already have another *CustomScriptExtension* deployed to the hosting machine, the **Configure SQL Assessment** button will not be activated.
42
+
> [!NOTE]
43
+
> Specifying a *Managed service account* activates the **Configure SQL Assessment** button so you can initiate the assessment from the portal by deploying a *CustomScriptExtension*. Because you can only deploy one *CustomScriptExtension* at a time, the script extension for SQL Assessment will be automatically removed after execution.
44
+
>
45
+
> If you already have another *CustomScriptExtension* deployed to the hosting machine, the **Configure SQL Assessment** button will not be activated.
45
46
46
-
3. Specify a working directory on the data collection machine if you want to change the default. By default, `C:\sql_assessment\work_dir` is used. During collection and analysis, data is temporarily stored in that folder. If the folder doesn't exist, it's created automatically.
47
+
3. Specify a working directory on the data collection machine if you want to change the default. By default, `C:\sql_assessment\work_dir` is used. During collection and analysis, the assessment temporarily stores data in that folder. If the folder doesn't exist, the assessment creates it automatically.
47
48
48
-
4. If you initiate SQL Assessment from the Portal by clicking **Configure SQL Assessment**, a standard deployment bubble will show up.
49
+
4. If you initiate SQL Assessment from the portal by clicking **Configure SQL Assessment**, the portal presents a standard deployment bubble.
49
50
50
-
> [!div class="mx-imgBorder"]
51
+
> [!div class="mx-imgBorder"]
51
52
> [](media/assess/sql-assessment-custom-script-deployment.png#lightbox)
52
53
53
-
5. If you prefer initiating SQL Assessment from the target machine, click**Download configuration script**, copy the downloaded script to the target machine and and execute one of the following code blocks in a admin instance of **powershell.exe**:
54
+
Alternatively, you can initiate SQL Assessment from the target machine. Click**Download configuration script**, copy the downloaded script to the target machine and and execute one of the following code blocks in a admin instance of **powershell.exe**:
54
55
55
-
*_Domain account_: You'll be prompted for the user account and password.
56
+
*_Domain account_: You'll be prompted for the user account and password.
56
57
57
-
```powershell
58
-
Set-ExecutionPolicy -Scope Process -ExecutionPolicy Bypass -Force
59
-
& '.\AddSqlAssessment.ps1'
60
-
```
58
+
```powershell
59
+
Set-ExecutionPolicy -Scope Process -ExecutionPolicy Bypass -Force
60
+
& '.\AddSqlAssessment.ps1'
61
+
```
61
62
62
-
* _Managed Service Account (MSA)_
63
+
*_Managed Service Account (MSA)_
63
64
64
-
```powershell
65
-
Set-ExecutionPolicy -Scope Process -ExecutionPolicy Bypass -Force
> The script schedules a task named *SQLAssessment*, which triggers data collection. This task executes within an hour after you've run the script. It then repeats every seven days.
70
+
> [!NOTE]
71
+
> The script schedules a task named *SQLAssessment*, which triggers data collection. This task executes within an hour after you've run the script. It then repeats every seven days.
71
72
72
-
> [!TIP]
73
-
> You can modify the task to run on a different date and time or even force it to run immediately. In the the task scheduler library, find **Microsoft** > **Operations Management Suite** > **AOI\*\*\*** > **Assessments** > **SQLAssessment**.
73
+
> [!TIP]
74
+
> You can modify the task to run on a different date and time or even force it to run immediately. In the the task scheduler library, find **Microsoft** > **Operations Management Suite** > **AOI\*\*\*** > **Assessments** > **SQLAssessment**.
Copy file name to clipboardExpand all lines: docs/sql-server/azure-arc/configure-advanced-data-security.md
+9-10Lines changed: 9 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,24 +5,23 @@ description: Configure advanced data security for an instance of SQL Server on A
5
5
author: anosov1960
6
6
ms.author: sashan
7
7
ms.reviewer: mikeray
8
-
ms.date: 04/06/2021
8
+
ms.date: 07/30/2021
9
9
ms.topic: conceptual
10
10
ms.prod: sql
11
11
---
12
12
# Configure advanced data security | SQL Server on Azure Arc-enabled servers
13
13
14
-
You can enable advanced data security for your SQL Server instances onpremises by following these steps.
14
+
You can enable advanced data security for your SQL Server instances on-premises by following these steps.
15
15
16
16
## Prerequisites
17
17
18
18
* Your Windows-based SQL Server instance is connected to Azure Arc. Follow the instructions to [onboard your SQL Server instance to Arc-enabled SQL Server](connect.md).
19
19
20
20
> [!NOTE]
21
-
> Azure Defender currently limited to SQL Server running on Windows machines. This will not work for SQL on Linux machines.
21
+
> Azure Defender is only supported for SQL Server instances on Windows machines. This will not work for SQL Server on Linux machines.
22
22
23
23
* Your user account is assigned one of the [Security Center Roles (RBAC)](/azure/security-center/security-center-permissions)
24
24
25
-
26
25
## Create a Log Analytics workspace
27
26
28
27
1. Search for __Log Analytics workspaces__ resource type and add a new one through the creation blade.
@@ -32,21 +31,21 @@ You can enable advanced data security for your SQL Server instances on premises
32
31
> [!NOTE]
33
32
> You can use a Log Analytics workspace in any region so if you already have one, you can use it. But we recommend creating it in the same region where your __Machine - Azure Arc__ resource is created.
34
33
35
-
1. Go to the overview page of the Log Analytics workspace resource and select “Windows, Linux and other sources”. Copy the workspace ID and primary key for later use.
34
+
1. Go to the overview page of the Log Analytics workspace resource and select **Windows, Linux, and other sources**. Copy the workspace ID and primary key for later use.
The next step is needed only if you have not yet configured the MMA agent on the remote machine yet.
40
+
The next step is needed only if you have not yet configured MMA on the remote machine.
42
41
43
42
1. Select the __Machine - Azure Arc__ resource for the virtual or physical server where the SQL Server instance is installed and add the extension __Microsoft Monitoring Agent - Azure Arc__ using the **Extensions** feature. When asked to configure the Log Analytics workspace, use the workspace ID and primary you saved in the previous step.
1. After validation succeeds, click **Create** to start the MMA Arc Extension deployment workflow. When deployment completes the status will be updated to **Succeeded**.
46
+
1. After validation succeeds, click **Create** to start the MMA Arc Extension deployment workflow. When the deployment completes, the status updates to **Succeeded**.
48
47
49
-
1. For more details, see [Extension management with Azure Arc](/azure/azure-arc/servers/manage-vm-extensions)
48
+
1. For more information, see [Extension management with Azure Arc](/azure/azure-arc/servers/manage-vm-extensions).
50
49
51
50
## Enable Azure Defender
52
51
@@ -61,7 +60,7 @@ Next, you need to enable Azure Defender for SQL Server instance.
> The first scan to generate the vulnerability assessment will happen within 24 hours after enabling advanced data security. After that, auto scans will be performed every week on Sunday.
63
+
> The first scan to generate the vulnerability assessment happens within 24 hours after enabling advanced data security. After that, auto scans are be performed every week on Sunday.
65
64
66
65
## Explore
67
66
@@ -84,7 +83,7 @@ Explore security anomalies and threats in Azure Security Center.
> The general __Security Center__ link at the top of the page does not use the Preview portal URL so your __SQL Server - Azure Arc__ resources will not be visible there. We recommend following the links for the individual recommendations or alerts.
86
+
> The general __Security Center__ link at the top of the page does not use the preview portal URL so your __SQL Server - Azure Arc__ resources are not be visible there. Follow the links for the individual recommendations or alerts.
0 commit comments