You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
If for any reason your primary database fails, you can initiate a geo-failover to any of your secondary databases. When a secondary is promoted to the primary role, all other secondaries are automatically linked to the new primary.
42
42
@@ -197,7 +197,7 @@ To create a geo-secondary in a subscription different from the subscription of t
197
197
10. After the geo-secondary is successfully created, the users, logins, and firewall rules created by this procedure can be removed.
198
198
199
199
> [!NOTE]
200
-
> Cross-subscription geo-replication operations including setup and geo-failover are only supported using T-SQL commands.
200
+
> Cross-subscription geo-replication operations including setup and geo-failover are only supported using REST API & T-SQL commands.
201
201
>
202
202
> Adding a geo-secondary using T-SQL is not supported when connecting to the primary server over a [private endpoint](private-endpoint-overview.md). If a private endpoint is configured but public network access is allowed, adding a geo-secondary is supported when connected to the primary server from a public IP address. Once a geo-secondary is added, public access can be [denied](connectivity-settings.md#deny-public-network-access).
Copy file name to clipboardExpand all lines: azure-sql/database/automated-backups-overview.md
+1-4Lines changed: 1 addition & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -494,7 +494,7 @@ Backup and restore operations for Hyperscale databases are fast regardless of da
494
494
495
495
### Hyperscale backup retention
496
496
497
-
Hyperscale supports short-term backup retention (STR) of 7 days by default; long-term retention (LTR) policies aren't currently supported.
497
+
Default short-term backup retention (STR) for Hyperscale databases is 7 days; long-term retention (LTR) policies aren't currently supported.
498
498
499
499
> [!NOTE]
500
500
> Short-term backup retention up to 35 days for Hyperscale databases is now in preview.
@@ -572,9 +572,6 @@ Backup storage redundancy for databases in Azure SQL Database can be configured
572
572
573
573
For Azure SQL Managed Instance, backup storage redundancy is set at the instance level, and it is applied for all belonging managed databases. It can be configured at the time of an instance creation or updated for existing instances; the backup storage redundancy change would trigger then a new full backup per database and the change will apply for all future backups. The default storage redundancy type is geo-redundancy (RA-GRS).
574
574
575
-
> [!NOTE]
576
-
> Backup storage redundancy change for SQL Managed Instance is currently available only for the Public cloud via Azure Portal.
577
-
578
575
### Configure backup storage redundancy by using the Azure portal
In this quickstart, you'll use the [Golang](https://godoc.org/github.com/denisenkom/go-mssqldb) programming language to connect to a database in Azure SQL Database or Azure SQL Managed Instance. You'll then run Transact-SQL statements to query and modify data. [Golang](https://go.dev/) is an open-source programming language that makes it easy to build simple, reliable, and efficient software.
20
+
In this quickstart, you'll use the Golang programming language to connect to a database in Azure SQL Database or Azure SQL Managed Instance with the [go-mssqldb]((https://github.com/microsoft/go-mssqldb). The sample queries and modifies data with explicit Transact-SQL statements. [Golang](https://go.dev/) is an open-source programming language that makes it easy to build simple, reliable, and efficient software.
21
21
22
22
## Prerequisites
23
23
@@ -70,7 +70,7 @@ Get the connection information you need to connect to the database. You'll need
70
70
71
71
```bash
72
72
cd SqlServerSample
73
-
go get github.com/denisenkom/go-mssqldb
73
+
go get github.com/microsoft/go-mssqldb
74
74
```
75
75
76
76
## Create sample data
@@ -114,7 +114,7 @@ Get the connection information you need to connect to the database. You'll need
114
114
package main
115
115
116
116
import (
117
-
_ "github.com/denisenkom/go-mssqldb"
117
+
_ "github.com/microsoft/go-mssqldb"
118
118
"database/sql"
119
119
"context"
120
120
"log"
@@ -330,5 +330,5 @@ Get the connection information you need to connect to the database. You'll need
330
330
## Next steps
331
331
332
332
-[Design your first database in Azure SQL Database](design-first-database-tutorial.md)
333
-
-[Golang driver for SQL Server](https://github.com/denisenkom/go-mssqldb)
334
-
-[Report issues or ask questions](https://github.com/denisenkom/go-mssqldb/issues)
333
+
-[Golang driver for SQL Server](https://github.com/microsoft/go-mssqldb)
334
+
-[Report issues or ask questions](https://github.com/microsoft/go-mssqldb/issues)
@@ -53,9 +52,17 @@ The classification includes two metadata attributes:
53
52
-**Labels**: The main classification attributes, used to define the sensitivity level of the data stored in the column.
54
53
-**Information types**: Attributes that provide more granular information about the type of data stored in the column.
55
54
56
-
### Define and customize your classification taxonomy
55
+
### Information Protection policy
56
+
57
+
Azure SQL offers both SQL Information Protection policy and Microsoft Information Protection policy in data classification, and you can choose either of these two policies based on your requirement.
58
+
59
+
:::image type="content" source="./media/data-discovery-and-classification-overview/protection-policy-types.png" alt-text="Screenshot of Information Protection policy types." lightbox="./media/data-discovery-and-classification-overview/protection-policy-types.png":::
60
+
61
+
### SQL Information Protection policy
62
+
63
+
Data Discovery & Classification comes with a built-in set of sensitivity labels and information types with discovery logic which is native to the SQL logical server. You can continue using the protection labels available in the default policy file, or you can customize this taxonomy. You can define a set and ranking of classification constructs specifically for your environment.
57
64
58
-
Data Discovery & Classification comes with a built-in set of sensitivity labels and a built-in set of information types and discovery logic. You can customize this taxonomy and define a set and ranking of classification constructs specifically for your environment.
65
+
### Define and customize your classification taxonomy
59
66
60
67
You define and customize of your classification taxonomy in one central place for your entire Azure organization. That location is in [Microsoft Defender for Cloud](/azure/security-center/security-center-introduction), as part of your security policy. Only someone with administrative rights on the organization's root management group can do this task.
61
68
@@ -65,7 +72,7 @@ For more information, see [Customize the SQL information protection policy in Mi
65
72
66
73
After the organization-wide policy has been defined, you can continue classifying individual databases by using your customized policy.
67
74
68
-
### Classify your database
75
+
### Classify database in SQL Information Protection policy mode
69
76
70
77
> [!NOTE]
71
78
> The below example uses Azure SQL Database, but you should select the appropriate product that you want to configure Data Discovery & Classification.
@@ -105,13 +112,43 @@ After the organization-wide policy has been defined, you can continue classifyin
105
112
106
113
1. To complete your classification and persistently label (tag) the database columns with the new classification metadata, select **Save** in the **Classification** page.
107
114
115
+
### Microsoft Information Protection policy
116
+
117
+
Microsoft Information Protection (MIP) labels provide a simple and uniform way for users to classify sensitive data uniformly across different Microsoft applications. MIP sensitivity labels are created and managed in [Microsoft 365 compliance center](https://compliance.microsoft.com/). To learn how to create and publish MIP sensitive labels in Microsoft 365 compliance center, see the article, [Create and publish sensitivity labels](/microsoft-365/compliance/create-sensitivity-labels).
118
+
119
+
#### Prerequisites to switch to MIP policy
120
+
121
+
- The current user has tenant wide security admin permissions to apply policy at the tenant root management group level. For more information, see [Grant tenant-wide permissions to yourself](/azure/defender-for-cloud/tenant-wide-permissions-management#grant-tenant-wide-permissions-to-yourself).
122
+
- Your tenant has an active Microsoft 365 subscription and you have labels published for the current user. For more information, see [Create and configure sensitivity labels and their policies](/microsoft-365/compliance/create-sensitivity-labels).
123
+
124
+
### Classify database in Microsoft Information Protection policy mode
125
+
126
+
1. Go to the [Azure portal](https://portal.azure.com).
127
+
1. Navigate to your database in Azure SQL Database
128
+
1. Go to **Data Discovery & Classification** under the **Security** heading in your database pane.
129
+
1. To select **Microsoft Information Protection policy**, select the **Overview** tab, and select **Configure**.
130
+
1. Select **Microsoft Information Protection policy** in the **Information Protection policy** options, and select **Save**.
131
+
132
+
:::image type="content" source="./media/data-discovery-and-classification-overview/select-microsoft-information-protection-policy.png" alt-text="Screenshot of selecting Microsoft Information Protection policy for Azure SQL Database." lightbox="./media/data-discovery-and-classification-overview/select-microsoft-information-protection-policy.png":::
133
+
134
+
1. If you go to the **Classification** tab, or select **Add classification**, you will now see M365 sensitivity labels appear in the **Sensitivity label** dropdown.
135
+
136
+
:::image type="content" source="./media/data-discovery-and-classification-overview/select-sensitivity-label.png" alt-text="Screenshot of Sensitivity label dropdown.":::
137
+
138
+
:::image type="content" source="./media/data-discovery-and-classification-overview/sensitivity-label-classification-tab.png" alt-text="Screenshot of Sensitivity label in the Classification tab." lightbox="./media/data-discovery-and-classification-overview/sensitivity-label-classification-tab.png":::
139
+
140
+
- Information type is `[n/a]` while you are in MIP policy mode and automatic data discovery & recommendations remain disabled.
141
+
- A warning icon may appear against an already classified column if the column was classified using a different Information Protection policy than the currently active policy. For example, if the column was classified with a label using SQL Information Protection policy earlier and now you are in Microsoft Information Protection policy mode. You will see a warning icon against that specific column. This warning icon does not indicate any problem, but is used only for information purposes.
142
+
143
+
:::image type="content" source="./media/data-discovery-and-classification-overview/classification-warning.png" alt-text="Screenshot of warnings for classified columns because of different Information Protection policies." lightbox="./media/data-discovery-and-classification-overview/classification-warning.png":::
144
+
108
145
## <aid="audit-sensitive-data"></a>Audit access to sensitive data
109
146
110
-
An important aspect of the classification is the ability to monitor access to sensitive data. [Azure SQL Auditing](/azure/azure-sql/database/auditing-overview) has been enhanced to include a new field in the audit log called `data_sensitivity_information`. This field logs the sensitivity classifications (labels) of the data that was returned by a query. Here's an example:
147
+
An important aspect of the classification is the ability to monitor access to sensitive data. [Azure SQL Auditing](../../azure-sql/database/auditing-overview.md) has been enhanced to include a new field in the audit log called `data_sensitivity_information`. This field logs the sensitivity classifications (labels) of the data that was returned by a query. Here's an example:
These are the activites that are actually auditable with sensitivity information:
151
+
These are the activities that are actually auditable with sensitivity information:
115
152
- ALTER TABLE ... DROP COLUMN
116
153
- BULK INSERT
117
154
- DELETE
@@ -129,7 +166,7 @@ These are the activites that are actually auditable with sensitivity information
129
166
- DBCC SHOW_STATISTICS
130
167
- sys.dm_db_stats_histogram
131
168
132
-
Use [sys.fn_get_audit_file](/sql/relational-databases/system-functions/sys-fn-get-audit-file-transact-sql) to returns information from an audit file stored in an Azure Storage account.
169
+
Use [sys.fn_get_audit_file](/sql/relational-databases/system-functions/sys-fn-get-audit-file-transact-sql) to return information from an audit file stored in an Azure Storage account.
133
170
134
171
## <aid="permissions"></a>Permissions
135
172
@@ -223,11 +260,11 @@ You can use the following SQL drivers to retrieve classification metadata:
223
260
224
261
## FAQ - Advanced classification capabilities
225
262
226
-
**Question**: Will [Microsoft Purview](/azure/purview/overview) replace SQL Data Discovery & Classification or will SQL Data Discovery & Classification be retired soon?
227
-
**Answer**: We continue to support SQL Data Discovery & Classification and encourage you to adopt [Microsoft Purview](/azure/purview/overview) which has richer capabilities to drive advanced classification capabilities and data governance. If we decide to retire any service, feature, API or SKU, you will receive advance notice including a migration or transition path. Learn more about Microsoft Lifecycle policies here.
263
+
**Question**: Will [Azure Purview](/azure/purview/overview) replace SQL Data Discovery & Classification or will SQL Data Discovery & Classification be retired soon?
264
+
**Answer**: We continue to support SQL Data Discovery & Classification and encourage you to adopt [Azure Purview](/azure/purview/overview) which has richer capabilities to drive advanced classification capabilities and data governance. If we decide to retire any service, feature, API or SKU, you will receive advance notice including a migration or transition path. Learn more about Microsoft Lifecycle policies [here](/lifecycle/index).
228
265
229
266
## Next steps
230
267
231
-
- Consider configuring [Azure SQL Auditing](/azure/azure-sql/database/auditing-overview) for monitoring and auditing access to your classified sensitive data.
268
+
- Consider configuring [Azure SQL Auditing](../../azure-sql/database/auditing-overview.md) for monitoring and auditing access to your classified sensitive data.
232
269
- For a presentation that includes data Discovery & Classification, see [Discovering, classifying, labeling & protecting SQL data | Data Exposed](https://www.youtube.com/watch?v=itVi9bkJUNc).
233
-
- To classify your Azure SQL Databases and Azure Synapse Analytics with Microsoft Purview labels using T-SQL commands, see [Classify your Azure SQL data using Microsoft Purview labels](/azure/sql-database/scripts/sql-database-import-purview-labels).
270
+
- To classify your Azure SQL Databases and Azure Synapse Analytics with Azure Purview labels using T-SQL commands, see [Classify your Azure SQL data using Azure Purview labels](/azure/sql-database/scripts/sql-database-import-purview-labels).
0 commit comments