Policy: Azure > SQL > Database > Advanced Data Security > Vulnerability Assessment > Storage Account
Define the storage account where scan results for database will be stored.
The storage account name is required. If the container name is not specified, then vulnerability-assessment is taken as default.
example:    - teststorageaccount   - teststorageaccount/containername<br /><br /> Note: To avoid cross-region reads/writes of audit records, Azure highly recommends to use storage and server located in the same region.
Targets
This policy targets the following resource types:
Primary Policy
This policy is used with the following primary policy:
Controls
Setting this policy configures this control:
Policy Specification
| Schema Type |  | 
|---|---|
| Examples [YAML] | teststorageaccount/container-name | 
Category
In Your Workspace
Developers
- tmod:@turbot/turbot#/control/categories/other
 
- tmod:@turbot/azure-sql#/policy/types/databaseVulnerabilityAssessmentStorageAccount
 
- turbot graphql policy-type --id "tmod:@turbot/azure-sql#/policy/types/databaseVulnerabilityAssessmentStorageAccount"
- turbot graphql policy-settings --filter "policyTypeId:tmod:@turbot/azure-sql#/policy/types/databaseVulnerabilityAssessmentStorageAccount"
 Get Policy TypeGet Policy Settings
Category URI
Policy Type URI
GraphQL
CLI