Policy: Azure > SQL > Server > Advanced Data Security > Threat Protection > Email Addresses
Define the email addresses to receive an email notification upon detection of anomalous database activities.
The email provides information on the suspicious security event including the nature of the anomalous activities, database name, server name, application name, and the event time. In addition, the email provides information on possible causes and recommended actions to investigate and mitigate the potential threat to the database.
Resource Types
This policy targets the following resource types:
Primary Policy
This policy is used with the following primary policy:
Controls
Policy Packs
This policy setting is used by the following policy packs:
Policy Specification
Schema Type |
|
---|---|
Default |
|
Category
In Your Workspace
Developers
- tmod:@turbot/turbot#/control/categories/other
- tmod:@turbot/azure-sql#/policy/types/serverThreatProtectionEmailAddresses
- turbot graphql policy-type --id "tmod:@turbot/azure-sql#/policy/types/serverThreatProtectionEmailAddresses"
- turbot graphql policy-settings --filter "policyTypeId:tmod:@turbot/azure-sql#/policy/types/serverThreatProtectionEmailAddresses"
Get Policy TypeGet Policy Settings
Category URI
Policy Type URI
GraphQL
CLI