Policy: Azure > SQL > Server > Advanced Data Security > Vulnerability Assessment > Storage Account
Define the storage account where scan results for all databases on the server will be stored.
The storage account name is required. If the container name is not specified, then vulnerability-assessment
is taken as default.
example: - teststorageaccount - teststorageaccount/containername<br /><br />
Note: To avoid cross-region reads/writes of audit records, Azure highly recommends to use storage and server located in the same region.
Resource Types
This policy targets the following resource types:
Primary Policy
This policy is used with the following primary policy:
Controls
Policy Packs
This policy setting is used by the following policy packs:
Policy Specification
Schema Type |
|
---|---|
Examples [YAML] | teststorageaccount/container-name |
Category
In Your Workspace
Developers
- tmod:@turbot/turbot#/control/categories/other
- tmod:@turbot/azure-sql#/policy/types/serverVulnerabilityAssessmentStorageAccount
- turbot graphql policy-type --id "tmod:@turbot/azure-sql#/policy/types/serverVulnerabilityAssessmentStorageAccount"
- turbot graphql policy-settings --filter "policyTypeId:tmod:@turbot/azure-sql#/policy/types/serverVulnerabilityAssessmentStorageAccount"
Get Policy TypeGet Policy Settings
Category URI
Policy Type URI
GraphQL
CLI