Using Console
Using CLI
az login
.
az account set --subscription <subscription_id>
.
az storage account create --name <storage_account_name> --resource-group <resource_group_name> --location <location> --sku Standard_LRS
, where <storage_account_name>
is the name of the storage account, <resource_group_name>
is the name of the resource group in which the storage account will be created, and <location>
is the location where the storage account will be created.
az sql server va create --resource-group <resource_group_name> --server <sql_server_name> --storage-account <storage_account_name> --storage-key <storage_account_key> --scan-results-container-name <container_name>
, where <resource_group_name>
is the name of the resource group in which the SQL Server is running, <sql_server_name>
is the name of the SQL Server, <storage_account_name>
is the name of the storage account created in step 3, <storage_account_key>
is the access key of the storage account, and <container_name>
is the name of the container in which the vulnerability assessment scan results will be stored.
az sql server va scan create --resource-group <resource_group_name> --server <sql_server_name> --scan-id <scan_id>
, where <resource_group_name>
is the name of the resource group in which the SQL Server is running, <sql_server_name>
is the name of the SQL Server, and <scan_id>
is the ID of the vulnerability assessment scan.
Using Python
<subscription_id>
, <resource_group_name>
, <server_name>
, <database_name>
, <storage_account_name>
, <storage_account_key>
, <location>
and <container_path>
with the appropriate values for your environment.