Azure SQL vulnerability assessment unable to access storage account despite permission being granted?

Todd Janson 1 Reputation point
2021-03-25T18:09:51.977+00:00

I'm having a strange issue with setting up Azure SQL vulnerability assessments. I am trying to target a storage account within the same subscription. My Azure SQL has been granted the "Storage Blob Data Contributor" role on the storage account, and I am able to select it through the portal as the target but it disappears after I have saved and reloaded the blade. When I attempt to run a scan manually, I get a message saying:

"The configured storage account 'xxxxxxxxx' was not found in the subscriptions selected by your Global subscription filter, or you don't have permission to access it. Please add the subscription corresponding to the configured storage to your Global filter settings."

The oddest part is that a handful of existing storage accounts with no discernable difference in configuration seem to work just fine. I've tried a number of storage accounts, some work and some don't and I can't seem to figure out why. I didn't find anything in existing documentation that would indicate a setting I need to ensure is enabled. Does anyone know if I am missing something or what might be causing this issue?

Azure SQL Database
Azure Storage Accounts
Azure Storage Accounts
Globally unique resources that provide access to data management services and serve as the parent namespace for the services.
2,687 questions
Azure Blob Storage
Azure Blob Storage
An Azure service that stores unstructured data in the cloud as blobs.
2,428 questions
Azure App Service
Azure App Service
Azure App Service is a service used to create and deploy scalable, mission-critical web apps.
6,876 questions
{count} votes

2 answers

Sort by: Most helpful
  1. Navtej Singh Saini 4,216 Reputation points Microsoft Employee
    2021-03-30T00:41:24.74+00:00

    @Todd Janson We have check and found that this is UI bug and there is ETA for the resolution at this point and we are trying to get more info regarding this.

    Regards
    Navtej S

    1 person found this answer helpful.

  2. Jeff Noyes 1 Reputation point
    2022-08-25T21:24:49.867+00:00

    I resolved this here -Under the SQL instance -

    Security
    Microsoft Defender for Cloud
    Enabled at the subscription-level (Configure) <-- click
    VULNERABILITY ASSESSMENT SETTINGS
    Storage account
    Select Storage Account

    0 comments No comments