Start-AzSqlInstanceDatabaseVulnerabilityAssessmentScan
Inicia un examen de evaluación de vulnerabilidades.
Syntax
Start-AzSqlInstanceDatabaseVulnerabilityAssessmentScan
[-InstanceName] <String>
[-DatabaseName] <String>
[-AsJob]
[-ScanId <String>]
[-ResourceGroupName] <String>
[-DefaultProfile <IAzureContextContainer>]
[-WhatIf]
[-Confirm]
[<CommonParameters>]
Start-AzSqlInstanceDatabaseVulnerabilityAssessmentScan
-InputObject <AzureSqlManagedDatabaseModel>
[-AsJob]
[-ScanId <String>]
[-ResourceGroupName] <String>
[-DefaultProfile <IAzureContextContainer>]
[-WhatIf]
[-Confirm]
[<CommonParameters>]
Description
El cmdlet Start-AzSqlInstanceDatabaseVulnerabilityAssessmentScan desencadena un examen con el identificador ScanId. Los resultados del examen se guardarán en el almacenamiento definido por el cmdlet Update-AzSqlInstanceVulnerabilityAssessmentSetting, en scans/{ManagedInstanceName}/{ManagedDatabaseName}/scan_{ScanId}.json Puede supervisar el progreso del examen mediante el cmdlet Get-AzSqlInstanceDatabaseVulnerabilityAssessmentScanRecord con el parámetro scanId y examine el parámetro State devuelto. Tenga en cuenta que debe ejecutar el cmdlet Enable-AzSqlInstanceAdvancedDataSecurity y Update-AzSqlInstanceVulnerabilityAssessmentSetting como requisito previo para usar estos cmdlets.
Ejemplos
Ejemplo 1: Inicia un examen de evaluación de vulnerabilidades
Start-AzSqlInstanceDatabaseVulnerabilityAssessmentScan `
-ResourceGroupName "ResourceGroup01" `
-InstanceName "ManagedInstance01" `
-DatabaseName "Database01" `
-ScanId "myScan"
ResourceGroupName : ResourceGroup01
InstanceName : ManagedInstance01
DatabaseName : Database01
ScanId : myScan
TriggerType : OnDemand
State : Fail
StartTime : 6/11/2018 1:57:27 PM
EndTime : 6/11/2018 1:57:31 PM
Errors : {}
ScanResultsLocationPath : https://myaccount.blob.core.windows.net/vulnerability-assessment
scans/ManagedInstance01/Database01/scan_myScan.json
NumberOfFailedSecurityChecks : 9
Ejemplo 2: Inicia un examen de evaluación de vulnerabilidades sin un identificador de examen específico
Start-AzSqlInstanceDatabaseVulnerabilityAssessmentScan `
-ResourceGroupName "ResourceGroup01" `
-InstanceName "ManagedInstance01" `
-DatabaseName "Database01"
ResourceGroupName : ResourceGroup01
InstanceName : ManagedInstance01
DatabaseName : Database01
ScanId : 20180611_135726
TriggerType : OnDemand
State : Fail
StartTime : 6/11/2018 1:57:27 PM
EndTime : 6/11/2018 1:57:31 PM
Errors : {}
ScanResultsLocationPath : https://myaccount.blob.core.windows.net/vulnerability-assessment
scans/ManagedInstance01/Database01/scan_myScan.json
NumberOfFailedSecurityChecks : 9
Este comando genera un identificador de examen con el formato "yyyyMMdd_HHmmss" a partir de la fecha y hora UTC.
Ejemplo 3: Inicia un examen de evaluación de vulnerabilidades en segundo plano
$scanJob = Start-AzSqlInstanceDatabaseVulnerabilityAssessmentScan `
-ResourceGroupName "ResourceGroup01" `
-InstanceName "ManagedInstance01" `
-DatabaseName "Database01" `
-ScanId "myScan" `
-AsJob
$scanJob | Wait-Job
$scanJob | Receive-Job
ResourceGroupName : ResourceGroup01
InstanceName : ManagedInstance01
DatabaseName : Database01
ScanId : myScan
TriggerType : OnDemand
State : Fail
StartTime : 6/11/2018 1:57:27 PM
EndTime : 6/11/2018 1:57:31 PM
Errors : {}
ScanResultsLocationPath : https://myaccount.blob.core.windows.net/vulnerability-assessment
scans/ManagedInstance01/Database01/scan_myScan.json
NumberOfFailedSecurityChecks : 9
Ejemplo 4: Inicia un examen de evaluación de vulnerabilidades con un objeto de base de datos administrado
Get-AzSqlInstanceDatabase `
-ResourceGroupName "ResourceGroup01" `
-InstanceName "ManagedInstance01" `
-Name "Database01" `
| Start-AzSqlInstanceDatabaseVulnerabilityAssessmentScan
ResourceGroupName : ResourceGroup01
InstanceName : ManagedInstance01
DatabaseName : Database01
ScanId : 20180611_135726
TriggerType : OnDemand
State : Fail
StartTime : 6/11/2018 1:57:27 PM
EndTime : 6/11/2018 1:57:31 PM
Errors : {}
ScanResultsLocationPath : https://myaccount.blob.core.windows.net/vulnerability-assessment
scans/ManagedInstance01/Database01/scan_myScan.json
NumberOfFailedSecurityChecks : 9
Ejemplo 5: inicia un examen de evaluación de vulnerabilidades en todas las bases de datos de una instancia administrada
Get-AzSqlInstanceDatabase `
-ResourceGroupName "ResourceGroup01" `
-InstanceName "ManagedInstance01" `
| Where-Object {$_.Name -ne "master"} `
| Start-AzSqlInstanceDatabaseVulnerabilityAssessmentScan
ResourceGroupName : ResourceGroup01
InstanceName : ManagedInstance01
DatabaseName : Database01
ScanId : 20180611_135726
TriggerType : OnDemand
State : Fail
StartTime : 6/11/2018 1:57:27 PM
EndTime : 6/11/2018 1:57:31 PM
Errors : {}
ScanResultsLocationPath : https://myaccount.blob.core.windows.net/vulnerability-assessment
scans/ManagedInstance01/Database01/scan_myScan.json
NumberOfFailedSecurityChecks : 9
ResourceGroupName : ResourceGroup01
InstanceName : ManagedInstance01
DatabaseName : Database02
ScanId : 20180611_135726
TriggerType : OnDemand
State : Fail
StartTime : 6/11/2018 1:57:27 PM
EndTime : 6/11/2018 1:57:31 PM
Errors : {}
ScanResultsLocationPath : https://myaccount.blob.core.windows.net/vulnerability-assessment
scans/ManagedInstance01/Database02/scan_myScan.json
NumberOfFailedSecurityChecks : 9
Parámetros
-AsJob
Ejecución del cmdlet en segundo plano
Type: | SwitchParameter |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-Confirm
Le solicita su confirmación antes de ejecutar el cmdlet.
Type: | SwitchParameter |
Aliases: | cf |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-DatabaseName
Nombre de base de datos administrada de SQL.
Type: | String |
Position: | 2 |
Default value: | None |
Required: | True |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-DefaultProfile
Credenciales, cuenta, inquilino y suscripción usados para la comunicación con Azure.
Type: | IAzureContextContainer |
Aliases: | AzContext, AzureRmContext, AzureCredential |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-InputObject
El objeto de base de datos administrada para obtener la configuración de evaluación de vulnerabilidades de .
Type: | AzureSqlManagedDatabaseModel |
Position: | Named |
Default value: | None |
Required: | True |
Accept pipeline input: | True |
Accept wildcard characters: | False |
-InstanceName
Nombre de sql Instancia administrada.
Type: | String |
Position: | 1 |
Default value: | None |
Required: | True |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-ResourceGroupName
Nombre del grupo de recursos.
Type: | String |
Position: | 0 |
Default value: | None |
Required: | True |
Accept pipeline input: | True |
Accept wildcard characters: | False |
-ScanId
Especifica el identificador de examen.
Type: | String |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | True |
Accept wildcard characters: | False |
-WhatIf
Muestra lo que sucedería si se ejecutara el cmdlet. El cmdlet no se ejecuta.
Type: | SwitchParameter |
Aliases: | wi |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
Entradas
Salidas
Comentarios
https://aka.ms/ContentUserFeedback.
Próximamente: A lo largo de 2024 iremos eliminando gradualmente GitHub Issues como mecanismo de comentarios sobre el contenido y lo sustituiremos por un nuevo sistema de comentarios. Para más información, vea:Enviar y ver comentarios de