last sync: 2021-Jan-25 16:07:05 UTC

Azure Policy definition

[Deprecated]: Advanced data security settings for SQL Managed Instance should contain an email address for security alerts

Name [Deprecated]: Advanced data security settings for SQL Managed Instance should contain an email address for security alerts
Azure Portal
Id 3965c43d-b5f4-482e-b74a-d89ee0e0b3a8
Version 1.0.1-deprecated
details on versioning
Category SQL
Microsoft docs
Description Ensure that an email address is provided for the 'Send alerts to' field in the advanced data security settings. This email address receives alert notifications when anomalous activities are detected on SQL Managed Instance.
Mode Indexed
Type BuiltIn
Preview FALSE
Deprecated True
Effect Default: Disabled
Allowed: (AuditIfNotExists, Disabled)
Used RBAC Role none
History
Date/Time (UTC ymd) (i) Change type Change detail
2020-08-05 13:05:29 change Previous DisplayName: [Deprecated]: Advanced data security settings for SQL Managed Instance should contain an email address to receive security alerts
2020-07-01 14:50:07 change Previous DisplayName: Advanced data security settings for SQL managed instance should contain an email address to receive security alerts
Used in Initiatives none
Json
{
  "properties": {
  "displayName": "[Deprecated]: Advanced data security settings for SQL Managed Instance should contain an email address for security alerts",
    "policyType": "BuiltIn",
    "mode": "Indexed",
    "description": "Ensure that an email address is provided for the 'Send alerts to' field in the advanced data security settings. This email address receives alert notifications when anomalous activities are detected on SQL Managed Instance.",
    "metadata": {
      "version": "1.0.1-deprecated",
      "category": "SQL",
      "deprecated": true
    },
    "parameters": {
      "effect": {
        "type": "String",
        "metadata": {
        "displayName": "[Deprecated]: Effect",
          "description": "Enable or disable the execution of the policy"
        },
        "allowedValues": [
          "AuditIfNotExists",
          "Disabled"
        ],
        "defaultValue": "Disabled"
      }
    },
    "policyRule": {
      "if": {
        "field": "type",
        "equals": "Microsoft.Sql/managedInstances"
      },
      "then": {
      "effect": "[parameters('effect')]",
        "details": {
          "type": "Microsoft.Sql/managedInstances/securityAlertPolicies",
          "name": "default",
          "existenceCondition": {
            "allOf": [
              {
              "field": "Microsoft.Sql/managedInstances/securityAlertPolicies/emailAddresses[*]",
                "notEquals": ""
              },
              {
              "field": "Microsoft.Sql/managedInstances/securityAlertPolicies/emailAddresses[*]",
                "exists": "true"
              }
            ]
          }
        }
      }
    }
  },
  "id": "/providers/Microsoft.Authorization/policyDefinitions/3965c43d-b5f4-482e-b74a-d89ee0e0b3a8",
  "type": "Microsoft.Authorization/policyDefinitions",
  "name": "3965c43d-b5f4-482e-b74a-d89ee0e0b3a8"
}