question

MatthiasCermak-1224 avatar image
0 Votes"
MatthiasCermak-1224 asked MatthiasCermak-1224 edited

Security Center says to enable Transparent Data Encryption for SQL DBs... but it's already on?

Hey there!

I am reviewing the Security Center of an Azure subscription, but I noticed that it's recommending that I turn on Transparent Data Encryption for two databases that already had Transparent Data Encryption enabled - and reviewing the settings shows that it very much still IS enabled, and in fact had been for months. This alert is "new" tho, only started showing up for me three days ago.

For one of the databases, I already tried to disable and reenable Transparent Data Encryption three days ago, and it didn't help.

Is this a bug or is there anything I can do, aside from ignoring it?

EDIT: This issue persisted until last Friday (July 16th), but today (July 19th) it seems to be gone. So, given I didn't change anything in the meantime... I'm gonna say temporary bug.

azure-sql-databaseazure-security-center
5 |1600 characters needed characters left characters exceeded

Up to 10 attachments (including images) can be used with a maximum of 3.0 MiB each and 30.0 MiB total.

1 Answer

AlbertoMorillo avatar image
1 Vote"
AlbertoMorillo answered MatthiasCermak-1224 commented

This recommendation usually comes with a Quick Fix option, that helps you "turn on" the data encryption on the unhealthy resources in a single-click. Could you try that option to see if that eradicate the issue?

Try also this PowerShell script.



· 1
5 |1600 characters needed characters left characters exceeded

Up to 10 attachments (including images) can be used with a maximum of 3.0 MiB each and 30.0 MiB total.

Thanks, we already tried the Quick Fix option when it first occurred, and it didn't solve the issue at the time.
It still reported the same erroneous recommendation until Friday, but today it seems to have miraculously fixed itself.

So, yeah - putting my money on a temporary glitch.

But thanks for your time and the recommendation!

0 Votes 0 ·