Migreringsguide för Az 3.0.0

I det här dokumentet beskrivs ändringarna mellan 2.0.0 och 3.0.0-versionerna av Az

Batch

Get-AzBatchNodeAgentSku

  • Togs Get-AzBatchNodeAgentSku bort och ersatts med Get-AzBatchSupportedImage .
  • Get-AzBatchSupportedImage returnerar samma data som Get-AzBatchNodeAgentSku men i ett mer användarvänligt format.
  • Nya icke-verifierade bilder returneras nu också. Ytterligare information om Capabilities och för varje bild ingår BatchSupportEndOfLife också.

Före

$Context = Get-AzBatchAccountKeys -AccountName "ContosoBatchAccount"
Get-AzBatchNodeAgentSku -BatchContext $Context

Efter

$Context = Get-AzBatchAccountKey -AccountName "ContosoBatchAccount"
Get-AzBatchSupportedImage -BatchContext $Context

Tidigare versionskompatibilitet med Az.Resources Module

Version 2.0.1 av modulen Az.Batch är inte kompatibel med tidigare versioner (version 1.7.0 eller tidigare) av az.resources-modulen. Det innebär att det inte går att importera version 1.7.0 av az.resources-modulen när version 2.0.1 av modulen Az.Batch importeras. Du kan lösa problemet genom att uppdatera modulen Az.Resources till version 1.7.1 eller senare eller genom att installera den senaste versionen av Az-modulen.

Beräkna

New-AzDiskConfig

UploadSizeInBytesparameter används i stället DiskSizeGB för när New-AzDiskConfig CreateOption används Upload

Före

$diskconfig = New-AzDiskConfig -Location 'Central US' -DiskSizeGB 1023 -SkuName Standard_LRS -OsType Windows -CreateOption Upload -DiskIOPSReadWrite 500 -DiskMBpsReadWrite 8

Efter

$diskconfig = New-AzDiskConfig -Location 'Central US' -UploadSizeInBytes 1023 * 1024 * 1024 * 1024 -SkuName Standard_LRS -OsType Windows -CreateOption Upload -DiskIOPSReadWrite 500 -DiskMBpsReadWrite 8

HDInsight

Get-AzHDInsightJobOutput

  • Uppdaterade Get-AzHDInsightJobOutput cmdleten för att stödja detaljerad rollbaserad åtkomst till lagringsnyckeln.
  • Användare med HDInsight-klusteroperator, deltagare eller ägarroller påverkas inte.
  • Användare med endast rollen Läsare måste uttryckligen ange DefaultStorageAccountKey parameter.

Före

Get-AzHDInsightJobOutput  -ClusterName $clusterName -JobId $jobId

Efter

Get-AzHDInsightJobOutput -ClusterName $clusterName -JobId $jobId -DefaultStorageAccountKey $storageAccountKey

Add-AzHDInsightConfigValues

Cmdlet Add-AzHDInsightConfigValue borttaget alias till Add-AzHDInsightConfigValues .

Före

Använda inaktuella alias

Add-AzHDInsightConfigValues

Efter

Add-AzHDInsightConfigValue

Disable-AzHDInsightMonitoring

Lade till en Disable-AzHDInsightMonitoring ny cmdlet. Använd den här cmdleten för att inaktivera övervakning i ett HDInsight-kluster (ersätter Disable-AzHDInsightOperationsManagementSuite och Disable-AzHDInsightOMS ).

Före

Disable-AzHDInsightOMS -Name testcluster
Disable-AzHDInsightOperationsManagementSuite -Name testcluster

Efter

Disable-AzHDInsightMonitoring -Name testcluster

Enable-AzHDInsightMonitoring

Lade till en Enable-AzHDInsightMonitoring ny cmdlet. Använd den här cmdleten för att aktivera övervakning i ett HDInsight-kluster (ersätter Enable-AzHDInsightOperationsManagementSuite och Enable-AzHDInsightOMS ).

Före

Enable-AzHDInsightOMS Enable-AzHDInsightMonitoring -Name testcluster -WorkspaceId 1d364e89-bb71-4503-aa3d-a23535aea7bd -PrimaryKey <key for workspace 1d364e89-bb71-4503-aa3d-a23535aea7bd>
Enable-AzHDInsightOperationsManagementSuite Enable-AzHDInsightMonitoring -Name testcluster -WorkspaceId 1d364e89-bb71-4503-aa3d-a23535aea7bd -PrimaryKey <key for workspace 1d364e89-bb71-4503-aa3d-a23535aea7bd>

Efter

Enable-AzHDInsightMonitoring Enable-AzHDInsightMonitoring -Name testcluster -WorkspaceId 1d364e89-bb71-4503-aa3d-a23535aea7bd -PrimaryKey <key for workspace 1d364e89-bb71-4503-aa3d-a23535aea7bd>

Get-AzHDInsightMonitoring

Lade till en Get-AzHDInsightMonitoring ny cmdlet. Använd den här cmdleten för att få status för övervakningsinstallationen i ett Azure HDInsight-kluster (ersätter Get-AzHDInsightOperationsManagementSuite och Get-AzHDInsightOMS ).

Före

Get-AzHDInsightOMS -Name testcluster
Get-AzHDInsightOperationsManagementSuite -Name testcluster

Efter

Get-AzHDInsightMonitoring -Name testcluster

Get-AzHDInsightProperty

Cmdlet Get-HDInsightProperty borttaget alias till Get-AzHDInsightProperties .

Före

Använda inaktuella alias

Get-AzHDInsightProperties -Location "East US 2"

Efter

Get-AzHDInsightProperty -Location "East US 2"

Grant-AzHDInsightRdpServicesAccess

Tog bort Grant-AzHDInsightRdpServicesAccess Revoke-AzHDInsightRdpServicesAccess cmdlet:arna och. De behövs inte längre eftersom kluster som Windows operativsystemstypen inte stöds. Skapa ett kluster med hjälp av Linux OS-typ i stället.

Remove-AzHDInsightCluster

Utdatatypen för Remove-AzHDInsightCluster ändrad från Microsoft.Azure.Management.HDInsight.Models.ClusterGetResponse till bool .

Före

$cluster = Remove-AzHDInsightCluster -ClusterName "your-hadoop-001"

Efter

Remove-AzHDInsightCluster -ClusterName "your-hadoop-001" -PassThru
True

Revoke-AzHDInsightRdpServicesAccess

Cmdleten är inaktuell. Den ersätts inte.

Set-AzHDInsightGatewayCredential

Utdatatypen för Set-AzHDInsightGatewayCredential ändrad från HttpConnectivitySettings till AzureHDInsightGatewaySettings .

IotHub

New-AzIotHubImportDevices

Detta alias tas bort. Använd i New-AzIotHubImportDevice stället.

Före

New-AzIotHubImportDevices -ResourceGroupName "myresourcegroup" -Name "myiothub" -InputBlobContainerUri "https://mystorageaccount.blob.core.windows.net/mystoragecontainer?sv=2015-04-05&ss=bfqt&sr=c&srt=sco&sp=rwdl&se=2016-10-27T04:01:48Z&st=2016-10-26T20:01:48Z&spr=https&sig=QqpIhHsIMF8hNuFO%3D" -OutputBlobContainerUri "https://mystorageaccount.blob.core.windows.net/?sv=2015-04-05&ss=bfqt&sr=c&srt=sco&sp=rwdl&se=2016-10-27T04:01:48Z&st=2016-10-26T20:01:48Z&spr=https&sig=QqpIhHsIMF8hNuFO%3D"

Efter

New-AzIotHubImportDevice -ResourceGroupName "myresourcegroup" -Name "myiothub" -InputBlobContainerUri "https://mystorageaccount.blob.core.windows.net/mystoragecontainer?sv=2015-04-05&ss=bfqt&sr=c&srt=sco&sp=rwdl&se=2016-10-27T04:01:48Z&st=2016-10-26T20:01:48Z&spr=https&sig=QqpIhHsIMF8hNuFO%3D" -OutputBlobContainerUri "https://mystorageaccount.blob.core.windows.net/?sv=2015-04-05&ss=bfqt&sr=c&srt=sco&sp=rwdl&se=2016-10-27T04:01:48Z&st=2016-10-26T20:01:48Z&spr=https&sig=QqpIhHsIMF8hNuFO%3D"

New-AzIotHubExportDevices

Detta alias tas bort. Använd i New-AzIotHubExportDevice stället.

Före

New-AzIotHubExportDevices -ResourceGroupName "myresourcegroup" -Name "myiothub" -ExportBlobContainerUri "https://mystorageaccount.blob.core.windows.net/mystoragecontainer?sv=2015-04-05&ss=bfqt&sr=c&srt=sco&sp=rwdl&se=2016-10-27T04:01:48Z&st=2016-10-26T20:01:48Z&spr=https&sig=QqpIhHsIMF8hNuFO%3D" -ExcludeKeys

Efter

New-AzIotHubExportDevice -ResourceGroupName "myresourcegroup" -Name "myiothub" -ExportBlobContainerUri "https://mystorageaccount.blob.core.windows.net/mystoragecontainer?sv=2015-04-05&ss=bfqt&sr=c&srt=sco&sp=rwdl&se=2016-10-27T04:01:48Z&st=2016-10-26T20:01:48Z&spr=https&sig=QqpIhHsIMF8hNuFO%3D" -ExcludeKeys

Add-AzIotHubEventHubConsumerGroup

Parametern är inaktuell utan att ersättas eftersom IotHub levereras med endast en inbyggd slutpunkt("händelser") som kan EventHubEndPointName hantera system- och enhetsmeddelanden.

Före

Add-AzIotHubEventHubConsumerGroup -ResourceGroupName "myresourcegroup" -Name "myiothub" -EventHubConsumerGroupName "myconsumergroup" -EventHubEndpointName "/EventHubEndpointName"

Efter

Add-AzIotHubEventHubConsumerGroup -ResourceGroupName "myresourcegroup" -Name "myiothub" -EventHubConsumerGroupName "myconsumergroup"

Get-AzIotHubEventHubConsumerGroup

Parametern är inaktuell utan att ersättas eftersom IotHub levereras med endast en inbyggd slutpunkt("händelser") som kan EventHubEndPointName hantera system- och enhetsmeddelanden.

Före

Get-AzIotHubEventHubConsumerGroup -ResourceGroupName "myresourcegroup" -Name "myiothub" -EventHubEndpointName "/EventHubEndpointName"

Efter

Get-AzIotHubEventHubConsumerGroup -ResourceGroupName "myresourcegroup" -Name "myiothub"

Remove-AzIotHubEventHubConsumerGroup

Parametern är inaktuell utan att ersättas eftersom IotHub levereras med endast en inbyggd slutpunkt("händelser") som kan EventHubEndPointName hantera system- och enhetsmeddelanden.

Före

Remove-AzIotHubEventHubConsumerGroup -ResourceGroupName "myresourcegroup" -Name "myiothub" -EventHubConsumerGroupName myconsumergroup -EventHubEndpointName "/EventHubEndpointName"

Efter

Remove-AzIotHubEventHubConsumerGroup -ResourceGroupName "myresourcegroup" -Name "myiothub" -EventHubConsumerGroupName myconsumergroup

Set-AzIotHub

Parametern är inaktuell utan att ersättas eftersom IotHub inte längre använder OperationsMonitoringProperties en inbyggd slutpunkt("åtgärderMonitoringEvents").

RecoveryServices

Edit-AzRecoveryServicesAsrRecoveryPlan

ASRRecoveryPlanGroup.ReplicationProtectedItemsoch ASRRecoveryPlanGroup.StartGroupActions tas bort från ASRRecoveryPlanGroup.EndGroupActions utdata.

Get-AzRecoveryServicesAsrRecoveryPlan

ASRRecoveryPlanGroup.ReplicationProtectedItemsoch ASRRecoveryPlanGroup.StartGroupActions tas bort från ASRRecoveryPlanGroup.EndGroupActions utdata.

New-AzRecoveryServicesAsrReplicationProtectedItem

Parameter IncludeDiskId ändras så att det går att skriva direkt till en hanterad disk i Azure Site Recovery.

Före

$job = New-AzRecoveryServicesAsrReplicationProtectedItem -RecoveryAzureStorageAccountId $recoveryAzureStorageAccountId -IncludeDiskId $includeDiskId -VMwareToAzure -Account $fabric.FabricSpecificDetails.RunAsAccounts[0] -RecoveryResourceGroupId $RecoveryResourceGroupId -RecoveryAzureNetworkId $RecoveryAzureNetworkId -name $name -ProcessServer $fabric.FabricSpecificDetails.ProcessServers[0] -ProtectableItem $protectableItem -ProtectionContainerMapping $pcm -RecoveryAzureSubnetName $RecoveryAzureSubnetName -RecoveryVmName $RecoveryVmName -LogStorageAccountId $LogStorageAccountId

Efter

$disk1 = New-AzRecoveryServicesAsrInMageAzureV2DiskInput -DiskId $diskId -LogStorageAccountId $logStorageAccountId -DiskType $diskType
$disk2 = New-AzRecoveryServicesAsrInMageAzureV2DiskInput -DiskId $diskId2 -LogStorageAccountId $logStorageAccountId -DiskType $diskType2
$job = New-AzRecoveryServicesAsrReplicationProtectedItem -VMwareToAzure -Account $fabric.FabricSpecificDetails.RunAsAccounts[0] -RecoveryResourceGroupId $RecoveryResourceGroupId -RecoveryAzureNetworkId $RecoveryAzureNetworkId -name $name -ProcessServer $fabric.FabricSpecificDetails.ProcessServers[0] -ProtectableItem $protectableItem -ProtectionContainerMapping $pcm -RecoveryAzureSubnetName $RecoveryAzureSubnetName -RecoveryVmName $RecoveryVmName -LogStorageAccountId $LogStorageAccountId -InMageAzureV2DiskInput $disk1,$disk2

Resurser

Tidigare versionskompatibilitet med Az.Batch Module

Version 1.7.1 av modulen Az.Resources är inte kompatibel med tidigare versioner (version 1.1.2 eller tidigare) av modulen Az.Batch. Det innebär att det inte går att importera version 1.1.2 av modulen Az.Batch när version 1.7.1 av modulen Az.Resources importeras. Lös problemet genom att uppdatera modulen Az.Batch till version 2.0.1 eller senare eller genom att installera den senaste versionen av Az-modulen.

ServiceFabric

Add-ServiceFabricApplicationCertificate

Tas Add-ServiceFabricApplicationCertificate bort när det här scenariot täcks av Add-AzVmssSecret .

Före

Add-AzServiceFabricApplicationCertificate -ResourceGroupName "Group1" -Name "Contoso01SFCluster" -SecretIdentifier "http://keyVaultName.vault.contoso.net/secrets/secretName/secretVersion"

Efter

$Vault = Get-AzKeyVault -VaultName "ContosoVault"
$CertConfig = New-AzVmssVaultCertificateConfig -CertificateUrl "http://keyVaultName.vault.contoso.net/secrets/secretName/secretVersion" -CertificateStore "Certificates"
$VMSS = New-AzVmssConfig
Add-AzVmssSecret -VirtualMachineScaleSet $VMSS -SourceVaultId $Vault.ResourceId -VaultCertificate $CertConfig

Sql

Get-AzSqlDatabaseSecureConnectionPolicy

Observera att säker anslutning är inaktuell och att kommandot därför tas bort. Använd databasbladet SQL Azure Portal för att visa anslutningssträngarna

Get-AzSqlDatabaseIndexRecommendations

Get-AzSqlDatabaseIndexRecommendations alias tas bort. Använd Get-AzSqlDatabaseIndexRecommendation i stället.

Get-AzSqlDatabaseRestorePoints

Get-AzSqlDatabaseRestorePoints alias tas bort. Använd Get-AzSqlDatabaseRestorePoint i stället.

Get-AzSqlDatabaseAuditing

  • Cmdleten Get-AzSqlDatabaseAudit ersätter denna cmdlet.
  • Utdatatypen ändras från den befintliga typen :'Microsoft.Azure.Commands.Sql.Auditing.Model.DatabaseBlobAuditingSettingsModel' till den nya typen :'Microsoft.Azure.Commands.Sql.Auditing.Model.DatabaseAuditingSettingsModel', tar bort egenskaper och AuditState StorageAccountName . och StorageAccountSubscriptionId . Skript kan hämta lagringskontoinformation från den nya StorageAccountResourceId egenskapen.

Före

PS C:\> Get-AzSqlDatabaseAuditing -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -DatabaseName "Database01"
DatabaseName                 : database01
AuditAction                  : {}
AuditActionGroup             : {SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP, FAILED_DATABASE_AUTHENTICATION_GROUP,
                                BATCH_COMPLETED_GROUP, ...}
ResourceGroupName            : resourcegroup01
ServerName                   : server01
AuditState                   : Enabled
StorageAccountName           : mystorage
StorageKeyType               : Primary
RetentionInDays              : 0
StorageAccountSubscriptionId : 7fe3301d-31d3-4668-af5e-211a890ba6e3
PredicateExpression          : statement <> 'select 1'

Efter

PS C:\> Get-AzSqlDatabaseAudit -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -DatabaseName "Database01"
ServerName                          : server01
DatabaseName                        : database01
AuditAction                         : {}
ResourceGroupName                   : resourcegroup01
AuditActionGroup                    : {SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP, FAILED_DATABASE_AUTHENTICATION_GROUP,
                                       BATCH_COMPLETED_GROUP, ...}
PredicateExpression                 : statement <> 'select 1'
BlobStorageTargetState              : Enabled
StorageAccountResourceId            : /subscriptions/7fe3301d-31d3-4668-af5e-211a890ba6e3/resourceGroups/resourcegroup01/providers/Microsoft.Storage/storageAccounts/mystorage
StorageKeyType                      : Primary
RetentionInDays                     : 0
EventHubTargetState                 : Enabled
EventHubName                        : eventHubName
EventHubAuthorizationRuleResourceId : EventHubAuthorizationRuleResourceId
LogAnalyticsTargetState             : Enabled
WorkspaceResourceId                 : "/subscriptions/4b9e8510-67ab-4e9a-95a9-e2f1e570ea9c/resourceGroups/insights-integration/providers/Microsoft.OperationalInsights/workspaces/viruela2"

Set-AzSqlDatabaseAuditing

  • Cmdleten Set-AzSqlDatabaseAudit ersätter denna cmdlet.
  • Utdatatypen ändras från den befintliga typen :'Microsoft.Azure.Commands.Sql.Auditing.Model.DatabaseBlobAuditingSettingsModel' till den nya typen :'bool'

Före

Set-AzSqlDatabaseAuditing -State Enabled -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -StorageAccountName "Storage22" -DatabaseName "Database01"

Efter

Set-AzSqlDatabaseAudit -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -DatabaseName "Database01" -BlobStorageTargetState Enabled -StorageAccountResourceId "/subscriptions/7fe3301d-31d3-4668-af5e-211a890ba6e3/resourceGroups/resourcegroup01/providers/Microsoft.Storage/storageAccounts/mystorage"

Get-AzSqlServerAuditing

  • Cmdleten Get-AzSqlServerAudit ersätter denna cmdlet.
  • Utdatatypen ändras från den befintliga typen :'Microsoft.Azure.Commands.Sql.Auditing.Model.DatabaseBlobAuditingSettingsModel' till den nya typen :'Microsoft.Azure.Commands.Sql.Auditing.Model.ServerAuditingSettingsModel'. Egenskaper AuditState StorageAccountName , och tas StorageAccountSubscriptionId bort. Skript som använder StorageAccountName och StorageAccountSubscriptionId proeprties kan hämta den här informationen från den nya StorageAccountResourceId egenskapen.

Före

PS C:\> Get-AzSqlServerAuditing -ResourceGroupName "resourcegroup01" -ServerName "server01"
AuditActionGroup             : {SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP, FAILED_DATABASE_AUTHENTICATION_GROUP, BATCH_COMPLETED_GROUP, ...}
ResourceGroupName            : resourcegroup01
ServerName                   : server01
AuditState                   : Enabled
StorageAccountName           : mystorage
StorageKeyType               : Primary
RetentionInDays              : 0
StorageAccountSubscriptionId : 7fe3301d-31d3-4668-af5e-211a890ba6e3
PredicateExpression          : statement <> 'select 1'

Efter

PS C:\> Get-AzSqlServerAudit -ResourceGroupName "resourcegroup01" -ServerName "server01"
ServerName                          : server01
ResourceGroupName                   : resourcegroup01
AuditActionGroup                    : {SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP, FAILED_DATABASE_AUTHENTICATION_GROUP, BATCH_COMPLETED_GROUP, ...}
PredicateExpression                 : statement <> 'select 1'
BlobStorageTargetState              : Enabled
StorageAccountResourceId            : /subscriptions/7fe3301d-31d3-4668-af5e-211a890ba6e3/resourceGroups/resourcegroup01/providers/Microsoft.Storage/storageAccounts/mystorage
StorageKeyType                      : Primary
RetentionInDays                     : 0
EventHubTargetState                 : Enabled
EventHubName                        : eventHubName
EventHubAuthorizationRuleResourceId : EventHubAuthorizationRuleResourceId
LogAnalyticsTargetState             : Enabled
WorkspaceResourceId                 : "/subscriptions/4b9e8510-67ab-4e9a-95a9-e2f1e570ea9c/resourceGroups/insights-integration/providers/Microsoft.OperationalInsights/workspaces/viruela2"

Set-AzSqlServerAuditing

  • Cmdleten Set-AzSqlServerAudit ersätter denna cmdlet.
  • Utdatatypen ändras från den befintliga typen :'Microsoft.Azure.Commands.Sql.Auditing.Model.DatabaseBlobAuditingSettingsModel' till den nya typen :'bool'

Före

Set-AzSqlServerAuditing -State Enabled -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -StorageAccountName "Storage22"

Efter

PS C:\> Set-AzSqlServerAudit -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -BlobStorageTargetState Enabled -StorageAccountResourceId "/subscriptions/7fe3301d-31d3-4668-af5e-211a890ba6e3/resourceGroups/resourcegroup01/providers/Microsoft.Storage/storageAccounts/mystorage"

Get-AzSqlServerAdvancedThreatProtectionSettings

Cmdleten Get-AzSqlServerAdvancedThreatProtectionSettings ersätts av Get-AzSqlServerAdvancedThreatProtectionSetting

Före

Get-AzSqlServerAdvancedThreatProtectionSettings -ResourceGroupName "ResourceGroup11" -ServerName "Server01"

Efter

Get-AzSqlServerAdvancedThreatProtectionSetting -ResourceGroupName "ResourceGroup11" -ServerName "Server01"

Clear-AzSqlServerAdvancedThreatProtectionSettings

Cmdleten Clear-AzSqlServerAdvancedThreatProtectionSettings ersätts av Clear-AzSqlServerAdvancedThreatProtectionSetting

Före

Clear-AzSqlServerAdvancedThreatProtectionSettings -ResourceGroupName "ResourceGroup11" -ServerName "Server01"

Efter

Clear-AzSqlServerAdvancedThreatProtectionSetting -ResourceGroupName "ResourceGroup11" -ServerName "Server01"

Update-AzSqlServerAdvancedThreatProtectionSettings

Cmdleten Update-AzSqlServerAdvancedThreatProtectionSettings ersätts av Update-AzSqlServerAdvancedThreatProtectionSetting

Före

Update-AzSqlServerAdvancedThreatProtectionSettings -ResourceGroupName "ResourceGroup11" -ServerName "Server01" -NotificationRecipientsEmails "admin01@contoso.com;secadmin@contoso.com" -EmailAdmins $False -ExcludedDetectionType "Sql_Injection_Vulnerability","SQL_Injection" -StorageAccountName "mystorageAccount"

Efter

Update-AzSqlServerAdvancedThreatProtectionSetting -ResourceGroupName "ResourceGroup11" -ServerName "Server01" -NotificationRecipientsEmails "admin01@contoso.com;secadmin@contoso.com" -EmailAdmins $False -ExcludedDetectionType "Sql_Injection_Vulnerability","SQL_Injection" -StorageAccountName "mystorageAccount"

Get-AzSqlDatabaseAdvancedThreatProtectionSettings

Cmdleten Get-AzSqlDatabaseAdvancedThreatProtectionSettings ersätts av Get-AzSqlDatabaseAdvancedThreatProtectionSetting

Före

Get-AzSqlDatabaseAdvancedThreatProtectionSettings -ResourceGroupName "ResourceGroup11" -ServerName "Server01" -DatabaseName "Database01"

Efter

Get-AzSqlDatabaseAdvancedThreatProtectionSetting -ResourceGroupName "ResourceGroup11" -ServerName "Server01" -DatabaseName "Database01"

Update-AzSqlDatabaseAdvancedThreatProtectionSettings

Cmdleten Update-AzSqlDatabaseAdvancedThreatProtectionSettings omsluts av Update-AzSqlDatabaseAdvancedThreatProtectionSetting

Före

Update-AzSqlDatabaseAdvancedThreatProtectionSettings -ResourceGroupName "ResourceGroup11" -ServerName "Server01" -DatabaseName "Database01" -NotificationRecipientsEmails "admin01@contoso.com;secadmin@contoso.com" -EmailAdmins $False -ExcludedDetectionType "Sql_Injection_Vulnerability", "SQL_Injection" -StorageAccountName "mystorageAccount"

Efter

Update-AzSqlDatabaseAdvancedThreatProtectionSetting -ResourceGroupName "ResourceGroup11" -ServerName "Server01" -DatabaseName "Database01" -NotificationRecipientsEmails "admin01@contoso.com;secadmin@contoso.com" -EmailAdmins $False -ExcludedDetectionType "Sql_Injection_Vulnerability", "SQL_Injection" -StorageAccountName "mystorageAccount"

Clear-AzSqlDatabaseAdvancedThreatProtectionSettings

Cmdleten Clear-AzSqlDatabaseAdvancedThreatProtectionSettings omsluts av Clear-AzSqlDatabaseAdvancedThreatProtectionSetting

Före

Clear-AzSqlDatabaseAdvancedThreatProtectionSettings -ResourceGroupName "ResourceGroup11" -ServerName "Server01" -DatabaseName "Database01"

Efter

Clear-AzSqlDatabaseAdvancedThreatProtectionSetting -ResourceGroupName "ResourceGroup11" -ServerName "Server01" -DatabaseName "Database01"

Update-AzSqlDatabaseVulnerabilityAssessmentSettings

Cmdleten Update-AzSqlDatabaseVulnerabilityAssessmentSettings omsluts av Update-AzSqlDatabaseVulnerabilityAssessmentSetting

Före

Update-AzSqlDatabaseVulnerabilityAssessmentSettings `
    -ResourceGroupName "ResourceGroup01"`
    -ServerName "Server01"`
    -DatabaseName "Database01" `
    -StorageAccountName "mystorage" `
    -ScanResultsContainerName "vulnerability-assessment" `
    -RecurringScansInterval Weekly `
    -EmailSubscriptionAdmins $true `
    -NotificationEmail @("mail1@mail.com" , "mail2@mail.com")

Efter

Update-AzSqlDatabaseVulnerabilityAssessmentSetting `
    -ResourceGroupName "ResourceGroup01"`
    -ServerName "Server01"`
    -DatabaseName "Database01" `
    -StorageAccountName "mystorage" `
    -ScanResultsContainerName "vulnerability-assessment" `
    -RecurringScansInterval Weekly `
    -EmailSubscriptionAdmins $true `
    -NotificationEmail @("mail1@mail.com" , "mail2@mail.com")

Get-AzSqlDatabaseVulnerabilityAssessmentSettings

Cmdleten Get-AzSqlDatabaseVulnerabilityAssessmentSettings omsluts av Get-AzSqlDatabaseVulnerabilityAssessmentSetting

Före

Get-AzSqlDatabaseVulnerabilityAssessmentSettings `
    -ResourceGroupName "ResourceGroup01" `
    -ServerName "Server01" `
    -DatabaseName "Database01"

Efter

Get-AzSqlDatabaseVulnerabilityAssessmentSetting `
    -ResourceGroupName "ResourceGroup01" `
    -ServerName "Server01" `
    -DatabaseName "Database01"

Clear-AzSqlDatabaseVulnerabilityAssessmentSettings

Cmdleten Clear-AzSqlDatabaseVulnerabilityAssessmentSettings omsluts av Clear-AzSqlDatabaseVulnerabilityAssessmentSetting

Före

Clear-AzSqlDatabaseVulnerabilityAssessmentSettings `
    -ResourceGroupName "ResourceGroup01" `
    -ServerName "Server01" `
    -DatabaseName "Database01"

Efter

Clear-AzSqlDatabaseVulnerabilityAssessmentSetting `
    -ResourceGroupName "ResourceGroup01" `
    -ServerName "Server01" `
    -DatabaseName "Database01"

Update-AzSqlInstanceDatabaseVulnerabilityAssessmentSettings

Cmdleten Update-AzSqlInstanceDatabaseVulnerabilityAssessmentSettings omsluts av Update-AzSqlInstanceDatabaseVulnerabilityAssessmentSetting

Före

Update-AzSqlInstanceDatabaseVulnerabilityAssessmentSettings `
    -ResourceGroupName "ResourceGroup01" `
    -InstanceName "ManagedInstance01" `
    -DatabaseName "Database01" `
    -StorageAccountName "mystorage" `
    -ScanResultsContainerName "vulnerability-assessment" `
    -RecurringScansInterval Weekly `
    -EmailSubscriptionAdmins $true `
    -NotificationEmail @("mail1@mail.com" , "mail2@mail.com")

Efter

Update-AzSqlInstanceDatabaseVulnerabilityAssessmentSetting `
    -ResourceGroupName "ResourceGroup01" `
    -InstanceName "ManagedInstance01" `
    -DatabaseName "Database01" `
    -StorageAccountName "mystorage" `
    -ScanResultsContainerName "vulnerability-assessment" `
    -RecurringScansInterval Weekly `
    -EmailSubscriptionAdmins $true `
    -NotificationEmail @("mail1@mail.com" , "mail2@mail.com")

Get-AzSqlInstanceDatabaseVulnerabilityAssessmentSettings

Cmdleten Get-AzSqlInstanceDatabaseVulnerabilityAssessmentSettings omsluts av Get-AzSqlInstanceDatabaseVulnerabilityAssessmentSetting

Före

Get-AzSqlInstanceDatabaseVulnerabilityAssessmentSettings `
    -ResourceGroupName "ResourceGroup01" `
    -ServerName "Server01" `
    -DatabaseName "Database01"

Efter

Get-AzSqlInstanceDatabaseVulnerabilityAssessmentSetting `
    -ResourceGroupName "ResourceGroup01" `
    -ServerName "Server01" `
    -DatabaseName "Database01"

Clear-AzSqlInstanceDatabaseVulnerabilityAssessmentSettings

Cmdleten Clear-AzSqlInstanceDatabaseVulnerabilityAssessmentSettings omsluts av Clear-AzSqlInstanceDatabaseVulnerabilityAssessmentSetting

Före

Clear-AzSqlInstanceDatabaseVulnerabilityAssessmentSettings `
    -ResourceGroupName "ResourceGroup01" `
    -ServerName "Server01" `
    -DatabaseName "Database01"

Efter

Clear-AzSqlInstanceDatabaseVulnerabilityAssessmentSetting `
    -ResourceGroupName "ResourceGroup01" `
    -ServerName "Server01" `
    -DatabaseName "Database01"

Update-AzSqlInstanceVulnerabilityAssessmentSettings

Cmdleten Update-AzSqlInstanceVulnerabilityAssessmentSettings omsluts av Update-AzSqlInstanceVulnerabilityAssessmentSetting

Före

Update-AzSqlInstanceVulnerabilityAssessmentSettings `
    -ResourceGroupName "ResourceGroup01" `
    -InstanceName "ManagedInstance01" `
    -StorageAccountName "mystorage" `
    -ScanResultsContainerName "vulnerability-assessment" `
    -RecurringScansInterval Weekly `
    -EmailSubscriptionAdmins $true `
    -NotificationEmail @("mail1@mail.com" , "mail2@mail.com")

Efter

Update-AzSqlInstanceVulnerabilityAssessmentSetting `
    -ResourceGroupName "ResourceGroup01" `
    -InstanceName "ManagedInstance01" `
    -StorageAccountName "mystorage" `
    -ScanResultsContainerName "vulnerability-assessment" `
    -RecurringScansInterval Weekly `
    -EmailSubscriptionAdmins $true `
    -NotificationEmail @("mail1@mail.com" , "mail2@mail.com")

Get-AzSqlInstanceVulnerabilityAssessmentSettings

Cmdleten Get-AzSqlInstanceVulnerabilityAssessmentSettings omsluts av Get-AzSqlInstanceVulnerabilityAssessmentSetting

Före

Get-AzSqlInstanceVulnerabilityAssessmentSettings `
    -ResourceGroupName "ResourceGroup01" `
    -ServerName "Server01" `
    -DatabaseName "Database01"

Efter

Get-AzSqlInstanceVulnerabilityAssessmentSetting `
    -ResourceGroupName "ResourceGroup01" `
    -ServerName "Server01" `
    -DatabaseName "Database01"

Clear-AzSqlInstanceVulnerabilityAssessmentSettings

Cmdleten Clear-AzSqlInstanceVulnerabilityAssessmentSettings omsluts av Clear-AzSqlInstanceVulnerabilityAssessmentSetting

Före

Clear-AzSqlInstanceVulnerabilityAssessmentSettings `
    -ResourceGroupName "ResourceGroup01" `
    -ServerName "Server01" `
    -DatabaseName "Database01"

Efter

Clear-AzSqlInstanceVulnerabilityAssessmentSetting `
    -ResourceGroupName "ResourceGroup01" `
    -ServerName "Server01" `
    -DatabaseName "Database01"

Update-AzSqlServerVulnerabilityAssessmentSettings

Cmdleten Update-AzSqlServerVulnerabilityAssessmentSettings omsluts av Update-AzSqlServerVulnerabilityAssessmentSetting

Före

Update-AzSqlServerVulnerabilityAssessmentSettings `
    -ResourceGroupName "ResourceGroup01"`
    -ServerName "Server01"`
    -StorageAccountName "mystorage" `
    -ScanResultsContainerName "vulnerability-assessment" `
    -RecurringScansInterval Weekly `
    -EmailSubscriptionAdmins $true `
    -NotificationEmail @("mail1@mail.com" , "mail2@mail.com")

Efter

Update-AzSqlServerVulnerabilityAssessmentSetting `
    -ResourceGroupName "ResourceGroup01"`
    -ServerName "Server01"`
    -StorageAccountName "mystorage" `
    -ScanResultsContainerName "vulnerability-assessment" `
    -RecurringScansInterval Weekly `
    -EmailSubscriptionAdmins $true `
    -NotificationEmail @("mail1@mail.com" , "mail2@mail.com")

Get-AzSqlServerVulnerabilityAssessmentSettings

Cmdleten Get-AzSqlServerVulnerabilityAssessmentSettings omsluts av Get-AzSqlServerVulnerabilityAssessmentSetting

Före

Get-AzSqlServerVulnerabilityAssessmentSettings `
    -ResourceGroupName "ResourceGroup01" `
    -ServerName "Server01" `
    -DatabaseName "Database01"

Efter

Get-AzSqlServerVulnerabilityAssessmentSetting `
    -ResourceGroupName "ResourceGroup01" `
    -ServerName "Server01" `
    -DatabaseName "Database01"

Clear-AzSqlServerVulnerabilityAssessmentSettings

Cmdleten Clear-AzSqlServerVulnerabilityAssessmentSettings omsluts av Clear-AzSqlServerVulnerabilityAssessmentSetting

Före

Clear-AzSqlServerVulnerabilityAssessmentSettings `
    -ResourceGroupName "ResourceGroup01" `
    -ServerName "Server01" `
    -DatabaseName "Database01"

Efter

Clear-AzSqlDatabaseVulnerabilityAssessmentSetting `
    -ResourceGroupName "ResourceGroup01" `
    -ServerName "Server01" `
    -DatabaseName "Database01"

Get-AzSqlServerAdvancedThreatProtectionPolicy

Cmdlet Get-AzSqlServerAdvancedThreatProtectionPolicy tas bort och ingen cmdlet tar bort den

Get-AzSqlServerThreatDetectionPolicy

Cmdleten Get-AzSqlServerThreatDetectionPolicy omsluts av Get-AzSqlServerThreatDetectionSetting

Före

PS C:\> Get-AzSqlServerThreatDetectionPolicy -ResourceGroupName "ResourceGroup11" -ServerName "Server01"
ResourceGroupName            : ResourceGroup11
ServerName                   : Server01
ThreatDetectionState         : Enabled
NotificationRecipientsEmails : admin@myCompany.com
StorageAccountName           : mystorage
EmailAdmins                  : True
ExcludedDetectionTypes       : {}
RetentionInDays              : 0

Efter

PS C:\> Get-AzSqlServerAdvancedThreatProtectionSetting -ResourceGroupName "ResourceGroup11" -ServerName "Server01"
ResourceGroupName            : ResourceGroup11
ServerName                   : Server01
ThreatDetectionState         : Enabled
NotificationRecipientsEmails : admin@myCompany.com
StorageAccountName           : mystorage
EmailAdmins                  : True
ExcludedDetectionTypes       : {}
RetentionInDays              : 0

Remove-AzSqlServerThreatDetectionPolicy

Cmdleten Remove-AzSqlServerThreatDetectionPolicy omsluts av Clear-AzSqlServerThreatDetectionSetting

Före

Remove-AzSqlServerThreatDetectionPolicy -ResourceGroupName "ResourceGroup11" -ServerName "Server01"

Efter

Clear-AzSqlServerAdvancedThreatProtectionSetting -ResourceGroupName "ResourceGroup11" -ServerName "Server01"

Set-AzSqlServerThreatDetectionPolicy

Cmdleten Set-AzSqlServerThreatDetectionPolicy omsluts av Update-AzSqlServerThreatDetectionSetting

Före

Set-AzSqlServerThreatDetectionPolicy -ResourceGroupName "ResourceGroup11" -ServerName "Server01" -NotificationRecipientsEmails "admin01@contoso.com;secadmin@contoso.com" -EmailAdmins $False -ExcludedDetectionType "Sql_Injection_Vulnerability","SQL_Injection" -StorageAccountName "mystorageAccount"

Efter

Update-AzSqlServerAdvancedThreatProtectionSetting -ResourceGroupName "ResourceGroup11" -ServerName "Server01" -NotificationRecipientsEmails "admin01@contoso.com;secadmin@contoso.com" -EmailAdmins $False -ExcludedDetectionType "Sql_Injection_Vulnerability","SQL_Injection" -StorageAccountName "mystorageAccount"

Get-AzSqlDatabaseThreatDetectionPolicy

Cmdleten Get-AzSqlDatabaseThreatDetectionPolicy omsluts av Get-AzSqlDatabaseThreatDetectionSetting

Före

PS C:\> Get-AzSqlDatabaseThreatDetectionPolicy -ResourceGroupName "ResourceGroup11" -ServerName "Server01" -DatabaseName   "Database01"
DatabaseName                 : Database01
ResourceGroupName            : ResourceGroup11
ServerName                   : Server01
ThreatDetectionState         : Enabled
NotificationRecipientsEmails : admin@myCompany.com
StorageAccountName           : mystorage
EmailAdmins                  : True
ExcludedDetectionTypes       : {}
RetentionInDays              : 0

Efter

PS C:\> Get-AzSqlDatabaseAdvancedThreatProtectionSetting -ResourceGroupName "ResourceGroup11" -ServerName "Server01"   -DatabaseName "Database01"
DatabaseName                 : Database01
ResourceGroupName            : ResourceGroup11
ServerName                   : Server01
ThreatDetectionState         : Enabled
NotificationRecipientsEmails : admin@myCompany.com
StorageAccountName           : mystorage
EmailAdmins                  : True
ExcludedDetectionTypes       : {}
RetentionInDays              : 0

Set-AzSqlDatabaseThreatDetectionPolicy

Cmdleten Set-AzSqlDatabaseThreatDetectionPolicy omsluts av Update-AzSqlDatabaseThreatDetectionSetting

Före

Set-AzSqlDatabaseThreatDetectionPolicy -ResourceGroupName "ResourceGroup11" -ServerName "Server01" -DatabaseName "Database01" -NotificationRecipientsEmails "admin01@contoso.com;secadmin@contoso.com" -EmailAdmins $False -ExcludedDetectionType "Sql_Injection_Vulnerability", "SQL_Injection" -StorageAccountName "mystorageAccount"

Efter

Update-AzSqlDatabaseAdvancedThreatProtectionSetting -ResourceGroupName "ResourceGroup11" -ServerName "Server01" -DatabaseName "Database01" -NotificationRecipientsEmails "admin01@contoso.com;secadmin@contoso.com" -EmailAdmins $False -ExcludedDetectionType "Sql_Injection_Vulnerability", "SQL_Injection" -StorageAccountName "mystorageAccount"

Remove-AzSqlDatabaseThreatDetectionPolicy

Cmdleten Remove-AzSqlDatabaseThreatDetectionPolicy omsluts av Clear-AzSqlDatabaseThreatDetectionSetting

Före

Remove-AzSqlDatabaseThreatDetectionPolicy -ResourceGroupName "ResourceGroup11" -ServerName "Server01" -DatabaseName "Database01"

Efter

Clear-AzSqlDatabaseAdvancedThreatProtectionSetting -ResourceGroupName "ResourceGroup11" -ServerName "Server01" -DatabaseName "Database01"