Az 3.0.0 的移轉指南
本文件說明 Az 2.0.0 和 3.0.0 版本之間的變更
- Az 3.0.0 的移轉指南
- Batch
- 計算
- HDInsight
- IotHub
- RecoveryServices
- 資源
- ServiceFabric
- Sql
Get-AzSqlDatabaseSecureConnectionPolicy
Get-AzSqlDatabaseIndexRecommendations
Get-AzSqlDatabaseRestorePoints
Get-AzSqlDatabaseAuditing
Set-AzSqlDatabaseAuditing
Get-AzSqlServerAuditing
Set-AzSqlServerAuditing
Get-AzSqlServerAdvancedThreatProtectionSettings
Clear-AzSqlServerAdvancedThreatProtectionSettings
Update-AzSqlServerAdvancedThreatProtectionSettings
Get-AzSqlDatabaseAdvancedThreatProtectionSettings
Update-AzSqlDatabaseAdvancedThreatProtectionSettings
Clear-AzSqlDatabaseAdvancedThreatProtectionSettings
Update-AzSqlDatabaseVulnerabilityAssessmentSettings
Get-AzSqlDatabaseVulnerabilityAssessmentSettings
Clear-AzSqlDatabaseVulnerabilityAssessmentSettings
Update-AzSqlInstanceDatabaseVulnerabilityAssessmentSettings
Get-AzSqlInstanceDatabaseVulnerabilityAssessmentSettings
Clear-AzSqlInstanceDatabaseVulnerabilityAssessmentSettings
Update-AzSqlInstanceVulnerabilityAssessmentSettings
Get-AzSqlInstanceVulnerabilityAssessmentSettings
Clear-AzSqlInstanceVulnerabilityAssessmentSettings
Update-AzSqlServerVulnerabilityAssessmentSettings
Get-AzSqlServerVulnerabilityAssessmentSettings
Clear-AzSqlServerVulnerabilityAssessmentSettings
Get-AzSqlServerAdvancedThreatProtectionPolicy
Get-AzSqlServerThreatDetectionPolicy
Remove-AzSqlServerThreatDetectionPolicy
Set-AzSqlServerThreatDetectionPolicy
Get-AzSqlDatabaseThreatDetectionPolicy
Set-AzSqlDatabaseThreatDetectionPolicy
Remove-AzSqlDatabaseThreatDetectionPolicy
Batch
Get-AzBatchNodeAgentSku
- 已移除
Get-AzBatchNodeAgentSku
並將其取代為Get-AzBatchSupportedImage
。 Get-AzBatchSupportedImage
會傳回與Get-AzBatchNodeAgentSku
相同的數據,但格式較易記。- 現在也會傳回新的未驗證映射。 也會包含每個映射和
BatchSupportEndOfLife
的其他資訊Capabilities
。
之前
$Context = Get-AzBatchAccountKeys -AccountName "ContosoBatchAccount"
Get-AzBatchNodeAgentSku -BatchContext $Context
之後
$Context = Get-AzBatchAccountKey -AccountName "ContosoBatchAccount"
Get-AzBatchSupportedImage -BatchContext $Context
舊版與 Az.Resources 模組不相容
'Az.Batch' 模組的版本 2.0.1 與 'Az.Resources' 模組的舊版(1.7.0 版或更早版本)不相容。 匯入 『Az.Batch』 模組 2.0.1 版時,這會導致無法匯入 'Az.Resources' 模組 1.7.0 版。 若要修正此問題,只要將 'Az.Resources' 模組更新為 1.7.1 版或更新版本,或只是安裝最新版的 'Az' 模組即可。
計算
New-AzDiskConfig
UploadSizeInBytes
當 CreateOption 為 Upload 時,會使用 參數,DiskSizeGB
New-AzDiskConfig
而不是
之前
$diskconfig = New-AzDiskConfig -Location 'Central US' -DiskSizeGB 1023 -SkuName Standard_LRS -OsType Windows -CreateOption Upload -DiskIOPSReadWrite 500 -DiskMBpsReadWrite 8
之後
$diskconfig = New-AzDiskConfig -Location 'Central US' -UploadSizeInBytes 1023 * 1024 * 1024 * 1024 -SkuName Standard_LRS -OsType Windows -CreateOption Upload -DiskIOPSReadWrite 500 -DiskMBpsReadWrite 8
HDInsight
Get-AzHDInsightJobOutput
- 更新 Cmdlet
Get-AzHDInsightJobOutput
以支援對記憶體金鑰的細微角色型存取。 - 具有 HDInsight 叢集操作員、參與者或擁有者角色的使用者將不會受到影響。
- 只有讀取者角色的用戶必須明確指定
DefaultStorageAccountKey
參數。
之前
Get-AzHDInsightJobOutput -ClusterName $clusterName -JobId $jobId
之後
Get-AzHDInsightJobOutput -ClusterName $clusterName -JobId $jobId -DefaultStorageAccountKey $storageAccountKey
Add-AzHDInsightConfigValues
Cmdlet Add-AzHDInsightConfigValue
已將別名移除為 Add-AzHDInsightConfigValues
。
之前
使用已被取代的別名
Add-AzHDInsightConfigValues
之後
Add-AzHDInsightConfigValue
Disable-AzHDInsightMonitoring
已新增 Cmdlet Disable-AzHDInsightMonitoring
。 使用此 Cmdlet 來停用 HDInsight 叢集中的監視功能(取代 Disable-AzHDInsightOperationsManagementSuite
和 Disable-AzHDInsightOMS
)。
之前
Disable-AzHDInsightOMS -Name testcluster
Disable-AzHDInsightOperationsManagementSuite -Name testcluster
之後
Disable-AzHDInsightMonitoring -Name testcluster
Enable-AzHDInsightMonitoring
已新增 Cmdlet Enable-AzHDInsightMonitoring
。 使用此 Cmdlet 在 HDInsight 叢集中啟用監視功能(取代 Enable-AzHDInsightOperationsManagementSuite
和 Enable-AzHDInsightOMS
)。
之前
Enable-AzHDInsightOMS Enable-AzHDInsightMonitoring -Name testcluster -WorkspaceId 1d364e89-bb71-4503-aa3d-a23535aea7bd -PrimaryKey <key for workspace 1d364e89-bb71-4503-aa3d-a23535aea7bd>
Enable-AzHDInsightOperationsManagementSuite Enable-AzHDInsightMonitoring -Name testcluster -WorkspaceId 1d364e89-bb71-4503-aa3d-a23535aea7bd -PrimaryKey <key for workspace 1d364e89-bb71-4503-aa3d-a23535aea7bd>
之後
Enable-AzHDInsightMonitoring Enable-AzHDInsightMonitoring -Name testcluster -WorkspaceId 1d364e89-bb71-4503-aa3d-a23535aea7bd -PrimaryKey <key for workspace 1d364e89-bb71-4503-aa3d-a23535aea7bd>
Get-AzHDInsightMonitoring
已新增 Cmdlet Get-AzHDInsightMonitoring
。 使用此 Cmdlet 取得 Azure HDInsight 叢集中監視安裝的狀態(取代 Get-AzHDInsightOperationsManagementSuite
和 Get-AzHDInsightOMS
)。
之前
Get-AzHDInsightOMS -Name testcluster
Get-AzHDInsightOperationsManagementSuite -Name testcluster
之後
Get-AzHDInsightMonitoring -Name testcluster
Get-AzHDInsightProperty
Cmdlet Get-HDInsightProperty
已將別名移除為 Get-AzHDInsightProperties
。
之前
使用已被取代的別名
Get-AzHDInsightProperties -Location "East US 2"
之後
Get-AzHDInsightProperty -Location "East US 2"
Grant-AzHDInsightRdpServicesAccess
Grant-AzHDInsightRdpServicesAccess
已移除和 Revoke-AzHDInsightRdpServicesAccess
Cmdlet。 因為不支援使用 Windows OS 類型的叢集,因此不再需要這些專案。 請改用LinuxOS類型建立叢集。
Remove-AzHDInsightCluster
輸出 Remove-AzHDInsightCluster
類型已從 Microsoft.Azure.Management.HDInsight.Models.ClusterGetResponse
變更為 bool
。
之前
$cluster = Remove-AzHDInsightCluster -ClusterName "your-hadoop-001"
之後
Remove-AzHDInsightCluster -ClusterName "your-hadoop-001" -PassThru
True
Revoke-AzHDInsightRdpServicesAccess
Cmdlet 已淘汰。 沒有取代它。
Set-AzHDInsightGatewayCredential
輸出 Set-AzHDInsightGatewayCredential
類型已從 HttpConnectivitySettings
變更為 AzureHDInsightGatewaySettings
。
IotHub
New-AzIotHubImportDevices
移除此別名,請改用 New-AzIotHubImportDevice
。
之前
New-AzIotHubImportDevices -ResourceGroupName "myresourcegroup" -Name "myiothub" -InputBlobContainerUri "https://mystorageaccount.blob.core.windows.net/mystoragecontainer?sv=2015-04-05&ss=bfqt&sr=c&srt=sco&sp=rwdl&se=2016-10-27T04:01:48Z&st=2016-10-26T20:01:48Z&spr=https&sig=QqpIhHsIMF8hNuFO%3D" -OutputBlobContainerUri "https://mystorageaccount.blob.core.windows.net/?sv=2015-04-05&ss=bfqt&sr=c&srt=sco&sp=rwdl&se=2016-10-27T04:01:48Z&st=2016-10-26T20:01:48Z&spr=https&sig=QqpIhHsIMF8hNuFO%3D"
之後
New-AzIotHubImportDevice -ResourceGroupName "myresourcegroup" -Name "myiothub" -InputBlobContainerUri "https://mystorageaccount.blob.core.windows.net/mystoragecontainer?sv=2015-04-05&ss=bfqt&sr=c&srt=sco&sp=rwdl&se=2016-10-27T04:01:48Z&st=2016-10-26T20:01:48Z&spr=https&sig=QqpIhHsIMF8hNuFO%3D" -OutputBlobContainerUri "https://mystorageaccount.blob.core.windows.net/?sv=2015-04-05&ss=bfqt&sr=c&srt=sco&sp=rwdl&se=2016-10-27T04:01:48Z&st=2016-10-26T20:01:48Z&spr=https&sig=QqpIhHsIMF8hNuFO%3D"
New-AzIotHubExportDevices
移除此別名,請改用 New-AzIotHubExportDevice
。
之前
New-AzIotHubExportDevices -ResourceGroupName "myresourcegroup" -Name "myiothub" -ExportBlobContainerUri "https://mystorageaccount.blob.core.windows.net/mystoragecontainer?sv=2015-04-05&ss=bfqt&sr=c&srt=sco&sp=rwdl&se=2016-10-27T04:01:48Z&st=2016-10-26T20:01:48Z&spr=https&sig=QqpIhHsIMF8hNuFO%3D" -ExcludeKeys
之後
New-AzIotHubExportDevice -ResourceGroupName "myresourcegroup" -Name "myiothub" -ExportBlobContainerUri "https://mystorageaccount.blob.core.windows.net/mystoragecontainer?sv=2015-04-05&ss=bfqt&sr=c&srt=sco&sp=rwdl&se=2016-10-27T04:01:48Z&st=2016-10-26T20:01:48Z&spr=https&sig=QqpIhHsIMF8hNuFO%3D" -ExcludeKeys
Add-AzIotHubEventHubConsumerGroup
參數 EventHubEndPointName
已被取代,而不會取代為 IotHub 隨附一個內建端點(“events”),其可以處理系統和裝置訊息。
之前
Add-AzIotHubEventHubConsumerGroup -ResourceGroupName "myresourcegroup" -Name "myiothub" -EventHubConsumerGroupName "myconsumergroup" -EventHubEndpointName "/EventHubEndpointName"
之後
Add-AzIotHubEventHubConsumerGroup -ResourceGroupName "myresourcegroup" -Name "myiothub" -EventHubConsumerGroupName "myconsumergroup"
Get-AzIotHubEventHubConsumerGroup
參數 EventHubEndPointName
已被取代,而不會取代為 IotHub 隨附一個內建端點(“events”),其可以處理系統和裝置訊息。
之前
Get-AzIotHubEventHubConsumerGroup -ResourceGroupName "myresourcegroup" -Name "myiothub" -EventHubEndpointName "/EventHubEndpointName"
之後
Get-AzIotHubEventHubConsumerGroup -ResourceGroupName "myresourcegroup" -Name "myiothub"
Remove-AzIotHubEventHubConsumerGroup
參數 EventHubEndPointName
已被取代,而不會取代為 IotHub 隨附一個內建端點(“events”),其可以處理系統和裝置訊息。
之前
Remove-AzIotHubEventHubConsumerGroup -ResourceGroupName "myresourcegroup" -Name "myiothub" -EventHubConsumerGroupName myconsumergroup -EventHubEndpointName "/EventHubEndpointName"
之後
Remove-AzIotHubEventHubConsumerGroup -ResourceGroupName "myresourcegroup" -Name "myiothub" -EventHubConsumerGroupName myconsumergroup
Set-AzIotHub
參數 OperationsMonitoringProperties
已被取代,而不需要取代,因為 IotHub 不再使用內建端點(“operationsMonitoringEvents” )。
RecoveryServices
Edit-AzRecoveryServicesAsrRecoveryPlan
ASRRecoveryPlanGroup.ReplicationProtectedItems
、 ASRRecoveryPlanGroup.StartGroupActions
和 ASRRecoveryPlanGroup.EndGroupActions
已從輸出中移除。
Get-AzRecoveryServicesAsrRecoveryPlan
ASRRecoveryPlanGroup.ReplicationProtectedItems
、 ASRRecoveryPlanGroup.StartGroupActions
和 ASRRecoveryPlanGroup.EndGroupActions
已從輸出中移除。
New-AzRecoveryServicesAsrReplicationProtectedItem
參數 IncludeDiskId 已變更為支援直接寫入 Azure Site Recovery 中的受控磁碟。
之前
$job = New-AzRecoveryServicesAsrReplicationProtectedItem -RecoveryAzureStorageAccountId $recoveryAzureStorageAccountId -IncludeDiskId $includeDiskId -VMwareToAzure -Account $fabric.FabricSpecificDetails.RunAsAccounts[0] -RecoveryResourceGroupId $RecoveryResourceGroupId -RecoveryAzureNetworkId $RecoveryAzureNetworkId -name $name -ProcessServer $fabric.FabricSpecificDetails.ProcessServers[0] -ProtectableItem $protectableItem -ProtectionContainerMapping $pcm -RecoveryAzureSubnetName $RecoveryAzureSubnetName -RecoveryVmName $RecoveryVmName -LogStorageAccountId $LogStorageAccountId
之後
$disk1 = New-AzRecoveryServicesAsrInMageAzureV2DiskInput -DiskId $diskId -LogStorageAccountId $logStorageAccountId -DiskType $diskType
$disk2 = New-AzRecoveryServicesAsrInMageAzureV2DiskInput -DiskId $diskId2 -LogStorageAccountId $logStorageAccountId -DiskType $diskType2
$job = New-AzRecoveryServicesAsrReplicationProtectedItem -VMwareToAzure -Account $fabric.FabricSpecificDetails.RunAsAccounts[0] -RecoveryResourceGroupId $RecoveryResourceGroupId -RecoveryAzureNetworkId $RecoveryAzureNetworkId -name $name -ProcessServer $fabric.FabricSpecificDetails.ProcessServers[0] -ProtectableItem $protectableItem -ProtectionContainerMapping $pcm -RecoveryAzureSubnetName $RecoveryAzureSubnetName -RecoveryVmName $RecoveryVmName -LogStorageAccountId $LogStorageAccountId -InMageAzureV2DiskInput $disk1,$disk2
資源
舊版與 Az.Batch 模組不相容
'Az.Resources' 模組 1.7.1 版與舊版的 'Az.Batch' 模組不相容。 匯入 『Az.Resources』 模組 1.7.1 版時,這會導致無法匯入 『Az.Batch』 模組 1.7.2 版。 若要修正此問題,請將 'Az.Batch' 模組更新為 2.0.1 版或更新版本,或只是安裝最新版的 'Az' 模組。
ServiceFabric
Add-ServiceFabricApplicationCertificate
已移除 Add-ServiceFabricApplicationCertificate
此案例,因為 Add-AzVmssSecret
涵蓋此案例。
之前
Add-AzServiceFabricApplicationCertificate -ResourceGroupName "Group1" -Name "Contoso01SFCluster" -SecretIdentifier "http://keyVaultName.vault.contoso.net/secrets/secretName/secretVersion"
之後
$Vault = Get-AzKeyVault -VaultName "ContosoVault"
$CertConfig = New-AzVmssVaultCertificateConfig -CertificateUrl "http://keyVaultName.vault.contoso.net/secrets/secretName/secretVersion" -CertificateStore "Certificates"
$VMSS = New-AzVmssConfig
Add-AzVmssSecret -VirtualMachineScaleSet $VMSS -SourceVaultId $Vault.ResourceId -VaultCertificate $CertConfig
Sql
Get-AzSqlDatabaseSecureConnectionPolicy
請注意,安全連線已被取代,因此會移除命令。 請使用 Azure 入口網站 中的 [SQL 資料庫] 刀鋒視窗來檢視 連接字串
Get-AzSqlDatabaseIndexRecommendations
Get-AzSqlDatabaseIndexRecommendations
已移除別名。 請改用 Get-AzSqlDatabaseIndexRecommendation
。
Get-AzSqlDatabaseRestorePoints
Get-AzSqlDatabaseRestorePoints
已移除別名。 請改用 Get-AzSqlDatabaseRestorePoint
。
Get-AzSqlDatabaseAuditing
- Cmdlet
Get-AzSqlDatabaseAudit
正在取代此 Cmdlet。 - 輸出類型從現有的類型 :'Microsoft.Azure.Commands.Sql.Auditing.Model.DatabaseBlobAuditing 設定 Model' 變更為新的類型 :'Microsoft.Azure.Commands.Sql.Auditing.Model.DatabaseAuditing 設定 Model',移除屬性
AuditState
和StorageAccountName
。 和StorageAccountSubscriptionId
。 腳本可以從新的StorageAccountResourceId
屬性擷取記憶體帳戶資訊。
之前
PS C:\> Get-AzSqlDatabaseAuditing -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -DatabaseName "Database01"
DatabaseName : database01
AuditAction : {}
AuditActionGroup : {SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP, FAILED_DATABASE_AUTHENTICATION_GROUP,
BATCH_COMPLETED_GROUP, ...}
ResourceGroupName : resourcegroup01
ServerName : server01
AuditState : Enabled
StorageAccountName : mystorage
StorageKeyType : Primary
RetentionInDays : 0
StorageAccountSubscriptionId : 7fe3301d-31d3-4668-af5e-211a890ba6e3
PredicateExpression : statement <> 'select 1'
之後
PS C:\> Get-AzSqlDatabaseAudit -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -DatabaseName "Database01"
ServerName : server01
DatabaseName : database01
AuditAction : {}
ResourceGroupName : resourcegroup01
AuditActionGroup : {SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP, FAILED_DATABASE_AUTHENTICATION_GROUP,
BATCH_COMPLETED_GROUP, ...}
PredicateExpression : statement <> 'select 1'
BlobStorageTargetState : Enabled
StorageAccountResourceId : /subscriptions/7fe3301d-31d3-4668-af5e-211a890ba6e3/resourceGroups/resourcegroup01/providers/Microsoft.Storage/storageAccounts/mystorage
StorageKeyType : Primary
RetentionInDays : 0
EventHubTargetState : Enabled
EventHubName : eventHubName
EventHubAuthorizationRuleResourceId : EventHubAuthorizationRuleResourceId
LogAnalyticsTargetState : Enabled
WorkspaceResourceId : "/subscriptions/4b9e8510-67ab-4e9a-95a9-e2f1e570ea9c/resourceGroups/insights-integration/providers/Microsoft.OperationalInsights/workspaces/viruela2"
Set-AzSqlDatabaseAuditing
- Cmdlet
Set-AzSqlDatabaseAudit
正在取代此 Cmdlet。 - 輸出類型從現有的類型 :'Microsoft.Azure.Commands.Sql.Auditing.Model.DatabaseBlobAuditing 設定 Model' 變更為新的類型 :'bool'
之前
Set-AzSqlDatabaseAuditing -State Enabled -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -StorageAccountName "Storage22" -DatabaseName "Database01"
之後
Set-AzSqlDatabaseAudit -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -DatabaseName "Database01" -BlobStorageTargetState Enabled -StorageAccountResourceId "/subscriptions/7fe3301d-31d3-4668-af5e-211a890ba6e3/resourceGroups/resourcegroup01/providers/Microsoft.Storage/storageAccounts/mystorage"
Get-AzSqlServerAuditing
- Cmdlet
Get-AzSqlServerAudit
正在取代此 Cmdlet。 - 輸出類型從現有的類型 :'Microsoft.Azure.Commands.Sql.Auditing.Model.DatabaseBlobAuditing 設定 Model' 變更為新的類型 :'Microsoft.Azure.Commands.Sql.Auditing.Model.ServerAuditing 設定 Model'。 屬性
AuditState
、StorageAccountName
和StorageAccountSubscriptionId
已移除。 使用StorageAccountName
和StorageAccountSubscriptionId
Proeprties 的腳本可以從新的StorageAccountResourceId
屬性擷取此資訊。
之前
PS C:\> Get-AzSqlServerAuditing -ResourceGroupName "resourcegroup01" -ServerName "server01"
AuditActionGroup : {SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP, FAILED_DATABASE_AUTHENTICATION_GROUP, BATCH_COMPLETED_GROUP, ...}
ResourceGroupName : resourcegroup01
ServerName : server01
AuditState : Enabled
StorageAccountName : mystorage
StorageKeyType : Primary
RetentionInDays : 0
StorageAccountSubscriptionId : 7fe3301d-31d3-4668-af5e-211a890ba6e3
PredicateExpression : statement <> 'select 1'
之後
PS C:\> Get-AzSqlServerAudit -ResourceGroupName "resourcegroup01" -ServerName "server01"
ServerName : server01
ResourceGroupName : resourcegroup01
AuditActionGroup : {SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP, FAILED_DATABASE_AUTHENTICATION_GROUP, BATCH_COMPLETED_GROUP, ...}
PredicateExpression : statement <> 'select 1'
BlobStorageTargetState : Enabled
StorageAccountResourceId : /subscriptions/7fe3301d-31d3-4668-af5e-211a890ba6e3/resourceGroups/resourcegroup01/providers/Microsoft.Storage/storageAccounts/mystorage
StorageKeyType : Primary
RetentionInDays : 0
EventHubTargetState : Enabled
EventHubName : eventHubName
EventHubAuthorizationRuleResourceId : EventHubAuthorizationRuleResourceId
LogAnalyticsTargetState : Enabled
WorkspaceResourceId : "/subscriptions/4b9e8510-67ab-4e9a-95a9-e2f1e570ea9c/resourceGroups/insights-integration/providers/Microsoft.OperationalInsights/workspaces/viruela2"
Set-AzSqlServerAuditing
- Cmdlet
Set-AzSqlServerAudit
正在取代此 Cmdlet。 - 輸出類型從現有的類型 :'Microsoft.Azure.Commands.Sql.Auditing.Model.DatabaseBlobAuditing 設定 Model' 變更為新的類型 :'bool'
之前
Set-AzSqlServerAuditing -State Enabled -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -StorageAccountName "Storage22"
之後
PS C:\> Set-AzSqlServerAudit -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -BlobStorageTargetState Enabled -StorageAccountResourceId "/subscriptions/7fe3301d-31d3-4668-af5e-211a890ba6e3/resourceGroups/resourcegroup01/providers/Microsoft.Storage/storageAccounts/mystorage"
Get-AzSqlServerAdvancedThreatProtectionSettings
Cmdlet Get-AzSqlServerAdvancedThreatProtectionSettings
已由 取代 Get-AzSqlServerAdvancedThreatProtectionSetting
之前
Get-AzSqlServerAdvancedThreatProtectionSettings -ResourceGroupName "ResourceGroup11" -ServerName "Server01"
之後
Get-AzSqlServerAdvancedThreatProtectionSetting -ResourceGroupName "ResourceGroup11" -ServerName "Server01"
Clear-AzSqlServerAdvancedThreatProtectionSettings
Cmdlet Clear-AzSqlServerAdvancedThreatProtectionSettings
已由 取代 Clear-AzSqlServerAdvancedThreatProtectionSetting
之前
Clear-AzSqlServerAdvancedThreatProtectionSettings -ResourceGroupName "ResourceGroup11" -ServerName "Server01"
之後
Clear-AzSqlServerAdvancedThreatProtectionSetting -ResourceGroupName "ResourceGroup11" -ServerName "Server01"
Update-AzSqlServerAdvancedThreatProtectionSettings
Cmdlet Update-AzSqlServerAdvancedThreatProtectionSettings
已由 取代 Update-AzSqlServerAdvancedThreatProtectionSetting
之前
Update-AzSqlServerAdvancedThreatProtectionSettings -ResourceGroupName "ResourceGroup11" -ServerName "Server01" -NotificationRecipientsEmails "admin01@contoso.com;secadmin@contoso.com" -EmailAdmins $False -ExcludedDetectionType "Sql_Injection_Vulnerability","SQL_Injection" -StorageAccountName "mystorageAccount"
之後
Update-AzSqlServerAdvancedThreatProtectionSetting -ResourceGroupName "ResourceGroup11" -ServerName "Server01" -NotificationRecipientsEmails "admin01@contoso.com;secadmin@contoso.com" -EmailAdmins $False -ExcludedDetectionType "Sql_Injection_Vulnerability","SQL_Injection" -StorageAccountName "mystorageAccount"
Get-AzSqlDatabaseAdvancedThreatProtectionSettings
Cmdlet Get-AzSqlDatabaseAdvancedThreatProtectionSettings
已由 取代 Get-AzSqlDatabaseAdvancedThreatProtectionSetting
之前
Get-AzSqlDatabaseAdvancedThreatProtectionSettings -ResourceGroupName "ResourceGroup11" -ServerName "Server01" -DatabaseName "Database01"
之後
Get-AzSqlDatabaseAdvancedThreatProtectionSetting -ResourceGroupName "ResourceGroup11" -ServerName "Server01" -DatabaseName "Database01"
Update-AzSqlDatabaseAdvancedThreatProtectionSettings
Cmdlet Update-AzSqlDatabaseAdvancedThreatProtectionSettings
會由 重新啟用 Update-AzSqlDatabaseAdvancedThreatProtectionSetting
之前
Update-AzSqlDatabaseAdvancedThreatProtectionSettings -ResourceGroupName "ResourceGroup11" -ServerName "Server01" -DatabaseName "Database01" -NotificationRecipientsEmails "admin01@contoso.com;secadmin@contoso.com" -EmailAdmins $False -ExcludedDetectionType "Sql_Injection_Vulnerability", "SQL_Injection" -StorageAccountName "mystorageAccount"
之後
Update-AzSqlDatabaseAdvancedThreatProtectionSetting -ResourceGroupName "ResourceGroup11" -ServerName "Server01" -DatabaseName "Database01" -NotificationRecipientsEmails "admin01@contoso.com;secadmin@contoso.com" -EmailAdmins $False -ExcludedDetectionType "Sql_Injection_Vulnerability", "SQL_Injection" -StorageAccountName "mystorageAccount"
Clear-AzSqlDatabaseAdvancedThreatProtectionSettings
Cmdlet Clear-AzSqlDatabaseAdvancedThreatProtectionSettings
會由 重新啟用 Clear-AzSqlDatabaseAdvancedThreatProtectionSetting
之前
Clear-AzSqlDatabaseAdvancedThreatProtectionSettings -ResourceGroupName "ResourceGroup11" -ServerName "Server01" -DatabaseName "Database01"
之後
Clear-AzSqlDatabaseAdvancedThreatProtectionSetting -ResourceGroupName "ResourceGroup11" -ServerName "Server01" -DatabaseName "Database01"
Update-AzSqlDatabaseVulnerabilityAssessmentSettings
Cmdlet Update-AzSqlDatabaseVulnerabilityAssessmentSettings
會由 重新啟用 Update-AzSqlDatabaseVulnerabilityAssessmentSetting
之前
Update-AzSqlDatabaseVulnerabilityAssessmentSettings `
-ResourceGroupName "ResourceGroup01"`
-ServerName "Server01"`
-DatabaseName "Database01" `
-StorageAccountName "mystorage" `
-ScanResultsContainerName "vulnerability-assessment" `
-RecurringScansInterval Weekly `
-EmailSubscriptionAdmins $true `
-NotificationEmail @("mail1@mail.com" , "mail2@mail.com")
之後
Update-AzSqlDatabaseVulnerabilityAssessmentSetting `
-ResourceGroupName "ResourceGroup01"`
-ServerName "Server01"`
-DatabaseName "Database01" `
-StorageAccountName "mystorage" `
-ScanResultsContainerName "vulnerability-assessment" `
-RecurringScansInterval Weekly `
-EmailSubscriptionAdmins $true `
-NotificationEmail @("mail1@mail.com" , "mail2@mail.com")
Get-AzSqlDatabaseVulnerabilityAssessmentSettings
Cmdlet Get-AzSqlDatabaseVulnerabilityAssessmentSettings
會由 重新啟用 Get-AzSqlDatabaseVulnerabilityAssessmentSetting
之前
Get-AzSqlDatabaseVulnerabilityAssessmentSettings `
-ResourceGroupName "ResourceGroup01" `
-ServerName "Server01" `
-DatabaseName "Database01"
之後
Get-AzSqlDatabaseVulnerabilityAssessmentSetting `
-ResourceGroupName "ResourceGroup01" `
-ServerName "Server01" `
-DatabaseName "Database01"
Clear-AzSqlDatabaseVulnerabilityAssessmentSettings
Cmdlet Clear-AzSqlDatabaseVulnerabilityAssessmentSettings
會由 重新啟用 Clear-AzSqlDatabaseVulnerabilityAssessmentSetting
之前
Clear-AzSqlDatabaseVulnerabilityAssessmentSettings `
-ResourceGroupName "ResourceGroup01" `
-ServerName "Server01" `
-DatabaseName "Database01"
之後
Clear-AzSqlDatabaseVulnerabilityAssessmentSetting `
-ResourceGroupName "ResourceGroup01" `
-ServerName "Server01" `
-DatabaseName "Database01"
Update-AzSqlInstanceDatabaseVulnerabilityAssessmentSettings
Cmdlet Update-AzSqlInstanceDatabaseVulnerabilityAssessmentSettings
會由 重新啟用 Update-AzSqlInstanceDatabaseVulnerabilityAssessmentSetting
之前
Update-AzSqlInstanceDatabaseVulnerabilityAssessmentSettings `
-ResourceGroupName "ResourceGroup01" `
-InstanceName "ManagedInstance01" `
-DatabaseName "Database01" `
-StorageAccountName "mystorage" `
-ScanResultsContainerName "vulnerability-assessment" `
-RecurringScansInterval Weekly `
-EmailSubscriptionAdmins $true `
-NotificationEmail @("mail1@mail.com" , "mail2@mail.com")
之後
Update-AzSqlInstanceDatabaseVulnerabilityAssessmentSetting `
-ResourceGroupName "ResourceGroup01" `
-InstanceName "ManagedInstance01" `
-DatabaseName "Database01" `
-StorageAccountName "mystorage" `
-ScanResultsContainerName "vulnerability-assessment" `
-RecurringScansInterval Weekly `
-EmailSubscriptionAdmins $true `
-NotificationEmail @("mail1@mail.com" , "mail2@mail.com")
Get-AzSqlInstanceDatabaseVulnerabilityAssessmentSettings
Cmdlet Get-AzSqlInstanceDatabaseVulnerabilityAssessmentSettings
會由 重新啟用 Get-AzSqlInstanceDatabaseVulnerabilityAssessmentSetting
之前
Get-AzSqlInstanceDatabaseVulnerabilityAssessmentSettings `
-ResourceGroupName "ResourceGroup01" `
-ServerName "Server01" `
-DatabaseName "Database01"
之後
Get-AzSqlInstanceDatabaseVulnerabilityAssessmentSetting `
-ResourceGroupName "ResourceGroup01" `
-ServerName "Server01" `
-DatabaseName "Database01"
Clear-AzSqlInstanceDatabaseVulnerabilityAssessmentSettings
Cmdlet Clear-AzSqlInstanceDatabaseVulnerabilityAssessmentSettings
會由 重新啟用 Clear-AzSqlInstanceDatabaseVulnerabilityAssessmentSetting
之前
Clear-AzSqlInstanceDatabaseVulnerabilityAssessmentSettings `
-ResourceGroupName "ResourceGroup01" `
-ServerName "Server01" `
-DatabaseName "Database01"
之後
Clear-AzSqlInstanceDatabaseVulnerabilityAssessmentSetting `
-ResourceGroupName "ResourceGroup01" `
-ServerName "Server01" `
-DatabaseName "Database01"
Update-AzSqlInstanceVulnerabilityAssessmentSettings
Cmdlet Update-AzSqlInstanceVulnerabilityAssessmentSettings
會由 重新啟用 Update-AzSqlInstanceVulnerabilityAssessmentSetting
之前
Update-AzSqlInstanceVulnerabilityAssessmentSettings `
-ResourceGroupName "ResourceGroup01" `
-InstanceName "ManagedInstance01" `
-StorageAccountName "mystorage" `
-ScanResultsContainerName "vulnerability-assessment" `
-RecurringScansInterval Weekly `
-EmailSubscriptionAdmins $true `
-NotificationEmail @("mail1@mail.com" , "mail2@mail.com")
之後
Update-AzSqlInstanceVulnerabilityAssessmentSetting `
-ResourceGroupName "ResourceGroup01" `
-InstanceName "ManagedInstance01" `
-StorageAccountName "mystorage" `
-ScanResultsContainerName "vulnerability-assessment" `
-RecurringScansInterval Weekly `
-EmailSubscriptionAdmins $true `
-NotificationEmail @("mail1@mail.com" , "mail2@mail.com")
Get-AzSqlInstanceVulnerabilityAssessmentSettings
Cmdlet Get-AzSqlInstanceVulnerabilityAssessmentSettings
會由 重新啟用 Get-AzSqlInstanceVulnerabilityAssessmentSetting
之前
Get-AzSqlInstanceVulnerabilityAssessmentSettings `
-ResourceGroupName "ResourceGroup01" `
-ServerName "Server01" `
-DatabaseName "Database01"
之後
Get-AzSqlInstanceVulnerabilityAssessmentSetting `
-ResourceGroupName "ResourceGroup01" `
-ServerName "Server01" `
-DatabaseName "Database01"
Clear-AzSqlInstanceVulnerabilityAssessmentSettings
Cmdlet Clear-AzSqlInstanceVulnerabilityAssessmentSettings
會由 重新啟用 Clear-AzSqlInstanceVulnerabilityAssessmentSetting
之前
Clear-AzSqlInstanceVulnerabilityAssessmentSettings `
-ResourceGroupName "ResourceGroup01" `
-ServerName "Server01" `
-DatabaseName "Database01"
之後
Clear-AzSqlInstanceVulnerabilityAssessmentSetting `
-ResourceGroupName "ResourceGroup01" `
-ServerName "Server01" `
-DatabaseName "Database01"
Update-AzSqlServerVulnerabilityAssessmentSettings
Cmdlet Update-AzSqlServerVulnerabilityAssessmentSettings
會由 重新啟用 Update-AzSqlServerVulnerabilityAssessmentSetting
之前
Update-AzSqlServerVulnerabilityAssessmentSettings `
-ResourceGroupName "ResourceGroup01"`
-ServerName "Server01"`
-StorageAccountName "mystorage" `
-ScanResultsContainerName "vulnerability-assessment" `
-RecurringScansInterval Weekly `
-EmailSubscriptionAdmins $true `
-NotificationEmail @("mail1@mail.com" , "mail2@mail.com")
之後
Update-AzSqlServerVulnerabilityAssessmentSetting `
-ResourceGroupName "ResourceGroup01"`
-ServerName "Server01"`
-StorageAccountName "mystorage" `
-ScanResultsContainerName "vulnerability-assessment" `
-RecurringScansInterval Weekly `
-EmailSubscriptionAdmins $true `
-NotificationEmail @("mail1@mail.com" , "mail2@mail.com")
Get-AzSqlServerVulnerabilityAssessmentSettings
Cmdlet Get-AzSqlServerVulnerabilityAssessmentSettings
會由 重新啟用 Get-AzSqlServerVulnerabilityAssessmentSetting
之前
Get-AzSqlServerVulnerabilityAssessmentSettings `
-ResourceGroupName "ResourceGroup01" `
-ServerName "Server01" `
-DatabaseName "Database01"
之後
Get-AzSqlServerVulnerabilityAssessmentSetting `
-ResourceGroupName "ResourceGroup01" `
-ServerName "Server01" `
-DatabaseName "Database01"
Clear-AzSqlServerVulnerabilityAssessmentSettings
Cmdlet Clear-AzSqlServerVulnerabilityAssessmentSettings
會由 重新啟用 Clear-AzSqlServerVulnerabilityAssessmentSetting
之前
Clear-AzSqlServerVulnerabilityAssessmentSettings `
-ResourceGroupName "ResourceGroup01" `
-ServerName "Server01" `
-DatabaseName "Database01"
之後
Clear-AzSqlDatabaseVulnerabilityAssessmentSetting `
-ResourceGroupName "ResourceGroup01" `
-ServerName "Server01" `
-DatabaseName "Database01"
Get-AzSqlServerAdvancedThreatProtectionPolicy
Cmdlet Get-AzSqlServerAdvancedThreatProtectionPolicy
已刪除,且未重新啟用任何 Cmdlet
Get-AzSqlServerThreatDetectionPolicy
Cmdlet Get-AzSqlServerThreatDetectionPolicy
會由 重新啟用 Get-AzSqlServerThreatDetectionSetting
之前
PS C:\> Get-AzSqlServerThreatDetectionPolicy -ResourceGroupName "ResourceGroup11" -ServerName "Server01"
ResourceGroupName : ResourceGroup11
ServerName : Server01
ThreatDetectionState : Enabled
NotificationRecipientsEmails : admin@myCompany.com
StorageAccountName : mystorage
EmailAdmins : True
ExcludedDetectionTypes : {}
RetentionInDays : 0
之後
PS C:\> Get-AzSqlServerAdvancedThreatProtectionSetting -ResourceGroupName "ResourceGroup11" -ServerName "Server01"
ResourceGroupName : ResourceGroup11
ServerName : Server01
ThreatDetectionState : Enabled
NotificationRecipientsEmails : admin@myCompany.com
StorageAccountName : mystorage
EmailAdmins : True
ExcludedDetectionTypes : {}
RetentionInDays : 0
Remove-AzSqlServerThreatDetectionPolicy
Cmdlet Remove-AzSqlServerThreatDetectionPolicy
會由 重新啟用 Clear-AzSqlServerAdvancedThreatProtectionSetting
之前
Remove-AzSqlServerThreatDetectionPolicy -ResourceGroupName "ResourceGroup11" -ServerName "Server01"
之後
Clear-AzSqlServerAdvancedThreatProtectionSetting -ResourceGroupName "ResourceGroup11" -ServerName "Server01"
Set-AzSqlServerThreatDetectionPolicy
Cmdlet Set-AzSqlServerThreatDetectionPolicy
會由 重新啟用 Update-AzSqlServerAdvancedThreatProtectionSetting
之前
Set-AzSqlServerThreatDetectionPolicy -ResourceGroupName "ResourceGroup11" -ServerName "Server01" -NotificationRecipientsEmails "admin01@contoso.com;secadmin@contoso.com" -EmailAdmins $False -ExcludedDetectionType "Sql_Injection_Vulnerability","SQL_Injection" -StorageAccountName "mystorageAccount"
之後
Update-AzSqlServerAdvancedThreatProtectionSetting -ResourceGroupName "ResourceGroup11" -ServerName "Server01" -NotificationRecipientsEmails "admin01@contoso.com;secadmin@contoso.com" -EmailAdmins $False -ExcludedDetectionType "Sql_Injection_Vulnerability","SQL_Injection" -StorageAccountName "mystorageAccount"
Get-AzSqlDatabaseThreatDetectionPolicy
Cmdlet Get-AzSqlDatabaseThreatDetectionPolicy
會由 重新啟用 Get-AzSqlDatabaseThreatDetectionSetting
之前
PS C:\> Get-AzSqlDatabaseThreatDetectionPolicy -ResourceGroupName "ResourceGroup11" -ServerName "Server01" -DatabaseName "Database01"
DatabaseName : Database01
ResourceGroupName : ResourceGroup11
ServerName : Server01
ThreatDetectionState : Enabled
NotificationRecipientsEmails : admin@myCompany.com
StorageAccountName : mystorage
EmailAdmins : True
ExcludedDetectionTypes : {}
RetentionInDays : 0
之後
PS C:\> Get-AzSqlDatabaseAdvancedThreatProtectionSetting -ResourceGroupName "ResourceGroup11" -ServerName "Server01" -DatabaseName "Database01"
DatabaseName : Database01
ResourceGroupName : ResourceGroup11
ServerName : Server01
ThreatDetectionState : Enabled
NotificationRecipientsEmails : admin@myCompany.com
StorageAccountName : mystorage
EmailAdmins : True
ExcludedDetectionTypes : {}
RetentionInDays : 0
Set-AzSqlDatabaseThreatDetectionPolicy
Cmdlet Set-AzSqlDatabaseThreatDetectionPolicy
會由 重新啟用 Update-AzSqlDatabaseAdvancedThreatProtectionSetting
之前
Set-AzSqlDatabaseThreatDetectionPolicy -ResourceGroupName "ResourceGroup11" -ServerName "Server01" -DatabaseName "Database01" -NotificationRecipientsEmails "admin01@contoso.com;secadmin@contoso.com" -EmailAdmins $False -ExcludedDetectionType "Sql_Injection_Vulnerability", "SQL_Injection" -StorageAccountName "mystorageAccount"
之後
Update-AzSqlDatabaseAdvancedThreatProtectionSetting -ResourceGroupName "ResourceGroup11" -ServerName "Server01" -DatabaseName "Database01" -NotificationRecipientsEmails "admin01@contoso.com;secadmin@contoso.com" -EmailAdmins $False -ExcludedDetectionType "Sql_Injection_Vulnerability", "SQL_Injection" -StorageAccountName "mystorageAccount"
Remove-AzSqlDatabaseThreatDetectionPolicy
Cmdlet Remove-AzSqlDatabaseThreatDetectionPolicy
會由 重新啟用 Clear-AzSqlDatabaseAdvancedThreatProtectionSetting
之前
Remove-AzSqlDatabaseThreatDetectionPolicy -ResourceGroupName "ResourceGroup11" -ServerName "Server01" -DatabaseName "Database01"
之後
Clear-AzSqlDatabaseAdvancedThreatProtectionSetting -ResourceGroupName "ResourceGroup11" -ServerName "Server01" -DatabaseName "Database01"
意見反應
https://aka.ms/ContentUserFeedback。
即將登場:在 2024 年,我們將逐步淘汰 GitHub 問題作為內容的意見反應機制,並將它取代為新的意見反應系統。 如需詳細資訊,請參閱:提交並檢視相關的意見反應