Skip to main content

Remediation

From Azure Portal​

  1. Go to SQL servers.
  2. For each SQL server:
  3. Under Security, click Networking.
  4. Uncheck Allow Azure services and resources to access this server.
  5. Set firewall rules to limit access to only authorized connections.
  6. Click Save.

From Azure CLI​

Disable the default firewall rule Allow access to Azure services:

az sql server firewall-rule delete \
--resource-group {{resource-group-name}} \
--server {{sql-server-name}} \
--name "AllowAllWindowsAzureIps"

Remove a custom firewall rule:

az sql server firewall-rule delete \
--resource-group {{resource-group-name}} \
--server {{sql-server-name}} \
--name {{firewall-rule-name}}

Create a firewall rule:

az sql server firewall-rule create \
--resource-group {{resource-group-name}} \
--server {{sql-server-name}} \
--name {{firewall-rule-name}} \
--start-ip-address "{{ip-address-other-than-0-0-0-0}}" \
--end-ip-address "{{ip-address-other-than-0-0-0-0-or-255-255-255-255}}"

Update a firewall rule:

az sql server firewall-rule update \
--resource-group {{resource-group-name}} \
--server {{sql-server-name}} \
--name {{firewall-rule-name}} \
--start-ip-address "{{ip-address-other-than-0-0-0-0}}" \
--end-ip-address "{{ip-address-other-than-0-0-0-0-or-255-255-255-255}}"

From PowerShell​

Disable the default firewall rule Allow access to Azure services:

Remove-AzSqlServerFirewallRule `
-FirewallRuleName "AllowAllWindowsAzureIps" `
-ResourceGroupName {{resource-group-name}} `
-ServerName {{sql-server-name}}

Remove a custom Firewall rule:

Remove-AzSqlServerFirewallRule `
-FirewallRuleName "{{firewall-rule-name}}" `
-ResourceGroupName {{resource-group-name}} `
-ServerName {{sql-server-name}}

Set the appropriate firewall rules:

Set-AzSqlServerFirewallRule `
-ResourceGroupName {{resource-group-name}} `
-ServerName {{sql-server-name}} `
-FirewallRuleName "{{firewall-rule-name}}" `
-StartIpAddress "{{ip-address-other-than-0-0-0-0}}" `
-EndIpAddress "{{ip-address-other-than-0-0-0-0-or-255-255-255-255}}"