1. Home
  2. Training Library
  3. Microsoft Azure
  4. Courses
  5. DP-200 Exam Prep - Additional Topics

Security

Contents

keyboard_tab
Intro and Synapse Analytics
SQL Database
2
SQL Database
PREVIEW1m 24s
Security
3
Security
1m 32s
Data Factory

The course is part of this learning path

play-arrow
Start course
Overview
DifficultyIntermediate
Duration9m
Students360
Ratings
5/5
starstarstarstarstar

Description

This course explains some additional topics you should make sure you understand before taking the DP-200 Exam. These topics deal with four different services:

  • SQL Database
  • Synapse Analytics
  • Databricks
  • Data Factory

Transcript

Now, let's move on to security. Both SQL Database and Synapse Analytics come with a suite of data protection features called Advanced Data Security, or ADS. ADS includes three features: Data Discovery & Classification, Vulnerability Assessment, and Advanced Threat Protection.

Data Discovery & Classification scans your database looking for sensitive data, such as names, addresses, and credit card numbers. It then gives you a list of recommendations for how these columns should be classified, such as "Confidential" or "Highly Confidential." If you accept the recommendations, then those columns will be labeled with those classifications. You can also label them manually if you want different classifications than the recommended ones. Once these columns are labeled, you can use the database auditing feature to monitor access to this sensitive data.

The Vulnerability Assessment service scans your database looking for potential security issues, such as loose permissions and dangerous firewall settings. Then you can go through the list of issues and decide whether or not they truly are issues that need to be addressed. When you drill down into issues that you want to address, there will be a recommendation as to how you can remediate the issue, and, in many cases, there will even be a remediation script you can run.

Advanced Threat Protection looks for unusual attempts to access or exploit databases. For example, it triggers email alerts when it sees potential SQL injection attacks or brute force login attempts. Then you can drill down into each alert to get more details about a potential attack. And that's it for security.

About the Author
Students55515
Courses61
Learning paths63

Guy launched his first training website in 1995 and he's been helping people learn IT technologies ever since. He has been a sysadmin, instructor, sales engineer, IT manager, and entrepreneur. In his most recent venture, he founded and led a cloud-based training infrastructure company that provided virtual labs for some of the largest software vendors in the world. Guy’s passion is making complex technology easy to understand. His activities outside of work have included riding an elephant and skydiving (although not at the same time).