Share via

Error trying to find out how "The way SQL vulnerability assessment findings are consumed in Defender for Cloud is changing"

Kaplan, Todd 20 Reputation points
2026-03-06T15:18:02.69+00:00

In Microsoft Defender for Cloud, there is a link telling me:

The way SQL vulnerability assessment findings are consumed in Defender for Cloud is changing .Learn more about the changes and how to prepare

When I click the link, which is 'https://aka.ms/SQLVARecommendations' I get an error about the application not being found .

Does anyone know I can fix this link or provide a link to a KB article I can read instead?

Microsoft Security | Microsoft Defender | Microsoft Defender for Cloud
0 comments No comments
{count} votes

Answer accepted by question author
  1. Q&A Assist
    2026-03-06T15:18:14.44+00:00
    AI generated content. This question contains an answer created with AI from Q&A Assist. Learn more

    The aka.ms link is intended to describe the change where SQL Vulnerability Assessment findings in Microsoft Defender for Cloud are moving from a server-level aggregated model to database-level recommendations. The short link itself is currently not resolving; this cannot be fixed from the Defender for Cloud side and must be corrected by Microsoft.

    The relevant information is already documented in the Defender for Cloud release notes:

    • SQL Vulnerability Assessment rules now generate separate assessments per affected database.
    • These assessments appear and are managed as recommendations in the Defender for Cloud Recommendations page.
    • Previously, findings were aggregated at the server/instance level under recommendations such as:
      • SQL databases should have vulnerability findings resolved
      • SQL servers on machines should have vulnerability findings resolved
    • The new database-level experience keeps the same scanning logic, rules, queries, schedules, APIs, and pricing; only the way findings are consumed and managed changes.
    • During preview, the new database-level assessments do not affect Secure Score in the Azure portal but do contribute to Secure Score in the Defender portal.
    • The SQL vulnerability assessment rules reference has been updated with the new database-level recommendation names and assessment identifiers.
    • The existing server-level (aggregated) experience remains available during preview.

    To understand and prepare for the change without using the broken aka.ms link:

    1. Review the Defender for Cloud release notes section describing the February 2026 change to SQL Vulnerability Assessment consumption.
    2. Review the SQL vulnerability assessment rules reference to see the updated database-level recommendation names and IDs.
    3. In Defender for Cloud, open Recommendations and locate the SQL VA-related recommendations (both the existing server-level ones and any new database-level ones) to see how they appear in the environment.

    The broken aka.ms link itself cannot be repaired locally; the workaround is to rely on the documented behavior in the release notes and rules reference as above.


    References:

    0 comments No comments

0 additional answers

Sort by: Most helpful

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.