@@ -153,17 +153,17 @@ function Test-DatabaseUpdatePolicyWithEventTypes
153
153
$policy = Get-AzureSqlDatabaseAuditingPolicy - ResourceGroupName $params.rgname - ServerName $params.serverName - DatabaseName $params.databaseName
154
154
155
155
# Assert
156
- Assert-AreEqual $policy.EventType.Length 5
156
+ Assert-AreEqual $policy.EventType.Length 10
157
157
158
158
# Test
159
- Set-AzureSqlDatabaseAuditingPolicy - ResourceGroupName $params.rgname - ServerName $params.serverName - DatabaseName $params.databaseName - StorageAccountName $params.storageAccount - EventType " DataAccess " , " DataChanges " , " RevokePermissions "
159
+ Set-AzureSqlDatabaseAuditingPolicy - ResourceGroupName $params.rgname - ServerName $params.serverName - DatabaseName $params.databaseName - StorageAccountName $params.storageAccount - EventType " PlainSQL_Success " , " ParameterizedSQL_Success " , " ParameterizedSQL_Failure "
160
160
$policy = Get-AzureSqlDatabaseAuditingPolicy - ResourceGroupName $params.rgname - ServerName $params.serverName - DatabaseName $params.databaseName
161
161
162
162
# Assert
163
163
Assert-AreEqual $policy.EventType.Length 3
164
- Assert-True {$policy.EventType.Contains ([Microsoft.Azure.Commands.Sql.Security.Model.AuditEventType ]::DataAccess )}
165
- Assert-True {$policy.EventType.Contains ([Microsoft.Azure.Commands.Sql.Security.Model.AuditEventType ]::DataChanges )}
166
- Assert-True {$policy.EventType.Contains ([Microsoft.Azure.Commands.Sql.Security.Model.AuditEventType ]::RevokePermissions )}
164
+ Assert-True {$policy.EventType.Contains ([Microsoft.Azure.Commands.Sql.Security.Model.AuditEventType ]::PlainSQL_Success )}
165
+ Assert-True {$policy.EventType.Contains ([Microsoft.Azure.Commands.Sql.Security.Model.AuditEventType ]::ParameterizedSQL_Success )}
166
+ Assert-True {$policy.EventType.Contains ([Microsoft.Azure.Commands.Sql.Security.Model.AuditEventType ]::ParameterizedSQL_Failure )}
167
167
168
168
# Test
169
169
Set-AzureSqlDatabaseAuditingPolicy - ResourceGroupName $params.rgname - ServerName $params.serverName - DatabaseName $params.databaseName - StorageAccountName $params.storageAccount - EventType " None"
@@ -197,18 +197,18 @@ function Test-ServerUpdatePolicyWithEventTypes
197
197
$policy = Get-AzureSqlDatabaseServerAuditingPolicy - ResourceGroupName $params.rgname - ServerName $params.serverName
198
198
199
199
# Assert
200
- Assert-AreEqual $policy.EventType.Length 5
200
+ Assert-AreEqual $policy.EventType.Length 10
201
201
202
202
# Test
203
- Set-AzureSqlDatabaseServerAuditingPolicy - ResourceGroupName $params.rgname - ServerName $params.serverName - StorageAccountName $params.storageAccount - EventType " DataAccess " , " DataChanges " , " RevokePermissions "
203
+ Set-AzureSqlDatabaseServerAuditingPolicy - ResourceGroupName $params.rgname - ServerName $params.serverName - StorageAccountName $params.storageAccount - EventType " PlainSQL_Success " , " ParameterizedSQL_Success " , " ParameterizedSQL_Failure "
204
204
$policy = Get-AzureSqlDatabaseServerAuditingPolicy - ResourceGroupName $params.rgname - ServerName $params.serverName
205
205
206
206
# Assert
207
207
Assert-AreEqual $policy.EventType.Length 3
208
208
209
- Assert-True {$policy.EventType.Contains ([Microsoft.Azure.Commands.Sql.Security.Model.AuditEventType ]::DataAccess )}
210
- Assert-True {$policy.EventType.Contains ([Microsoft.Azure.Commands.Sql.Security.Model.AuditEventType ]::DataChanges )}
211
- Assert-True {$policy.EventType.Contains ([Microsoft.Azure.Commands.Sql.Security.Model.AuditEventType ]::RevokePermissions )}
209
+ Assert-True {$policy.EventType.Contains ([Microsoft.Azure.Commands.Sql.Security.Model.AuditEventType ]::PlainSQL_Success )}
210
+ Assert-True {$policy.EventType.Contains ([Microsoft.Azure.Commands.Sql.Security.Model.AuditEventType ]::ParameterizedSQL_Success )}
211
+ Assert-True {$policy.EventType.Contains ([Microsoft.Azure.Commands.Sql.Security.Model.AuditEventType ]::ParameterizedSQL_Failure )}
212
212
213
213
# Test
214
214
Set-AzureSqlDatabaseServerAuditingPolicy - ResourceGroupName $params.rgname - ServerName $params.serverName - StorageAccountName $params.storageAccount - EventType " None"
@@ -242,14 +242,14 @@ function Test-DatabaseUpdatePolicyWithEventTypeShortcuts
242
242
$policy = Get-AzureSqlDatabaseAuditingPolicy - ResourceGroupName $params.rgname - ServerName $params.serverName - DatabaseName $params.databaseName
243
243
244
244
# Assert
245
- Assert-AreEqual $policy.EventType.Length 5
245
+ Assert-AreEqual $policy.EventType.Length 10
246
246
247
247
# Test
248
248
Set-AzureSqlDatabaseAuditingPolicy - ResourceGroupName $params.rgname - ServerName $params.serverName - DatabaseName $params.databaseName - StorageAccountName $params.storageAccount - EventType " All"
249
249
$policy = Get-AzureSqlDatabaseAuditingPolicy - ResourceGroupName $params.rgname - ServerName $params.serverName - DatabaseName $params.databaseName
250
250
251
251
# Assert
252
- Assert-AreEqual $policy.EventType.Length 5
252
+ Assert-AreEqual $policy.EventType.Length 10
253
253
254
254
255
255
# Test
@@ -269,8 +269,8 @@ function Test-DatabaseUpdatePolicyWithEventTypeShortcuts
269
269
# Test
270
270
Assert-Throws {Set-AzureSqlDatabaseAuditingPolicy - ResourceGroupName $params.rgname - ServerName $params.serverName - DatabaseName $params.databaseName - StorageAccountName $params.storageAccount - EventType " All" , " None" }
271
271
Assert-Throws {Set-AzureSqlDatabaseAuditingPolicy - ResourceGroupName $params.rgname - ServerName $params.serverName - DatabaseName $params.databaseName - StorageAccountName $params.storageAccount - EventType " None" , " All" }
272
- Assert-Throws {Set-AzureSqlDatabaseAuditingPolicy - ResourceGroupName $params.rgname - ServerName $params.serverName - DatabaseName $params.databaseName - StorageAccountName $params.storageAccount - EventType " DataChanges " , " All" }
273
- Assert-Throws {Set-AzureSqlDatabaseAuditingPolicy - ResourceGroupName $params.rgname - ServerName $params.serverName - DatabaseName $params.databaseName - StorageAccountName $params.storageAccount - EventType " DataChanges " , " None" }
272
+ Assert-Throws {Set-AzureSqlDatabaseAuditingPolicy - ResourceGroupName $params.rgname - ServerName $params.serverName - DatabaseName $params.databaseName - StorageAccountName $params.storageAccount - EventType " PlainSQL_Success " , " All" }
273
+ Assert-Throws {Set-AzureSqlDatabaseAuditingPolicy - ResourceGroupName $params.rgname - ServerName $params.serverName - DatabaseName $params.databaseName - StorageAccountName $params.storageAccount - EventType " PlainSQL_Success " , " None" }
274
274
}
275
275
finally
276
276
{
@@ -297,14 +297,14 @@ function Test-ServerUpdatePolicyWithEventTypeShortcuts
297
297
$policy = Get-AzureSqlDatabaseServerAuditingPolicy - ResourceGroupName $params.rgname - ServerName $params.serverName
298
298
299
299
# Assert
300
- Assert-AreEqual $policy.EventType.Length 5
300
+ Assert-AreEqual $policy.EventType.Length 10
301
301
302
302
# Test
303
- Set-AzureSqlDatabaseServerAuditingPolicy - ResourceGroupName $params.rgname - ServerName $params.serverName - StorageAccountName $params.storageAccount - EventType " All" , " All "
303
+ Set-AzureSqlDatabaseServerAuditingPolicy - ResourceGroupName $params.rgname - ServerName $params.serverName - StorageAccountName $params.storageAccount - EventType " All"
304
304
$policy = Get-AzureSqlDatabaseServerAuditingPolicy - ResourceGroupName $params.rgname - ServerName $params.serverName
305
305
306
306
# Assert
307
- Assert-AreEqual $policy.EventType.Length 5
307
+ Assert-AreEqual $policy.EventType.Length 10
308
308
309
309
310
310
# Test
@@ -315,7 +315,7 @@ function Test-ServerUpdatePolicyWithEventTypeShortcuts
315
315
Assert-AreEqual $policy.EventType.Length 0
316
316
317
317
# Test
318
- Set-AzureSqlDatabaseServerAuditingPolicy - ResourceGroupName $params.rgname - ServerName $params.serverName - StorageAccountName $params.storageAccount - EventType " None" , " None "
318
+ Set-AzureSqlDatabaseServerAuditingPolicy - ResourceGroupName $params.rgname - ServerName $params.serverName - StorageAccountName $params.storageAccount - EventType " None"
319
319
$policy = Get-AzureSqlDatabaseServerAuditingPolicy - ResourceGroupName $params.rgname - ServerName $params.serverName
320
320
321
321
# Assert
@@ -324,8 +324,8 @@ function Test-ServerUpdatePolicyWithEventTypeShortcuts
324
324
# Test
325
325
Assert-Throws {Set-AzureSqlDatabaseServerAuditingPolicy - ResourceGroupName $params.rgname - ServerName $params.serverName - StorageAccountName $params.storageAccount - EventType " All" , " None" }
326
326
Assert-Throws {Set-AzureSqlDatabaseServerAuditingPolicy - ResourceGroupName $params.rgname - ServerName $params.serverName - StorageAccountName $params.storageAccount - EventType " None" , " All" }
327
- Assert-Throws {Set-AzureSqlDatabaseServerAuditingPolicy - ResourceGroupName $params.rgname - ServerName $params.serverName - StorageAccountName $params.storageAccount - EventType " DataChanges " , " All" }
328
- Assert-Throws {Set-AzureSqlDatabaseServerAuditingPolicy - ResourceGroupName $params.rgname - ServerName $params.serverName - StorageAccountName $params.storageAccount - EventType " DataChanges " , " None" }
327
+ Assert-Throws {Set-AzureSqlDatabaseServerAuditingPolicy - ResourceGroupName $params.rgname - ServerName $params.serverName - StorageAccountName $params.storageAccount - EventType " PlainSQL_Success " , " All" }
328
+ Assert-Throws {Set-AzureSqlDatabaseServerAuditingPolicy - ResourceGroupName $params.rgname - ServerName $params.serverName - StorageAccountName $params.storageAccount - EventType " PlainSQL_Success " , " None" }
329
329
}
330
330
finally
331
331
{
@@ -404,7 +404,7 @@ function Test-DatabaseDisableEnableKeepProperties
404
404
try
405
405
{
406
406
# Test
407
- Set-AzureSqlDatabaseAuditingPolicy - ResourceGroupName $params.rgname - ServerName $params.serverName - DatabaseName $params.databaseName - StorageAccountName $params.storageAccount - EventType " SecurityExceptions "
407
+ Set-AzureSqlDatabaseAuditingPolicy - ResourceGroupName $params.rgname - ServerName $params.serverName - DatabaseName $params.databaseName - StorageAccountName $params.storageAccount - EventType " Login_Failure "
408
408
Remove-AzureSqlDatabaseAuditing - ResourceGroupName $params.rgname - ServerName $params.serverName - DatabaseName $params.databaseName
409
409
Set-AzureSqlDatabaseAuditingPolicy - ResourceGroupName $params.rgname - ServerName $params.serverName - DatabaseName $params.databaseName
410
410
$policy = Get-AzureSqlDatabaseAuditingPolicy - ResourceGroupName $params.rgname - ServerName $params.serverName - DatabaseName $params.databaseName
@@ -414,7 +414,7 @@ function Test-DatabaseDisableEnableKeepProperties
414
414
Assert-AreEqual $policy.AuditState " Enabled"
415
415
Assert-AreEqual $policy.UseServerDefault " Disabled"
416
416
Assert-AreEqual $policy.EventType.Length 1
417
- Assert-True {$policy.EventType.Contains ([Microsoft.Azure.Commands.Sql.Security.Model.AuditEventType ]::SecurityExceptions )}
417
+ Assert-True {$policy.EventType.Contains ([Microsoft.Azure.Commands.Sql.Security.Model.AuditEventType ]::Login_Failure )}
418
418
}
419
419
finally
420
420
{
@@ -437,7 +437,7 @@ function Test-ServerDisableEnableKeepProperties
437
437
try
438
438
{
439
439
# Test
440
- Set-AzureSqlDatabaseServerAuditingPolicy - ResourceGroupName $params.rgname - ServerName $params.serverName - StorageAccountName $params.storageAccount - EventType " RevokePermissions "
440
+ Set-AzureSqlDatabaseServerAuditingPolicy - ResourceGroupName $params.rgname - ServerName $params.serverName - StorageAccountName $params.storageAccount - EventType " TransactionManagement_Success "
441
441
Remove-AzureSqlDatabaseServerAuditing - ResourceGroupName $params.rgname - ServerName $params.serverName
442
442
Set-AzureSqlDatabaseServerAuditingPolicy - ResourceGroupName $params.rgname - ServerName $params.serverName
443
443
$policy = Get-AzureSqlDatabaseServerAuditingPolicy - ResourceGroupName $params.rgname - ServerName $params.serverName
@@ -446,7 +446,7 @@ function Test-ServerDisableEnableKeepProperties
446
446
Assert-AreEqual $policy.StorageAccountName $params.storageAccount
447
447
Assert-AreEqual $policy.AuditState " Enabled"
448
448
Assert-AreEqual $policy.EventType.Length 1
449
- Assert-True {$policy.EventType.Contains ([Microsoft.Azure.Commands.Sql.Security.Model.AuditEventType ]::RevokePermissions )}
449
+ Assert-True {$policy.EventType.Contains ([Microsoft.Azure.Commands.Sql.Security.Model.AuditEventType ]::TransactionManagement_Success )}
450
450
}
451
451
finally
452
452
{
0 commit comments