Skip to content

Commit eb69fa8

Browse files
committed
Apply Microsoft Learn documentation standards
- Use proper NOTE alert syntax instead of heading - Apply sentence case for 'Customer responsibility' - Improve grammar and use active voice - Use full product name 'Azure role-based access control (RBAC)' - Remove unnecessary punctuation in list items - Update ms.date to 11/24/2025 Fixes MicrosoftDocs/sql-docs-pr#35810
1 parent ee03d68 commit eb69fa8

1 file changed

Lines changed: 8 additions & 10 deletions

File tree

azure-sql/database/auditing-microsoft-support-operations.md

Lines changed: 8 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: How to use Auditing to audit Microsoft support operations.
55
author: sravanisaluru
66
ms.author: srsaluru
77
ms.reviewer: mathoma, vanto
8-
ms.date: 09/18/2025
8+
ms.date: 11/24/2025
99
ms.service: azure-sql-database
1010
ms.subservice: security
1111
ms.topic: conceptual
@@ -37,15 +37,13 @@ AzureDiagnostics
3737

3838
You have the option of choosing a different storage destination for this auditing log, or use the same auditing configuration for your server.
3939

40-
### Note
41-
42-
DevOps Audit Logs stored in **Microsoft Azure Storage** may contain sensitive operational details. If accessed by a malicious actor within the customer environment, could gain insights into system operations, which may lead to unauthorized access or data breaches.
43-
44-
**Customer Responsibility:**
45-
Secure these logs by:
46-
- Restricting access to authorized personnel only.
47-
- Applying strong Azure RBAC and network controls.
48-
- Monitoring and auditing storage access regularly.
40+
> [!NOTE]
41+
> DevOps audit logs stored in Azure Storage may contain sensitive operational details. If a malicious actor within your environment accesses these logs, they could gain insights into system operations, which may lead to unauthorized access or data breaches.
42+
>
43+
> **Customer responsibility -** Secure these logs by:
44+
> - Restricting access to authorized personnel only
45+
> - Applying strong Azure role-based access control (RBAC) and network controls
46+
> - Monitoring and auditing storage access regularly
4947
5048
## Related content
5149

0 commit comments

Comments
 (0)