Skip to content

Commit 76469d8

Browse files
Merge pull request #37128 from MicrosoftDocs/main
Auto Publish – main to live - 2026-04-23 17:30 UTC
2 parents 77a9901 + 2f5398b commit 76469d8

3 files changed

Lines changed: 6 additions & 5 deletions

File tree

azure-sql/database/transparent-data-encryption-byok-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: Bring Your Own Key (BYOK) support for transparent data encryption (
55
author: Pietervanhove
66
ms.author: pivanho
77
ms.reviewer: wiassaf, vanto, mathoma, randolphwest
8-
ms.date: 03/05/2026
8+
ms.date: 04/22/2026
99
ms.service: azure-sql
1010
ms.subservice: security
1111
ms.topic: concept-article
@@ -217,7 +217,7 @@ Auditors can use Azure Monitor to review managed HSM AuditEvent logs, if logging
217217
218218
- Keep all previously used keys in Azure Key Vault or Azure Managed HSM even after switching to service-managed keys. It ensures database backups can be restored with the TDE protectors stored in Azure Key Vault or Azure Managed HSM. TDE protectors created with Azure Key Vault or Azure Managed HSM have to be maintained until all remaining stored backups have been created with service-managed keys. Make recoverable backup copies of these keys using [Backup-AzKeyVaultKey](/powershell/module/az.keyvault/backup-azkeyvaultkey).
219219
220-
- To remove a potentially compromised key during a security incident without the risk of data loss, follow the steps in the article [Remove a Transparent Data Encryption (TDE) protector using PowerShell](transparent-data-encryption-byok-remove-tde-protector.md).
220+
- To remove a potentially compromised key during a security incident without the risk of data loss, follow the steps in the article [Remove a Transparent Data Encryption (TDE) protector using PowerShell](transparent-data-encryption-byok-remove-tde-protector.md). Always rotate to a new TDE protector and verify that all databases are using the new key before deleting or disabling the compromised key. Deleting or disabling the key without rotating first causes all encrypted databases to become inaccessible, and does not invalidate any key copies that were previously backed up and restored to another vault.
221221
222222
> [!TIP]
223223
> **Using versioned and versionless Azure Key Vault keys for TDE**

azure-sql/database/transparent-data-encryption-byok-remove-tde-protector.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: Learn how to respond to a potentially compromised TDE protector for
55
author: Pietervanhove
66
ms.author: pivanho
77
ms.reviewer: wiassaf, vanto, mathoma
8-
ms.date: 03/05/2026
8+
ms.date: 04/22/2026
99
ms.service: azure-sql-database
1010
ms.subservice: security
1111
ms.topic: how-to
@@ -24,7 +24,7 @@ This article describes how to respond to a potentially compromised TDE protect f
2424
> [!CAUTION]
2525
> The procedures outlined in this article should only be done in extreme cases or in test environments. Review the steps carefully, as deleting actively used TDE protectors from Azure Key Vault will result in **database becoming unavailable**.
2626
27-
If a key is ever suspected to be compromised, such that a service or user had unauthorized access to the key, it's best to delete the key.
27+
If a key is ever suspected to be compromised, such that a service or user had unauthorized access to the key, the recommended response is to first rotate to a new TDE protector and migrate all databases before deleting the old key. Deleting or disabling a key without first rotating the TDE protector causes all encrypted databases to become inaccessible. In addition, deleting or disabling a key does not invalidate any copies that were previously backed up and restored to another vault. Those copies remain fully functional. For more information about Key Vault backup copy behavior, see [Backup security considerations](/azure/key-vault/general/backup#security-considerations).
2828

2929
Keep in mind that once the TDE protector is deleted in Azure Key Vault, in up to 10 minutes, all encrypted databases will start denying all connections with the corresponding error message and change its state to [Inaccessible](./transparent-data-encryption-byok-overview.md#inaccessible-tde-protector).
3030

docs/relational-databases/system-views/queryinsights-exec-requests-history-transact-sql.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: "The queryinsights.exec_requests_history in Microsoft Fabric provid
44
author: WilliamDAssafMSFT
55
ms.author: wiassaf
66
ms.reviewer: mariyaali, randolphwest, emtehran
7-
ms.date: 03/12/2026
7+
ms.date: 04/23/2026
88
ms.service: sql
99
ms.topic: "reference"
1010
ms.custom:
@@ -53,6 +53,7 @@ The `queryinsights.exec_requests_history` in [!INCLUDE [fabric](../../includes/f
5353
| `data_scanned_memory_mb` | **decimal(18,3)** | Shows how much data was scanned from local memory. Data scanned from disk and memory together indicates how much data was read from cache. |
5454
| `data_scanned_disk_mb` | **decimal(18,3)** | Shows how much data was scanned/read from local disk. Data scanned from disk and memory together indicates how much data was read from cache. |
5555
| `command` | **varchar(max)** | Complete text of the executed query. |
56+
| `error_code` | **int** | Error code if query failed after beginning execution. `0` if no error encountered. |
5657

5758
## Permissions
5859

0 commit comments

Comments
 (0)