Summary:
I am trying to remediate vulnerability finding VA2065 ("Server-level firewall rules should be tracked and maintained at a strict minimum") on an Azure SQL Server resource using Microsoft Defender for Cloud's Vulnerability Assessment feature.
Environment:
- Azure SQL Server (logical server)
- Microsoft Defender for SQL enabled
- Vulnerability Assessment configured and scanning successfully
- Last scan completed on 4/27/2026
Issue:
When I navigate to the VA2065 finding under Defender for Cloud > Recommendations > "SQL databases should have vulnerability findings resolved," the finding shows multiple server-level firewall rules with status "Not in Baseline."
When I click either the "Add all results as baseline" or "Remove all from baseline" buttons, nothing happens. There is no error message, no loading indicator, and no change in the status of the findings. The page remains unchanged after clicking.
Steps to Reproduce:
- Open Microsoft Defender for Cloud in Azure Portal
- Go to Security posture > Recommendations
- Select "SQL databases should have vulnerability findings resolved"
- Select the affected SQL Server and its master database
- Open finding VA2065
- Click "Add all results as baseline" or "Remove all from baseline"
- Observe that no action occurs
Expected Behavior:
Clicking "Add all results as baseline" should update the baseline and mark the finding as resolved upon the next scan.
Actual Behavior:
Neither button produces any visible effect. The finding remains in Unhealthy status.
Question:
- Is there a known issue with the VA2065 baseline functionality?
- Are there alternative methods to update the baseline (e.g., REST API, PowerShell, or T-SQL)?
- Are there any required permissions beyond Contributor that are needed to modify the vulnerability assessment baseline?
Thank you for your help.