diff --git a/azure-sql/database/auditing-overview.md b/azure-sql/database/auditing-overview.md index 9badb2c929d..c92c09dca89 100644 --- a/azure-sql/database/auditing-overview.md +++ b/azure-sql/database/auditing-overview.md @@ -265,10 +265,10 @@ For a script example, see [Configure auditing and threat detection using PowerSh **REST API**: -- [Create or Update Database Auditing Policy](/rest/api/sql/database%20auditing%20settings/createorupdate) +- [Create or Update Database Auditing Policy](/rest/api/sql/2017-03-01-preview/server-auditing-settings/create-or-update) - [Create or Update Server Auditing Policy](/rest/api/sql/server%20auditing%20settings/createorupdate) - [Get Database Auditing Policy](/rest/api/sql/database%20auditing%20settings/get) -- [Get Server Auditing Policy](/rest/api/sql/server%20auditing%20settings/get) +- [Get Server Auditing Policy](/rest/api/sql/2017-03-01-preview/server-auditing-settings/get) Extended policy with WHERE clause support for additional filtering: @@ -297,4 +297,4 @@ You can manage Azure SQL Database auditing using [Azure Resource Manager](../../ - Data Exposed episode [What's New in Azure SQL Auditing](https://channel9.msdn.com/Shows/Data-Exposed/Whats-New-in-Azure-SQL-Auditing) on Channel 9. - [Auditing for SQL Managed Instance](../managed-instance/auditing-configure.md) -- [Auditing for SQL Server](/sql/relational-databases/security/auditing/sql-server-audit-database-engine) \ No newline at end of file +- [Auditing for SQL Server](/sql/relational-databases/security/auditing/sql-server-audit-database-engine)