From cde1199b11a885c7cbe0e6ed9722975d37865f52 Mon Sep 17 00:00:00 2001 From: "OpenPublishing.Build" Date: Sun, 5 Apr 2026 04:27:46 +0000 Subject: [PATCH] status --- .../Get-AzRegulatoryComplianceStandard.md | 14 +-- .../Az.Security/Get-AzSecurityAlert.md | 96 +++++++++---------- .../Az.Security/Get-AzSecurityPricing.md | 2 +- ...uritySqlVulnerabilityAssessmentBaseline.md | 12 +-- ...itySqlVulnerabilityAssessmentScanRecord.md | 24 ++--- ...itySqlVulnerabilityAssessmentScanResult.md | 18 ++-- ...uritySqlVulnerabilityAssessmentBaseline.md | 6 +- ...uritySqlVulnerabilityAssessmentBaseline.md | 24 ++--- .../Get-AzSentinelEntityActivity.md | 4 +- 9 files changed, 100 insertions(+), 100 deletions(-) diff --git a/azps-15.4.0/Az.Security/Get-AzRegulatoryComplianceStandard.md b/azps-15.4.0/Az.Security/Get-AzRegulatoryComplianceStandard.md index 9f64ecc078..ea05a958ed 100644 --- a/azps-15.4.0/Az.Security/Get-AzRegulatoryComplianceStandard.md +++ b/azps-15.4.0/Az.Security/Get-AzRegulatoryComplianceStandard.md @@ -43,7 +43,7 @@ Get-AzRegulatoryComplianceStandard ``` ```output -Id : /subscriptions/487bb485-b5b0-471e-9c0d-10717612f869/providers/Microsoft.Security/regulatoryCompli +Id : /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/providers/Microsoft.Security/regulatoryCompli anceStandards/Azure-CIS-1.1.0 Name : Azure-CIS-1.1.0 Type : Microsoft.Security/regulatoryComplianceStandards @@ -53,7 +53,7 @@ FailedControls : 4 SkippedControls : 0 UnsupportedControls : 87 -Id : /subscriptions/487bb485-b5b0-471e-9c0d-10717612f869/providers/Microsoft.Security/regulatoryCompli +Id : /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/providers/Microsoft.Security/regulatoryCompli anceStandards/ISO-27001 Name : ISO-27001 Type : Microsoft.Security/regulatoryComplianceStandards @@ -63,7 +63,7 @@ FailedControls : 10 SkippedControls : 2 UnsupportedControls : 93 -Id : /subscriptions/487bb485-b5b0-471e-9c0d-10717612f869/providers/Microsoft.Security/regulatoryCompli +Id : /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/providers/Microsoft.Security/regulatoryCompli anceStandards/PCI-DSS-3.2.1 Name : PCI-DSS-3.2.1 Type : Microsoft.Security/regulatoryComplianceStandards @@ -73,7 +73,7 @@ FailedControls : 32 SkippedControls : 0 UnsupportedControls : 187 -Id : /subscriptions/487bb485-b5b0-471e-9c0d-10717612f869/providers/Microsoft.Security/regulatoryCompli +Id : /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/providers/Microsoft.Security/regulatoryCompli anceStandards/SOC-TSP Name : SOC-TSP Type : Microsoft.Security/regulatoryComplianceStandards @@ -92,7 +92,7 @@ Get-AzRegulatoryComplianceStandard -Name "SOC-TSP" ``` ```output -Id : /subscriptions/487bb485-b5b0-471e-9c0d-10717612f869/providers/Microsoft.Security/regulatoryCompli +Id : /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/providers/Microsoft.Security/regulatoryCompli anceStandards/SOC-TSP Name : SOC-TSP Type : Microsoft.Security/regulatoryComplianceStandards @@ -107,11 +107,11 @@ Get details of specific regulatory compliance standard according standard name. ### Example 3 ```powershell -Get-AzRegulatoryComplianceStandard -ResourceId "/subscriptions/487bb485-b5b0-471e-9c0d-10717612f869/providers/Microsoft.Security/regulatoryComplianceStandards/SOC-TSP" +Get-AzRegulatoryComplianceStandard -ResourceId "/subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/providers/Microsoft.Security/regulatoryComplianceStandards/SOC-TSP" ``` ```output -Id : /subscriptions/487bb485-b5b0-471e-9c0d-10717612f869/providers/Microsoft.Security/regulatoryCompli +Id : /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/providers/Microsoft.Security/regulatoryCompli anceStandards/SOC-TSP Name : SOC-TSP Type : Microsoft.Security/regulatoryComplianceStandards diff --git a/azps-15.4.0/Az.Security/Get-AzSecurityAlert.md b/azps-15.4.0/Az.Security/Get-AzSecurityAlert.md index 9af45e09a4..7cac64cf1e 100644 --- a/azps-15.4.0/Az.Security/Get-AzSecurityAlert.md +++ b/azps-15.4.0/Az.Security/Get-AzSecurityAlert.md @@ -55,13 +55,13 @@ Get-AzSecurityAlert ``` ```output -Id : /subscriptions/487bb485-b5b0-471e-9c0d-10717612f869/resourceGroups/RSG/providers/Microsoft.Securit +Id : /subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourceGroups/RSG/providers/Microsoft.Securit y/locations/centralus/alerts/2518710774294070750_FFF23C70-80EF-4A8B-9122-507B0EA8DFFF Name : 2518710774294070750_FFF23C70-80EF-4A8B-9122-507B0EA8DFFF ActionTaken : Undefined AlertDisplayName : PREVIEW - Vulnerability scanner detected AlertName : APPS_WpScanner -AssociatedResource : /subscriptions/487bb485-b5b0-471e-9c0d-10717612f869/resourceGroups/RSG/providers/Microsoft.Web/sit +AssociatedResource : /subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourceGroups/RSG/providers/Microsoft.Web/sit es/testSite1 CanBeInvestigated : True CompromisedEntity : testSite1 @@ -86,18 +86,18 @@ RemediationSteps : 1. If WordPress is installed, make sure that the applicatio ReportedSeverity : High ReportedTimeUtc : 10/07/2018 16:31:52 State : Active -SubscriptionId : 487bb485-b5b0-471e-9c0d-10717612f869 +SubscriptionId : aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e SystemSource : VendorName : Microsoft WorkspaceArmId : -Id : /subscriptions/487bb485-b5b0-471e-9c0d-10717612f869/providers/Microsoft.Security/locations/central +Id : /subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/providers/Microsoft.Security/locations/central us/alerts/2518710774894070750_EEE23C70-80EF-4A8B-9122-507B0EA8DFFF Name : 2518710774894070750_EEE23C70-80EF-4A8B-9122-507B0EA8DFFF ActionTaken : Undefined AlertDisplayName : PREVIEW - Spam folder referrer detected AlertName : APPS_SpamReferrer -AssociatedResource : /subscriptions/487bb485-b5b0-471e-9c0d-10717612f869/providers/Microsoft.Web/sites/testSite2 +AssociatedResource : /subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/providers/Microsoft.Web/sites/testSite2 CanBeInvestigated : True CompromisedEntity : testSite2 ConfidenceReasons : {} @@ -120,18 +120,18 @@ RemediationSteps : Review the URIs in the alert details. Check whether the cor ReportedSeverity : High ReportedTimeUtc : 10/07/2018 16:31:52 State : Active -SubscriptionId : 487bb485-b5b0-471e-9c0d-10717612f869 +SubscriptionId : aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e SystemSource : VendorName : Microsoft WorkspaceArmId : -Id : /subscriptions/487bb485-b5b0-471e-9c0d-10717612f869/resourceGroups/myService1/providers/Microsoft. +Id : /subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourceGroups/myService1/providers/Microsoft. Security/locations/westeurope/alerts/2518675199999999999_0501972d-06cd-47c7-a276-036f67d89262 Name : 2518675199999999999_0501972d-06cd-47c7-a276-036f67d89262 ActionTaken : Detected AlertDisplayName : PROTOCOL-ENFORCEMENT AlertName : PROTOCOL-ENFORCEMENT -AssociatedResource : /subscriptions/487bb485-b5b0-471e-9c0d-10717612f869/resourceGroups/myService1/providers/Microsoft. +AssociatedResource : /subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourceGroups/myService1/providers/Microsoft. Network/applicationGateways/ContosoWAF CanBeInvestigated : True CompromisedEntity : 10.1.0.4 @@ -141,27 +141,27 @@ Description : Detail:Host header is a numeric IP address 13.69.131.117:80 DetectedTimeUtc : 20/08/2018 16:00:00 Entities : {} ExtendedProperties : {[hit Count, 1], [source IPs, 177.189.28.238], [management URL, https://portal.azure.com#resource/ - subscriptions/487bb485-b5b0-471e-9c0d-10717612f869/resourceGroups/myService1/providers/Microsoft.N + subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourceGroups/myService1/providers/Microsoft.N etwork/applicationGateways/ContosoWAF/overview], [resourceType, Networking]} InstanceId : 0501972d-06cd-47c7-a276-036f67d89262 RemediationSteps : ReportedSeverity : Low ReportedTimeUtc : 20/08/2018 17:00:18 State : Active -SubscriptionId : 487bb485-b5b0-471e-9c0d-10717612f869 +SubscriptionId : aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e SystemSource : Azure VendorName : Microsoft WAF -WorkspaceArmId : /subscriptions/487bb485-b5b0-471e-9c0d-10717612f869/resourcegroups/defaultresourcegroup-eus/provid - ers/microsoft.operationalinsights/workspaces/defaultworkspace-487bb485-b5b0-471e-9c0d-10717612f869 +WorkspaceArmId : /subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourcegroups/defaultresourcegroup-eus/provid + ers/microsoft.operationalinsights/workspaces/defaultworkspace-aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e -eus -Id : /subscriptions/487bb485-b5b0-471e-9c0d-10717612f869/resourceGroups/myService1/providers/Microsoft. +Id : /subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourceGroups/myService1/providers/Microsoft. Security/locations/westeurope/alerts/2518675235999999999_0cd957d9-8101-47f7-88cc-0c5d0ebdbfd0 Name : 2518675235999999999_0cd957d9-8101-47f7-88cc-0c5d0ebdbfd0 ActionTaken : Detected AlertDisplayName : PROTOCOL-ENFORCEMENT AlertName : PROTOCOL-ENFORCEMENT -AssociatedResource : /subscriptions/487bb485-b5b0-471e-9c0d-10717612f869/resourceGroups/myService1/providers/Microsoft. +AssociatedResource : /subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourceGroups/myService1/providers/Microsoft. Network/applicationGateways/ContosoWAF CanBeInvestigated : True CompromisedEntity : 10.1.0.4 @@ -171,18 +171,18 @@ Description : Detail:Host header is a numeric IP address 13.69.131.117 DetectedTimeUtc : 20/08/2018 15:00:00 Entities : {} ExtendedProperties : {[hit Count, 1], [source IPs, 217.91.251.86], [management URL, https://portal.azure.com#resource/s - ubscriptions/487bb485-b5b0-471e-9c0d-10717612f869/resourceGroups/myService1/providers/Microsoft.Ne + ubscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourceGroups/myService1/providers/Microsoft.Ne twork/applicationGateways/ContosoWAF/overview], [resourceType, Networking]} InstanceId : 0cd957d9-8101-47f7-88cc-0c5d0ebdbfd0 RemediationSteps : ReportedSeverity : Low ReportedTimeUtc : 20/08/2018 16:00:03 State : Active -SubscriptionId : 487bb485-b5b0-471e-9c0d-10717612f869 +SubscriptionId : aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e SystemSource : Azure VendorName : Microsoft WAF -WorkspaceArmId : /subscriptions/487bb485-b5b0-471e-9c0d-10717612f869/resourcegroups/defaultresourcegroup-eus/provid - ers/microsoft.operationalinsights/workspaces/defaultworkspace-487bb485-b5b0-471e-9c0d-10717612f869 +WorkspaceArmId : /subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourcegroups/defaultresourcegroup-eus/provid + ers/microsoft.operationalinsights/workspaces/defaultworkspace-aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e -eus ``` @@ -194,13 +194,13 @@ Get-AzSecurityAlert -ResourceGroupName "myService1" ``` ```output -Id : /subscriptions/487bb485-b5b0-471e-9c0d-10717612f869/resourceGroups/myService1/providers/Microsoft. +Id : /subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourceGroups/myService1/providers/Microsoft. Security/locations/westeurope/alerts/2518675199999999999_0501972d-06cd-47c7-a276-036f67d89262 Name : 2518675199999999999_0501972d-06cd-47c7-a276-036f67d89262 ActionTaken : Detected AlertDisplayName : PROTOCOL-ENFORCEMENT AlertName : PROTOCOL-ENFORCEMENT -AssociatedResource : /subscriptions/487bb485-b5b0-471e-9c0d-10717612f869/resourceGroups/myService1/providers/Microsoft. +AssociatedResource : /subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourceGroups/myService1/providers/Microsoft. Network/applicationGateways/ContosoWAF CanBeInvestigated : True CompromisedEntity : 10.1.0.4 @@ -210,27 +210,27 @@ Description : Detail:Host header is a numeric IP address 13.69.131.117:80 DetectedTimeUtc : 20/08/2018 16:00:00 Entities : {} ExtendedProperties : {[hit Count, 1], [source IPs, 177.189.28.238], [management URL, https://portal.azure.com#resource/ - subscriptions/487bb485-b5b0-471e-9c0d-10717612f869/resourceGroups/myService1/providers/Microsoft.N + subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourceGroups/myService1/providers/Microsoft.N etwork/applicationGateways/ContosoWAF/overview], [resourceType, Networking]} InstanceId : 0501972d-06cd-47c7-a276-036f67d89262 RemediationSteps : ReportedSeverity : Low ReportedTimeUtc : 20/08/2018 17:00:18 State : Active -SubscriptionId : 487bb485-b5b0-471e-9c0d-10717612f869 +SubscriptionId : aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e SystemSource : Azure VendorName : Microsoft WAF -WorkspaceArmId : /subscriptions/487bb485-b5b0-471e-9c0d-10717612f869/resourcegroups/defaultresourcegroup-eus/provid - ers/microsoft.operationalinsights/workspaces/defaultworkspace-487bb485-b5b0-471e-9c0d-10717612f869 +WorkspaceArmId : /subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourcegroups/defaultresourcegroup-eus/provid + ers/microsoft.operationalinsights/workspaces/defaultworkspace-aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e -eus -Id : /subscriptions/487bb485-b5b0-471e-9c0d-10717612f869/resourceGroups/myService1/providers/Microsoft. +Id : /subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourceGroups/myService1/providers/Microsoft. Security/locations/westeurope/alerts/2518675235999999999_0cd957d9-8101-47f7-88cc-0c5d0ebdbfd0 Name : 2518675235999999999_0cd957d9-8101-47f7-88cc-0c5d0ebdbfd0 ActionTaken : Detected AlertDisplayName : PROTOCOL-ENFORCEMENT AlertName : PROTOCOL-ENFORCEMENT -AssociatedResource : /subscriptions/487bb485-b5b0-471e-9c0d-10717612f869/resourceGroups/myService1/providers/Microsoft. +AssociatedResource : /subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourceGroups/myService1/providers/Microsoft. Network/applicationGateways/ContosoWAF CanBeInvestigated : True CompromisedEntity : 10.1.0.4 @@ -240,27 +240,27 @@ Description : Detail:Host header is a numeric IP address 13.69.131.117 DetectedTimeUtc : 20/08/2018 15:00:00 Entities : {} ExtendedProperties : {[hit Count, 1], [source IPs, 217.91.251.86], [management URL, https://portal.azure.com#resource/s - ubscriptions/487bb485-b5b0-471e-9c0d-10717612f869/resourceGroups/myService1/providers/Microsoft.Ne + ubscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourceGroups/myService1/providers/Microsoft.Ne twork/applicationGateways/ContosoWAF/overview], [resourceType, Networking]} InstanceId : 0cd957d9-8101-47f7-88cc-0c5d0ebdbfd0 RemediationSteps : ReportedSeverity : Low ReportedTimeUtc : 20/08/2018 16:00:03 State : Active -SubscriptionId : 487bb485-b5b0-471e-9c0d-10717612f869 +SubscriptionId : aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e SystemSource : Azure VendorName : Microsoft WAF -WorkspaceArmId : /subscriptions/487bb485-b5b0-471e-9c0d-10717612f869/resourcegroups/defaultresourcegroup-eus/provid - ers/microsoft.operationalinsights/workspaces/defaultworkspace-487bb485-b5b0-471e-9c0d-10717612f869 +WorkspaceArmId : /subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourcegroups/defaultresourcegroup-eus/provid + ers/microsoft.operationalinsights/workspaces/defaultworkspace-aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e -eus -Id : /subscriptions/487bb485-b5b0-471e-9c0d-10717612f869/resourceGroups/myService1/providers/Microsoft. +Id : /subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourceGroups/myService1/providers/Microsoft. Security/locations/westeurope/alerts/2518675235999999999_3cc2c984-3d3d-4af2-a2d9-ed7c6d078315 Name : 2518675235999999999_3cc2c984-3d3d-4af2-a2d9-ed7c6d078315 ActionTaken : Detected AlertDisplayName : PROTOCOL-ENFORCEMENT AlertName : PROTOCOL-ENFORCEMENT -AssociatedResource : /subscriptions/487bb485-b5b0-471e-9c0d-10717612f869/resourceGroups/myService1/providers/Microsoft. +AssociatedResource : /subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourceGroups/myService1/providers/Microsoft. Network/applicationGateways/ContosoWAF CanBeInvestigated : True CompromisedEntity : 10.1.0.5 @@ -270,27 +270,27 @@ Description : Detail:Host header is a numeric IP address 13.69.131.117 DetectedTimeUtc : 20/08/2018 15:00:00 Entities : {} ExtendedProperties : {[hit Count, 1], [source IPs, 217.91.251.86], [management URL, https://portal.azure.com#resource/s - ubscriptions/487bb485-b5b0-471e-9c0d-10717612f869/resourceGroups/myService1/providers/Microsoft.Ne + ubscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourceGroups/myService1/providers/Microsoft.Ne twork/applicationGateways/ContosoWAF/overview], [resourceType, Networking]} InstanceId : 3cc2c984-3d3d-4af2-a2d9-ed7c6d078315 RemediationSteps : ReportedSeverity : Low ReportedTimeUtc : 20/08/2018 16:00:04 State : Active -SubscriptionId : 487bb485-b5b0-471e-9c0d-10717612f869 +SubscriptionId : aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e SystemSource : Azure VendorName : Microsoft WAF -WorkspaceArmId : /subscriptions/487bb485-b5b0-471e-9c0d-10717612f869/resourcegroups/defaultresourcegroup-eus/provid - ers/microsoft.operationalinsights/workspaces/defaultworkspace-487bb485-b5b0-471e-9c0d-10717612f869 +WorkspaceArmId : /subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourcegroups/defaultresourcegroup-eus/provid + ers/microsoft.operationalinsights/workspaces/defaultworkspace-aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e -eus -Id : /subscriptions/487bb485-b5b0-471e-9c0d-10717612f869/resourceGroups/myService1/providers/Microsoft. +Id : /subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourceGroups/myService1/providers/Microsoft. Security/locations/westeurope/alerts/2518675307999999999_bbbda0ad-b149-49f4-a4ba-3e95540cbf1c Name : 2518675307999999999_bbbda0ad-b149-49f4-a4ba-3e95540cbf1c ActionTaken : Detected AlertDisplayName : PROTOCOL-ENFORCEMENT AlertName : PROTOCOL-ENFORCEMENT -AssociatedResource : /subscriptions/487bb485-b5b0-471e-9c0d-10717612f869/resourceGroups/myService1/providers/Microsoft. +AssociatedResource : /subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourceGroups/myService1/providers/Microsoft. Network/applicationGateways/ContosoWAF CanBeInvestigated : True CompromisedEntity : 10.1.0.4 @@ -300,18 +300,18 @@ Description : Detail:Host header is a numeric IP address 13.69.131.117:80 DetectedTimeUtc : 20/08/2018 13:00:00 Entities : {} ExtendedProperties : {[hit Count, 1], [source IPs, 177.86.202.171], [management URL, https://portal.azure.com#resource/ - subscriptions/487bb485-b5b0-471e-9c0d-10717612f869/resourceGroups/myService1/providers/Microsoft.N + subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourceGroups/myService1/providers/Microsoft.N etwork/applicationGateways/ContosoWAF/overview], [resourceType, Networking]} InstanceId : bbbda0ad-b149-49f4-a4ba-3e95540cbf1c RemediationSteps : ReportedSeverity : Low ReportedTimeUtc : 20/08/2018 14:00:36 State : Active -SubscriptionId : 487bb485-b5b0-471e-9c0d-10717612f869 +SubscriptionId : aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e SystemSource : Azure VendorName : Microsoft WAF -WorkspaceArmId : /subscriptions/487bb485-b5b0-471e-9c0d-10717612f869/resourcegroups/defaultresourcegroup-eus/provid - ers/microsoft.operationalinsights/workspaces/defaultworkspace-487bb485-b5b0-471e-9c0d-10717612f869 +WorkspaceArmId : /subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourcegroups/defaultresourcegroup-eus/provid + ers/microsoft.operationalinsights/workspaces/defaultworkspace-aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e -eus ``` @@ -323,13 +323,13 @@ Get-AzSecurityAlert -ResourceGroupName "myService1" -Location "westeurope" -Name ``` ```output -Id : /subscriptions/487bb485-b5b0-471e-9c0d-10717612f869/resourceGroups/myService1/providers/Microsoft. +Id : /subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourceGroups/myService1/providers/Microsoft. Security/locations/westeurope/alerts/2518675235999999999_0cd957d9-8101-47f7-88cc-0c5d0ebdbfd0 Name : 2518675235999999999_0cd957d9-8101-47f7-88cc-0c5d0ebdbfd0 ActionTaken : Detected AlertDisplayName : PROTOCOL-ENFORCEMENT AlertName : PROTOCOL-ENFORCEMENT -AssociatedResource : /subscriptions/487bb485-b5b0-471e-9c0d-10717612f869/resourceGroups/myService1/providers/Microsoft. +AssociatedResource : /subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourceGroups/myService1/providers/Microsoft. Network/applicationGateways/ContosoWAF CanBeInvestigated : True CompromisedEntity : 10.1.0.4 @@ -339,18 +339,18 @@ Description : Detail:Host header is a numeric IP address 13.69.131.117 DetectedTimeUtc : 20/08/2018 15:00:00 Entities : {} ExtendedProperties : {[hit Count, 1], [source IPs, 217.91.251.86], [management URL, https://portal.azure.com#resource/s - ubscriptions/487bb485-b5b0-471e-9c0d-10717612f869/resourceGroups/myService1/providers/Microsoft.Ne + ubscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourceGroups/myService1/providers/Microsoft.Ne twork/applicationGateways/ContosoWAF/overview], [resourceType, Networking]} InstanceId : 0cd957d9-8101-47f7-88cc-0c5d0ebdbfd0 RemediationSteps : ReportedSeverity : Low ReportedTimeUtc : 20/08/2018 16:00:03 State : Active -SubscriptionId : 487bb485-b5b0-471e-9c0d-10717612f869 +SubscriptionId : aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e SystemSource : Azure VendorName : Microsoft WAF -WorkspaceArmId : /subscriptions/487bb485-b5b0-471e-9c0d-10717612f869/resourcegroups/defaultresourcegroup-eus/provid - ers/microsoft.operationalinsights/workspaces/defaultworkspace-487bb485-b5b0-471e-9c0d-10717612f869 +WorkspaceArmId : /subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourcegroups/defaultresourcegroup-eus/provid + ers/microsoft.operationalinsights/workspaces/defaultworkspace-aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e -eus ``` diff --git a/azps-15.4.0/Az.Security/Get-AzSecurityPricing.md b/azps-15.4.0/Az.Security/Get-AzSecurityPricing.md index 9f2ebbf6cb..6da0102b0e 100644 --- a/azps-15.4.0/Az.Security/Get-AzSecurityPricing.md +++ b/azps-15.4.0/Az.Security/Get-AzSecurityPricing.md @@ -71,7 +71,7 @@ Gets the status of each Azure Defender plan for the subscription. ### Example 2 ```powershell -Get-AzSecurityPricing -ResourceId '/subscriptions/fbaa2b23-e9dd-4bed-93c1-9e2a44f64bc0/providers/Microsoft.Security/pricings/VirtualMachines' +Get-AzSecurityPricing -ResourceId '/subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/providers/Microsoft.Security/pricings/VirtualMachines' ``` Gets pricing details of the specific resource ID. Where ResourceId is one of the IDs returned by `Get-AzSecurityPricing`. diff --git a/azps-15.4.0/Az.Security/Get-AzSecuritySqlVulnerabilityAssessmentBaseline.md b/azps-15.4.0/Az.Security/Get-AzSecuritySqlVulnerabilityAssessmentBaseline.md index 8a488bc843..7ab734d225 100644 --- a/azps-15.4.0/Az.Security/Get-AzSecuritySqlVulnerabilityAssessmentBaseline.md +++ b/azps-15.4.0/Az.Security/Get-AzSecuritySqlVulnerabilityAssessmentBaseline.md @@ -35,13 +35,13 @@ Get SQL vulnerability assessment baseline. ### Example 1: Get baseline on a specific rule using resource id parameters ```powershell -Get-AzSecuritySqlVulnerabilityAssessmentBaseline -ResourceId /subscriptions/f26d1f13-67d5-4ad6-9012-67ca12d2436f/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace/onPremiseMachines/ahabas-dev01.middleeast.corp.microsoft.com_49640166-652f-4ee6-b48b-cfb840b8afe2_4c4c4544-0030-4b10-8039-b8c04f4a3332 -WorkspaceId ba7c9d0e-a6e3-4997-b575-cf7a18a98a49 -Server AHABASDEV01SRV -Database master -RuleId "VA2108" +Get-AzSecuritySqlVulnerabilityAssessmentBaseline -ResourceId /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace/onPremiseMachines/ahabas-dev01.middleeast.corp.microsoft.com_49640166-652f-4ee6-b48b-cfb840b8afe2_4c4c4544-0030-4b10-8039-b8c04f4a3332 -WorkspaceId b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2 -Server AHABASDEV01SRV -Database master -RuleId "VA2108" ``` ```output Results WorkSpaceId ------- ----------- -{VA2108 => [[dbo, db_owner1, SQL_USER]]} ba7c9d0e-a6e3-4997-b575-cf7a18a98a49 +{VA2108 => [[dbo, db_owner1, SQL_USER]]} b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2 ``` Example of using resource id parameters. @@ -53,26 +53,26 @@ Supported resources are: ### Example 2: Get baseline on a specific rule using on premise parameters ```powershell -Get-AzSecuritySqlVulnerabilityAssessmentBaseline -WorkspaceResourceId /subscriptions/f26d1f13-67d5-4ad6-9012-67ca12d2436f/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace -ComputerName ahabas-dev01.middleeast.corp.microsoft.com -AgentId 49640166-652f-4ee6-b48b-cfb840b8afe2 -VmUuid 4c4c4544-0030-4b10-8039-b8c04f4a3332 -WorkspaceId ba7c9d0e-a6e3-4997-b575-cf7a18a98a49 -Server AHABASDEV01SRV -Database master -RuleId "VA2108" +Get-AzSecuritySqlVulnerabilityAssessmentBaseline -WorkspaceResourceId /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace -ComputerName ahabas-dev01.middleeast.corp.microsoft.com -AgentId 49640166-652f-4ee6-b48b-cfb840b8afe2 -VmUuid 4c4c4544-0030-4b10-8039-b8c04f4a3332 -WorkspaceId b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2 -Server AHABASDEV01SRV -Database master -RuleId "VA2108" ``` ```output Results WorkSpaceId ------- ----------- -{VA2108 => [[dbo, db_owner1, SQL_USER]]} ba7c9d0e-a6e3-4997-b575-cf7a18a98a49 +{VA2108 => [[dbo, db_owner1, SQL_USER]]} b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2 ``` Example of using on premise parameters. ### Example 3: Get all baselines on a SQL Database ```powershell -Get-AzSecuritySqlVulnerabilityAssessmentBaseline -WorkspaceResourceId /subscriptions/f26d1f13-67d5-4ad6-9012-67ca12d2436f/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace -ComputerName ahabas-dev01.middleeast.corp.microsoft.com -AgentId 49640166-652f-4ee6-b48b-cfb840b8afe2 -VmUuid 4c4c4544-0030-4b10-8039-b8c04f4a3332 -WorkspaceId ba7c9d0e-a6e3-4997-b575-cf7a18a98a49 -Server AHABASDEV01SRV -Database master +Get-AzSecuritySqlVulnerabilityAssessmentBaseline -WorkspaceResourceId /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace -ComputerName ahabas-dev01.middleeast.corp.microsoft.com -AgentId 49640166-652f-4ee6-b48b-cfb840b8afe2 -VmUuid 4c4c4544-0030-4b10-8039-b8c04f4a3332 -WorkspaceId b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2 -Server AHABASDEV01SRV -Database master ``` ```output Results WorkSpaceId ------- ----------- -{VA1017 => [], VA1018 => [[True]], VA1020 => [], VA1022 => [[False]]…} ba7c9d0e-a6e3-4997-b575-cf7a18a98a49 +{VA1017 => [], VA1018 => [[True]], VA1020 => [], VA1022 => [[False]]…} b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2 ``` In this example a rule id is not specified, it returns all the baselines for that database. diff --git a/azps-15.4.0/Az.Security/Get-AzSecuritySqlVulnerabilityAssessmentScanRecord.md b/azps-15.4.0/Az.Security/Get-AzSecuritySqlVulnerabilityAssessmentScanRecord.md index debd16d8b5..796351fc43 100644 --- a/azps-15.4.0/Az.Security/Get-AzSecuritySqlVulnerabilityAssessmentScanRecord.md +++ b/azps-15.4.0/Az.Security/Get-AzSecuritySqlVulnerabilityAssessmentScanRecord.md @@ -35,7 +35,7 @@ Gets SQL vulnerability assessment scan summary. ### Example 1: get scan summary for latest scan for SQL Database. ```powershell -Get-AzSecuritySqlVulnerabilityAssessmentScanRecord -WorkspaceResourceId /subscriptions/f26d1f13-67d5-4ad6-9012-67ca12d2436f/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace -ComputerName ahabas-dev01.middleeast.corp.microsoft.com -AgentId 49640166-652f-4ee6-b48b-cfb840b8afe2 -VmUuid 4c4c4544-0030-4b10-8039-b8c04f4a3332 -WorkspaceId ba7c9d0e-a6e3-4997-b575-cf7a18a98a49 -Server AHABASDEV01SRV -Database master -ScanId "latest" +Get-AzSecuritySqlVulnerabilityAssessmentScanRecord -WorkspaceResourceId /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace -ComputerName ahabas-dev01.middleeast.corp.microsoft.com -AgentId 49640166-652f-4ee6-b48b-cfb840b8afe2 -VmUuid 4c4c4544-0030-4b10-8039-b8c04f4a3332 -WorkspaceId b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2 -Server AHABASDEV01SRV -Database master -ScanId "latest" ``` ```output @@ -53,7 +53,7 @@ TotalPassedRulesCount : 43 TotalFailedRulesCount : 16 TotalRulesCount : 59 IsBaselineApplied : True -Id : /subscriptions/f26d1f13-67d5-4ad6-9012-67ca12d2436f/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace/onpremisemachines/ahabas-dev01.middleeast.corp.microsoft.com_49640166-652f-4ee6-b48b-cfb840b8afe2_4c4c4544-0030-4b10-8039-b8c04f4a3332/ +Id : /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace/onpremisemachines/ahabas-dev01.middleeast.corp.microsoft.com_49640166-652f-4ee6-b48b-cfb840b8afe2_4c4c4544-0030-4b10-8039-b8c04f4a3332/ sqlServers/AHABASDEV01SRV/databases/master/providers/Microsoft.Security/sqlVulnerabilityAssessments/default/scans/bdbdf860-5d58-464b-ad9a-0125af63c162 Name : bdbdf860-5d58-464b-ad9a-0125af63c162 Type : Microsoft.Security/sqlVulnerabilityAssessments/scans @@ -63,7 +63,7 @@ Example for using scan id = "latest". ### Example 2: Get all scan summaries on SQL Database. ```powershell -Get-AzSecuritySqlVulnerabilityAssessmentScanRecord -WorkspaceResourceId /subscriptions/f26d1f13-67d5-4ad6-9012-67ca12d2436f/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace -ComputerName ahabas-dev01.middleeast.corp.microsoft.com -AgentId 49640166-652f-4ee6-b48b-cfb840b8afe2 -VmUuid 4c4c4544-0030-4b10-8039-b8c04f4a3332 -WorkspaceId ba7c9d0e-a6e3-4997-b575-cf7a18a98a49 -Server AHABASDEV01SRV -Database master +Get-AzSecuritySqlVulnerabilityAssessmentScanRecord -WorkspaceResourceId /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace -ComputerName ahabas-dev01.middleeast.corp.microsoft.com -AgentId 49640166-652f-4ee6-b48b-cfb840b8afe2 -VmUuid 4c4c4544-0030-4b10-8039-b8c04f4a3332 -WorkspaceId b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2 -Server AHABASDEV01SRV -Database master ``` ```output @@ -81,7 +81,7 @@ TotalPassedRulesCount : 43 TotalFailedRulesCount : 16 TotalRulesCount : 59 IsBaselineApplied : True -Id : /subscriptions/f26d1f13-67d5-4ad6-9012-67ca12d2436f/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace/onpremisemachines/ahabas-dev01.middleeast.corp.microsoft.com_49640166-652f-4ee6-b48b-cfb840b8afe2_4c4c4544-0030-4b10-8039-b8c04f4a3332/ +Id : /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace/onpremisemachines/ahabas-dev01.middleeast.corp.microsoft.com_49640166-652f-4ee6-b48b-cfb840b8afe2_4c4c4544-0030-4b10-8039-b8c04f4a3332/ sqlServers/AHABASDEV01SRV/databases/master/providers/Microsoft.Security/sqlVulnerabilityAssessments/default/scans/bdbdf860-5d58-464b-ad9a-0125af63c162 Name : bdbdf860-5d58-464b-ad9a-0125af63c162 Type : Microsoft.Security/sqlVulnerabilityAssessments/scans @@ -100,7 +100,7 @@ TotalPassedRulesCount : 57 TotalFailedRulesCount : 2 TotalRulesCount : 59 IsBaselineApplied : True -Id : /subscriptions/f26d1f13-67d5-4ad6-9012-67ca12d2436f/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace/onpremisemachines/ahabas-dev01.middleeast.corp.microsoft.com_49640166-652f-4ee6-b48b-cfb840b8afe2_4c4c4544-0030-4b10-8039-b8c04f4a3332/ +Id : /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace/onpremisemachines/ahabas-dev01.middleeast.corp.microsoft.com_49640166-652f-4ee6-b48b-cfb840b8afe2_4c4c4544-0030-4b10-8039-b8c04f4a3332/ sqlServers/AHABASDEV01SRV/databases/master/providers/Microsoft.Security/sqlVulnerabilityAssessments/default/scans/8b2383c3-7c7e-4b6c-9b34-512ce99fd68a Name : 8b2383c3-7c7e-4b6c-9b34-512ce99fd68a Type : Microsoft.Security/sqlVulnerabilityAssessments/scans @@ -119,7 +119,7 @@ TotalPassedRulesCount : 59 TotalFailedRulesCount : 0 TotalRulesCount : 59 IsBaselineApplied : True -Id : /subscriptions/f26d1f13-67d5-4ad6-9012-67ca12d2436f/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace/onpremisemachines/ahabas-dev01.middleeast.corp.microsoft.com_49640166-652f-4ee6-b48b-cfb840b8afe2_4c4c4544-0030-4b10-8039-b8c04f4a3332/ +Id : /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace/onpremisemachines/ahabas-dev01.middleeast.corp.microsoft.com_49640166-652f-4ee6-b48b-cfb840b8afe2_4c4c4544-0030-4b10-8039-b8c04f4a3332/ sqlServers/AHABASDEV01SRV/databases/master/providers/Microsoft.Security/sqlVulnerabilityAssessments/default/scans/6845790d-6463-4f45-96e8-76286edf0267 Name : 6845790d-6463-4f45-96e8-76286edf0267 Type : Microsoft.Security/sqlVulnerabilityAssessments/scans @@ -138,7 +138,7 @@ TotalPassedRulesCount : 57 TotalFailedRulesCount : 2 TotalRulesCount : 59 IsBaselineApplied : True -Id : /subscriptions/f26d1f13-67d5-4ad6-9012-67ca12d2436f/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace/onpremisemachines/ahabas-dev01.middleeast.corp.microsoft.com_49640166-652f-4ee6-b48b-cfb840b8afe2_4c4c4544-0030-4b10-8039-b8c04f4a3332/ +Id : /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace/onpremisemachines/ahabas-dev01.middleeast.corp.microsoft.com_49640166-652f-4ee6-b48b-cfb840b8afe2_4c4c4544-0030-4b10-8039-b8c04f4a3332/ sqlServers/AHABASDEV01SRV/databases/master/providers/Microsoft.Security/sqlVulnerabilityAssessments/default/scans/2058a46e-cb5a-4a49-b28a-6576a540dd9d Name : 2058a46e-cb5a-4a49-b28a-6576a540dd9d Type : Microsoft.Security/sqlVulnerabilityAssessments/scans @@ -148,7 +148,7 @@ Example for Listing all scan records when a scan id is not specified. ### Example 3: Get scan summary using resource id parameters. ```powershell -Get-AzSecuritySqlVulnerabilityAssessmentScanRecord -ResourceId /subscriptions/f26d1f13-67d5-4ad6-9012-67ca12d2436f/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace/onPremiseMachines/ahabas-dev01.middleeast.corp.microsoft.com_49640166-652f-4ee6-b48b-cfb840b8afe2_4c4c4544-0030-4b10-8039-b8c04f4a3332 -WorkspaceId ba7c9d0e-a6e3-4997-b575-cf7a18a98a49 -Server AHABASDEV01SRV -Database master -ScanId 169a5f78-acff-4e05-b597-6252af7e6677 +Get-AzSecuritySqlVulnerabilityAssessmentScanRecord -ResourceId /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace/onPremiseMachines/ahabas-dev01.middleeast.corp.microsoft.com_49640166-652f-4ee6-b48b-cfb840b8afe2_4c4c4544-0030-4b10-8039-b8c04f4a3332 -WorkspaceId b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2 -Server AHABASDEV01SRV -Database master -ScanId c2c2c2c2-dddd-eeee-ffff-a3a3a3a3a3a3 ``` ```output @@ -166,13 +166,13 @@ TotalPassedRulesCount : 43 TotalFailedRulesCount : 16 TotalRulesCount : 59 IsBaselineApplied : True -Id : /subscriptions/f26d1f13-67d5-4ad6-9012-67ca12d2436f/resourcegroups/ahmadtesting/provid +Id : /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourcegroups/ahmadtesting/provid ers/microsoft.operationalinsights/workspaces/ahabas-workspace/onpremisemachines/ahabas -dev01.middleeast.corp.microsoft.com_49640166-652f-4ee6-b48b-cfb840b8afe2_4c4c4544-003 0-4b10-8039-b8c04f4a3332/sqlServers/AHABASDEV01SRV/databases/master/providers/Microsof t.Security/sqlVulnerabilityAssessments/default/scans/169a5f78-acff-4e05-b597-6252af7e6 677 -Name : 169a5f78-acff-4e05-b597-6252af7e6677 +Name : c2c2c2c2-dddd-eeee-ffff-a3a3a3a3a3a3 Type : Microsoft.Security/sqlVulnerabilityAssessments/scans ``` @@ -185,7 +185,7 @@ Supported resources are: ### Example 4: Get scan summary using on premise parameters. ```powershell -Get-AzSecuritySqlVulnerabilityAssessmentScanRecord -WorkspaceResourceId /subscriptions/f26d1f13-67d5-4ad6-9012-67ca12d2436f/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace -ComputerName ahabas-dev01.middleeast.corp.microsoft.com -AgentId 49640166-652f-4ee6-b48b-cfb840b8afe2 -VmUuid 4c4c4544-0030-4b10-8039-b8c04f4a3332 -WorkspaceId ba7c9d0e-a6e3-4997-b575-cf7a18a98a49 -Server AHABASDEV01SRV -Database master -ScanId bdbdf860-5d58-464b-ad9a-0125af63c162 +Get-AzSecuritySqlVulnerabilityAssessmentScanRecord -WorkspaceResourceId /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace -ComputerName ahabas-dev01.middleeast.corp.microsoft.com -AgentId 49640166-652f-4ee6-b48b-cfb840b8afe2 -VmUuid 4c4c4544-0030-4b10-8039-b8c04f4a3332 -WorkspaceId b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2 -Server AHABASDEV01SRV -Database master -ScanId bdbdf860-5d58-464b-ad9a-0125af63c162 ``` ```output @@ -203,7 +203,7 @@ TotalPassedRulesCount : 43 TotalFailedRulesCount : 16 TotalRulesCount : 59 IsBaselineApplied : True -Id : /subscriptions/f26d1f13-67d5-4ad6-9012-67ca12d2436f/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace/onpremisemachines/ahabas-dev01.middleeast.corp.microsoft.com_49640166-652f-4ee6-b48b-cfb840b8afe2_4c4c4544-0030-4b10-8039-b8c04f4a3332/ +Id : /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace/onpremisemachines/ahabas-dev01.middleeast.corp.microsoft.com_49640166-652f-4ee6-b48b-cfb840b8afe2_4c4c4544-0030-4b10-8039-b8c04f4a3332/ sqlServers/AHABASDEV01SRV/databases/master/providers/Microsoft.Security/sqlVulnerabilityAssessments/default/scans/bdbdf860-5d58-464b-ad9a-0125af63c162 Name : bdbdf860-5d58-464b-ad9a-0125af63c162 Type : Microsoft.Security/sqlVulnerabilityAssessments/scans diff --git a/azps-15.4.0/Az.Security/Get-AzSecuritySqlVulnerabilityAssessmentScanResult.md b/azps-15.4.0/Az.Security/Get-AzSecuritySqlVulnerabilityAssessmentScanResult.md index 1dba8b69e5..c016f5bcae 100644 --- a/azps-15.4.0/Az.Security/Get-AzSecuritySqlVulnerabilityAssessmentScanResult.md +++ b/azps-15.4.0/Az.Security/Get-AzSecuritySqlVulnerabilityAssessmentScanResult.md @@ -36,7 +36,7 @@ Gets SQL vulnerability assessment scan results. ### Example 1: Get all results from latest scan on a SQL Database ```powershell -Get-AzSecuritySqlVulnerabilityAssessmentScanResult -WorkspaceResourceId /subscriptions/f26d1f13-67d5-4ad6-9012-67ca12d2436f/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace -ComputerName ahabas-dev01.middleeast.corp.microsoft.com -AgentId 49640166-652f-4ee6-b48b-cfb840b8afe2 -VmUuid 4c4c4544-0030-4b10-8039-b8c04f4a3332 -WorkspaceId ba7c9d0e-a6e3-4997-b575-cf7a18a98a49 -Server AHABASDEV01SRV -Database master +Get-AzSecuritySqlVulnerabilityAssessmentScanResult -WorkspaceResourceId /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace -ComputerName ahabas-dev01.middleeast.corp.microsoft.com -AgentId 49640166-652f-4ee6-b48b-cfb840b8afe2 -VmUuid 4c4c4544-0030-4b10-8039-b8c04f4a3332 -WorkspaceId b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2 -Server AHABASDEV01SRV -Database master ``` ```output @@ -77,7 +77,7 @@ RuleMetadata : { Reference: } } -Id : /subscriptions/f26d1f13-67d5-4ad6-9012-67ca12d2436f/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace/onpremisemachines/ahabas-dev01.middleeast.corp.microsoft.com_49640166-652f-4ee6-b48b-cfb840b8afe2_4c4c4544-0030-4b10-8039-b8c04f4a3332/sqlServe +Id : /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace/onpremisemachines/ahabas-dev01.middleeast.corp.microsoft.com_49640166-652f-4ee6-b48b-cfb840b8afe2_4c4c4544-0030-4b10-8039-b8c04f4a3332/sqlServe rs/AHABASDEV01SRV/databases/master/providers/Microsoft.Security/sqlVulnerabilityAssessments/default/scans/bdbdf860-5d58-464b-ad9a-0125af63c162/scanResults/VA1017 Name : VA1017 Type : Microsoft.Security/sqlVulnerabilityAssessments/scans/scanResults @@ -127,7 +127,7 @@ In this example when the rule id is not specified all scan results all returned ### Example 2: Get all results with scan id on a SQL Database ```powershell -Get-AzSecuritySqlVulnerabilityAssessmentScanResult -WorkspaceResourceId /subscriptions/f26d1f13-67d5-4ad6-9012-67ca12d2436f/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace -ComputerName ahabas-dev01.middleeast.corp.microsoft.com -AgentId 49640166-652f-4ee6-b48b-cfb840b8afe2 -VmUuid 4c4c4544-0030-4b10-8039-b8c04f4a3332 -WorkspaceId ba7c9d0e-a6e3-4997-b575-cf7a18a98a49 -Server AHABASDEV01SRV -Database master -ScanId 7db278d4-4629-4f75-ae0b-9c0e3d3b0816 +Get-AzSecuritySqlVulnerabilityAssessmentScanResult -WorkspaceResourceId /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace -ComputerName ahabas-dev01.middleeast.corp.microsoft.com -AgentId 49640166-652f-4ee6-b48b-cfb840b8afe2 -VmUuid 4c4c4544-0030-4b10-8039-b8c04f4a3332 -WorkspaceId b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2 -Server AHABASDEV01SRV -Database master -ScanId 7db278d4-4629-4f75-ae0b-9c0e3d3b0816 ``` ```output @@ -180,7 +180,7 @@ RuleMetadata : { Reference: } } -Id : /subscriptions/f26d1f13-67d5-4ad6-9012-67ca12d2436f/resourcegroups/ahmadtesting/providers/micr +Id : /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourcegroups/ahmadtesting/providers/micr osoft.operationalinsights/workspaces/ahabas-workspace/onpremisemachines/ahabas-dev01.middleeas t.corp.microsoft.com_49640166-652f-4ee6-b48b-cfb840b8afe2_4c4c4544-0030-4b10-8039-b8c04f4a3332 /sqlServers/AHABASDEV01SRV/databases/master/providers/Microsoft.Security/sqlVulnerabilityAsses @@ -192,7 +192,7 @@ Type : Microsoft.Security/sqlVulnerabilityAssessments/scans/sc ### Example 3: Get result on a specific rule from latest scan on SQL Database ```powershell -Get-AzSecuritySqlVulnerabilityAssessmentScanResult -WorkspaceResourceId /subscriptions/f26d1f13-67d5-4ad6-9012-67ca12d2436f/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace -ComputerName ahabas-dev01.middleeast.corp.microsoft.com -AgentId 49640166-652f-4ee6-b48b-cfb840b8afe2 -VmUuid 4c4c4544-0030-4b10-8039-b8c04f4a3332 -WorkspaceId ba7c9d0e-a6e3-4997-b575-cf7a18a98a49 -Server AHABASDEV01SRV -Database master -RuleId "VA2108" +Get-AzSecuritySqlVulnerabilityAssessmentScanResult -WorkspaceResourceId /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace -ComputerName ahabas-dev01.middleeast.corp.microsoft.com -AgentId 49640166-652f-4ee6-b48b-cfb840b8afe2 -VmUuid 4c4c4544-0030-4b10-8039-b8c04f4a3332 -WorkspaceId b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2 -Server AHABASDEV01SRV -Database master -RuleId "VA2108" ``` ```output @@ -244,7 +244,7 @@ RuleMetadata : { Reference: } } -Id : /subscriptions/f26d1f13-67d5-4ad6-9012-67ca12d2436f/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace/onpremisemachines/ahabas-dev01.middleeast.corp.microsoft.com_49640166-652f-4ee6-b48b-cfb840b8afe2_4c4c4544-0030-4b10-8039-b8c04f4a3332/sqlServe +Id : /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace/onpremisemachines/ahabas-dev01.middleeast.corp.microsoft.com_49640166-652f-4ee6-b48b-cfb840b8afe2_4c4c4544-0030-4b10-8039-b8c04f4a3332/sqlServe rs/AHABASDEV01SRV/databases/master/providers/Microsoft.Security/sqlVulnerabilityAssessments/default/scans/bdbdf860-5d58-464b-ad9a-0125af63c162/scanResults/VA2108 Name : VA2108 Type : Microsoft.Security/sqlVulnerabilityAssessments/scans/scanResults @@ -254,7 +254,7 @@ Example for using on premise parameters. scan id is not specified so it gets res ### Example 4: Get result on a specific rule using scan id parameter on SQL Database ```powershell -Get-AzSecuritySqlVulnerabilityAssessmentScanResult -ResourceId /subscriptions/f26d1f13-67d5-4ad6-9012-67ca12d2436f/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace/onPremiseMachines/ahabas-dev01.middleeast.corp.microsoft.com_49640166-652f-4ee6-b48b-cfb840b8afe2_4c4c4544-0030-4b10-8039-b8c04f4a3332 -WorkspaceId ba7c9d0e-a6e3-4997-b575-cf7a18a98a49 -Server AHABASDEV01SRV -Database master -ScanId 5cded390-68c4-4f5b-9ce6-b8a7a12b288b -RuleId "VA2108" +Get-AzSecuritySqlVulnerabilityAssessmentScanResult -ResourceId /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace/onPremiseMachines/ahabas-dev01.middleeast.corp.microsoft.com_49640166-652f-4ee6-b48b-cfb840b8afe2_4c4c4544-0030-4b10-8039-b8c04f4a3332 -WorkspaceId b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2 -Server AHABASDEV01SRV -Database master -ScanId c2c2c2c2-dddd-eeee-ffff-a3a3a3a3a3a3 -RuleId "VA2108" ``` ```output @@ -316,11 +316,11 @@ RuleMetadata : { Reference: } } -Id : /subscriptions/f26d1f13-67d5-4ad6-9012-67ca12d2436f/resourcegroups/ahmadtesting/providers/micr +Id : /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourcegroups/ahmadtesting/providers/micr osoft.operationalinsights/workspaces/ahabas-workspace/onpremisemachines/ahabas-dev01.middleeas t.corp.microsoft.com_49640166-652f-4ee6-b48b-cfb840b8afe2_4c4c4544-0030-4b10-8039-b8c04f4a3332 /sqlServers/AHABASDEV01SRV/databases/master/providers/Microsoft.Security/sqlVulnerabilityAsses - sments/default/scans/5cded390-68c4-4f5b-9ce6-b8a7a12b288b/scanResults/VA2108 + sments/default/scans/c2c2c2c2-dddd-eeee-ffff-a3a3a3a3a3a3/scanResults/VA2108 Name : VA2108 Type : Microsoft.Security/sqlVulnerabilityAssessments/scans/scanResults ``` diff --git a/azps-15.4.0/Az.Security/Remove-AzSecuritySqlVulnerabilityAssessmentBaseline.md b/azps-15.4.0/Az.Security/Remove-AzSecuritySqlVulnerabilityAssessmentBaseline.md index b736828298..984a931aa1 100644 --- a/azps-15.4.0/Az.Security/Remove-AzSecuritySqlVulnerabilityAssessmentBaseline.md +++ b/azps-15.4.0/Az.Security/Remove-AzSecuritySqlVulnerabilityAssessmentBaseline.md @@ -43,7 +43,7 @@ Removes SQL vulnerability assessment baseline. ### Example 1: Remove baseline on a specific rule with resource id parameters ```powershell -Remove-AzSecuritySqlVulnerabilityAssessmentBaseline -ResourceId /subscriptions/f26d1f13-67d5-4ad6-9012-67ca12d2436f/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace/onPremiseMachines/ahabas-dev01.middleeast.corp.microsoft.com_49640166-652f-4ee6-b48b-cfb840b8afe2_4c4c4544-0030-4b10-8039-b8c04f4a3332 -WorkspaceId ba7c9d0e-a6e3-4997-b575-cf7a18a98a49 -Server AHABASDEV01SRV -Database master -RuleId "VA2108" +Remove-AzSecuritySqlVulnerabilityAssessmentBaseline -ResourceId /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace/onPremiseMachines/ahabas-dev01.middleeast.corp.microsoft.com_49640166-652f-4ee6-b48b-cfb840b8afe2_4c4c4544-0030-4b10-8039-b8c04f4a3332 -WorkspaceId b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2 -Server AHABASDEV01SRV -Database master -RuleId "VA2108" ``` ```output @@ -61,7 +61,7 @@ Supported resources are: ### Example 2: Remove baseline on a specific rule with on premise parameters ```powershell -Remove-AzSecuritySqlVulnerabilityAssessmentBaseline -WorkspaceResourceId /subscriptions/f26d1f13-67d5-4ad6-9012-67ca12d2436f/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace -ComputerName ahabas-dev01.middleeast.corp.microsoft.com -AgentId 49640166-652f-4ee6-b48b-cfb840b8afe2 -VmUuid 4c4c4544-0030-4b10-8039-b8c04f4a3332 -WorkspaceId ba7c9d0e-a6e3-4997-b575-cf7a18a98a49 -Server AHABASDEV01SRV -Database master -RuleId "VA2108" +Remove-AzSecuritySqlVulnerabilityAssessmentBaseline -WorkspaceResourceId /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace -ComputerName ahabas-dev01.middleeast.corp.microsoft.com -AgentId 49640166-652f-4ee6-b48b-cfb840b8afe2 -VmUuid 4c4c4544-0030-4b10-8039-b8c04f4a3332 -WorkspaceId b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2 -Server AHABASDEV01SRV -Database master -RuleId "VA2108" ``` ```output @@ -74,7 +74,7 @@ Example of using on premise parameters. ### Example 3: Remove all baselines on SQL Database using pipe ```powershell -Get-AzSecuritySqlVulnerabilityAssessmentBaseline -WorkspaceResourceId /subscriptions/f26d1f13-67d5-4ad6-9012-67ca12d2436f/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace -ComputerName ahabas-dev01.middleeast.corp.microsoft.com -AgentId 49640166-652f-4ee6-b48b-cfb840b8afe2 -VmUuid 4c4c4544-0030-4b10-8039-b8c04f4a3332 -WorkspaceId ba7c9d0e-a6e3-4997-b575-cf7a18a98a49 -Server AHABASDEV01SRV -Database master | Remove-AzSecuritySqlVulnerabilityAssessmentBaseline -Force +Get-AzSecuritySqlVulnerabilityAssessmentBaseline -WorkspaceResourceId /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace -ComputerName ahabas-dev01.middleeast.corp.microsoft.com -AgentId 49640166-652f-4ee6-b48b-cfb840b8afe2 -VmUuid 4c4c4544-0030-4b10-8039-b8c04f4a3332 -WorkspaceId b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2 -Server AHABASDEV01SRV -Database master | Remove-AzSecuritySqlVulnerabilityAssessmentBaseline -Force ``` Example for force removing all the baselines for all rules on a specific database. diff --git a/azps-15.4.0/Az.Security/Set-AzSecuritySqlVulnerabilityAssessmentBaseline.md b/azps-15.4.0/Az.Security/Set-AzSecuritySqlVulnerabilityAssessmentBaseline.md index fceb18ea09..5dd742fea7 100644 --- a/azps-15.4.0/Az.Security/Set-AzSecuritySqlVulnerabilityAssessmentBaseline.md +++ b/azps-15.4.0/Az.Security/Set-AzSecuritySqlVulnerabilityAssessmentBaseline.md @@ -52,19 +52,19 @@ Sets new SQL vulnerability assessment baseline on a specific database, discards ### Example 1: Set results as baseline using resource id parameters. ```powershell -Set-AzSecuritySqlVulnerabilityAssessmentBaseline -ResourceId /subscriptions/f26d1f13-67d5-4ad6-9012-67ca12d2436f/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace/onPremiseMachines/ahabas-dev01.middleeast.corp.microsoft.com_49640166-652f-4ee6-b48b-cfb840b8afe2_4c4c4544-0030-4b10-8039-b8c04f4a3332 -WorkspaceId ba7c9d0e-a6e3-4997-b575-cf7a18a98a49 -Server AHABASDEV01SRV -Database master -BaselineSet @{VA2108 = @( , @("dbo", "db_owner1", "SQL_USER"))} +Set-AzSecuritySqlVulnerabilityAssessmentBaseline -ResourceId /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace/onPremiseMachines/ahabas-dev01.middleeast.corp.microsoft.com_49640166-652f-4ee6-b48b-cfb840b8afe2_4c4c4544-0030-4b10-8039-b8c04f4a3332 -WorkspaceId b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2 -Server AHABASDEV01SRV -Database master -BaselineSet @{VA2108 = @( , @("dbo", "db_owner1", "SQL_USER"))} ``` ```output Setting baseline for -/subscriptions/f26d1f13-67d5-4ad6-9012-67ca12d2436f/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace/onPremiseMachines/ahabas-dev01.middleeast.corp.microsoft.com_49640166-652f-4ee6-b48b-cfb840b8afe2_4c4c4544-0030-4b10-8039-b8c04f4a3332/sqlServers/AHABASDEV01SRV/databas +/subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace/onPremiseMachines/ahabas-dev01.middleeast.corp.microsoft.com_49640166-652f-4ee6-b48b-cfb840b8afe2_4c4c4544-0030-4b10-8039-b8c04f4a3332/sqlServers/AHABASDEV01SRV/databas es/master. Are you sure you want to set baseline? - This will discard your old baseline work. [Y] Yes [N] No [S] Suspend [?] Help (default is "Y"): y Results WorkSpaceId ------- ----------- -{VA2108 => [[dbo, db_owner1, SQL_USER]]} ba7c9d0e-a6e3-4997-b575-cf7a18a98a49 +{VA2108 => [[dbo, db_owner1, SQL_USER]]} b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2 ``` Example of using resource id parameters. @@ -79,57 +79,57 @@ For on premise resources, the parameter machineName is composed as follows: ### Example 2: Set results as baseline using on premise parameters. ```powershell -Set-AzSecuritySqlVulnerabilityAssessmentBaseline -WorkspaceResourceId /subscriptions/f26d1f13-67d5-4ad6-9012-67ca12d2436f/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace -ComputerName ahabas-dev01.middleeast.corp.microsoft.com -AgentId 49640166-652f-4ee6-b48b-cfb840b8afe2 -VmUuid 4c4c4544-0030-4b10-8039-b8c04f4a3332 -WorkspaceId ba7c9d0e-a6e3-4997-b575-cf7a18a98a49 -Server AHABASDEV01SRV -Database master -BaselineSet @{VA2108 = @( , @("dbo", "db_owner1", "SQL_USER"))} +Set-AzSecuritySqlVulnerabilityAssessmentBaseline -WorkspaceResourceId /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace -ComputerName ahabas-dev01.middleeast.corp.microsoft.com -AgentId 49640166-652f-4ee6-b48b-cfb840b8afe2 -VmUuid 4c4c4544-0030-4b10-8039-b8c04f4a3332 -WorkspaceId b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2 -Server AHABASDEV01SRV -Database master -BaselineSet @{VA2108 = @( , @("dbo", "db_owner1", "SQL_USER"))} ``` ```output Setting baseline for -/subscriptions/f26d1f13-67d5-4ad6-9012-67ca12d2436f/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace/onPremiseMachines/ahabas-dev01.middleeast.corp.microsoft.com_49640166-652f-4ee6-b48b-cfb840b8afe2_4c4c4544-0030-4b10-8039-b8c04f4a3332/sqlServers/AHABASDEV01SRV/databas +/subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace/onPremiseMachines/ahabas-dev01.middleeast.corp.microsoft.com_49640166-652f-4ee6-b48b-cfb840b8afe2_4c4c4544-0030-4b10-8039-b8c04f4a3332/sqlServers/AHABASDEV01SRV/databas es/master. Are you sure you want to set baseline? - This will discard your old baseline work. [Y] Yes [N] No [S] Suspend [?] Help (default is "Y"): y Results WorkSpaceId ------- ----------- -{VA2108 => [[dbo, db_owner1, SQL_USER]]} ba7c9d0e-a6e3-4997-b575-cf7a18a98a49 +{VA2108 => [[dbo, db_owner1, SQL_USER]]} b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2 ``` Example of using OnPremMachinesWithBaselineObject parameters. ### Example 3: Set results as baseline for all checks on database. ```powershell -Set-AzSecuritySqlVulnerabilityAssessmentBaseline -WorkspaceResourceId /subscriptions/f26d1f13-67d5-4ad6-9012-67ca12d2436f/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace -ComputerName ahabas-dev01.middleeast.corp.microsoft.com -AgentId 49640166-652f-4ee6-b48b-cfb840b8afe2 -VmUuid 4c4c4544-0030-4b10-8039-b8c04f4a3332 -WorkspaceId ba7c9d0e-a6e3-4997-b575-cf7a18a98a49 -Server AHABASDEV01SRV -Database master +Set-AzSecuritySqlVulnerabilityAssessmentBaseline -WorkspaceResourceId /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace -ComputerName ahabas-dev01.middleeast.corp.microsoft.com -AgentId 49640166-652f-4ee6-b48b-cfb840b8afe2 -VmUuid 4c4c4544-0030-4b10-8039-b8c04f4a3332 -WorkspaceId b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2 -Server AHABASDEV01SRV -Database master ``` ```output Setting baseline for -/subscriptions/f26d1f13-67d5-4ad6-9012-67ca12d2436f/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace/onPremiseMachines/ahabas-dev01.middleeast.corp.microsoft.com_49640166-652f-4ee6-b48b-cfb840b8afe2_4c4c4544-0030-4b10-8039-b8c04f4a3332/sqlServers/AHABASDEV01SRV/databas +/subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace/onPremiseMachines/ahabas-dev01.middleeast.corp.microsoft.com_49640166-652f-4ee6-b48b-cfb840b8afe2_4c4c4544-0030-4b10-8039-b8c04f4a3332/sqlServers/AHABASDEV01SRV/databas es/master. Are you sure you want to set baseline? - This will discard your old baseline work. [Y] Yes [N] No [S] Suspend [?] Help (default is "Y"): y Results WorkSpaceId ------- ----------- -{VA1017 => [], VA1018 => [[True]], VA1020 => [], VA1022 => [[False]]…} ba7c9d0e-a6e3-4997-b575-cf7a18a98a49 +{VA1017 => [], VA1018 => [[True]], VA1020 => [], VA1022 => [[False]]…} b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2 ``` In this example the BaselineSet is not specified thus setting all latest results as baseline. ### Example 4: Copy baseline from a database to an on prem database using pipe. ```powershell -Get-AzSecuritySqlVulnerabilityAssessmentBaseline -ResourceId /subscriptions/f26d1f13-67d5-4ad6-9012-67ca12d2436f/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace/onPremiseMachines/ahabas-dev01.middleeast.corp.microsoft.com_49640166-652f-4ee6-b48b-cfb840b8afe2_4c4c4544-0030-4b10-8039-b8c04f4a3332 -WorkspaceId ba7c9d0e-a6e3-4997-b575-cf7a18a98a49 -Server AHABASDEV01SRV -Database master | Set-AzSecuritySqlVulnerabilityAssessmentBaseline -ResourceId /subscriptions/f26d1f13-67d5-4ad6-9012-67ca12d2436f/resourcegroups/talmachinegroupeuap/providers/microsoft.operationalinsights/workspaces/talworkspaceeuap2/onPremiseMachines/TAHERSCO-DEV.middleeast.corp.microsoft.com_7adcdd86-adb6-4008-a254-80e0fc425c55_4c4c4544-0058-3310-8032-c4c04f4a4e32 -WorkspaceId 806d6dfa-132f-488d-975b-9bcf2fcd6802 -Server SQLEXPRESS -Database master +Get-AzSecuritySqlVulnerabilityAssessmentBaseline -ResourceId /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace/onPremiseMachines/ahabas-dev01.middleeast.corp.microsoft.com_49640166-652f-4ee6-b48b-cfb840b8afe2_4c4c4544-0030-4b10-8039-b8c04f4a3332 -WorkspaceId b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2 -Server AHABASDEV01SRV -Database master | Set-AzSecuritySqlVulnerabilityAssessmentBaseline -ResourceId /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourcegroups/talmachinegroupeuap/providers/microsoft.operationalinsights/workspaces/talworkspaceeuap2/onPremiseMachines/TAHERSCO-DEV.middleeast.corp.microsoft.com_7adcdd86-adb6-4008-a254-80e0fc425c55_4c4c4544-0058-3310-8032-c4c04f4a4e32 -WorkspaceId c2c2c2c2-dddd-eeee-ffff-a3a3a3a3a3a3 -Server SQLEXPRESS -Database master ``` ```output Setting baseline for -/subscriptions/f26d1f13-67d5-4ad6-9012-67ca12d2436f/resourcegroups/talmachinegroupeuap/providers/microsoft.operationalinsights/workspaces/talworkspaceeuap2/onPremiseMachines/TAHERSCO-DEV.middleeast.corp.microsoft.com_7adcdd86-adb6-4008-a254-80e0fc425c55_4c4c4544-0058-3310-8032-c4c04f4a4e32/sqlServers/SQLEXPRESS/dat +/subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourcegroups/talmachinegroupeuap/providers/microsoft.operationalinsights/workspaces/talworkspaceeuap2/onPremiseMachines/TAHERSCO-DEV.middleeast.corp.microsoft.com_7adcdd86-adb6-4008-a254-80e0fc425c55_4c4c4544-0058-3310-8032-c4c04f4a4e32/sqlServers/SQLEXPRESS/dat abases/master. Are you sure you want to set baseline? - This will discard your old baseline work. [Y] Yes [N] No [S] Suspend [?] Help (default is "Y"): y Results WorkSpaceId ------- ----------- -{VA2108 => [[dbo, db_owner1, SQL_USER]]} 806d6dfa-132f-488d-975b-9bcf2fcd6802 +{VA2108 => [[dbo, db_owner1, SQL_USER]]} c2c2c2c2-dddd-eeee-ffff-a3a3a3a3a3a3 ``` >[!NOTE] diff --git a/azps-15.4.0/Az.SecurityInsights/Get-AzSentinelEntityActivity.md b/azps-15.4.0/Az.SecurityInsights/Get-AzSentinelEntityActivity.md index 7b0cb442a9..47014c59d5 100644 --- a/azps-15.4.0/Az.SecurityInsights/Get-AzSentinelEntityActivity.md +++ b/azps-15.4.0/Az.SecurityInsights/Get-AzSentinelEntityActivity.md @@ -41,14 +41,14 @@ Name : 876fda24-fe06-62b7-7dca-bced167a0ca3 FriendlyName : 52.166.111.66 Kind : Ip -Name : 4ebb68f3-a435-fac0-d3b6-94712d246f0a +Name : 00aa00aa-bb11-cc22-dd33-44ee44ee44ee ``` This command gets insights and activities for an Entity. ### Example 2: Get Insights and Activities for an Entity by Id ```powershell -$Entity = Get-AzSentinelEntity -ResourceGroupName "myResourceGroupName" -workspaceName "myWorkspaceName" -EntityId "4ebb68f3-a435-fac0-d3b6-94712d246f0a" +$Entity = Get-AzSentinelEntity -ResourceGroupName "myResourceGroupName" -workspaceName "myWorkspaceName" -EntityId "00aa00aa-bb11-cc22-dd33-44ee44ee44ee" $Entity | Get-AzSentinelEntityActivity ```