Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
14 changes: 7 additions & 7 deletions azps-15.4.0/Az.Security/Get-AzRegulatoryComplianceStandard.md
Original file line number Diff line number Diff line change
Expand Up @@ -43,7 +43,7 @@ Get-AzRegulatoryComplianceStandard
```

```output
Id : /subscriptions/487bb485-b5b0-471e-9c0d-10717612f869/providers/Microsoft.Security/regulatoryCompli
Id : /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/providers/Microsoft.Security/regulatoryCompli
anceStandards/Azure-CIS-1.1.0
Name : Azure-CIS-1.1.0
Type : Microsoft.Security/regulatoryComplianceStandards
Expand All @@ -53,7 +53,7 @@ FailedControls : 4
SkippedControls : 0
UnsupportedControls : 87

Id : /subscriptions/487bb485-b5b0-471e-9c0d-10717612f869/providers/Microsoft.Security/regulatoryCompli
Id : /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/providers/Microsoft.Security/regulatoryCompli
anceStandards/ISO-27001
Name : ISO-27001
Type : Microsoft.Security/regulatoryComplianceStandards
Expand All @@ -63,7 +63,7 @@ FailedControls : 10
SkippedControls : 2
UnsupportedControls : 93

Id : /subscriptions/487bb485-b5b0-471e-9c0d-10717612f869/providers/Microsoft.Security/regulatoryCompli
Id : /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/providers/Microsoft.Security/regulatoryCompli
anceStandards/PCI-DSS-3.2.1
Name : PCI-DSS-3.2.1
Type : Microsoft.Security/regulatoryComplianceStandards
Expand All @@ -73,7 +73,7 @@ FailedControls : 32
SkippedControls : 0
UnsupportedControls : 187

Id : /subscriptions/487bb485-b5b0-471e-9c0d-10717612f869/providers/Microsoft.Security/regulatoryCompli
Id : /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/providers/Microsoft.Security/regulatoryCompli
anceStandards/SOC-TSP
Name : SOC-TSP
Type : Microsoft.Security/regulatoryComplianceStandards
Expand All @@ -92,7 +92,7 @@ Get-AzRegulatoryComplianceStandard -Name "SOC-TSP"
```

```output
Id : /subscriptions/487bb485-b5b0-471e-9c0d-10717612f869/providers/Microsoft.Security/regulatoryCompli
Id : /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/providers/Microsoft.Security/regulatoryCompli
anceStandards/SOC-TSP
Name : SOC-TSP
Type : Microsoft.Security/regulatoryComplianceStandards
Expand All @@ -107,11 +107,11 @@ Get details of specific regulatory compliance standard according standard name.

### Example 3
```powershell
Get-AzRegulatoryComplianceStandard -ResourceId "/subscriptions/487bb485-b5b0-471e-9c0d-10717612f869/providers/Microsoft.Security/regulatoryComplianceStandards/SOC-TSP"
Get-AzRegulatoryComplianceStandard -ResourceId "/subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/providers/Microsoft.Security/regulatoryComplianceStandards/SOC-TSP"
```

```output
Id : /subscriptions/487bb485-b5b0-471e-9c0d-10717612f869/providers/Microsoft.Security/regulatoryCompli
Id : /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/providers/Microsoft.Security/regulatoryCompli
anceStandards/SOC-TSP
Name : SOC-TSP
Type : Microsoft.Security/regulatoryComplianceStandards
Expand Down
96 changes: 48 additions & 48 deletions azps-15.4.0/Az.Security/Get-AzSecurityAlert.md

Large diffs are not rendered by default.

2 changes: 1 addition & 1 deletion azps-15.4.0/Az.Security/Get-AzSecurityPricing.md
Original file line number Diff line number Diff line change
Expand Up @@ -71,7 +71,7 @@ Gets the status of each Azure Defender plan for the subscription.
### Example 2

```powershell
Get-AzSecurityPricing -ResourceId '/subscriptions/fbaa2b23-e9dd-4bed-93c1-9e2a44f64bc0/providers/Microsoft.Security/pricings/VirtualMachines'
Get-AzSecurityPricing -ResourceId '/subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/providers/Microsoft.Security/pricings/VirtualMachines'
```

Gets pricing details of the specific resource ID. Where ResourceId is one of the IDs returned by `Get-AzSecurityPricing`.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -35,13 +35,13 @@ Get SQL vulnerability assessment baseline.

### Example 1: Get baseline on a specific rule using resource id parameters
```powershell
Get-AzSecuritySqlVulnerabilityAssessmentBaseline -ResourceId /subscriptions/f26d1f13-67d5-4ad6-9012-67ca12d2436f/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace/onPremiseMachines/ahabas-dev01.middleeast.corp.microsoft.com_49640166-652f-4ee6-b48b-cfb840b8afe2_4c4c4544-0030-4b10-8039-b8c04f4a3332 -WorkspaceId ba7c9d0e-a6e3-4997-b575-cf7a18a98a49 -Server AHABASDEV01SRV -Database master -RuleId "VA2108"
Get-AzSecuritySqlVulnerabilityAssessmentBaseline -ResourceId /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace/onPremiseMachines/ahabas-dev01.middleeast.corp.microsoft.com_49640166-652f-4ee6-b48b-cfb840b8afe2_4c4c4544-0030-4b10-8039-b8c04f4a3332 -WorkspaceId b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2 -Server AHABASDEV01SRV -Database master -RuleId "VA2108"
```

```output
Results WorkSpaceId
------- -----------
{VA2108 => [[dbo, db_owner1, SQL_USER]]} ba7c9d0e-a6e3-4997-b575-cf7a18a98a49
{VA2108 => [[dbo, db_owner1, SQL_USER]]} b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2
```

Example of using resource id parameters.
Expand All @@ -53,26 +53,26 @@ Supported resources are:

### Example 2: Get baseline on a specific rule using on premise parameters
```powershell
Get-AzSecuritySqlVulnerabilityAssessmentBaseline -WorkspaceResourceId /subscriptions/f26d1f13-67d5-4ad6-9012-67ca12d2436f/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace -ComputerName ahabas-dev01.middleeast.corp.microsoft.com -AgentId 49640166-652f-4ee6-b48b-cfb840b8afe2 -VmUuid 4c4c4544-0030-4b10-8039-b8c04f4a3332 -WorkspaceId ba7c9d0e-a6e3-4997-b575-cf7a18a98a49 -Server AHABASDEV01SRV -Database master -RuleId "VA2108"
Get-AzSecuritySqlVulnerabilityAssessmentBaseline -WorkspaceResourceId /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace -ComputerName ahabas-dev01.middleeast.corp.microsoft.com -AgentId 49640166-652f-4ee6-b48b-cfb840b8afe2 -VmUuid 4c4c4544-0030-4b10-8039-b8c04f4a3332 -WorkspaceId b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2 -Server AHABASDEV01SRV -Database master -RuleId "VA2108"
```

```output
Results WorkSpaceId
------- -----------
{VA2108 => [[dbo, db_owner1, SQL_USER]]} ba7c9d0e-a6e3-4997-b575-cf7a18a98a49
{VA2108 => [[dbo, db_owner1, SQL_USER]]} b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2
```

Example of using on premise parameters.

### Example 3: Get all baselines on a SQL Database
```powershell
Get-AzSecuritySqlVulnerabilityAssessmentBaseline -WorkspaceResourceId /subscriptions/f26d1f13-67d5-4ad6-9012-67ca12d2436f/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace -ComputerName ahabas-dev01.middleeast.corp.microsoft.com -AgentId 49640166-652f-4ee6-b48b-cfb840b8afe2 -VmUuid 4c4c4544-0030-4b10-8039-b8c04f4a3332 -WorkspaceId ba7c9d0e-a6e3-4997-b575-cf7a18a98a49 -Server AHABASDEV01SRV -Database master
Get-AzSecuritySqlVulnerabilityAssessmentBaseline -WorkspaceResourceId /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourcegroups/ahmadtesting/providers/microsoft.operationalinsights/workspaces/ahabas-workspace -ComputerName ahabas-dev01.middleeast.corp.microsoft.com -AgentId 49640166-652f-4ee6-b48b-cfb840b8afe2 -VmUuid 4c4c4544-0030-4b10-8039-b8c04f4a3332 -WorkspaceId b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2 -Server AHABASDEV01SRV -Database master
```

```output
Results WorkSpaceId
------- -----------
{VA1017 => [], VA1018 => [[True]], VA1020 => [], VA1022 => [[False]]…} ba7c9d0e-a6e3-4997-b575-cf7a18a98a49
{VA1017 => [], VA1018 => [[True]], VA1020 => [], VA1022 => [[False]]…} b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2
```

In this example a rule id is not specified, it returns all the baselines for that database.
Expand Down
Loading