0.0.2.3/Devopstoolkit_issues.ps1

Set-AzureRmSqlDatabaseTransparentDataEncryption -ResourceGroupName 'MSFT-ACC-TEST' -ServerName 'capmgmttest' -DatabaseName 'assetsreports' -State 'Enabled'

Set-AzureRmSqlServerThreatDetectionPolicy -ResourceGroupName 'MSFT-ACC-TEST' -ServerName 'capmgmttest'  -StorageAccountName 'msftaccteststore' -NotificationRecipientsEmails rtraccdri@microsoft.com

Set-AzureRmSqlDatabaseThreatDetectionPolicy -ResourceGroupName 'MSFT-ACC-TEST' -ServerName 'capmgmttest' -DatabaseName 'assetsreports' -StorageAccountName 'msftaccteststore' -NotificationRecipientsEmails "rtraccdri@microsoft.com" -EmailAdmins $False -ExcludedDetectionType "Sql_Injection_Vulnerability", "SQL_Injection" 

New-AzureRmSqlServerFirewallRule -FirewallRuleName v-nismat -ResourceGroupName 'MSFT-ACC-TEST' -ServerName 'capmgmttest' -StartIpAddress '167.220.236.1' -EndIpAddress '167.220.236.254'

Remove-AzureRmSqlServerFirewallRule -FirewallRuleName 'Test' -ResourceGroupName 'MSFT-ACC-TEST' -ServerName 'capmgmttest'

Set-AzureRmStorageAccount -ResourceGroupName 11756-MSCFA-UAT  -name assetsreportsuatstorage -EnableHttpsTrafficOnly $true

Set-AzureRmStorageAccount -Name assetsreportsuatstorage -ResourceGroupName 11756-MSCFA-UAT -StorageEncryption -EnableEncryptionService 'File'

Set-AzureStorageContainerAcl -Name 'mscfaut' -Permission Off Set-AzureRmSqlDatabaseTransparentDataEncryption -ResourceGroupName 'MSFT-ACC-TEST' -ServerName 'capmgmttest' -DatabaseName 'assetsreports' -State 'Enabled'

Set-AzureRmSqlServerThreatDetectionPolicy -ResourceGroupName 'MSFT-ACC-TEST' -ServerName 'capmgmttest'  -StorageAccountName 'msftaccteststore' -NotificationRecipientsEmails rtraccdri@microsoft.com

Set-AzureRmSqlDatabaseThreatDetectionPolicy -ResourceGroupName 'MSFT-ACC-TEST' -ServerName 'capmgmttest' -DatabaseName 'assetsreports' -StorageAccountName 'msftaccteststore' -NotificationRecipientsEmails "rtraccdri@microsoft.com" -EmailAdmins $False -ExcludedDetectionType "Sql_Injection_Vulnerability", "SQL_Injection" 

New-AzureRmSqlServerFirewallRule -FirewallRuleName v-nismat -ResourceGroupName 'MSFT-ACC-TEST' -ServerName 'capmgmttest' -StartIpAddress '167.220.236.1' -EndIpAddress '167.220.236.254'

Remove-AzureRmSqlServerFirewallRule -FirewallRuleName 'Test' -ResourceGroupName 'MSFT-ACC-TEST' -ServerName 'capmgmttest'

Set-AzureRmStorageAccount -ResourceGroupName 4875-Development-MSPolicySharePointPortal-01  -name mspolicydevstoragedata -EnableHttpsTrafficOnly $true

Set-AzureRmStorageAccount -Name assetsreportsuatstorage -ResourceGroupName 11756-MSCFA-UAT -StorageEncryption -EnableEncryptionService 'File'

Set-AzureStorageContainerAcl -Name 'mscfaut' -Permission Off -Context $ctx

$X=New-AzureStorageContext  -StorageAccountName assetsreportsuatstorage -StorageAccountKey 'uLLwURNTL8D4CI5G3BCO7SwAwSMFWe58QZ93eNS2p7YsTQv+zFTSWo31LO+kVezvNNimoQwWbCZTcSLT/cwauA=='

Login-AzureRmAccount

$StorageAccountName = 'assetsreportsuatstorage'
$ctx = New-AzureStorageContext -StorageAccountName $StorageAccountName -StorageAccountKey 'uLLwURNTL8D4CI5G3BCO7SwAwSMFWe58QZ93eNS2p7YsTQv+zFTSWo31LO+kVezvNNimoQwWbCZTcSLT/cwauA=='
Select-AzureRmSubscription -SubscriptionName 'MSFT - Capital Management - 01'

Add-AzureRmMetricAlertRule -MetricName 'AnonymousSuccess' -Operator 'GreaterThan' -Threshold '0' -TimeAggregationOperator 'Total' -WindowSize '01:00:00' -Actions 
New-AzureRmAlertRuleEmail -SendToServiceOwner' -Name '<AlertName>' -ResourceGroup '<RGName>' -TargetResourceId '<TargetResourceId>' -Location '<Location>''


Add-AzureRMMetricAlertRule -Name "StorageAccountBlobAlert" -Location "SouthCentralUS" -ResourceGroup "11756-MSCFA-UAT" -Operator GreaterThan -Threshold 0 -WindowSize 01:00:00 -MetricName "Requests" -Description "Blob Alert rules for tracking anonymous activity" -TimeAggregationOperator Total -TargetResourceId '/subscriptions/9862b02e-efb3-4118-9edb-c6468651a180/resourceGroups/11756-mscfa-uat/providers/Microsoft.Storage/storageAccounts/'

#Use geo-redundant storage accounts
Set-AzureRmStorageAccount -Name 'assetsreportsuatstorage' -ResourceGroupName '11756-MSCFA-UAT' -SkuName 'Standard_GRS'

#Storage Account must be configured to log and monitor authentication request data
Set-AzureStorageServiceLoggingProperty -ServiceType 'File' -LoggingOperations 'All' -Context $ctx -RetentionDays '365' -PassThru
Set-AzureStorageServiceMetricsProperty -MetricsType 'Hour' -ServiceType 'Queue' -Context $ctx -MetricsLevel 'ServiceAndApi' -RetentionDays '365' -PassThru

#Enable SQL Database audit with selected event types and retention period of minimum 365 days
Set-AzureRmSqlDatabaseAuditingPolicy -ResourceGroupName '4215-STAT-PROD' -ServerName 'egfp8zjklf' -DatabaseName 'STAT' -AuditType 'Blob' -StorageAccountName 'statprodasia' -RetentionInDays 365 -EventType All 

Set-AzureRmSqlDatabaseAuditingPolicy -ResourceGroupName '4215-STAT-TEST' -ServerName 'w3djnbv8ut2' -DatabaseName 'STAT' -StorageAccountName 'statusatest' -EventType 'All'-RetentionInDays 365 -AuditType 'Blob'
Set-AzureRmSqlDatabaseThreatDetectionPolicy -ResourceGroupName '11756-MSCFA-UAT' -ServerName 'capmgmtuat' -DatabaseName 'assetsreports' -StorageAccountName 'assetsreportsuatstorage' -NotificationRecipientsEmails 'rtraccdri@microsoft.com' -ExcludedDetectionType 'None'

Set-AzureRmSqlServerAuditingPolicy -ResourceGroupName '4215-STAT-PROD' -ServerName 'egfp8zjklf2' -StorageAccountName 'statprodusa' -EventType 'All' -RetentionInDays 365 -AuditType 'blob'
Set-AzureRmSqlServerAuditingPolicy -ResourceGroupName '4215-STAT-PROD' -ServerName 'egfp8zjklf2' -StorageAccountName 'statprodusa' -EventType 'All' -RetentionInDays 365 -AuditType 'NotSet'
Set-AzureRmSqlServerAuditingPolicy -ResourceGroupName '4215-STAT-PROD' -ServerName 'egfp8zjklf2' -StorageAccountName 'statprodusa' -EventType 'All' -RetentionInDays 365 -AuditType 'Table'

Set-AzureRmSqlServerThreatDetectionPolicy -ResourceGroupName '4215-STAT-PROD' -ServerName 'egfp8zjklf2' -StorageAccountName 'statprodusa' -EmailAdmins $true -ExcludedDetectionType 'None'
Set-AzureRmSqlDatabaseThreatDetectionPolicy -ResourceGroupName '4215-STAT-PROD' -ServerName 'egfp8zjklf2' -DatabaseName 'STAT' -StorageAccountName 'statprodusa' -EmailAdmins $true -ExcludedDetectionType 'None'

Set-AzureRmSqlDatabaseThreatDetectionPolicy -ResourceGroupName 'MSFT-ACC-TEST' -ServerName 'capmgmttest' -DatabaseName 'assetsreports' -StorageAccountName 'masterdatatststorage' -NotificationRecipientsEmails 'rtraccdri@microsoft.com' -ExcludedDetectionType 'None'
Set-AzureRmSqlDatabaseAuditingPolicy -ResourceGroupName 'MSFT-ACC-TEST' -ServerName 'capmgmttest' -DatabaseName 'assetsreports' -StorageAccountName 'masterdatatststorage' -EventType 'All'-RetentionInDays 365 -AuditType Table
Add-AzureRMMetricAlertRule -Name "StorageAccountBlobAlert" -Location "SouthCentralUS" -ResourceGroup "MSFT-ACC-TEST" -Operator GreaterThan -Threshold 0 -WindowSize 01:00:00 -MetricName "Requests" -Description "Blob Alert rules for tracking anonymous activity" -TimeAggregationOperator Total -TargetResourceId '/subscriptions/9862b02e-efb3-4118-9edb-c6468651a180/resourceGroups/11756-mscfa-uat/providers/Microsoft.Storage/storageAccounts/'
#Use geo-redundant storage accounts
Set-AzureRmStorageAccount -Name 'masterdatatststorage' -ResourceGroupName 'MSFT-ACC-TEST' -SkuName 'Standard_GRS'
#Storage Account must be configured to log and monitor authentication request data
$StorageAccountName = 'statauditstorageprod'
$ctx = New-AzureStorageContext -StorageAccountName $StorageAccountName -StorageAccountKey 'XHA+4cxrHxpCJzt/eOl1j1u+/eJib+JAjahtLaG2/TY2mVf9i962pNGMKUoY0kgdTS3WtXPhr0z9KEX0u9wTow=='
Set-AzureStorageServiceLoggingProperty -ServiceType 'Blob' -LoggingOperations 'All' -Context $ctx -RetentionDays '365' -PassThru
Set-AzureStorageServiceLoggingProperty -ServiceType 'Queue' -LoggingOperations 'All' -Context $ctx -RetentionDays '365' -PassThru
Set-AzureStorageServiceLoggingProperty -ServiceType 'Table' -LoggingOperations 'All' -Context $ctx -RetentionDays '365' -PassThru
Set-AzureStorageServiceMetricsProperty -MetricsType 'Hour' -ServiceType 'File' -Context $ctx -MetricsLevel 'ServiceAndApi' -RetentionDays '365' -PassThru
Set-AzureStorageServiceMetricsProperty -MetricsType 'Hour' -ServiceType 'Table' -Context $ctx -MetricsLevel 'ServiceAndApi' -RetentionDays '365' -PassThru
Set-AzureStorageServiceMetricsProperty -MetricsType 'Hour' -ServiceType 'Queue' -Context $ctx -MetricsLevel 'ServiceAndApi' -RetentionDays '365' -PassThru
Set-AzureStorageServiceMetricsProperty -MetricsType 'Hour' -ServiceType 'Blob' -Context $ctx -MetricsLevel 'ServiceAndApi' -RetentionDays '365' -PassThru
#Set Azure sql database alert configuration
Set-AzureRmSqlDatabaseThreatDetectionPolicy -ResourceGroupName 'MSFT-ACC-TEST' -ServerName 'capmgmttest' -DatabaseName 'assetsreports' -StorageAccountName 'masterdatatststorage' -NotificationRecipientsEmails 'rtraccdri@microsoft.com' -ExcludedDetectionType 'None'
Set-AzureRmSqlDatabaseAuditingPolicy -ResourceGroupName '4215-STAT-TEST'-ServerName 'w3djnbv8ut'-DatabaseName 'STAT_Testold'-StorageAccountName 'statbackuptest'-EventType 'All'-RetentionInDays 365 -AuditType Blob
Set-AzureRmSqlDatabaseAuditingPolicy -ResourceGroupName '4215-STAT-TEST' -ServerName 'w3djnbv8ut' -DatabaseName 'STAT_Testold' -StorageAccountName 'statbackuptest' -RetentionInDays 365 -EventType All 
Set-AzureRmStorageAccount -Name 'msftaccteststore' -ResourceGroupName 'MSFT-ACC-TEST' -SkuName 'Standard_GRS'

#-----------------------------------------------------


Set-AzureRmStorageAccount -Name 'msftcomuatstore' -ResourceGroupName 'MSFT-COM-UAT' -SkuName 'Standard_GRS'

Set-AzureRmDiagnosticSetting -ResourceId '/subscriptions/37cc140d-3e01-4871-bbab-b2ce87d8c902/resourceGroups/rtr_uat_oms/providers/Microsoft.Automation/automationAccounts/omsppeautoaccount' -WorkspaceId '/subscriptions/37cc140d-3e01-4871-bbab-b2ce87d8c902/resourcegroups/rtr_uat_oms/providers/microsoft.operationalinsights/workspaces/recordtoreport-uat' -Enabled $true
$workspaceId = (Get-AzureRmOperationalInsightsWorkspace).ResourceId

#Set-AzureStorageContainerAcl -Name 'vhds' -Permission Off -Context $ctx
$StorageAccountName = 'statuatusa'
$ctx = New-AzureStorageContext -StorageAccountName $StorageAccountName -StorageAccountKey 'VCiQPcL/BgQcNWQ4BeRqhmDjNL62jqoj+I5idoi6PRfgxyDNp5yrSVusZoiQK+31yuDRLobtU46fPqts3N73kw=='
Set-AzureStorageServiceLoggingProperty -ServiceType 'Queue' -LoggingOperations 'All' -Context $ctx -RetentionDays '365' -PassThru
Set-AzureStorageServiceMetricsProperty -MetricsType 'Hour' -ServiceType 'Queue' -Context $ctx -MetricsLevel 'ServiceAndApi' -RetentionDays '365' -PassThru 
Set-AzureStorageServiceLoggingProperty -ServiceType 'Blob' -LoggingOperations 'All' -Context $ctx -RetentionDays '365' -PassThru
Set-AzureStorageServiceMetricsProperty -MetricsType 'Hour' -ServiceType 'Blob' -Context $ctx -MetricsLevel 'ServiceAndApi' -RetentionDays '365' -PassThru 
Set-AzureStorageServiceLoggingProperty -ServiceType 'Table' -LoggingOperations 'All' -Context $ctx -RetentionDays '365' -PassThru
Set-AzureStorageServiceMetricsProperty -MetricsType 'Hour' -ServiceType 'Table' -Context $ctx -MetricsLevel 'ServiceAndApi' -RetentionDays '365' -PassThru 
Set-AzureStorageServiceMetricsProperty -MetricsType 'Hour' -ServiceType 'File' -Context $ctx -MetricsLevel 'ServiceAndApi' -RetentionDays '365' -PassThru 
#Login-AzureRmAccount
#Get-AzSDKAzureServicesSecurityStatus -subscriptionid 9862b02e-efb3-4118-9edb-c6468651a180 -resourcegroupname 11756-MSCFA-UAT
#Get-AzSDKAzureServicesSecurityStatus -subscriptionid 9862b02e-efb3-4118-9edb-c6468651a180 -resourcegroupname MSFT-ACC-TEST
#Get-AzSDKAzureServicesSecurityStatus -subscriptionid 9862b02e-efb3-4118-9edb-c6468651a180 -resourcegroupname MSFT-ACC-UAT
#Get-AzSDKAzureServicesSecurityStatus -subscriptionid 9862b02e-efb3-4118-9edb-c6468651a180 -resourcegroupname MSFT-ACC-PROD -Pending
#Get-AzSDKAzureServicesSecurityStatus -subscriptionid 37cc140d-3e01-4871-bbab-b2ce87d8c902 -resourcegroupname MSFT-COM-UAT
#Get-AzSDKAzureServicesSecurityStatus -subscriptionid f3c68eb0-92d8-4206-bded-c9117e841048 -resourcegroupname 4215-STAT-TEST
#Get-AzSDKAzureServicesSecurityStatus -subscriptionid f3c68eb0-92d8-4206-bded-c9117e841048 -resourcegroupname 4875-Development-MSPolicySharePointPortal-01

Set-AzureRmDiagnosticSetting -ResourceId /subscriptions/f3c68eb0-92d8-4206-bded-c9117e841048/resourceGroups/4215-STAT-TEST/providers/Microsoft.KeyVault/vaults/STATkeyvaultLOCAL -StorageAccountId /subscriptions/f3c68eb0-92d8-4206-bded-c9117e841048/resourceGroups/4215-stat-test/providers/Microsoft.Storage/storageAccounts/statauditstoragetest -RetentionInDays 365 -RetentionEnabled $true -Enabled $true

$Resource =Get-azureRmresource -ResourceName STATkeyvaultLOCAL -ResourceGroupName 4215-STAT-TEST

C:\Users\v-kojonn\AppData\Local\Microsoft\AzSDKLogs\Sub_MSFT - Record to Report - 01\20171208_123511_GRS\


#Get-AzSDKAzureServicesSecurityStatus -subscriptionid '37cc140d-3e01-4871-bbab-b2ce87d8c902' -ResourceGroupNames MSFT-COM-UAT
#Get-AzSDKAzureServicesSecurityStatus -subscriptionid '37cc140d-3e01-4871-bbab-b2ce87d8c902' -ResourceGroupNames MSFT-COM-Prod -AttestControls All

$StorageAccountName = 'statprodeurope'
$ctx = New-AzureStorageContext -StorageAccountName $StorageAccountName -StorageAccountKey 'WYHues0W3cTVHSggaYYgnlLgQKRtIOsr1c6N2cucGYJ2wWYIllTnhDHcZLxob8kva9XsdUarhPR/HT4edUrSlQ=='
Set-AzureStorageContainerAcl -Name 'statprodeurope' -Permission 'Off' -Context $ctx

#iwr 'https://aka.ms/azsk/install.ps1' -UseBasicParsing | iex
#Auditing and Monitoring must be enabled for App Service
Set-AzureRmWebApp -Name 'StatUatWebAppAsia' -ResourceGroupName '4215-STAT-Prod' -DetailedErrorLoggingEnabled $true -HttpLoggingEnabled $true -RequestTracingEnabled $true

New-AzureRmAlertRuleEmail   -CustomEmails 'rtraccdri@microsoft.com' -SendToServiceOwners
Add-AzureRmMetricAlertRule -MetricName 'Errors' -Operator 'GreaterThan' -Threshold '0' -TimeAggregationOperator 'Total' -WindowSize '00:05:00' -Name 'failed runtime request' -ResourceGroup '4215-STAT-PROD' -TargetResourceId '/subscriptions/f3c68eb0-92d8-4206-bded-c9117e841048/resourceGroups/4215-STAT-PROD/providers/Microsoft.StreamAnalytics/streamingjobs/ExportAIDatatoSTATPROD' -Location 'South Central US' #-Actions 'New-AzureRmAlertRuleEmail -CustomEmails rtraccdri@microsoft.com -SendToServiceOwners'


#Get-AzureRmVMDiskEncryptionStatus -VMName azfipacctsql31 -ResourceGroupName 'MSFT-ACC-TEST'-
Get-AzSDKAzureServicesSecurityStatus -subscriptionid 9862b02e-efb3-4118-9edb-c6468651a180 -ResourceNames msftacctestdiag322

Get-AzSDKAzureServicesSecurityStatus -subscriptionid 9862b02e-efb3-4118-9edb-c6468651a180 -ResourceNames AccountingDiskEncryption

 
Disable-AzureRmVmDiskEncryption -ResourceGroupName MSFT-ACC-TEST -VMName azfipacctsql32 -VolumeType All
 
Remove-AzureRmVmDiskEncryptionExtension -ResourceGroupName MSFT-ACC-TEST -VMName azfipacctsql32 
manage-bde -status



$X=Get-AzureRmKeyVault -VaultName AcctServiceAccountsPROD -ResourceGroupName RTR-ACC-SVA -Verbose
$Z= Get-AzureKeyVaultSecret -VaultName AcctServiceAccountsPROD -Name pcaprod -Version latest


Get-AzSKAzureServicesSecurityStatus -subscriptionid f3c68eb0-92d8-4206-bded-c9117e841048 -ResourceGroupNames '' -ResourceNames '' -AttestControls All

#Login-AzureRmAccount
#Get-AzSKAzureServicesSecurityStatus -subscriptionid '37cc140d-3e01-4871-bbab-b2ce87d8c902' -ResourceGroupNames 'MSFT-COM-UAT,MSFT-COM-PROD'
Get-AzSKAzureServicesSecurityStatus -subscriptionid 'f3c68eb0-92d8-4206-bded-c9117e841048' -ResourceGroupNames '4215-STAT-PROD,4215-STAT-TEST,4215-STAT-UAT,4875-Development-MSPolicySharePointPortal-01'