0.0.2.4/Devopstoolkit_issues.ps1
Set-AzureRmSqlDatabaseTransparentDataEncryption -ResourceGroupName 'MSFT-ACC-TEST' -ServerName 'capmgmttest' -DatabaseName 'assetsreports' -State 'Enabled' Set-AzureRmSqlServerThreatDetectionPolicy -ResourceGroupName 'MSFT-ACC-TEST' -ServerName 'capmgmttest' -StorageAccountName 'msftaccteststore' -NotificationRecipientsEmails rtraccdri@microsoft.com Set-AzureRmSqlDatabaseThreatDetectionPolicy -ResourceGroupName 'MSFT-ACC-TEST' -ServerName 'capmgmttest' -DatabaseName 'assetsreports' -StorageAccountName 'msftaccteststore' -NotificationRecipientsEmails "rtraccdri@microsoft.com" -EmailAdmins $False -ExcludedDetectionType "Sql_Injection_Vulnerability", "SQL_Injection" New-AzureRmSqlServerFirewallRule -FirewallRuleName v-nismat -ResourceGroupName 'MSFT-ACC-TEST' -ServerName 'capmgmttest' -StartIpAddress '167.220.236.1' -EndIpAddress '167.220.236.254' Remove-AzureRmSqlServerFirewallRule -FirewallRuleName 'Test' -ResourceGroupName 'MSFT-ACC-TEST' -ServerName 'capmgmttest' Set-AzureRmStorageAccount -ResourceGroupName 11756-MSCFA-UAT -name assetsreportsuatstorage -EnableHttpsTrafficOnly $true Set-AzureRmStorageAccount -Name assetsreportsuatstorage -ResourceGroupName 11756-MSCFA-UAT -StorageEncryption -EnableEncryptionService 'File' Set-AzureStorageContainerAcl -Name 'mscfaut' -Permission Off Set-AzureRmSqlDatabaseTransparentDataEncryption -ResourceGroupName 'MSFT-ACC-TEST' -ServerName 'capmgmttest' -DatabaseName 'assetsreports' -State 'Enabled' Set-AzureRmSqlServerThreatDetectionPolicy -ResourceGroupName 'MSFT-ACC-TEST' -ServerName 'capmgmttest' -StorageAccountName 'msftaccteststore' -NotificationRecipientsEmails rtraccdri@microsoft.com Set-AzureRmSqlDatabaseThreatDetectionPolicy -ResourceGroupName 'MSFT-ACC-TEST' -ServerName 'capmgmttest' -DatabaseName 'assetsreports' -StorageAccountName 'msftaccteststore' -NotificationRecipientsEmails "rtraccdri@microsoft.com" -EmailAdmins $False -ExcludedDetectionType "Sql_Injection_Vulnerability", "SQL_Injection" New-AzureRmSqlServerFirewallRule -FirewallRuleName v-nismat -ResourceGroupName 'MSFT-ACC-TEST' -ServerName 'capmgmttest' -StartIpAddress '167.220.236.1' -EndIpAddress '167.220.236.254' Remove-AzureRmSqlServerFirewallRule -FirewallRuleName 'Test' -ResourceGroupName 'MSFT-ACC-TEST' -ServerName 'capmgmttest' Set-AzureRmStorageAccount -ResourceGroupName 4875-Development-MSPolicySharePointPortal-01 -name mspolicydevstoragedata -EnableHttpsTrafficOnly $true Set-AzureRmStorageAccount -Name assetsreportsuatstorage -ResourceGroupName 11756-MSCFA-UAT -StorageEncryption -EnableEncryptionService 'File' Set-AzureStorageContainerAcl -Name 'mscfaut' -Permission Off -Context $ctx $X=New-AzureStorageContext -StorageAccountName assetsreportsuatstorage -StorageAccountKey 'uLLwURNTL8D4CI5G3BCO7SwAwSMFWe58QZ93eNS2p7YsTQv+zFTSWo31LO+kVezvNNimoQwWbCZTcSLT/cwauA==' Login-AzureRmAccount $StorageAccountName = 'assetsreportsuatstorage' $ctx = New-AzureStorageContext -StorageAccountName $StorageAccountName -StorageAccountKey 'uLLwURNTL8D4CI5G3BCO7SwAwSMFWe58QZ93eNS2p7YsTQv+zFTSWo31LO+kVezvNNimoQwWbCZTcSLT/cwauA==' Select-AzureRmSubscription -SubscriptionName 'MSFT - Capital Management - 01' Add-AzureRmMetricAlertRule -MetricName 'AnonymousSuccess' -Operator 'GreaterThan' -Threshold '0' -TimeAggregationOperator 'Total' -WindowSize '01:00:00' -Actions New-AzureRmAlertRuleEmail -SendToServiceOwner' -Name '<AlertName>' -ResourceGroup '<RGName>' -TargetResourceId '<TargetResourceId>' -Location '<Location>'' Add-AzureRMMetricAlertRule -Name "StorageAccountBlobAlert" -Location "SouthCentralUS" -ResourceGroup "11756-MSCFA-UAT" -Operator GreaterThan -Threshold 0 -WindowSize 01:00:00 -MetricName "Requests" -Description "Blob Alert rules for tracking anonymous activity" -TimeAggregationOperator Total -TargetResourceId '/subscriptions/9862b02e-efb3-4118-9edb-c6468651a180/resourceGroups/11756-mscfa-uat/providers/Microsoft.Storage/storageAccounts/' #Use geo-redundant storage accounts Set-AzureRmStorageAccount -Name 'assetsreportsuatstorage' -ResourceGroupName '11756-MSCFA-UAT' -SkuName 'Standard_GRS' #Storage Account must be configured to log and monitor authentication request data Set-AzureStorageServiceLoggingProperty -ServiceType 'File' -LoggingOperations 'All' -Context $ctx -RetentionDays '365' -PassThru Set-AzureStorageServiceMetricsProperty -MetricsType 'Hour' -ServiceType 'Queue' -Context $ctx -MetricsLevel 'ServiceAndApi' -RetentionDays '365' -PassThru #Enable SQL Database audit with selected event types and retention period of minimum 365 days Set-AzureRmSqlDatabaseAuditingPolicy -ResourceGroupName '4215-STAT-PROD' -ServerName 'egfp8zjklf' -DatabaseName 'STAT' -AuditType 'Blob' -StorageAccountName 'statprodasia' -RetentionInDays 365 -EventType All Set-AzureRmSqlDatabaseAuditingPolicy -ResourceGroupName '4215-STAT-TEST' -ServerName 'w3djnbv8ut2' -DatabaseName 'STAT' -StorageAccountName 'statusatest' -EventType 'All'-RetentionInDays 365 -AuditType 'Blob' Set-AzureRmSqlDatabaseThreatDetectionPolicy -ResourceGroupName '11756-MSCFA-UAT' -ServerName 'capmgmtuat' -DatabaseName 'assetsreports' -StorageAccountName 'assetsreportsuatstorage' -NotificationRecipientsEmails 'rtraccdri@microsoft.com' -ExcludedDetectionType 'None' Set-AzureRmSqlServerAuditingPolicy -ResourceGroupName '4215-STAT-PROD' -ServerName 'egfp8zjklf2' -StorageAccountName 'statprodusa' -EventType 'All' -RetentionInDays 365 -AuditType 'blob' Set-AzureRmSqlServerAuditingPolicy -ResourceGroupName '4215-STAT-PROD' -ServerName 'egfp8zjklf2' -StorageAccountName 'statprodusa' -EventType 'All' -RetentionInDays 365 -AuditType 'NotSet' Set-AzureRmSqlServerAuditingPolicy -ResourceGroupName '4215-STAT-PROD' -ServerName 'egfp8zjklf2' -StorageAccountName 'statprodusa' -EventType 'All' -RetentionInDays 365 -AuditType 'Table' Set-AzureRmSqlServerThreatDetectionPolicy -ResourceGroupName '4215-STAT-PROD' -ServerName 'egfp8zjklf2' -StorageAccountName 'statprodusa' -EmailAdmins $true -ExcludedDetectionType 'None' Set-AzureRmSqlDatabaseThreatDetectionPolicy -ResourceGroupName '4215-STAT-PROD' -ServerName 'egfp8zjklf2' -DatabaseName 'STAT' -StorageAccountName 'statprodusa' -EmailAdmins $true -ExcludedDetectionType 'None' Set-AzureRmSqlDatabaseThreatDetectionPolicy -ResourceGroupName 'MSFT-ACC-TEST' -ServerName 'capmgmttest' -DatabaseName 'assetsreports' -StorageAccountName 'masterdatatststorage' -NotificationRecipientsEmails 'rtraccdri@microsoft.com' -ExcludedDetectionType 'None' Set-AzureRmSqlDatabaseAuditingPolicy -ResourceGroupName 'MSFT-ACC-TEST' -ServerName 'capmgmttest' -DatabaseName 'assetsreports' -StorageAccountName 'masterdatatststorage' -EventType 'All'-RetentionInDays 365 -AuditType Table Add-AzureRMMetricAlertRule -Name "StorageAccountBlobAlert" -Location "SouthCentralUS" -ResourceGroup "MSFT-ACC-TEST" -Operator GreaterThan -Threshold 0 -WindowSize 01:00:00 -MetricName "Requests" -Description "Blob Alert rules for tracking anonymous activity" -TimeAggregationOperator Total -TargetResourceId '/subscriptions/9862b02e-efb3-4118-9edb-c6468651a180/resourceGroups/11756-mscfa-uat/providers/Microsoft.Storage/storageAccounts/' #Use geo-redundant storage accounts Set-AzureRmStorageAccount -Name 'masterdatatststorage' -ResourceGroupName 'MSFT-ACC-TEST' -SkuName 'Standard_GRS' #Storage Account must be configured to log and monitor authentication request data $StorageAccountName = 'statauditstorageprod' $ctx = New-AzureStorageContext -StorageAccountName $StorageAccountName -StorageAccountKey 'XHA+4cxrHxpCJzt/eOl1j1u+/eJib+JAjahtLaG2/TY2mVf9i962pNGMKUoY0kgdTS3WtXPhr0z9KEX0u9wTow==' Set-AzureStorageServiceLoggingProperty -ServiceType 'Blob' -LoggingOperations 'All' -Context $ctx -RetentionDays '365' -PassThru Set-AzureStorageServiceLoggingProperty -ServiceType 'Queue' -LoggingOperations 'All' -Context $ctx -RetentionDays '365' -PassThru Set-AzureStorageServiceLoggingProperty -ServiceType 'Table' -LoggingOperations 'All' -Context $ctx -RetentionDays '365' -PassThru Set-AzureStorageServiceMetricsProperty -MetricsType 'Hour' -ServiceType 'File' -Context $ctx -MetricsLevel 'ServiceAndApi' -RetentionDays '365' -PassThru Set-AzureStorageServiceMetricsProperty -MetricsType 'Hour' -ServiceType 'Table' -Context $ctx -MetricsLevel 'ServiceAndApi' -RetentionDays '365' -PassThru Set-AzureStorageServiceMetricsProperty -MetricsType 'Hour' -ServiceType 'Queue' -Context $ctx -MetricsLevel 'ServiceAndApi' -RetentionDays '365' -PassThru Set-AzureStorageServiceMetricsProperty -MetricsType 'Hour' -ServiceType 'Blob' -Context $ctx -MetricsLevel 'ServiceAndApi' -RetentionDays '365' -PassThru #Set Azure sql database alert configuration Set-AzureRmSqlDatabaseThreatDetectionPolicy -ResourceGroupName 'MSFT-ACC-TEST' -ServerName 'capmgmttest' -DatabaseName 'assetsreports' -StorageAccountName 'masterdatatststorage' -NotificationRecipientsEmails 'rtraccdri@microsoft.com' -ExcludedDetectionType 'None' Set-AzureRmSqlDatabaseAuditingPolicy -ResourceGroupName '4215-STAT-TEST'-ServerName 'w3djnbv8ut'-DatabaseName 'STAT_Testold'-StorageAccountName 'statbackuptest'-EventType 'All'-RetentionInDays 365 -AuditType Blob Set-AzureRmSqlDatabaseAuditingPolicy -ResourceGroupName '4215-STAT-TEST' -ServerName 'w3djnbv8ut' -DatabaseName 'STAT_Testold' -StorageAccountName 'statbackuptest' -RetentionInDays 365 -EventType All Set-AzureRmStorageAccount -Name 'msftaccteststore' -ResourceGroupName 'MSFT-ACC-TEST' -SkuName 'Standard_GRS' #----------------------------------------------------- Set-AzureRmStorageAccount -Name 'msftcomuatstore' -ResourceGroupName 'MSFT-COM-UAT' -SkuName 'Standard_GRS' Set-AzureRmDiagnosticSetting -ResourceId '/subscriptions/37cc140d-3e01-4871-bbab-b2ce87d8c902/resourceGroups/rtr_uat_oms/providers/Microsoft.Automation/automationAccounts/omsppeautoaccount' -WorkspaceId '/subscriptions/37cc140d-3e01-4871-bbab-b2ce87d8c902/resourcegroups/rtr_uat_oms/providers/microsoft.operationalinsights/workspaces/recordtoreport-uat' -Enabled $true $workspaceId = (Get-AzureRmOperationalInsightsWorkspace).ResourceId #Set-AzureStorageContainerAcl -Name 'vhds' -Permission Off -Context $ctx $StorageAccountName = 'statuatusa' $ctx = New-AzureStorageContext -StorageAccountName $StorageAccountName -StorageAccountKey 'VCiQPcL/BgQcNWQ4BeRqhmDjNL62jqoj+I5idoi6PRfgxyDNp5yrSVusZoiQK+31yuDRLobtU46fPqts3N73kw==' Set-AzureStorageServiceLoggingProperty -ServiceType 'Queue' -LoggingOperations 'All' -Context $ctx -RetentionDays '365' -PassThru Set-AzureStorageServiceMetricsProperty -MetricsType 'Hour' -ServiceType 'Queue' -Context $ctx -MetricsLevel 'ServiceAndApi' -RetentionDays '365' -PassThru Set-AzureStorageServiceLoggingProperty -ServiceType 'Blob' -LoggingOperations 'All' -Context $ctx -RetentionDays '365' -PassThru Set-AzureStorageServiceMetricsProperty -MetricsType 'Hour' -ServiceType 'Blob' -Context $ctx -MetricsLevel 'ServiceAndApi' -RetentionDays '365' -PassThru Set-AzureStorageServiceLoggingProperty -ServiceType 'Table' -LoggingOperations 'All' -Context $ctx -RetentionDays '365' -PassThru Set-AzureStorageServiceMetricsProperty -MetricsType 'Hour' -ServiceType 'Table' -Context $ctx -MetricsLevel 'ServiceAndApi' -RetentionDays '365' -PassThru Set-AzureStorageServiceMetricsProperty -MetricsType 'Hour' -ServiceType 'File' -Context $ctx -MetricsLevel 'ServiceAndApi' -RetentionDays '365' -PassThru #Login-AzureRmAccount #Get-AzSDKAzureServicesSecurityStatus -subscriptionid 9862b02e-efb3-4118-9edb-c6468651a180 -resourcegroupname 11756-MSCFA-UAT #Get-AzSDKAzureServicesSecurityStatus -subscriptionid 9862b02e-efb3-4118-9edb-c6468651a180 -resourcegroupname MSFT-ACC-TEST #Get-AzSDKAzureServicesSecurityStatus -subscriptionid 9862b02e-efb3-4118-9edb-c6468651a180 -resourcegroupname MSFT-ACC-UAT #Get-AzSDKAzureServicesSecurityStatus -subscriptionid 9862b02e-efb3-4118-9edb-c6468651a180 -resourcegroupname MSFT-ACC-PROD -Pending #Get-AzSDKAzureServicesSecurityStatus -subscriptionid 37cc140d-3e01-4871-bbab-b2ce87d8c902 -resourcegroupname MSFT-COM-UAT #Get-AzSDKAzureServicesSecurityStatus -subscriptionid f3c68eb0-92d8-4206-bded-c9117e841048 -resourcegroupname 4215-STAT-TEST #Get-AzSDKAzureServicesSecurityStatus -subscriptionid f3c68eb0-92d8-4206-bded-c9117e841048 -resourcegroupname 4875-Development-MSPolicySharePointPortal-01 Set-AzureRmDiagnosticSetting -ResourceId /subscriptions/f3c68eb0-92d8-4206-bded-c9117e841048/resourceGroups/4215-STAT-TEST/providers/Microsoft.KeyVault/vaults/STATkeyvaultLOCAL -StorageAccountId /subscriptions/f3c68eb0-92d8-4206-bded-c9117e841048/resourceGroups/4215-stat-test/providers/Microsoft.Storage/storageAccounts/statauditstoragetest -RetentionInDays 365 -RetentionEnabled $true -Enabled $true $Resource =Get-azureRmresource -ResourceName STATkeyvaultLOCAL -ResourceGroupName 4215-STAT-TEST C:\Users\v-kojonn\AppData\Local\Microsoft\AzSDKLogs\Sub_MSFT - Record to Report - 01\20171208_123511_GRS\ #Get-AzSDKAzureServicesSecurityStatus -subscriptionid '37cc140d-3e01-4871-bbab-b2ce87d8c902' -ResourceGroupNames MSFT-COM-UAT #Get-AzSDKAzureServicesSecurityStatus -subscriptionid '37cc140d-3e01-4871-bbab-b2ce87d8c902' -ResourceGroupNames MSFT-COM-Prod -AttestControls All $StorageAccountName = 'statprodeurope' $ctx = New-AzureStorageContext -StorageAccountName $StorageAccountName -StorageAccountKey 'WYHues0W3cTVHSggaYYgnlLgQKRtIOsr1c6N2cucGYJ2wWYIllTnhDHcZLxob8kva9XsdUarhPR/HT4edUrSlQ==' Set-AzureStorageContainerAcl -Name 'statprodeurope' -Permission 'Off' -Context $ctx #iwr 'https://aka.ms/azsk/install.ps1' -UseBasicParsing | iex #Auditing and Monitoring must be enabled for App Service Set-AzureRmWebApp -Name 'StatUatWebAppAsia' -ResourceGroupName '4215-STAT-Prod' -DetailedErrorLoggingEnabled $true -HttpLoggingEnabled $true -RequestTracingEnabled $true New-AzureRmAlertRuleEmail -CustomEmails 'rtraccdri@microsoft.com' -SendToServiceOwners Add-AzureRmMetricAlertRule -MetricName 'Errors' -Operator 'GreaterThan' -Threshold '0' -TimeAggregationOperator 'Total' -WindowSize '00:05:00' -Name 'failed runtime request' -ResourceGroup '4215-STAT-PROD' -TargetResourceId '/subscriptions/f3c68eb0-92d8-4206-bded-c9117e841048/resourceGroups/4215-STAT-PROD/providers/Microsoft.StreamAnalytics/streamingjobs/ExportAIDatatoSTATPROD' -Location 'South Central US' #-Actions 'New-AzureRmAlertRuleEmail -CustomEmails rtraccdri@microsoft.com -SendToServiceOwners' #Get-AzureRmVMDiskEncryptionStatus -VMName azfipacctsql31 -ResourceGroupName 'MSFT-ACC-TEST'- Get-AzSDKAzureServicesSecurityStatus -subscriptionid 9862b02e-efb3-4118-9edb-c6468651a180 -ResourceNames msftacctestdiag322 Get-AzSDKAzureServicesSecurityStatus -subscriptionid 9862b02e-efb3-4118-9edb-c6468651a180 -ResourceNames AccountingDiskEncryption Disable-AzureRmVmDiskEncryption -ResourceGroupName MSFT-ACC-TEST -VMName azfipacctsql32 -VolumeType All Remove-AzureRmVmDiskEncryptionExtension -ResourceGroupName MSFT-ACC-TEST -VMName azfipacctsql32 manage-bde -status $X=Get-AzureRmKeyVault -VaultName AcctServiceAccountsPROD -ResourceGroupName RTR-ACC-SVA -Verbose $Z= Get-AzureKeyVaultSecret -VaultName AcctServiceAccountsPROD -Name pcaprod -Version latest Get-AzSKAzureServicesSecurityStatus -subscriptionid f3c68eb0-92d8-4206-bded-c9117e841048 -ResourceGroupNames '' -ResourceNames '' -AttestControls All #Login-AzureRmAccount #Get-AzSKAzureServicesSecurityStatus -subscriptionid '37cc140d-3e01-4871-bbab-b2ce87d8c902' -ResourceGroupNames 'MSFT-COM-UAT,MSFT-COM-PROD' Get-AzSKAzureServicesSecurityStatus -subscriptionid 'f3c68eb0-92d8-4206-bded-c9117e841048' -ResourceGroupNames '4215-STAT-PROD,4215-STAT-TEST,4215-STAT-UAT,4875-Development-MSPolicySharePointPortal-01' |