bin/dbadisa-index.json

[
    {
        "Name": "Disable-DbsBrowser",
        "Description": "Disables and stops the SQL Server Browser service on computers with no named instances",
        "Tags": [
                     "V-79353",
                     "V-79349"
                 ],
        "Synopsis": "Disables and stops the SQL Server Browser service on computers with no named instances",
        "Alias": "",
        "Author": "Tracy Boggiano (@TracyBoggiano), databasesuperhero.com",
        "CommandName": "Disable-DbsBrowser",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eDisable-DbsBrowser -ComputerName sql2016, sql2019\nDisables and stops the SQL Server Browser service on sql2016 and sql2019 if no named instances exist",
        "Params": [
                       [
                           "ComputerName",
                           "The target server or instance",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Disable-DbsBrowser [-ComputerName] \u003cDbaInstanceParameter[]\u003e [[-Credential] \u003cPSCredential\u003e] [-EnableException] [-WhatIf] [-Confirm] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Disable-DbsCEIP",
        "Description": "Disables all instances of CEIP on a server via both services and the registry (x64 and x86)",
        "Tags": [
                     "V-79313",
                     "V-79315"
                 ],
        "Synopsis": "Disables all instances of CEIP on a server via both services and the registry (x64 and x86)",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Disable-DbsCEIP",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eDisable-DbsCEIP -ComputerName sql2016, sql2017, sql2012\nDisables all instances of CEIP on sql2016, sql2017 and sql2012\n-------------------------- EXAMPLE 2 --------------------------\nPS C:\\\u003eDisable-DbsCEIP -ComputerName sql2016, sql2017, sql2012 -Credential ad\\altdba\nDisables all instances of CEIP on sql2016, sql2017 and sql2012 using alternative Windows credentials",
        "Params": [
                       [
                           "ComputerName",
                           "The target server or instance",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Disable-DbsCEIP [-ComputerName] \u003cDbaInstanceParameter[]\u003e [[-Credential] \u003cPSCredential\u003e] [-EnableException] [-WhatIf] [-Confirm] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Disable-DbsDbContainment",
        "Description": "Disables database containment features",
        "Tags": "V-79061",
        "Synopsis": "Disables database containment features",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Disable-DbsDbContainment",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eDisable-DbsDbContainment -SqlInstance sql2017, sql2016, sql2012\nDisables database containment features on sql2017, sql2016 and sql2012",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Disable-DbsDbContainment [-SqlInstance] \u003cDbaInstanceParameter[]\u003e [[-SqlCredential] \u003cPSCredential\u003e] [-EnableException] [-WhatIf] [-Confirm] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Disable-DbsExternalScripts",
        "Description": "Disables external scripts",
        "Tags": "V-79347",
        "Synopsis": "Disables external scripts",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Disable-DbsExternalScripts",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eDisable-DbsExternalScripts -SqlInstance sql2017, sql2016, sql2012\nDisables external scripts on sql2017, sql2016 and sql2012\n-------------------------- EXAMPLE 2 --------------------------\nPS C:\\\u003eDisable-DbsExternalScripts -SqlInstance sql2017, sql2016, sql2012 -WhatIf\nShows what would happen if the command would run",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Disable-DbsExternalScripts [-SqlInstance] \u003cDbaInstanceParameter[]\u003e [[-SqlCredential] \u003cPSCredential\u003e] [-EnableException] [-WhatIf] [-Confirm] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Disable-DbsFilestreamAccess",
        "Description": "Disables non-compliant filestream access settings",
        "Tags": [
                     "V-79329",
                     "NonCompliantResults"
                 ],
        "Synopsis": "Disables non-compliant filestream access settings",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Disable-DbsFilestreamAccess",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eDisable-DbsFilestreamAccess -SqlInstance sql2017, sql2016, sql2012\nDisables filestream access on sql2017, sql2016 and sql2012\n-------------------------- EXAMPLE 2 --------------------------\nPS C:\\\u003eDisable-DbsFilestreamAccess -SqlInstance sql2017, sql2016, sql2012 -WhatIf\nShows what would happen if the command would run",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Disable-DbsFilestreamAccess [-SqlInstance] \u003cDbaInstanceParameter[]\u003e [[-SqlCredential] \u003cPSCredential\u003e] [-EnableException] [-WhatIf] [-Confirm] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Disable-DbsHadoopConnectivity",
        "Description": "Disables non-compliant Hadoop connectivity settings",
        "Tags": [
                     "V-79341",
                     "NonCompliantResults"
                 ],
        "Synopsis": "Disables non-compliant Hadoop connectivity settings",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Disable-DbsHadoopConnectivity",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eDisable-DbsHadoopConnectivity -SqlInstance sql2017, sql2016, sql2012\nDisables Hadoop connectivity on sql2017, sql2016 and sql2012\n-------------------------- EXAMPLE 2 --------------------------\nPS C:\\\u003eDisable-DbsHadoopConnectivity -SqlInstance sql2017, sql2016, sql2012 -WhatIf\nShows what would happen if the command would run",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Disable-DbsHadoopConnectivity [-SqlInstance] \u003cDbaInstanceParameter[]\u003e [[-SqlCredential] \u003cPSCredential\u003e] [-EnableException] [-WhatIf] [-Confirm] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Disable-DbsMixedMode",
        "Description": "Disables mixed mode authentication",
        "Tags": [
                     "V-79121",
                     "V-79355"
                 ],
        "Synopsis": "Disables mixed mode authentication",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Disable-DbsMixedMode",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eDisable-DbsMixedMode -SqlInstance sql2017, sql2016, sql2012\nDisables mixed mode on sql2017, sql2016 and sql2012\n-------------------------- EXAMPLE 2 --------------------------\nPS C:\\\u003eDisable-DbsMixedMode -SqlInstance sql2017, sql2016, sql2012 -WhatIf\nShows what would happen if you ran the command",
        "Params": [
                       [
                           "SqlInstance",
                           "The target server or instance",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Disable-DbsMixedMode [-SqlInstance] \u003cDbaInstanceParameter[]\u003e [[-SqlCredential] \u003cPSCredential\u003e] [-EnableException] [-WhatIf] [-Confirm] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Disable-DbsOleAutomation",
        "Description": "Disables non-compliant OLE automation procedures settings",
        "Tags": "V-79333",
        "Synopsis": "Disables non-compliant OLE automation procedures settings",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Disable-DbsOleAutomation",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eDisable-DbsOleAutomation -SqlInstance sql2017, sql2016, sql2012\nDisables OLE automation procedures on sql2017, sql2016 and sql2012\n-------------------------- EXAMPLE 2 --------------------------\nPS C:\\\u003eDisable-DbsOleAutomation -SqlInstance sql2017, sql2016, sql2012 -WhatIf\nShows what would happen if the command would run",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Disable-DbsOleAutomation [-SqlInstance] \u003cDbaInstanceParameter[]\u003e [[-SqlCredential] \u003cPSCredential\u003e] [-EnableException] [-WhatIf] [-Confirm] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Disable-DbsPolybaseExport",
        "Description": "Disables non-compliant Polybase export settings",
        "Tags": "V-79343",
        "Synopsis": "Disables non-compliant Polybase export settings",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Disable-DbsPolybaseExport",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eDisable-DbsPolybaseExport -SqlInstance sql2017, sql2016, sql2012\nDisables Polybase export on sql2017, sql2016 and sql2012\n-------------------------- EXAMPLE 2 --------------------------\nPS C:\\\u003eDisable-DbsPolybaseExport -SqlInstance sql2017, sql2016, sql2012 -WhatIf\nShows what would happen if the command would run",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Disable-DbsPolybaseExport [-SqlInstance] \u003cDbaInstanceParameter[]\u003e [[-SqlCredential] \u003cPSCredential\u003e] [-EnableException] [-WhatIf] [-Confirm] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Disable-DbsProtocol",
        "Description": "Disables all non-tcp protocols for all instances on a computer, enables TCP\n\nSettings go into effect after the SQL Service has been restarted",
        "Tags": [
                     "V-79185",
                     "V-79241"
                 ],
        "Synopsis": "Disables all non-tcp protocols for all instances on a computer, enables TCP",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Disable-DbsProtocol",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eDisable-DbsProtocol -ComputerName sql01\nDisables all protocols except for tcp for all instances on sql01\n-------------------------- EXAMPLE 2 --------------------------\nPS C:\\\u003eDisable-DbsProtocol -ComputerName sql01 -Whatif\nShows what protocols on what instance would be disabled if the command would run",
        "Params": [
                       [
                           "ComputerName",
                           "The target server or instance",
                           "cn,host,Server",
                           true,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Disable-DbsProtocol [-ComputerName] \u003cDbaInstanceParameter[]\u003e [[-Credential] \u003cPSCredential\u003e] [-EnableException] [-WhatIf] [-Confirm] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Disable-DbsRemoteAccess",
        "Description": "Disables non-compliant Remote Access settings",
        "Tags": [
                     "V-79337",
                     "NonCompliantResults"
                 ],
        "Synopsis": "Disables non-compliant Remote Access settings",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Disable-DbsRemoteAccess",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eDisable-DbsRemoteAccess -SqlInstance sql2017, sql2016, sql2012\nDisables Remote Access on sql2017, sql2016 and sql2012\n-------------------------- EXAMPLE 2 --------------------------\nPS C:\\\u003eDisable-DbsRemoteAccess -SqlInstance sql2017, sql2016, sql2012 -WhatIf\nShows what would happen if the command would run",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Disable-DbsRemoteAccess [-SqlInstance] \u003cDbaInstanceParameter[]\u003e [[-SqlCredential] \u003cPSCredential\u003e] [-EnableException] [-WhatIf] [-Confirm] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Disable-DbsRemoteDataArchive",
        "Description": "Disables non-compliant Remote Data Archive settings",
        "Tags": [
                     "V-79345",
                     "NonCompliantResults"
                 ],
        "Synopsis": "Disables non-compliant Remote Data Archive settings",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Disable-DbsRemoteDataArchive",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eDisable-DbsRemoteDataArchive -SqlInstance sql2017, sql2016, sql2012\nDisables Remote Data Archive on sql2017, sql2016 and sql2012\n-------------------------- EXAMPLE 2 --------------------------\nPS C:\\\u003eDisable-DbsRemoteDataArchive -SqlInstance sql2017, sql2016, sql2012 -WhatIf\nShows what would happen if the command would run",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Disable-DbsRemoteDataArchive [-SqlInstance] \u003cDbaInstanceParameter[]\u003e [[-SqlCredential] \u003cPSCredential\u003e] [-EnableException] [-WhatIf] [-Confirm] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Disable-DbsReplicationXp",
        "Description": "Disables replication XPs",
        "Tags": "V-79351",
        "Synopsis": "Disables replication XPs",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Disable-DbsReplicationXp",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eDisable-DbsReplicationXp -SqlInstance sql2017, sql2016, sql2012\nDisables replication XPs on sql2017, sql2016 and sql2012\n-------------------------- EXAMPLE 2 --------------------------\nPS C:\\\u003eDisable-DbsReplicationXp -SqlInstance sql2017, sql2016, sql2012 -WhatIf\nShows what would happen if the command would run",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Disable-DbsReplicationXp [-SqlInstance] \u003cDbaInstanceParameter[]\u003e [[-SqlCredential] \u003cPSCredential\u003e] [-EnableException] [-WhatIf] [-Confirm] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Disable-DbsSaAccount",
        "Description": "Disable and/or rename sa account",
        "Tags": [
                     "V-79319",
                     "V-79317"
                 ],
        "Synopsis": "Disable and/or rename sa account",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Disable-DbsSaAccount",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eDisable-DbsSaAccount -SqlInstance Sql2016 -NewName newsa\nDisables and renames sa account",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ],
                       [
                           "NewName",
                           "NewName for sa account",
                           "",
                           false,
                           "false",
                           ""
                       ]
                   ],
        "Syntax": "Disable-DbsSaAccount [-SqlInstance] \u003cDbaInstanceParameter[]\u003e [[-SqlCredential] \u003cPSCredential\u003e] [[-NewName] \u003cString\u003e] [-EnableException] [-WhatIf] [-Confirm] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Disable-DbsSqlClr",
        "Description": "Disables SQL Server CLR Integration",
        "Tags": [
                     "V-79179",
                     "V-79243"
                 ],
        "Synopsis": "Disables SQL Server CLR Integration",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Disable-DbsSqlClr",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eDisable-DbsSqlClr -SqlInstance sql2017, sql2016, sql2012\nDisables CLR on sql2017, sql2016 and sql2012\n-------------------------- EXAMPLE 2 --------------------------\nPS C:\\\u003eDisable-DbsSqlClr -SqlInstance sql2017, sql2016, sql2012 -WhatIf\nShows what would happen if the command would run",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Disable-DbsSqlClr [-SqlInstance] \u003cDbaInstanceParameter[]\u003e [[-SqlCredential] \u003cPSCredential\u003e] [-EnableException] [-WhatIf] [-Confirm] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Disable-DbsUserOptions",
        "Description": "Disables non-compliant User Options settings",
        "Tags": "V-79335",
        "Synopsis": "Disables non-compliant User Options settings",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Disable-DbsUserOptions",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eDisable-DbsUserOptions -SqlInstance sql2017, sql2016, sql2012\nDisables User Options on sql2017, sql2016 and sql2012\n-------------------------- EXAMPLE 2 --------------------------\nPS C:\\\u003eDisable-DbsUserOptions -SqlInstance sql2017, sql2016, sql2012 -WhatIf\nShows what would happen if the command would run",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Disable-DbsUserOptions [-SqlInstance] \u003cDbaInstanceParameter[]\u003e [[-SqlCredential] \u003cPSCredential\u003e] [-EnableException] [-WhatIf] [-Confirm] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Disable-DbsXPCmdShell",
        "Description": "Disables xp_cmdshell",
        "Tags": "V-79177",
        "Synopsis": "Disables xp_cmdshell",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Disable-DbsXPCmdShell",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eDisable-DbsXPCmdShell -SqlInstance sql2017, sql2016, sql2012\nDisables xp_cmdshell on sql2017, sql2016 and sql2012\n-------------------------- EXAMPLE 2 --------------------------\nPS C:\\\u003eDisable-DbsXPCmdShell -SqlInstance sql2017, sql2016, sql2012 -WhatIf\nShows what would happen if the command would run",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Disable-DbsXPCmdShell [-SqlInstance] \u003cDbaInstanceParameter[]\u003e [[-SqlCredential] \u003cPSCredential\u003e] [-EnableException] [-WhatIf] [-Confirm] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Enable-DbsC2",
        "Description": "Enables Common Criteria Compliance Criteria Compliance",
        "Tags": "V-79211",
        "Synopsis": "Enables Common Criteria Compliance Criteria Compliance",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Enable-DbsC2",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eEnable-DbsC2 -SqlInstance sql2017, sql2016, sql2012\nEnables Common Criteria Compliance Criteria Compliance on sql2017, sql2016 and sql2012\n-------------------------- EXAMPLE 2 --------------------------\nPS C:\\\u003eEnable-DbsC2 -SqlInstance sql2017, sql2016, sql2012 -WhatIf\nShows what would happen if the command would run",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Enable-DbsC2 [-SqlInstance] \u003cDbaInstanceParameter[]\u003e [[-SqlCredential] \u003cPSCredential\u003e] [-EnableException] [-WhatIf] [-Confirm] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Enable-DbsFips",
        "Description": "Enables FIPS",
        "Tags": [
                     "V-67871",
                     "V-79113",
                     "V-79197",
                     "V-79199",
                     "V-79203",
                     "V-79305",
                     "V-79307",
                     "V-79309"
                 ],
        "Synopsis": "Enables FIPS",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Enable-DbsFips",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eEnable-DbsFips -ComputerName sql2016, sql2017, sql2012\nEnables FIPS on sql2016, sql2017 and sql2012",
        "Params": [
                       [
                           "ComputerName",
                           "The target server or instance",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Enable-DbsFips [-ComputerName] \u003cDbaInstanceParameter[]\u003e [[-Credential] \u003cPSCredential\u003e] [-EnableException] [-WhatIf] [-Confirm] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Export-DbsInstance",
        "Description": "Exports all required documentation for an instance and its underlying server",
        "Synopsis": "Exports all required documentation for an instance and its underlying server",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Export-DbsInstance",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eExport-DbsInstance -SqlInstance sqlserver\\instance\nAll databases, logins, job objects and sp_configure options will be exported from\r\nsqlserver\\instance to an automatically generated folder name in Documents.\n-------------------------- EXAMPLE 2 --------------------------\nPS C:\\\u003eExport-DbsInstance -SqlInstance sqlcluster -Exclude Databases, Logins -Path C:\\dr\\sqlcluster\nExports everything but logins and database restore scripts to C:\\dr\\sqlcluster\n-------------------------- EXAMPLE 3 --------------------------\nPS C:\\\u003eExport-DbsInstance -SqlInstance sqlcluster -Path C:\\servers\\ -NoPrefix\nExports everything to C:\\servers but scripts do not include prefix information.",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ],
                       [
                           "Path",
                           "Specifies the directory where the file or files will be exported.",
                           "FilePath",
                           false,
                           "false",
                           "(Get-PSFConfigValue -FullName dbadisa.path.export)"
                       ],
                       [
                           "Exclude",
                           "Exclude one or more exports. This is autopopulated so just tab whatever you\u0027d like",
                           "",
                           false,
                           "false",
                           ""
                       ],
                       [
                           "Baseline",
                           "Specifies if it is a baseline, which basically names the folder differently",
                           "",
                           false,
                           "false",
                           "False"
                       ]
                   ],
        "Syntax": "Export-DbsInstance [-SqlInstance] \u003cDbaInstanceParameter[]\u003e [[-SqlCredential] \u003cPSCredential\u003e] [[-Credential] \u003cPSCredential\u003e] [[-Path] \u003cString\u003e] [[-Exclude] \u003cString[]\u003e] [-Baseline] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsAcl",
        "Description": "Gets the required permissions for SQL Server directories\n\nBy default, it will detect and secure the default Data, Log and Backup directories",
        "Tags": [
                     "V-79215",
                     "V-79151",
                     "V-79153",
                     "V-79155",
                     "V-79163"
                 ],
        "Synopsis": "Gets the permissions required by DISA for SQL Server directories",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Get-DbsAcl",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsAcl -SqlInstance sql2017, sql2016, sql2012\nGets permissions for the default data, log and backups on sql2017, sql2016, sql2012\n-------------------------- EXAMPLE 2 --------------------------\nPS C:\\\u003eGet-DbaRegServer -SqlInstance sqlcentral | Get-DbsAcl\nGets the permissions for all SQL Servers stored in the sqlcentral registered server",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ],
                       [
                           "Path",
                           "By default, the ACLs on the paths to the data, log and backup files will be modified.\nIf you want to set permissions on a specific path, use this option.\nNote that if your Backup directory is a UNC share, it will be skipped.",
                           "",
                           false,
                           "false",
                           ""
                       ]
                   ],
        "Syntax": "Get-DbsAcl [-SqlInstance] \u003cDbaInstanceParameter[]\u003e [[-SqlCredential] \u003cPSCredential\u003e] [[-Credential] \u003cPSCredential\u003e] [[-Path] \u003cString[]\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsAdminRoleMember",
        "Description": "Gets members of the sysadmin and securityadmin server roles",
        "Tags": [
                     "V-79217",
                     "V-79219",
                     "V-79235"
                 ],
        "Synopsis": "Gets members of the sysadmin and securityadmin server roles",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Get-DbsAdminRoleMember",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsAdminRoleMember -SqlInstance sql2017, sql2016, sql2012\nGets members of the sysadmin and securityadmin server roles on sql2017, sql2016 and sql2012\n-------------------------- EXAMPLE 2 --------------------------\nPS C:\\\u003eGet-DbsAdminRoleMember -SqlInstance sql2017, sql2016, sql2012 | Export-Csv -Path D:\\DISA\\serverroles.csv -NoTypeInformation\nGets members of the sysadmin and securityadmin server roles and exports them to D:\\DISA\\serverroles.csv",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Get-DbsAdminRoleMember [-SqlInstance] \u003cDbaInstanceParameter[]\u003e [[-SqlCredential] \u003cPSCredential\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsAlert",
        "Description": "Checks both Agent Alerts and Database Mail to ensure SQL Server provides immediate, real-time alerts to appropriate support staff",
        "Tags": [
                     "V-79231",
                     "NonCompliantResults"
                 ],
        "Synopsis": "Checks both Agent Alerts and Database Mail to ensure SQL Server provides immediate, real-time alerts to appropriate support staff",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Get-DbsAlert",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsAlert -SqlInstance sql2017, sql2016, sql2012\nChecks to ensure both Agent Alerts and Database Mail to ensure SQL Server provides immediate, real-time alerts to appropriate support staff",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Get-DbsAlert [-SqlInstance] \u003cDbaInstanceParameter[]\u003e [[-SqlCredential] \u003cPSCredential\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsAuditDisabled",
        "Description": "Gets a list of non-compliant audit states",
        "Tags": [
                     "V-79133",
                     "NonCompliantResults"
                 ],
        "Synopsis": "Gets a list of non-compliant audit states",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Get-DbsAuditDisabled",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsAuditDisabled -SqlInstance sql2017, sql2016, sql2012\nGets a list of non-compliant audit states on sql2017, sql2016 and sql2012\n-------------------------- EXAMPLE 2 --------------------------\nPS C:\\\u003eGet-DbsAuditDisabled -SqlInstance sql2017, sql2016, sql2012\nGets a list of non-compliant audit states on sql2017, sql2016 and sql2012\n-------------------------- EXAMPLE 3 --------------------------\nPS C:\\\u003eGet-DbsAuditDisabled -SqlInstance sql2017, sql2016, sql2012 | Export-Csv -Path D:\\DISA\\auditstates.csv -NoTypeInformation\nGets a list of non-compliant audit states sql2017, sql2016 and sql2012 to D:\\disa\\auditstates.csv",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ],
                       [
                           "Audit",
                           "The name of the DISA Audit",
                           "",
                           false,
                           "false",
                           "(Get-PSFConfigValue -FullName dbadisa.app.auditname)"
                       ]
                   ],
        "Syntax": "Get-DbsAuditDisabled [-SqlInstance] \u003cDbaInstanceParameter[]\u003e [[-Audit] \u003cString[]\u003e] [[-SqlCredential] \u003cPSCredential\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsAuditFilter",
        "Description": "Gets a list of non-compliant audit filters",
        "Tags": [
                     "V-79303",
                     "NonCompliantResults"
                 ],
        "Synopsis": "Gets a list of non-compliant audit filters",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Get-DbsAuditFilter",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsAuditFilter -SqlInstance sql2017, sql2016, sql2012\nGets a list of non-compliant audit filters on sql2017, sql2016 and sql2012\n-------------------------- EXAMPLE 2 --------------------------\nPS C:\\\u003eGet-DbsAuditFilter -SqlInstance sql2017, sql2016, sql2012\nGets a list of non-compliant audit filters on sql2017, sql2016 and sql2012\n-------------------------- EXAMPLE 3 --------------------------\nPS C:\\\u003eGet-DbsAuditFilter -SqlInstance sql2017, sql2016, sql2012 | Export-Csv -Path D:\\DISA\\auditfilters.csv -NoTypeInformation\nGets a list of non-compliant audit filters sql2017, sql2016 and sql2012 to D:\\disa\\auditfilters.csv",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ],
                       [
                           "Audit",
                           "The name of the DISA Audit",
                           "",
                           false,
                           "false",
                           "(Get-PSFConfigValue -FullName dbadisa.app.auditname)"
                       ]
                   ],
        "Syntax": "Get-DbsAuditFilter [-SqlInstance] \u003cDbaInstanceParameter[]\u003e [[-Audit] \u003cString[]\u003e] [[-SqlCredential] \u003cPSCredential\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsAuditLogin",
        "Description": "Returns a list of non-compliant servers that are not auditing logins either by Audits or via \"Both failed and successful logins\"",
        "Tags": [
                     "V-79297",
                     "V-79287",
                     "V-79289",
                     "NonCompliantResults"
                 ],
        "Synopsis": "Returns a list of non-compliant servers that are not auditing logins either by Audits or via \"Both failed and successful logins\"",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Get-DbsAuditLogin",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsAuditLogin -SqlInstance sql2017, sql2016, sql2012\nReturns a list of non-compliant servers that are not auditing logins either by Audits or via \"Both failed and successful logins\"",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Get-DbsAuditLogin [-SqlInstance] \u003cDbaInstanceParameter[]\u003e [[-SqlCredential] \u003cPSCredential\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsAuditMaintainer",
        "Description": "Returns a list of the server roles and individual logins that have permissions which enable the ability to create and maintain audit definitions.",
        "Tags": [
                     "V-79135",
                     "V-79143",
                     "V-79159",
                     "V-79161"
                 ],
        "Synopsis": "Returns a list of the server roles and individual logins that have permissions which enable the ability to create and maintain audit definitions.",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Get-DbsAuditMaintainer",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsAuditMaintainer -SqlInstance sql2017, sql2016, sql2012\nReturns a list of audit maintainers for sql2017, sql2016 and sql2012",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Get-DbsAuditMaintainer [-SqlInstance] \u003cDbaInstanceParameter[]\u003e [[-SqlCredential] \u003cPSCredential\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsAuditMaxValue",
        "Description": "Gets a list of non-compliant max values (rollover and file size)",
        "Tags": [
                     "V-79149",
                     "V-79227",
                     "NonCompliantResults"
                 ],
        "Synopsis": "Gets a list of non-compliant max values (rollover and file size)",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Get-DbsAuditMaxValue",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsAuditMaxValue -SqlInstance sql2017, sql2016, sql2012\nGets a list of non-compliant max values (rollover and file size) for sql2017, sql2016 and sql2012\n-------------------------- EXAMPLE 2 --------------------------\nPS C:\\\u003eGet-DbsAuditMaxValue -SqlInstance sql2017, sql2016, sql2012 | Export-Csv -Path D:\\DISA\\maxvalues.csv -NoTypeInformation\nExports a list of non-compliant max values (rollover and file size) on sql2017, sql2016 and sql2012 to D:\\disa\\maxvalues.csv",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ],
                       [
                           "Audit",
                           "The name of the DISA Audit.",
                           "",
                           false,
                           "false",
                           "(Get-PSFConfigValue -FullName dbadisa.app.auditname)"
                       ]
                   ],
        "Syntax": "Get-DbsAuditMaxValue [-SqlInstance] \u003cDbaInstanceParameter[]\u003e [[-SqlCredential] \u003cPSCredential\u003e] [[-Audit] \u003cString[]\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsAuditOnFailure",
        "Description": "Gets a list of non-compliant audit onfailure actions",
        "Tags": [
                     "V-79147",
                     "NonCompliantResults"
                 ],
        "Synopsis": "Gets a list of non-compliant audit onfailure actions",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Get-DbsAuditOnFailure",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsAuditOnFailure -SqlInstance sql2017, sql2016, sql2012\nGets a list of non-compliant audit onfailure actions for sql2017, sql2016 and sql2012\n-------------------------- EXAMPLE 2 --------------------------\nPS C:\\\u003eGet-DbsAuditOnFailure -SqlInstance sql2017, sql2016, sql2012 | Export-Csv -Path D:\\DISA\\auditonfailure.csv -NoTypeInformation\nExports a list of instance permissions for all databases on sql2017, sql2016 and sql2012 to D:\\disa\\auditonfailure.csv",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ],
                       [
                           "Audit",
                           "The name of the DISA Audit",
                           "",
                           false,
                           "false",
                           "(Get-PSFConfigValue -FullName dbadisa.app.auditname)"
                       ]
                   ],
        "Syntax": "Get-DbsAuditOnFailure [-SqlInstance] \u003cDbaInstanceParameter[]\u003e [[-SqlCredential] \u003cPSCredential\u003e] [[-Audit] \u003cString[]\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsAuditSchemaAccessGroup",
        "Description": "Gets a list of audits that record when privileges/permissions are retrieved or are failed to be retrieved",
        "Tags": [
                     "V-79137",
                     "V-79139",
                     "V-79301",
                     "V-79299",
                     "V-79251",
                     "V-79253",
                     "V-79255",
                     "V-79257",
                     "V-79267",
                     "V-79269",
                     "V-79271",
                     "V-79273",
                     "V-79279",
                     "V-79281",
                     "V-79283",
                     "V-79285",
                     "V-79301"
                 ],
        "Synopsis": "Gets a list of audits that record when privileges/permissions are retrieved or are failed to be retrieved",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Get-DbsAuditSchemaAccessGroup",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsAuditSchemaAccessGroup -SqlInstance sql2017, sql2016, sql2012\nGets a list of audits that record when privileges/permissions are retrieved or are failed to be retrieved for sql2017, sql2016 and sql2012",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Get-DbsAuditSchemaAccessGroup [-SqlInstance] \u003cDbaInstanceParameter[]\u003e [[-SqlCredential] \u003cPSCredential\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsAuditSpecification",
        "Description": "Returns a list of missing audit specifications",
        "Tags": [
                     "V-79239",
                     "V-79259",
                     "V-79261",
                     "V-79263",
                     "V-79265",
                     "V-79275",
                     "V-79277",
                     "V-79291",
                     "V-79293",
                     "V-79295"
                 ],
        "Synopsis": "Returns a list of missing audit specifications",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Get-DbsAuditSpecification",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsAuditSpecification -SqlInstance sql2017, sql2016, sql2012\nReturns a list of missing audit specifications for sql2017, sql2016 and sql2012",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Get-DbsAuditSpecification [-SqlInstance] \u003cDbaInstanceParameter[]\u003e [[-SqlCredential] \u003cPSCredential\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsAuditStartupState",
        "Description": "Gets a list of non-compliant audit startup states",
        "Tags": [
                     "V-79141",
                     "NonCompliantResults"
                 ],
        "Synopsis": "Gets a list of non-compliant audit startup states",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Get-DbsAuditStartupState",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsAuditStartupState -SqlInstance sql2017, sql2016, sql2012\nGets a list of non-compliant audit states on sql2017, sql2016 and sql2012\n-------------------------- EXAMPLE 2 --------------------------\nPS C:\\\u003eGet-DbsAuditStartupState -SqlInstance sql2017, sql2016, sql2012\nGets a list of non-compliant audit states on sql2017, sql2016 and sql2012\n-------------------------- EXAMPLE 3 --------------------------\nPS C:\\\u003eGet-DbsAuditStartupState -SqlInstance sql2017, sql2016, sql2012 | Export-Csv -Path D:\\DISA\\auditstartup.csv -NoTypeInformation\nGets a list of non-compliant audit startup states sql2017, sql2016 and sql2012 to D:\\disa\\auditstartup.csv",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ],
                       [
                           "Audit",
                           "The name of the DISA Audit.",
                           "",
                           false,
                           "false",
                           "(Get-PSFConfigValue -FullName dbadisa.app.auditname)"
                       ]
                   ],
        "Syntax": "Get-DbsAuditStartupState [-SqlInstance] \u003cDbaInstanceParameter[]\u003e [[-Audit] \u003cString[]\u003e] [[-SqlCredential] \u003cPSCredential\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsBrowser",
        "Description": "Gets non-compliant SQL Browser service states (Running)",
        "Tags": [
                     "V-79353",
                     "V-79349",
                     "NonCompliantResults"
                 ],
        "Synopsis": "Gets non-compliant SQL Browser service states (Running)",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Get-DbsBrowser",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsBrowser -ComputerName Sql2016\nGets non-compliant SQL Browser services",
        "Params": [
                       [
                           "ComputerName",
                           "The target server or instance",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Get-DbsBrowser [-ComputerName] \u003cDbaInstanceParameter[]\u003e [[-Credential] \u003cPSCredential\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsC2",
        "Description": "Gets non-compliant Common Criteria Compliance settings",
        "Tags": [
                     "V-79211",
                     "NonCompliantResults"
                 ],
        "Synopsis": "Gets non-compliant Common Criteria Compliance settings",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Get-DbsC2",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsC2Disabled -SqlInstance sql2017, sql2016, sql2012\nOnly returns non-compliant Common Criteria Compliance settings from sql2017, sql2016 and sql2012",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Get-DbsC2 [-SqlInstance] \u003cDbaInstanceParameter[]\u003e [[-SqlCredential] \u003cPSCredential\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsCEIP",
        "Description": "Returns a list of accounts that have installed or modified SQL Server",
        "Tags": [
                     "V-79313",
                     "V-79315"
                 ],
        "Synopsis": "Returns a list of accounts that have installed or modified SQL Server",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Get-DbsCEIP",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsCEIP -ComputerName sql2016, sql2017, sql2012\nReturns a list of accounts that have isntalled or modified SQL Server on sql2016, sql2017 and sql2012",
        "Params": [
                       [
                           "ComputerName",
                           "The target server or instance",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Get-DbsCEIP [-ComputerName] \u003cDbaInstanceParameter[]\u003e [[-Credential] \u003cPSCredential\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsComputerLogin",
        "Description": "Returns a list of all server logins that are computers",
        "Tags": "V-79131",
        "Synopsis": "Returns a list of all server logins that are computers",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Get-DbsComputerLogin",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsComputerLogin -SqlInstance sql2017, sql2016, sql2012\nReturns a list of all server logins that are computers for sql2017, sql2016, and sql2012\n-------------------------- EXAMPLE 2 --------------------------\nPS C:\\\u003eGet-DbsComputerLogin -SqlInstance sql2017, sql2016, sql2012 | Export-Csv -Path D:\\DISA\\computeruser.csv -NoTypeInformation\nExports a list of all server logins that are computers to D:\\disa\\computeruser.csv",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Get-DbsComputerLogin [-SqlInstance] \u003cDbaInstanceParameter[]\u003e [[-SqlCredential] \u003cPSCredential\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsCustomXp",
        "Description": "Returns a list non-standard extended procedures",
        "Tags": "V-79181",
        "Synopsis": "Returns a list non-standard extended procedures",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Get-DbsCustomXp",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsCustomXp -SqlInstance sql2017, sql2016, sql2012\nReturns a list non-standard extended procedures for sql2017, sql2016 and sql2012",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Get-DbsCustomXp [-SqlInstance] \u003cDbaInstanceParameter[]\u003e [[-SqlCredential] \u003cPSCredential\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsDbAccessControl",
        "Description": "Gathers information for for object ownership and authorization delegation to be documented",
        "Tags": [
                     "V-79105",
                     "V-79235"
                 ],
        "Synopsis": "Gathers information for for object ownership and authorization delegation to be documented",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Get-DbsDbAccessControl",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsDbAccessControl -SqlInstance sql2017, sql2016, sql2012\nGathers information for for object ownership and authorization delegation for all databases on sql2017, sql2016 and sql2012\n-------------------------- EXAMPLE 2 --------------------------\nPS C:\\\u003eGet-DbsDbAccessControl -SqlInstance sql2017, sql2016, sql2012 | Export-Csv -Path D:\\DISA\\access.csv -NoTypeInformation\nExports information for for object ownership and authorization delegation for all databases on sql2017, sql2016 and sql2012 to D:\\disa\\access.csv",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           false,
                           "true (ByValue)",
                           ""
                       ],
                       [
                           "InputObject",
                           "Allows databases to be piped in from Get-DbaDatabase",
                           "",
                           false,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Get-DbsDbAccessControl [[-SqlInstance] \u003cDbaInstanceParameter[]\u003e] [[-SqlCredential] \u003cPSCredential\u003e] [[-InputObject] \u003cDatabase[]\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsDbAlterPermission",
        "Description": "Gets non-compliant alter permissions",
        "Tags": [
                     "V-79109",
                     "V-79075",
                     "V-79081",
                     "NonCompliantResults"
                 ],
        "Synopsis": "Gets non-compliant alter permissions",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Get-DbsDbAlterPermission",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsDbAlterPermission -SqlInstance sql2017, sql2016, sql2012\nGets non-compliant alter permissions on sql2017, sql2016 and sql2012\n-------------------------- EXAMPLE 2 --------------------------\nPS C:\\\u003eGet-DbsDbAlterPermission -SqlInstance sql2017, sql2016, sql2012 | Export-Csv -Path D:\\DISA\\alter.csv -NoTypeInformation\nExports all non-compliant alter permissions for all databases on sql2017, sql2016 and sql2012 to D:\\disa\\alter.csv",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           false,
                           "true (ByValue)",
                           ""
                       ],
                       [
                           "InputObject",
                           "Allows databases to be piped in from Get-DbaDatabase",
                           "",
                           false,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Get-DbsDbAlterPermission [[-SqlInstance] \u003cDbaInstanceParameter[]\u003e] [[-SqlCredential] \u003cPSCredential\u003e] [[-InputObject] \u003cDatabase[]\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsDbAuditMaintainer",
        "Description": "Returns a list of the database roles and individual users that have permissions which enable the ability to create and maintain audit definitions",
        "Tags": "V-79073",
        "Synopsis": "Returns a list of the database roles and individual users that have permissions which enable the ability to create and maintain audit definitions",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Get-DbsDbAuditMaintainer",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsDbAuditMaintainer -SqlInstance sql2017, sql2016, sql2012\nReturns a list of audit maintainers for sql2017, sql2016 and sql2012",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           false,
                           "true (ByValue)",
                           ""
                       ],
                       [
                           "InputObject",
                           "Allows databases to be piped in from Get-DbaDatabase",
                           "",
                           false,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Get-DbsDbAuditMaintainer [[-SqlInstance] \u003cDbaInstanceParameter[]\u003e] [[-SqlCredential] \u003cPSCredential\u003e] [[-InputObject] \u003cDatabase[]\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsDbComputerUser",
        "Description": "Returns a list of all database user accounts that are computers",
        "Tags": "V-79067",
        "Synopsis": "Returns a list of all database user accounts that are computers",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Get-DbsDbComputerUser",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsDbComputerUser -SqlInstance sql2017, sql2016, sql2012\nReturns a list of all database user accounts that are computers for sql2017, sql2016, and sql2012\n-------------------------- EXAMPLE 2 --------------------------\nPS C:\\\u003eGet-DbsDbComputerUser -SqlInstance sql2017, sql2016, sql2012 | Export-Csv -Path D:\\DISA\\computeruser.csv -NoTypeInformation\nExports a list of all database user accounts that are computers to D:\\disa\\computeruser.csv",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           false,
                           "true (ByValue)",
                           ""
                       ],
                       [
                           "InputObject",
                           "Allows databases to be piped in from Get-DbaDatabase",
                           "",
                           false,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Get-DbsDbComputerUser [[-SqlInstance] \u003cDbaInstanceParameter[]\u003e] [[-SqlCredential] \u003cPSCredential\u003e] [[-InputObject] \u003cDatabase[]\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsDbContainedUser",
        "Description": "Returns a list of non-compliant users for all contained databases",
        "Tags": [
                     "V-79193",
                     "NonCompliantResults"
                 ],
        "Synopsis": "Returns a list of non-compliant users for all contained databases",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Get-DbsDbContainedUser",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsDbContainedUser -SqlInstance sql2017, sql2016, sql2012\nReturns a list of non-compliant users for all contained databases on sql2017, sql2016 and sql2012\n-------------------------- EXAMPLE 2 --------------------------\nPS C:\\\u003eGet-DbsDbContainedUser -SqlInstance sql2017, sql2016, sql2012 | Export-Csv -Path D:\\DISA\\contained.csv -NoTypeInformation\nExports a list of non-compliant users for all contained databases on sql2017, sql2016 and sql2012 to D:\\disa\\contained.csv",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           false,
                           "true (ByValue)",
                           ""
                       ],
                       [
                           "InputObject",
                           "Allows databases to be piped in from Get-DbaDatabase",
                           "",
                           false,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Get-DbsDbContainedUser [[-SqlInstance] \u003cDbaInstanceParameter[]\u003e] [[-SqlCredential] \u003cPSCredential\u003e] [[-InputObject] \u003cDatabase[]\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsDbExecuteAs",
        "Description": "Gets a list of stored procedures and functions that utilize impersonation (EXECUTE AS)",
        "Tags": "V-79107",
        "Synopsis": "Gets a list of stored procedures and functions that utilize impersonation (EXECUTE AS)",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Get-DbsDbExecuteAs",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsDbExecuteAs -SqlInstance sql2017, sql2016, sql2012\nGets a list of stored procedures and functions that utilize impersonation (EXECUTE AS) for all databases on sql2017, sql2016 and sql2012\n-------------------------- EXAMPLE 2 --------------------------\nPS C:\\\u003eGet-DbsDbExecuteAs -SqlInstance sql2017, sql2016, sql2012 | Export-Csv -Path D:\\DISA\\contained.csv -NoTypeInformation\nExports a list of stored procedures and functions that utilize impersonation for all databases on sql2017, sql2016 and sql2012 to D:\\disa\\contained.csv",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           false,
                           "true (ByValue)",
                           ""
                       ],
                       [
                           "InputObject",
                           "Allows databases to be piped in from Get-DbaDatabase",
                           "",
                           false,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Get-DbsDbExecuteAs [[-SqlInstance] \u003cDbaInstanceParameter[]\u003e] [[-SqlCredential] \u003cPSCredential\u003e] [[-InputObject] \u003cDatabase[]\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsDbExternalProcessAccess",
        "Description": "Returns a listing of accounts currently configured for use by external processes",
        "Tags": "V-79221",
        "Synopsis": "Returns a listing of accounts currently configured for use by external processes",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Get-DbsDbExternalProcessAccess",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsDbExternalProcessAccess -SqlInstance sql2017, sql2016, sql2012\nReturns a listing of accounts currently configured for use by external processes for sql2017, sql2016 and sql2012",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           false,
                           "true (ByValue)",
                           ""
                       ],
                       [
                           "InputObject",
                           "Allows databases to be piped in from Get-DbaDatabase",
                           "",
                           false,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Get-DbsDbExternalProcessAccess [[-SqlInstance] \u003cDbaInstanceParameter[]\u003e] [[-SqlCredential] \u003cPSCredential\u003e] [[-InputObject] \u003cDatabase[]\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsDbInputValidity",
        "Description": "Returns a list of all input validations",
        "Tags": "V-79095",
        "Synopsis": "Returns a list of all input validations",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Get-DbsDbInputValidity",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsDbInputValidity -SqlInstance sql2017, sql2016, sql2012\nReturns a list of all input validations\n-------------------------- EXAMPLE 2 --------------------------\nPS C:\\\u003eGet-DbsDbInputValidity -SqlInstance sql2017, sql2016, sql2012 | Export-Csv -Path D:\\DISA\\checks.csv -NoTypeInformation\nExports input validation for all databases on sql2017, sql2016 and sql2012 to D:\\disa\\checks.csv",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           false,
                           "true (ByValue)",
                           ""
                       ],
                       [
                           "InputObject",
                           "Allows databases to be piped in from Get-DbaDatabase",
                           "",
                           false,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Get-DbsDbInputValidity [[-SqlInstance] \u003cDbaInstanceParameter[]\u003e] [[-SqlCredential] \u003cPSCredential\u003e] [[-InputObject] \u003cDatabase[]\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsDbKeyEncryptedByPassword",
        "Description": "Returns a list of non-compliant Database Master Key that are not encrypted by the Service Master Key",
        "Tags": "V-79085",
        "Synopsis": "Returns a list of non-compliant Database Master Key that are not encrypted by the Service Master Key",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Get-DbsDbKeyEncryptedByPassword",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsDbKeyEncryptedByPassword -SqlInstance sql2017, sql2016, sql2012\nReturns a list of non-compliant Database Master Key that are not encrypted by the Service Master Key for all databases on sql2017, sql2016 and sql2012\n-------------------------- EXAMPLE 2 --------------------------\nPS C:\\\u003eGet-DbsDbKeyEncryptedByPassword -SqlInstance sql2017, sql2016, sql2012 | Export-Csv -Path D:\\DISA\\access.csv -NoTypeInformation\nReturns a list of non-compliant Database Master Key that are not encrypted by the Service Master Key for all databases on sql2017, sql2016 and sql2012 to D:\\disa\\access.csv",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           false,
                           "true (ByValue)",
                           ""
                       ],
                       [
                           "InputObject",
                           "Allows databases to be piped in from Get-DbaDatabase",
                           "",
                           false,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Get-DbsDbKeyEncryptedByPassword [[-SqlInstance] \u003cDbaInstanceParameter[]\u003e] [[-SqlCredential] \u003cPSCredential\u003e] [[-InputObject] \u003cDatabase[]\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsDbKeyNotEncryptedByServer",
        "Description": "Returns a list of non-compliant Database Master Key that are not encrypted by the Service Master Key",
        "Tags": [
                     "V-79087",
                     "NonCompliantResults"
                 ],
        "Synopsis": "Returns a list of non-compliant Database Master Key that are not encrypted by the Service Master Key",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Get-DbsDbKeyNotEncryptedByServer",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsDbKeyNotEncryptedByServer -SqlInstance sql2017, sql2016, sql2012\nReturns a list of non-compliant Database Master Key that are not encrypted by the Service Master Key for all databases on sql2017, sql2016 and sql2012\n-------------------------- EXAMPLE 2 --------------------------\nPS C:\\\u003eGet-DbsDbKeyNotEncryptedByServer -SqlInstance sql2017, sql2016, sql2012 | Export-Csv -Path D:\\DISA\\access.csv -NoTypeInformation\nReturns a list of non-compliant Database Master Key that are not encrypted by the Service Master Key for all databases on sql2017, sql2016 and sql2012 to D:\\disa\\access.csv",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           false,
                           "true (ByValue)",
                           ""
                       ],
                       [
                           "InputObject",
                           "Allows databases to be piped in from Get-DbaDatabase",
                           "",
                           false,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Get-DbsDbKeyNotEncryptedByServer [[-SqlInstance] \u003cDbaInstanceParameter[]\u003e] [[-SqlCredential] \u003cPSCredential\u003e] [[-InputObject] \u003cDatabase[]\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsDbModuleAccess",
        "Description": "Obtains a listing of users and roles who are currently capable of changing stored procedures, functions, and triggers",
        "Tags": "V-79075",
        "Synopsis": "Obtains a listing of users and roles who are currently capable of changing stored procedures, functions, and triggers",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Get-DbsDbModuleAccess",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsDbModuleAccess -SqlInstance sql2017, sql2016, sql2012\nGets a listing of users and roles who are currently capable of changing stored procedures, functions, and triggers for all databases on sql2017, sql2016 and sql2012\n-------------------------- EXAMPLE 2 --------------------------\nPS C:\\\u003eGet-DbsDbModuleAccess -SqlInstance sql2017, sql2016, sql2012 | Export-Csv -Path D:\\DISA\\modulechanger.csv -NoTypeInformation\nExports a listing of users and roles who are currently capable of changing stored procedures, functions, and triggers for all databases on sql2017, sql2016 and sql2012 to D:\\disa\\modulechanger.csv",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           false,
                           "true (ByValue)",
                           ""
                       ],
                       [
                           "InputObject",
                           "Allows databases to be piped in from Get-DbaDatabase",
                           "",
                           false,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Get-DbsDbModuleAccess [[-SqlInstance] \u003cDbaInstanceParameter[]\u003e] [[-SqlCredential] \u003cPSCredential\u003e] [[-InputObject] \u003cDatabase[]\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsDbObjectOwner",
        "Description": "Returns SQL Server accounts that own database objects. These users are presumed to be authorized.",
        "Tags": "V-79079",
        "Synopsis": "Returns SQL Server accounts that own database objects. These users are presumed to be authorized.",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Get-DbsDbObjectOwner",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsDbObjectOwner -SqlInstance sql2017, sql2016, sql2012\nGets SQL Server accounts that own database objects for all databases on sql2017, sql2016 and sql2012\n-------------------------- EXAMPLE 2 --------------------------\nPS C:\\\u003eGet-DbsDbObjectOwner -SqlInstance sql2017, sql2016, sql2012 | Export-Csv -Path D:\\DISA\\dbobjowners.csv -NoTypeInformation\nGets SQL Server accounts that own database objects for sql2017, sql2016 and sql2012 to D:\\disa\\dbobjowners.csv",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           false,
                           "true (ByValue)",
                           ""
                       ],
                       [
                           "InputObject",
                           "Allows databases to be piped in from Get-DbaDatabase",
                           "",
                           false,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Get-DbsDbObjectOwner [[-SqlInstance] \u003cDbaInstanceParameter[]\u003e] [[-SqlCredential] \u003cPSCredential\u003e] [[-InputObject] \u003cDatabase[]\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsDbOwnerFixedServerRole",
        "Description": "Gets a listing of user databases whose owner is a member of a fixed server role",
        "Tags": "V-79111",
        "Synopsis": "Gets a listing of user databases whose owner is a member of a fixed server role",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Get-DbsDbOwnerFixedServerRole",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsDbOwnerFixedServerRole -SqlInstance sql2017, sql2016, sql2012\nGets a listing of user databases whose owner is a member of a fixed server role for all databases on sql2017, sql2016 and sql2012\n-------------------------- EXAMPLE 2 --------------------------\nPS C:\\\u003eGet-DbsDbOwnerFixedServerRole -SqlInstance sql2017, sql2016, sql2012 | Export-Csv -Path D:\\DISA\\fixedserverrole.csv -NoTypeInformation\nExports a list of user databases whose owner is a member of a fixed server role for all databases on sql2017, sql2016 and sql2012 to D:\\disa\\fixedserverrole.csv",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           false,
                           "true (ByValue)",
                           ""
                       ],
                       [
                           "InputObject",
                           "Allows databases to be piped in from Get-DbaDatabase",
                           "",
                           false,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Get-DbsDbOwnerFixedServerRole [[-SqlInstance] \u003cDbaInstanceParameter[]\u003e] [[-SqlCredential] \u003cPSCredential\u003e] [[-InputObject] \u003cDatabase[]\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsDbPermission",
        "Description": "Gets a list of database permissions using the \u0027Database permission assignments to users and roles.sql\u0027 file provided by DISA",
        "Tags": [
                     "V-79125",
                     "V-79065"
                 ],
        "Synopsis": "Gets a list of database permissions using the \u0027Database permission assignments to users and roles.sql\u0027 file provided by DISA",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Get-DbsDbPermission",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsDbPermission -SqlInstance sql2017, sql2016, sql2012\nGets a list of database permissions for all databases on sql2017, sql2016 and sql2012\n-------------------------- EXAMPLE 2 --------------------------\nPS C:\\\u003eGet-DbsDbPermission -SqlInstance sql2017, sql2016, sql2012\nGets a list of database permissions for all databases on sql2017, sql2016 and sql2012\n-------------------------- EXAMPLE 3 --------------------------\nPS C:\\\u003eGet-DbsDbPermission -SqlInstance sql2017, sql2016, sql2012 | Export-Csv -Path D:\\DISA\\dbperms.csv -NoTypeInformation\nExports a list of database permissions for all databases on sql2017, sql2016 and sql2012 to D:\\disa\\dbperms.csv",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           false,
                           "true (ByValue)",
                           ""
                       ],
                       [
                           "InputObject",
                           "Allows databases to be piped in from Get-DbaDatabase",
                           "",
                           false,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Get-DbsDbPermission [[-SqlInstance] \u003cDbaInstanceParameter[]\u003e] [[-SqlCredential] \u003cPSCredential\u003e] [[-InputObject] \u003cDatabase[]\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsDbProhibitedKeyAlgorithm",
        "Description": "Gets a list of prohibited key algorithms",
        "Tags": [
                     "V-79113",
                     "NonCompliantResults"
                 ],
        "Synopsis": "Gets a list of prohibited key algorithms",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Get-DbsDbProhibitedKeyAlgorithm",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsDbProhibitedKeyAlgorithm -SqlInstance sql2017\nGets a list of prohibited key algorithms for all databases on sql2017, sql2016 and sql2012",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           false,
                           "true (ByValue)",
                           ""
                       ],
                       [
                           "InputObject",
                           "Allows databases to be piped in from Get-DbaDatabase",
                           "",
                           false,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Get-DbsDbProhibitedKeyAlgorithm [[-SqlInstance] \u003cDbaInstanceParameter[]\u003e] [[-SqlCredential] \u003cPSCredential\u003e] [[-InputObject] \u003cDatabase[]\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsDbRecoveryModel",
        "Description": "Returns a list of all non-compliant (non-full) database recovery models",
        "Tags": [
                     "V-79083",
                     "NonCompliantResults"
                 ],
        "Synopsis": "Returns a list of all non-compliant (non-full) database recovery models",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Get-DbsDbRecoveryModel",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsDbRecoveryModel -SqlInstance sql2017, sql2016, sql2012\nReturns a list of all non-compliant (non-full) database recovery models.\n-------------------------- EXAMPLE 2 --------------------------\nPS C:\\\u003eGet-DbsDbRecoveryModel -SqlInstance sql2017, sql2016, sql2012 | Export-Csv -Path D:\\DISA\\recovery.csv -NoTypeInformation\nExports all non-compliant (non-full) database recovery models for all databases on sql2017, sql2016 and sql2012 to D:\\disa\\recovery.csv",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           false,
                           "true (ByValue)",
                           ""
                       ],
                       [
                           "InputObject",
                           "Allows databases to be piped in from Get-DbaDatabase",
                           "",
                           false,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Get-DbsDbRecoveryModel [[-SqlInstance] \u003cDbaInstanceParameter[]\u003e] [[-SqlCredential] \u003cPSCredential\u003e] [[-InputObject] \u003cDatabase[]\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsDbSchema",
        "Description": "Returns a list of all schemas and their owners",
        "Tags": [
                     "V-79077",
                     "V-79091"
                 ],
        "Synopsis": "Returns a list of all schemas and their owners",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Get-DbsDbSchema",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsDbSchema -SqlInstance sql2017, sql2016, sql2012\nReturns a list of all schema owners\n-------------------------- EXAMPLE 2 --------------------------\nPS C:\\\u003eGet-DbsDbSchema -SqlInstance sql2017, sql2016, sql2012 | Export-Csv -Path D:\\DISA\\schemaowners.csv -NoTypeInformation\nExports a list of all schema owners for all databases on sql2017, sql2016 and sql2012 to D:\\disa\\schemaowners.csv",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           false,
                           "true (ByValue)",
                           ""
                       ],
                       [
                           "InputObject",
                           "Allows databases to be piped in from Get-DbaDatabase",
                           "",
                           false,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Get-DbsDbSchema [[-SqlInstance] \u003cDbaInstanceParameter[]\u003e] [[-SqlCredential] \u003cPSCredential\u003e] [[-InputObject] \u003cDatabase[]\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsDbTde",
        "Description": "Returns a list of non-compliant (unencrypted) databases",
        "Tags": [
                     "V-79115",
                     "V-79117",
                     "V-79205",
                     "NonCompliantResults"
                 ],
        "Synopsis": "Returns a list of non-compliant (unencrypted) databases",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Get-DbsDbTde",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsDbTde -SqlInstance sql2017, sql2016, sql2012\nReturns a list of non-compliant (unencrypted) databases for all databases on sql2017, sql2016 and sql2012\n-------------------------- EXAMPLE 2 --------------------------\nPS C:\\\u003eGet-DbsDbTde -SqlInstance sql2017, sql2016, sql2012 | Export-Csv -Path D:\\DISA\\access.csv -NoTypeInformation\nReturns a list of non-compliant (unencrypted) databases for all databases on sql2017, sql2016 and sql2012 to D:\\disa\\access.csv",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           false,
                           "true (ByValue)",
                           ""
                       ],
                       [
                           "InputObject",
                           "Allows databases to be piped in from Get-DbaDatabase",
                           "",
                           false,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Get-DbsDbTde [[-SqlInstance] \u003cDbaInstanceParameter[]\u003e] [[-SqlCredential] \u003cPSCredential\u003e] [[-InputObject] \u003cDatabase[]\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsDbTemporalTable",
        "Description": "Gets all of the temporal tables in the database",
        "Tags": "V-79069",
        "Synopsis": "Gets all of the temporal tables in the database",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Get-DbsDbTemporalTable",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsDbTemporalTable -SqlInstance sql2017, sql2016, sql2012\nGets all of the temporal tables in all databases on sql2017, sql2016 and sql2012\n-------------------------- EXAMPLE 2 --------------------------\nPS C:\\\u003eGet-DbsDbTemporalTable -SqlInstance sql2017, sql2016, sql2012 | Export-Csv -Path D:\\DISA\\temporal.csv -NoTypeInformation\nGets all of the temporal tables in all databases on sql2017, sql2016 and sql2012 to D:\\disa\\temporal.csv",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           false,
                           "true (ByValue)",
                           ""
                       ],
                       [
                           "InputObject",
                           "Allows databases to be piped in from Get-DbaDatabase",
                           "",
                           false,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Get-DbsDbTemporalTable [[-SqlInstance] \u003cDbaInstanceParameter[]\u003e] [[-SqlCredential] \u003cPSCredential\u003e] [[-InputObject] \u003cDatabase[]\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsDbTrustworthy",
        "Description": "Returns a list trustworthy databases",
        "Tags": [
                     "V-79071",
                     "NonCompliantResults"
                 ],
        "Synopsis": "Returns a list trustworthy databases",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Get-DbsDbTrustworthy",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsDbTrustworthy -SqlInstance sql2017, sql2016, sql2012\nReturns a list of all trustworthy databases.\n-------------------------- EXAMPLE 2 --------------------------\nPS C:\\\u003eGet-DbsDbTrustworthy -SqlInstance sql2017, sql2016, sql2012 | Export-Csv -Path D:\\DISA\\trustworthy.csv -NoTypeInformation\nExports all trustworthy databases for all databases on sql2017, sql2016 and sql2012 to D:\\disa\\trustworthy.csv",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           false,
                           "true (ByValue)",
                           ""
                       ],
                       [
                           "InputObject",
                           "Allows databases to be piped in from Get-DbaDatabase",
                           "",
                           false,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Get-DbsDbTrustworthy [[-SqlInstance] \u003cDbaInstanceParameter[]\u003e] [[-SqlCredential] \u003cPSCredential\u003e] [[-InputObject] \u003cDatabase[]\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsDbUser",
        "Description": "Returns a list of all users for a database. These users are presumed to be authorized.",
        "Tags": "",
        "Synopsis": "Returns a list of all users for a database. These users are presumed to be authorized.",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Get-DbsDbUser",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsDbUser -SqlInstance sql2017, sql2016, sql2012\nReturns a list of all users for a database. These users are presumed to be authorized.\n-------------------------- EXAMPLE 2 --------------------------\nPS C:\\\u003eGet-DbsDbUser -SqlInstance sql2017, sql2016, sql2012 | Export-Csv -Path D:\\DISA\\authorized.csv -NoTypeInformation\nExports authorized users for all databases on sql2017, sql2016 and sql2012 to D:\\disa\\authorized.csv",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           false,
                           "true (ByValue)",
                           ""
                       ],
                       [
                           "InputObject",
                           "Allows databases to be piped in from Get-DbaDatabase",
                           "",
                           false,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Get-DbsDbUser [[-SqlInstance] \u003cDbaInstanceParameter[]\u003e] [[-SqlCredential] \u003cPSCredential\u003e] [[-InputObject] \u003cDatabase[]\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsEndpointEncryption",
        "Description": "Gets a list of non-compliant endpoint encryption algorithms",
        "Tags": [
                     "V-79323",
                     "V-79325",
                     "NonCompliantResults"
                 ],
        "Synopsis": "Gets a list of non-compliant endpoint encryption algorithms",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Get-DbsEndpointEncryption",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsEndpointEncryption -SqlInstance sql2017, sql2016, sql2012\nGets a list of non-compliant endpoint encryption algorithms on sql2017, sql2016 and sql2012\n-------------------------- EXAMPLE 2 --------------------------\nPS C:\\\u003eGet-DbsEndpointEncryption -SqlInstance sql2017, sql2016, sql2012 | Export-Csv -Path D:\\DISA\\startupproc.csv -NoTypeInformation\nGets a list of non-compliant endpoint encryption algorithms on sql2017, sql2016 and sql2012 to D:\\disa\\startupproc.csv",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Get-DbsEndpointEncryption [-SqlInstance] \u003cDbaInstanceParameter[]\u003e [[-SqlCredential] \u003cPSCredential\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsExternalScripts",
        "Description": "Gets non-compliant External Scripts Enabled settings",
        "Tags": [
                     "V-79347",
                     "NonCompliantResults"
                 ],
        "Synopsis": "Gets non-compliant External Scripts Enabled settings",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Get-DbsExternalScripts",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsExternalScripts -SqlInstance sql2017, sql2016, sql2012\nOnly returns non-compliant External Scripts Enabled settings from sql2017, sql2016 and sql2012",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Get-DbsExternalScripts [-SqlInstance] \u003cDbaInstanceParameter[]\u003e [[-SqlCredential] \u003cPSCredential\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsFeature",
        "Description": "Returns a list of all features that may be not required and must be documented",
        "Tags": [
                     "V-79173",
                     "V-79175",
                     "V-79247"
                 ],
        "Synopsis": "Returns a list of all features that may be not required and must be documented",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Get-DbsFeature",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsFeature -ComputerName sql2016, sql2017, sql2012\nGets all instances that do not have an SPN from sql2016, sql2017 and sql2012",
        "Params": [
                       [
                           "ComputerName",
                           "The target server or instance",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Get-DbsFeature [-ComputerName] \u003cDbaInstanceParameter[]\u003e [[-Credential] \u003cPSCredential\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsFilestreamAccess",
        "Description": "Gets non-compliant Filestream Access settings",
        "Tags": [
                     "V-79329",
                     "NonCompliantResults"
                 ],
        "Synopsis": "Gets non-compliant Filestream Access settings",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Get-DbsFilestreamAccess",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsFilestreamAccess -SqlInstance sql2017, sql2016, sql2012\nOnly returns non-compliant Filestream Access settings from sql2017, sql2016 and sql2012",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Get-DbsFilestreamAccess [-SqlInstance] \u003cDbaInstanceParameter[]\u003e [[-SqlCredential] \u003cPSCredential\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsFips",
        "Description": "Returns a list of computers that are not FIPS compliant",
        "Tags": [
                     "V-67871",
                     "V-79113",
                     "V-79197",
                     "V-79199",
                     "V-79203",
                     "V-79305",
                     "V-79307",
                     "V-79309",
                     "NonCompliantResults"
                 ],
        "Synopsis": "Returns a list of computers that are not FIPS compliant",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Get-DbsFips",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsFips -ComputerName sql2016, sql2017, sql2012\nGets FIPS disabled state from sql2016, sql2017 and sql2012",
        "Params": [
                       [
                           "ComputerName",
                           "The target server or instance",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Get-DbsFips [-ComputerName] \u003cDbaInstanceParameter[]\u003e [[-Credential] \u003cPSCredential\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsHadoopConnectivity",
        "Description": "Gets non-compliant Hadoop Connectivity settings",
        "Tags": [
                     "V-79341",
                     "NonCompliantResults"
                 ],
        "Synopsis": "Gets non-compliant Hadoop Connectivity settings",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Get-DbsHadoopConnectivity",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsHadoopConnectivity -SqlInstance sql2017, sql2016, sql2012\nOnly returns non-compliant Hadoop Connectivity settings from sql2017, sql2016 and sql2012",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Get-DbsHadoopConnectivity [-SqlInstance] \u003cDbaInstanceParameter[]\u003e [[-SqlCredential] \u003cPSCredential\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsIFI",
        "Description": "Gets all non-compliant Instant File Initialization (IFI) settings from all instances on a computer",
        "Tags": [
                     "V-79213",
                     "NonCompliantResults"
                 ],
        "Synopsis": "Gets all non-compliant Instant File Initialization (IFI) settings from all instances on a computer",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Get-DbsIFI",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsIFI -ComputerName sql01\nGets all non-compliant Instant File Initialization (IFI) settings from all instances on sql01",
        "Params": [
                       [
                           "ComputerName",
                           "The target SQL Server",
                           "cn,host,Server",
                           false,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Get-DbsIFI [[-ComputerName] \u003cDbaInstanceParameter[]\u003e] [[-Credential] \u003cPSCredential\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsLinkedServer",
        "Description": "Gets a list of linked servers and their logins",
        "Tags": "V-79183",
        "Synopsis": "Gets a list of linked servers and their logins",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Get-DbsLinkedServer",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsLinkedServer -SqlInstance sql2017, sql2016, sql2012\nGets a list of linked servers and their logins for sql2017, sql2016 and sql2012\n-------------------------- EXAMPLE 2 --------------------------\nPS C:\\\u003eGet-DbsLinkedServer -SqlInstance sql2017, sql2016, sql2012 | Export-Csv -Path D:\\DISA\\linkedservers.csv -NoTypeInformation\nGets a list of linked servers and their logins for sql2017, sql2016 and sql2012 and exports them to D:\\DISA\\linkedservers.csv",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Get-DbsLinkedServer [-SqlInstance] \u003cDbaInstanceParameter[]\u003e [[-SqlCredential] \u003cPSCredential\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsLocalAdmin",
        "Description": "Gets a list of Windows administrators on a SQL Server",
        "Tags": "V-79237",
        "Synopsis": "Gets a list of Windows administrators on a SQL Server",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Get-DbsLocalAdmin",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsLocalAdmin -ComputerName sql01\nGets a list of Windows administrators on a SQL Server",
        "Params": [
                       [
                           "ComputerName",
                           "The target SQL Server",
                           "cn,host,Server",
                           false,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Get-DbsLocalAdmin [[-ComputerName] \u003cDbaInstanceParameter[]\u003e] [[-Credential] \u003cPSCredential\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsLogin",
        "Description": "Gets a list of all logins",
        "Tags": "V-79201",
        "Synopsis": "Gets a list of all logins",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Get-DbsLogin",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsLogin -SqlInstance sql2017, sql2016, sql2012\nGets a list of all logins from sql2017, sql2016 and sql2012",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Get-DbsLogin [-SqlInstance] \u003cDbaInstanceParameter[]\u003e [[-SqlCredential] \u003cPSCredential\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsLoginProperty",
        "Description": "Gets non-compliant login properties",
        "Tags": [
                     "V-79191",
                     "NonCompliantResults"
                 ],
        "Synopsis": "Gets non-compliant login properties",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Get-DbsLoginProperty",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsLoginProperty -SqlInstance sql2017, sql2016, sql2012\nOnly returns non-compliant login properties from sql2017, sql2016 and sql2012",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Get-DbsLoginProperty [-SqlInstance] \u003cDbaInstanceParameter[]\u003e [[-SqlCredential] \u003cPSCredential\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsMixedMode",
        "Description": "Returns a list of any server that has mixed mode enabled",
        "Tags": [
                     "V-79121",
                     "V-79355",
                     "NonCompliantResults"
                 ],
        "Synopsis": "Returns a list of any server that has mixed mode enabled",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Get-DbsMixedMode",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsMixedMode -SqlInstance sql2017, sql2016, sql2012\nReturns a list of any server that has mixed mode enabled",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Get-DbsMixedMode [-SqlInstance] \u003cDbaInstanceParameter[]\u003e [[-SqlCredential] \u003cPSCredential\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsNonCompliance",
        "Description": "Easily see non-compliant server info",
        "Synopsis": "Easily see non-compliant server info",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Get-DbsNonCompliance",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-ChildItem R:\\disa | Get-DbsNonCompliance\nEasily see non-compliant server info\n-------------------------- EXAMPLE 2 --------------------------\nPS C:\\\u003eExport-DbsInstance -SqlInstance sql2017, sql01, sql02 | Get-DbsNonCompliance\nEasily see non-compliant server info",
        "Params": [
                       [
                           "Path",
                           "The file/files/directories to compare",
                           "FilePath",
                           false,
                           "true (ByValue)",
                           "(Get-PSFConfigValue -FullName dbadisa.path.export)"
                       ]
                   ],
        "Syntax": "Get-DbsNonCompliance [[-Path] \u003cFileInfo[]\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsOleAutomation",
        "Description": "Gets non-compliant Ole Automation Procedures settings.",
        "Tags": [
                     "V-79333",
                     "NonCompliantResults"
                 ],
        "Synopsis": "Gets non-compliant Ole Automation Procedures settings.",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Get-DbsOleAutomation",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsOleAutomation -SqlInstance sql2017, sql2016, sql2012\nOnly returns non-compliant Ole Automation Procedures settings from sql2017, sql2016 and sql2012",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Get-DbsOleAutomation [-SqlInstance] \u003cDbaInstanceParameter[]\u003e [[-SqlCredential] \u003cPSCredential\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsPermission",
        "Description": "Gets a list of instance permissions using the \u0027Instance permissions assignments to logins and roles.sql\u0027 file provided by DISA",
        "Tags": "V-79125",
        "Synopsis": "Gets a list of instance permissions using the \u0027Instance permissions assignments to logins and roles.sql\u0027 file provided by DISA",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Get-DbsPermission",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsPermission -SqlInstance sql2017, sql2016, sql2012\nGets a list of instance permissions for all databases on sql2017, sql2016 and sql2012\n-------------------------- EXAMPLE 2 --------------------------\nPS C:\\\u003eGet-DbsPermission -SqlInstance sql2017, sql2016, sql2012\nGets a list of instance permissions for all databases on sql2017, sql2016 and sql2012\n-------------------------- EXAMPLE 3 --------------------------\nPS C:\\\u003eGet-DbsPermission -SqlInstance sql2017, sql2016, sql2012 | Export-Csv -Path D:\\DISA\\instanceperms.csv -NoTypeInformation\nExports a list of instance permissions for all databases on sql2017, sql2016 and sql2012 to D:\\disa\\instanceperms.csv",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Get-DbsPermission [-SqlInstance] \u003cDbaInstanceParameter[]\u003e [[-SqlCredential] \u003cPSCredential\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsPolybaseExport",
        "Description": "Gets non-compliant Allow Polybase Export settings.",
        "Tags": [
                     "V-79343",
                     "NonCompliantResults"
                 ],
        "Synopsis": "Gets non-compliant Allow Polybase Export settings.",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Get-DbsPolybaseExport",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsPolybaseExport -SqlInstance sql2017, sql2016, sql2012\nOnly returns non-compliant Allow Polybase Export settings from sql2017, sql2016 and sql2012",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Get-DbsPolybaseExport [-SqlInstance] \u003cDbaInstanceParameter[]\u003e [[-SqlCredential] \u003cPSCredential\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsPrivilegedLogin",
        "Description": "Review server-level securables and built-in role membership to ensure only authorized users have privileged access and the ability to create server-level objects and grant permissions to themselves or others",
        "Tags": "V-79219",
        "Synopsis": "Review server-level securables and built-in role membership to ensure only authorized users have privileged access and the ability to create server-level objects and grant permissions to themselves or others",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Get-DbsPrivilegedLogin",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsPrivilegedLogin -SqlInstance sql2017, sql2016, sql2012\nReview server-level securables and built-in role membership to ensure only authorized users have privileged access and the ability to create server-level objects and grant permissions to themselves \r\nor others for sql2017, sql2016 and sql2012",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Get-DbsPrivilegedLogin [-SqlInstance] \u003cDbaInstanceParameter[]\u003e [[-SqlCredential] \u003cPSCredential\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsProtocol",
        "Description": "Gets all non-compliant protocols enabled from all instances on a computer",
        "Tags": [
                     "V-79185",
                     "V-79241",
                     "NonCompliantResults"
                 ],
        "Synopsis": "Gets all non-compliant protocols enabled from all instances on a computer",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Get-DbsProtocol",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsProtocol -ComputerName sql01\nGets all non-compliant protocols enabled from all instances on sql01",
        "Params": [
                       [
                           "ComputerName",
                           "The target SQL Server",
                           "cn,host,Server",
                           false,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Get-DbsProtocol [[-ComputerName] \u003cDbaInstanceParameter[]\u003e] [[-Credential] \u003cPSCredential\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsRemoteAccess",
        "Description": "Gets non-compliant Remote Access settings",
        "Tags": [
                     "V-79337",
                     "NonCompliantResults"
                 ],
        "Synopsis": "Gets non-compliant Remote Access settings",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Get-DbsRemoteAccess",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsRemoteAccess -SqlInstance sql2017, sql2016, sql2012\nOnly returns non-compliant Remote Access settings from sql2017, sql2016 and sql2012",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Get-DbsRemoteAccess [-SqlInstance] \u003cDbaInstanceParameter[]\u003e [[-SqlCredential] \u003cPSCredential\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsRemoteDataArchive",
        "Description": "Gets non-compliant Remote Data Archive settings",
        "Tags": [
                     "V-79345",
                     "NonCompliantResults"
                 ],
        "Synopsis": "Gets non-compliant Remote Data Archive settings",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Get-DbsRemoteDataArchive",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsRemoteDataArchive -SqlInstance sql2017, sql2016, sql2012\nOnly returns non-compliant Remote Data Archive settings from sql2017, sql2016 and sql2012",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Get-DbsRemoteDataArchive [-SqlInstance] \u003cDbaInstanceParameter[]\u003e [[-SqlCredential] \u003cPSCredential\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsReplicationXp",
        "Description": "Gets non-compliant Replication Xp settings.",
        "Tags": [
                     "V-79351",
                     "NonCompliantResults"
                 ],
        "Synopsis": "Gets non-compliant Replication Xp settings.",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Get-DbsReplicationXp",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsReplicationXp -SqlInstance sql2017, sql2016, sql2012\nOnly returns non-compliant Replication Xp settings from sql2017, sql2016 and sql2012",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Get-DbsReplicationXp [-SqlInstance] \u003cDbaInstanceParameter[]\u003e [[-SqlCredential] \u003cPSCredential\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsSaAccount",
        "Description": "Gets a list of non-compliant logins named \u0027sa\u0027 or \u0027sa\u0027 accounts that are still enabled",
        "Tags": [
                     "V-79319",
                     "V-79317",
                     "NonCompliantResults"
                 ],
        "Synopsis": "Gets a list of non-compliant logins named \u0027sa\u0027 or \u0027sa\u0027 accounts that are still enabled",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Get-DbsSaAccount",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsSaAccount -SqlInstance sql2017, sql2016, sql2012\nGets a list of logins named \u0027sa\u0027 or \u0027sa\u0027 accounts that are still enabled from sql2017, sql2016, and sql2012",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Get-DbsSaAccount [-SqlInstance] \u003cDbaInstanceParameter[]\u003e [[-SqlCredential] \u003cPSCredential\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsSampleDatabase",
        "Description": "Returns a list of prohibited (non-compliant) sample databases",
        "Tags": [
                     "V-79195",
                     "V-79171",
                     "NonCompliantResults"
                 ],
        "Synopsis": "Returns a list of prohibited (non-compliant) sample databases",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Get-DbsSampleDatabase",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGetDbsSampleDatabase -SqlInstance sql2017, sql2016, sql2012\nReturns a list of prohibited sample databases for sql2017, sql2016, and sql2012\n-------------------------- EXAMPLE 2 --------------------------\nPS C:\\\u003eGetDbsSampleDatabase -SqlInstance sql2017, sql2016, sql2012 | Export-Csv -Path D:\\DISA\\sampledbs.csv -NoTypeInformation\nExports a list of prohibited sample databases for sql2017, sql2016 and sql2012 to D:\\disa\\sampledbs.csv",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Get-DbsSampleDatabase [-SqlInstance] \u003cDbaInstanceParameter[]\u003e [[-SqlCredential] \u003cPSCredential\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsServiceAccount",
        "Description": "Gets SQL services and service accounts",
        "Tags": "V-79245",
        "Synopsis": "Gets SQL services and service accounts",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Get-DbsServiceAccount",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsServiceAccount -ComputerName sql01\nGets SQL services and service accounts",
        "Params": [
                       [
                           "ComputerName",
                           "The target SQL Server",
                           "cn,host,Server",
                           false,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Get-DbsServiceAccount [[-ComputerName] \u003cDbaInstanceParameter[]\u003e] [[-Credential] \u003cPSCredential\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsSetupAccount",
        "Description": "Returns a list of accounts that have installed or modified SQL Server",
        "Tags": "V-79167",
        "Synopsis": "Returns a list of accounts that have installed or modified SQL Server",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Get-DbsSetupAccount",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsSetupAccount -ComputerName sql2016, sql2017, sql2012\nReturns a list of accounts that have isntalled or modified SQL Server on sql2016, sql2017 and sql2012",
        "Params": [
                       [
                           "ComputerName",
                           "The target server or instance",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Get-DbsSetupAccount [-ComputerName] \u003cDbaInstanceParameter[]\u003e [[-Credential] \u003cPSCredential\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsSqlClr",
        "Description": "Gets non-compliant CLR settings",
        "Tags": [
                     "V-79179",
                     "V-79243",
                     "NonCompliantResults"
                 ],
        "Synopsis": "Gets non-compliant CLR settings",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Get-DbsSqlClr",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsSqlClr -SqlInstance sql2017, sql2016, sql2012\nOnly returns non-compliant CLR settings from sql2017, sql2016 and sql2012",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Get-DbsSqlClr [-SqlInstance] \u003cDbaInstanceParameter[]\u003e [[-SqlCredential] \u003cPSCredential\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsStartupProcedure",
        "Description": "Gets a list of startup procedures",
        "Tags": "V-79321",
        "Synopsis": "Gets a list of startup procedures",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Get-DbsStartupProcedure",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsStartupProcedure -SqlInstance sql2017, sql2016, sql2012\nGets a list of startup procedures for all databases on sql2017, sql2016 and sql2012\n-------------------------- EXAMPLE 2 --------------------------\nPS C:\\\u003eGet-DbsStartupProcedure -SqlInstance sql2017, sql2016, sql2012 | Export-Csv -Path D:\\DISA\\startupproc.csv -NoTypeInformation\nExports a list of startup procedures for all databases on sql2017, sql2016 and sql2012 to D:\\disa\\startupproc.csv",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Get-DbsStartupProcedure [-SqlInstance] \u003cDbaInstanceParameter[]\u003e [[-SqlCredential] \u003cPSCredential\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsStig",
        "Description": "Parses the U_MS_SQL_Server_2014_Database_STIG_V1R6_Manual-xccdf style XML files from DISA into PowerShell objects",
        "Synopsis": "Parses the U_MS_SQL_Server_2014_Database_STIG_V1R6_Manual-xccdf style XML files from DISA into PowerShell objects",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Get-DbsStig",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsStig\nReturn checklsits for database and instance for SQL Server 2014 and 2016\n-------------------------- EXAMPLE 2 --------------------------\nPS C:\\\u003eGet-DbsStig -Version 2014\nReturn checklsits for database and instance for SQL Server 2014 only",
        "Params": [
                       [
                           "Path",
                           "The Path to the STIG xml file. Not required, as they\u0027ve been included.",
                           "",
                           false,
                           "true (ByValue)",
                           ""
                       ],
                       [
                           "Version",
                           "By default, SQL Server 2014 and above stigs are returned. This allows you to filter by version.",
                           "",
                           false,
                           "false",
                           ""
                       ]
                   ],
        "Syntax": "Get-DbsStig [[-Path] \u003cObject[]\u003e] [[-Version] \u003cInt32[]\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsSystemPermission",
        "Description": "Gets permissions that were identified as not allowed in the check content",
        "Tags": [
                     "V-79129",
                     "NonCompliantResults"
                 ],
        "Synopsis": "Gets permissions that were identified as not allowed in the check content",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Get-DbsSystemPermission",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsSystemPermission -SqlInstance sql2017, sql2016, sql2012\nGets a list of non-compliant audit states on sql2017, sql2016 and sql2012\n-------------------------- EXAMPLE 2 --------------------------\nPS C:\\\u003eGet-DbsSystemPermission -SqlInstance sql2017, sql2016, sql2012\nGets a list of non-compliant audit states on sql2017, sql2016 and sql2012\n-------------------------- EXAMPLE 3 --------------------------\nPS C:\\\u003eGet-DbsSystemPermission -SqlInstance sql2017, sql2016, sql2012 | Export-Csv -Path D:\\DISA\\auditstates.csv -NoTypeInformation\nGets a list of non-compliant audit states sql2017, sql2016 and sql2012 to D:\\disa\\auditstates.csv",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Get-DbsSystemPermission [-SqlInstance] \u003cDbaInstanceParameter[]\u003e [[-SqlCredential] \u003cPSCredential\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsTcpPort",
        "Description": "Returns all Tcp Ports in use by SQL Server",
        "Tags": "V-79187",
        "Synopsis": "Returns all Tcp Ports in use by SQL Server",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Get-DbsTcpPort",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsTcpPort -ComputerName server01, server02\nReturns all Tcp Ports in use by SQL Server on server01 and server02",
        "Params": [
                       [
                           "ComputerName",
                           "The target server or instance.",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Get-DbsTcpPort [-ComputerName] \u003cDbaInstanceParameter[]\u003e [[-Credential] \u003cPSCredential\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsTimeSource",
        "Description": "Returns a list of non-compliant time sources",
        "Tags": [
                     "V-79233",
                     "NonCompliantResults"
                 ],
        "Synopsis": "Returns a list of non-compliant time sources",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Get-DbsTimeSource",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsTimeSource -ComputerName sql01\nReturns a list of non-compliant time sources",
        "Params": [
                       [
                           "ComputerName",
                           "The target SQL Server",
                           "cn,host,Server",
                           true,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Get-DbsTimeSource [-ComputerName] \u003cDbaInstanceParameter[]\u003e [[-Credential] \u003cPSCredential\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsTraceFlag",
        "Description": "Checks to see if trace flag 3625 to hide system information form non-sysadmins in error messages",
        "Tags": [
                     "V-79097",
                     "V-79217",
                     "NonCompliantResults"
                 ],
        "Synopsis": "Checks both startup params and trace flags to see if trace flag 3625 is set",
        "Alias": "",
        "Author": "Tracy Boggiano (@TracyBoggiano), databasesuperhero.com",
        "CommandName": "Get-DbsTraceFlag",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsTraceFlag -SqlInstance sql2017, sql2016, sql2012\nGets trace flag on servers.",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Get-DbsTraceFlag [-SqlInstance] \u003cDbaInstanceParameter[]\u003e [[-SqlCredential] \u003cPSCredential\u003e] [[-Credential] \u003cPSCredential\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsUserOptions",
        "Description": "Gets non-compliant User Options settings",
        "Tags": [
                     "V-79335",
                     "NonCompliantResults"
                 ],
        "Synopsis": "Gets non-compliant User Options settings",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Get-DbsUserOptions",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsUserOptions -SqlInstance sql2017, sql2016, sql2012\nOnly returns non-compliant User Options settings from sql2017, sql2016 and sql2012",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Get-DbsUserOptions [-SqlInstance] \u003cDbaInstanceParameter[]\u003e [[-SqlCredential] \u003cPSCredential\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsXPCmdShell",
        "Description": "Gets non-compliant xp_cmdshell settings",
        "Tags": [
                     "V-79177",
                     "NonCompliantResults"
                 ],
        "Synopsis": "Gets non-compliant xp_cmdshell settings",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Get-DbsXPCmdShell",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsXPCmdShell -SqlInstance sql2017, sql2016, sql2012\nOnly returns non-compliant xp_cmdshell settings from sql2017, sql2016 and sql2012",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Get-DbsXPCmdShell [-SqlInstance] \u003cDbaInstanceParameter[]\u003e [[-SqlCredential] \u003cPSCredential\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Get-DbsXpPermission",
        "Description": "Gets a list of registry extended stored procedure permissions",
        "Tags": "V-79327",
        "Synopsis": "Gets a list of registry extended stored procedure permissions",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Get-DbsXpPermission",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsXpPermission -SqlInstance sql2017, sql2016, sql2012\nGets a list of registry extended stored procedure permissions for all databases on sql2017, sql2016 and sql2012\n-------------------------- EXAMPLE 2 --------------------------\nPS C:\\\u003eGet-DbsXpPermission -SqlInstance sql2017, sql2016, sql2012 | Export-Csv -Path D:\\DISA\\instanceperms.csv -NoTypeInformation\nExports a list of registry extended stored procedure permissions for all databases on sql2017, sql2016 and sql2012 to D:\\disa\\instanceperms.csv",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Get-DbsXpPermission [-SqlInstance] \u003cDbaInstanceParameter[]\u003e [[-SqlCredential] \u003cPSCredential\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Install-DbsAudit",
        "Description": "Installs the supplemental SQL Server Audit provided by DISA",
        "Synopsis": "Installs the supplemental SQL Server Audit provided by DISA",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Install-DbsAudit",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eInstall-DbsAudit -SqlInstance sql2017, sql2016, sql2012\nDetect version and create appropriate audit from DISA, output to DATA\\Stig\\, shutdown on failure\n-------------------------- EXAMPLE 2 --------------------------\nPS C:\\\u003eInstall-DbsAudit -SqlInstance sql2017 -SqlCredential sqladmin -Path C:\\temp -OnFaiure Continue\nLogin as sqladmin, detect version and create appropriate audit from DISA, output to C:\\temp, continue on failure\n-------------------------- EXAMPLE 3 --------------------------\nPS C:\\\u003eGet-DbaRegServer -SqlInstance sqlcentral | Install-DbaDisaStigAudit\nInstalls disa stig on all servers on the CMS",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ],
                       [
                           "Name",
                           "The name of the audit and audit specification. Defaults to DISA\u0027s default of DISA_STIG.",
                           "",
                           false,
                           "false",
                           "(Get-PSFConfigValue -FullName dbadisa.app.auditname)"
                       ],
                       [
                           "Path",
                           "The path where the audit files will be created. Defaults to default data directory + STIG. Creates the directory if it does not exist.",
                           "",
                           false,
                           "false",
                           ""
                       ],
                       [
                           "MaxSize",
                           "The max size of each audit file. Defaults to 10MB.",
                           "",
                           false,
                           "false",
                           "10 MB"
                       ],
                       [
                           "MaxFiles",
                           "The max number of files to keep. Defaults to 50.",
                           "",
                           false,
                           "false",
                           "50"
                       ],
                       [
                           "Reserve",
                           "Sets the reserve of disk space. Defaults to OFF.",
                           "",
                           false,
                           "false",
                           "OFF"
                       ],
                       [
                           "QueueDelay",
                           "Sets the queue delay of the audit. Defaults to 1000.",
                           "",
                           false,
                           "false",
                           "1000"
                       ],
                       [
                           "OnFailure",
                           "Instructs SQL Server of what to do on failure. Defaults to SHUTDOWN. Options include \u0027FAIL_OPERATION\u0027, \u0027SHUTDOWN\u0027, \u0027CONTINUE\u0027.",
                           "",
                           false,
                           "false",
                           "SHUTDOWN"
                       ]
                   ],
        "Syntax": "Install-DbsAudit [-SqlInstance] \u003cDbaInstanceParameter[]\u003e [-SqlCredential \u003cPSCredential\u003e] [-Name \u003cString\u003e] [-Path \u003cString\u003e] [-MaxSize \u003cString\u003e] [-MaxFiles \u003cString\u003e] [-Reserve \u003cString\u003e] [-QueueDelay \u003cString\u003e] [-OnFailure \u003cString\u003e] [-EnableException] [-WhatIf] [-Confirm] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Move-DbsAuditFile",
        "Description": "Moves .sqlaudit files to a central repository using UNC shares",
        "Tags": [
                     "V-79311",
                     "V-79223",
                     "V-79225"
                 ],
        "Synopsis": "Moves .sqlaudit files to a central repository using UNC shares",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Move-DbsAuditFile",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eMove-DbsAuditFile -SqlInstance sql2017\nMove it",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances\nThis is required to get specific information about the paths to modify. The base computer name is also used to\r\nperform the actual modifications",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ],
                       [
                           "Path",
                           "Pat dat",
                           "",
                           false,
                           "false",
                           ""
                       ],
                       [
                           "Destination",
                           "Central repo",
                           "",
                           false,
                           "false",
                           ""
                       ],
                       [
                           "NoCompress",
                           "Skip zip",
                           "",
                           false,
                           "false",
                           "False"
                       ]
                   ],
        "Syntax": "Move-DbsAuditFile [-SqlInstance] \u003cDbaInstanceParameter[]\u003e [[-SqlCredential] \u003cPSCredential\u003e] [[-Path] \u003cString[]\u003e] [[-Destination] \u003cString\u003e] [-NoCompress] [-EnableException] [-WhatIf] [-Confirm] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "New-DbsDocTemplate",
        "Description": "Creates a documentation template in markdown that makes it easy to provide the necessary documentation to auditors",
        "Synopsis": "Creates a documentation template in markdown that makes it easy to provide the necessary documentation to auditors",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "New-DbsDocTemplate",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eNew-DbsDocTemplate -FilePath C:\\temp\\sql2016.md\nCreates a DISA documentation template for 2016\n-------------------------- EXAMPLE 2 --------------------------\nPS C:\\\u003eNew-DbsDocTemplate -FilePath C:\\temp\\sql2014.md -Version 2014\nCreates a DISA documentation template for 2014",
        "Params": [
                       [
                           "FilePath",
                           "The output markdown file path",
                           "",
                           true,
                           "false",
                           ""
                       ],
                       [
                           "Version",
                           "The SQL Server version. 2016 by default.",
                           "",
                           false,
                           "false",
                           "2016"
                       ],
                       [
                           "Include",
                           "What parts to include in the output",
                           "",
                           false,
                           "false",
                           "@(\"Description\", \"FixText\", \"Check\")"
                       ]
                   ],
        "Syntax": "New-DbsDocTemplate [-FilePath] \u003cString\u003e [[-Version] \u003cInt32\u003e] [[-Include] \u003cString[]\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Remove-DbsSystemPermission",
        "Description": "Removes non-compliant audit states\n\nIf you remove permissions for \u0027NT AUTHORITY\\SYSTEM\u0027 using this command and they continue to persist, check to ensure\nthat the permissions are not granted by a role such as sysadmin",
        "Tags": "V-79129",
        "Synopsis": "Remoes non-compliant audit states",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Remove-DbsSystemPermission",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eRemove-DbsSystemPermission -SqlInstance sql2017, sql2016, sql2012\nGets a list of non-compliant audit states on sql2017, sql2016 and sql2012\n-------------------------- EXAMPLE 2 --------------------------\nPS C:\\\u003eRemove-DbsSystemPermission -SqlInstance sql2017, sql2016 and sql2012\nRemoves all non-compliant permissions for NT AUTHORITY\\SYSTEM on sql2017, sql2016 and sql2012\n-------------------------- EXAMPLE 3 --------------------------\nPS C:\\\u003eGet-DbsSystemPermission -SqlInstance sql2014 | Out-GridView -PassThru | Remove-DbsSystemPermission\nGets a list of non-compliant permissions for NT AUTHORITY\\SYSTEM, prompts to select specific permissions, then removes the selected permissions",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           false,
                           "false",
                           ""
                       ],
                       [
                           "InputObject",
                           "Allows piping from Get-DbsSystemPermission",
                           "",
                           false,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Remove-DbsSystemPermission [[-SqlInstance] \u003cDbaInstanceParameter[]\u003e] [[-SqlCredential] \u003cPSCredential\u003e] [[-InputObject] \u003cPSObject[]\u003e] [-EnableException] [-WhatIf] [-Confirm] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Repair-DbsDbOwnerFixedServerRole",
        "Description": "Removes unauthorized users from roles and/or sets the owner of the database to an authorized login",
        "Tags": "V-79111",
        "Synopsis": "Removes unauthorized users from roles and/or sets the owner of the database to an authorized login",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Repair-DbsDbOwnerFixedServerRole",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsDbOwnerFixedServerRole -SqlInstance sql2017, sql2016, sql2012 | Remove-DbsDbOwnerFixedServerRole\nRemoves unauthorized users from their associated roles\n-------------------------- EXAMPLE 2 --------------------------\nPS C:\\\u003eGet-DbsDbOwnerFixedServerRole -SqlInstance sql2017, sql2016, sql2012 | Remove-DbsDbOwnerFixedServerRole -Confirm:$false\nRemoves unauthorized users from their associated roles and does not prompt\n-------------------------- EXAMPLE 3 --------------------------\nPS C:\\\u003eGet-DbsDbOwnerFixedServerRole -SqlInstance sql2017, sql2016, sql2012 | Out-GridView -Passthru | Remove-DbsDbOwnerFixedServerRole -Type SetOwner -NewOwner AD\\chantel.phillip -Confirm:$false\nSets the owner of the database to an authorized login, AD\\chantel.phillip",
        "Params": [
                       [
                           "InputObject",
                           "Allows databases to be piped in from Get-DbsDbOwnerFixedServerRole",
                           "",
                           false,
                           "true (ByValue)",
                           ""
                       ],
                       [
                           "Type",
                           "The type of repair - remove user from role, set a new db owner, or both\nOptions: \"RemoveRoleMember\", \"SetOwner\"",
                           "",
                           false,
                           "false",
                           "RemoveRoleMember"
                       ],
                       [
                           "NewOwner",
                           "The type of repair - remove user from role, set a new db owner, or both",
                           "",
                           false,
                           "false",
                           ""
                       ]
                   ],
        "Syntax": "Repair-DbsDbOwnerFixedServerRole [[-InputObject] \u003cPSObject[]\u003e] [[-Type] \u003cString[]\u003e] [[-NewOwner] \u003cString\u003e] [-EnableException] [-WhatIf] [-Confirm] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Revoke-DbsDbAlterPermission",
        "Description": "Removes non-compliant alter permissions",
        "Tags": [
                     "V-79109",
                     "V-79075",
                     "V-79081"
                 ],
        "Synopsis": "Removes non-compliant alter permissions",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Revoke-DbsDbAlterPermission",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsDbAlterPermission -SqlInstance sql2017, sql2016, sql2012 | Revoke-DbsDbAlterPermission\nRevokes non-compliant alter permissions on sql2017, sql2016, sql2012\n-------------------------- EXAMPLE 2 --------------------------\nPS C:\\\u003eGet-DbsDbAlterPermission -SqlInstance sql2017, sql2016, sql2012 | Out-GridView -Passthru | Revoke-DbsDbAlterPermission -Confirm:$false\nRevokes _selected_ non-compliant alter permissions on sql2017, sql2016, sql2012, does not prompt",
        "Params": [
                       [
                           "InputObject",
                           "Allows databases to be piped in from Get-DbsDbAlterPermission",
                           "",
                           false,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Revoke-DbsDbAlterPermission [[-InputObject] \u003cPSObject[]\u003e] [-EnableException] [-WhatIf] [-Confirm] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Set-DbsAcl",
        "Description": "Sets the required permissions for SQL Server directories\n\nBy default, it will detect and secure the default Data, Log and Backup directories",
        "Tags": [
                     "V-79215",
                     "V-79151",
                     "V-79153",
                     "V-79155",
                     "V-79163"
                 ],
        "Synopsis": "Sets the permissions required by DISA for SQL Server directories",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Set-DbsAcl",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eSet-DbsAcl -SqlInstance sql2017, sql2016, sql2012 -Account \"AD\\SQL Admins\" -Owner \"AD\\SQL Service\"\nSets permissions for the default data, log and backups on sql2017, sql2016, sql2012\nAdds appropriate permissions for the \"AD\\SQL Admins\" group as well as the SQL Server service accountsas Full Access\nAlso sets the owner of the folder to \"AD\\SQL Service\"\n-------------------------- EXAMPLE 2 --------------------------\nPS C:\\\u003eGet-DbaRegServer -SqlInstance sqlcentral | Set-DbsAcl -Account \"AD\\SQL Admins\" -Owner \"AD\\SQL Service\"\nSets the appropriate permissions for all SQL Servers stored in the sqlcentral registered server",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances\nThis is required to get specific information about the paths to modify\nThe base computer name is also used to perform the actual modifications",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ],
                       [
                           "Owner",
                           "The account that will be set as the folder owner",
                           "",
                           true,
                           "false",
                           ""
                       ],
                       [
                           "Account",
                           "The account name or names that are to be granted permissions along with the service accounts",
                           "",
                           true,
                           "false",
                           ""
                       ],
                       [
                           "Path",
                           "By default, the ACLs on the paths to the data, log and backup files will be modified\nIf you want to set permissions on a specific path, use this option\nNote that if your Backup directory is a UNC share, it will be skipped",
                           "",
                           false,
                           "false",
                           ""
                       ]
                   ],
        "Syntax": "Set-DbsAcl [-SqlInstance] \u003cDbaInstanceParameter[]\u003e [[-SqlCredential] \u003cPSCredential\u003e] [[-Credential] \u003cPSCredential\u003e] [-Owner] \u003cString\u003e [-Account] \u003cString[]\u003e [[-Path] \u003cString[]\u003e] [-EnableException] [-WhatIf] [-Confirm] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Set-DbsAuditLogin",
        "Description": "Sets \"Both failed and successful logins\"",
        "Tags": [
                     "V-79297",
                     "V-79287",
                     "V-79289"
                 ],
        "Synopsis": "Sets \"Both failed and successful logins\"",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Set-DbsAuditLogin",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eSet-DbsAuditLogin -SqlInstance sql2017, sql2016, sql2012\nSets \"Both failed and successful logins\" on sql2017, sql2016 and sql2012",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Set-DbsAuditLogin [-SqlInstance] \u003cDbaInstanceParameter[]\u003e [[-SqlCredential] \u003cPSCredential\u003e] [-EnableException] [-WhatIf] [-Confirm] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Set-DbsAuditMaintainer",
        "Description": "Create the audit maintainer role, sets the permissions for the role, and adds logins",
        "Tags": [
                     "V-79135",
                     "V-79143"
                 ],
        "Synopsis": "Create the audit maintainer role, sets the permissions for the role, and adds logins\n\nNOTE! This command revokes permz.",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Set-DbsAuditMaintainer",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eSet-DbsAuditMaintainer -SqlInstance sql2017, sql2016, sql2012 -Login \"AD\\SQL Admins\"\nSet permissions for the SERVER_AUDIT_MAINTAINERS role on sql2017, sql2016, sql2012 for user AD\\SQL Admins on Prod database.\n-------------------------- EXAMPLE 2 --------------------------\nPS C:\\\u003eSet-DbsAuditMaintainer -SqlInstance sql2017, sql2016, sql2012 -Role auditmaintainers -Login \"AD\\SQL Admins\"\nSet permissions for the auditmaintainers role on sql2017, sql2016, sql2012 for user AD\\SQL Admins on Prod database.",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ],
                       [
                           "Role",
                           "Name to be given the audit maintainer role",
                           "",
                           false,
                           "false",
                           "SERVER_AUDIT_MAINTAINERS"
                       ],
                       [
                           "Login",
                           "The login or logins that are to be granted permissions. This should be a Windows Group or you may violate another STIG",
                           "",
                           true,
                           "false",
                           ""
                       ],
                       [
                           "NoRevoke",
                           "Skips all revokes",
                           "",
                           false,
                           "false",
                           "False"
                       ]
                   ],
        "Syntax": "Set-DbsAuditMaintainer [-SqlInstance] \u003cDbaInstanceParameter[]\u003e [[-SqlCredential] \u003cPSCredential\u003e] [[-Role] \u003cString\u003e] [-Login] \u003cString[]\u003e [-NoRevoke] [-EnableException] [-WhatIf] [-Confirm] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Set-DbsAuditStartupState",
        "Description": "Sets startup state for compliance audit to ON",
        "Tags": "V-79141",
        "Synopsis": "Sets startup state for compliance audit to ON",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Set-DbsAuditStartupState",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eSet-DbsAuditStartupState -SqlInstance sql2017, sql2016, sql2012\nSets startup state for compliance audit to ON on sql2017, sql2016 and sql2012",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ],
                       [
                           "Audit",
                           "The name of the DISA Audit",
                           "",
                           false,
                           "false",
                           "(Get-PSFConfigValue -FullName dbadisa.app.auditname)"
                       ]
                   ],
        "Syntax": "Set-DbsAuditStartupState [-SqlInstance] \u003cDbaInstanceParameter[]\u003e [[-Audit] \u003cString[]\u003e] [[-SqlCredential] \u003cPSCredential\u003e] [-EnableException] [-WhatIf] [-Confirm] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Set-DbsConnectionLimit",
        "Description": "Sets the max number of UserConnection\n\n\"If a mechanism other than a logon trigger is used, verify its correct operation by the appropriate means.\"",
        "Tags": "V-79119",
        "Synopsis": "Sets the max number of UserConnections",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Set-DbsConnectionLimit",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eSet-DbsConnectionLimit -SqlInstance sql2017, sql2016, sql2012 -Value 5000\nSets the max number of connections to 5000\n-------------------------- EXAMPLE 2 --------------------------\nPS C:\\\u003eSet-DbsConnectionLimit -SqlInstance sql2017, sql2016, sql2012 -Value 5000 -WhatIf\nShows what would happen if the command would run",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ],
                       [
                           "Value",
                           "The max number of connections that can connect to the SQL Server",
                           "",
                           true,
                           "false",
                           "0"
                       ]
                   ],
        "Syntax": "Set-DbsConnectionLimit [-SqlInstance] \u003cDbaInstanceParameter[]\u003e [[-SqlCredential] \u003cPSCredential\u003e] [-Value] \u003cInt32\u003e [-EnableException] [-WhatIf] [-Confirm] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Set-DbsDbAuditMaintainer",
        "Description": "Creates the database audit maintainer role, sets the permissions for the role, adds logins and revokes permissions for other accounts",
        "Tags": "V-79073",
        "Synopsis": "Creates the database audit maintainer role, sets the permissions for the role, adds logins and revokes permissions for other accounts",
        "Alias": "",
        "Author": "Tracy Boggiano (@TracyBoggiano), databasesuperhero.com",
        "CommandName": "Set-DbsDbAuditMaintainer",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eSet-DbsDbAuditMaintainer -SqlInstance sql2017, sql2016, sql2012 -User \"AD\\SQL Admins\"\nSet permissions for the DATABASE_AUDIT_MAINTAINERS role on sql2017, sql2016, sql2012 for user AD\\SQL Admins on Prod database.\n-------------------------- EXAMPLE 2 --------------------------\nPS C:\\\u003eSet-DbsDbAuditMaintainer -SqlInstance sql2017, sql2016, sql2012 -Role auditmaintainers -User \"AD\\SQL Admins\"\nSet permissions for the auditmaintainers role on sql2017, sql2016, sql2012 for user AD\\SQL Admins on Prod database.",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ],
                       [
                           "Role",
                           "Name to be given the audit maintainer role",
                           "",
                           false,
                           "false",
                           "DATABASE_AUDIT_MAINTAINERS"
                       ],
                       [
                           "User",
                           "The login or logins that are to be granted permissions. This should be a Windows Group or you may violate another STIG",
                           "",
                           true,
                           "false",
                           ""
                       ],
                       [
                           "InputObject",
                           "Allows piping from Get-DbsDbAuditMaintainer",
                           "",
                           false,
                           "true (ByValue)",
                           ""
                       ],
                       [
                           "NoRevoke",
                           "Skips all revokes",
                           "",
                           false,
                           "false",
                           "False"
                       ]
                   ],
        "Syntax": "Set-DbsDbAuditMaintainer [-SqlInstance] \u003cDbaInstanceParameter[]\u003e [[-SqlCredential] \u003cPSCredential\u003e] [[-Role] \u003cString\u003e] [-User] \u003cString[]\u003e [[-InputObject] \u003cDatabase[]\u003e] [-NoRevoke] [-EnableException] [-WhatIf] [-Confirm] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Set-DbsDbFileSize",
        "Description": "Sets databases to a non-default growth and growth type. 64MB by default.",
        "Tags": "",
        "Synopsis": "Sets databases to a non-default growth and growth type. 64MB by default.",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Set-DbsDbFileSize",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eSet-DbsDbFileSize -SqlInstance sql2017, sql2016, sql2012\nSets all non-default sized database files on sql2017, sql2016, sql2012 to 64MB.\n-------------------------- EXAMPLE 2 --------------------------\nPS C:\\\u003eGet-DbaDatabase -SqlInstance sql2016 -Database test | Set-DbsDbFileSize -GrowthType GB -Growth 1\nSets the test database on sql2016 to a growth of 1GB\n-------------------------- EXAMPLE 3 --------------------------\nPS C:\\\u003eSet-DbsDbFileSize -SqlInstance sql2017, sql2016, sql2012 -WhatIf\nShows what would happen if the command were executed",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           false,
                           "true (ByValue)",
                           ""
                       ],
                       [
                           "GrowthType",
                           "The growth type, MB by default - valid values are MB, KB, GB or TB. MB by default",
                           "",
                           false,
                           "false",
                           "MB"
                       ],
                       [
                           "Growth",
                           "The growth value. 64 by default.",
                           "",
                           false,
                           "false",
                           "64"
                       ],
                       [
                           "InputObject",
                           "Allows piping from Get-DbaDatabase",
                           "",
                           false,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Set-DbsDbFileSize [[-SqlInstance] \u003cDbaInstanceParameter[]\u003e] [[-SqlCredential] \u003cPSCredential\u003e] [[-GrowthType] \u003cString\u003e] [[-Growth] \u003cInt32\u003e] [[-InputObject] \u003cDatabase[]\u003e] [-EnableException] [-WhatIf] [-Confirm] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Set-DbsDbRecoveryModel",
        "Description": "Sets all user databases to the FULL recovery model",
        "Tags": "V-79083",
        "Synopsis": "Sets all user databases to the FULL recovery model",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Set-DbsDbRecoveryModel",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eSet-DbsDbRecoveryModel -SqlInstance sql2017, sql2016, sql2012\nSets all user databases to the FULL recovery model on sql2017, sql2016, and sql2012",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           false,
                           "true (ByValue)",
                           ""
                       ],
                       [
                           "InputObject",
                           "Allows piping from Get-DbaDatabase",
                           "",
                           false,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Set-DbsDbRecoveryModel [[-SqlInstance] \u003cDbaInstanceParameter[]\u003e] [[-SqlCredential] \u003cPSCredential\u003e] [[-InputObject] \u003cDatabase[]\u003e] [-EnableException] [-WhatIf] [-Confirm] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Set-DbsDbSchemaOwner",
        "Description": "Sets a schema owner\n\nBasically performs ALTER AUTHORIZATION ON SCHEMA::[\u003cSchema Name\u003e] TO [\u003cPrincipal Name\u003e]",
        "Tags": "V-79077",
        "Synopsis": "Sets a schema owner",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Set-DbsDbSchemaOwner",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsDbSchema -SqlInstance sql2017, sql2016, sql2012 | Set-DbsDbSchemaOwner\nSets a schema owner for schemas per db on sql2017, sql2016, sql2012\n-------------------------- EXAMPLE 2 --------------------------\nPS C:\\\u003eGet-DbsDbSchema -SqlInstance sql2017, sql2016, sql2012 | Out-GridView -Passthru | Set-DbsDbSchemaOwner -Owner ad\\dbschemaowner -Confirm:$false\nSets a schema owner for _selected_ schemas on sql2017, sql2016, sql2012, does not prompt",
        "Params": [
                       [
                           "InputObject",
                           "Allows databases to be piped in from Get-DbsDbSchema",
                           "",
                           false,
                           "true (ByValue)",
                           ""
                       ],
                       [
                           "Owner",
                           "Sets the new owner",
                           "",
                           false,
                           "false",
                           ""
                       ]
                   ],
        "Syntax": "Set-DbsDbSchemaOwner [[-InputObject] \u003cPSObject[]\u003e] [[-Owner] \u003cString\u003e] [-EnableException] [-WhatIf] [-Confirm] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Set-DbsEndpointEncryption",
        "Description": "Sets non-compliant endpoint encryption algorithms for non-compliant endpoints",
        "Tags": [
                     "V-79323",
                     "V-79325"
                 ],
        "Synopsis": "Sets non-compliant endpoint encryption algorithms for non-compliant endpoints",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Set-DbsEndpointEncryption",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eGet-DbsEndpointEncryption -SqlInstance sql2017, sql2016, sql2012 | Set-DbsEndpointEncryption\nSets non-compliant endpoint encryption algorithms to AES on sql2017, sql2016 and sql2012\n-------------------------- EXAMPLE 2 --------------------------\nPS C:\\\u003eGet-DbsEndpointEncryption -SqlInstance sql2017, sql2016, sql2012 | Out-GridView -Passthru | Set-DbsEndpointEncryption\nSets selected non-compliant endpoint encryption algorithms to AES on sql2017, sql2016 and sql2012",
        "Params": [
                       [
                           "InputObject",
                           "Allows piping from Get-DbaEndpoint",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Set-DbsEndpointEncryption [-InputObject] \u003cEndpoint[]\u003e [-EnableException] [-WhatIf] [-Confirm] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Set-DbsLoginProperty",
        "Description": "Sets login properties, PasswordExpirationEnabled and PasswordPolicyEnforced, to true",
        "Tags": "V-79191",
        "Synopsis": "Sets login properties, PasswordExpirationEnabled and PasswordPolicyEnforced, to true",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Set-DbsLoginProperty",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eSet-DbsLoginProperty -SqlInstance sql2017, sql2016, sql2012\nOnly returns non-compliant login properties from sql2017, sql2016 and sql2012",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Set-DbsLoginProperty [-SqlInstance] \u003cDbaInstanceParameter[]\u003e [[-SqlCredential] \u003cPSCredential\u003e] [-EnableException] [-WhatIf] [-Confirm] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Set-DbsTraceFlag",
        "Description": "Sets trace flag 3625 to hide information from non-sysadmins in error messages",
        "Tags": [
                     "V-79097",
                     "V-79217"
                 ],
        "Synopsis": "Sets trace flag 3625",
        "Alias": "",
        "Author": "Tracy Boggiano (@TracyBoggiano), databasesuperhero.com",
        "CommandName": "Set-DbsTraceFlag",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eSet-DbsTraceFlag -SqlInstance sql2017, sql2016, sql2012\nSets the 3625 trace flag on sql2017, sql2016, and sql2012\n-------------------------- EXAMPLE 2 --------------------------\nPS C:\\\u003eSet-DbsTraceFlag -SqlInstance sql2017, sql2016, sql2012 -Confirm:$false\nSets the 3625 trace flag on sql2017, sql2016, and sql2012 without confirmation prompts",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Set-DbsTraceFlag [-SqlInstance] \u003cDbaInstanceParameter[]\u003e [[-Credential] \u003cPSCredential\u003e] [-EnableException] [-WhatIf] [-Confirm] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Start-DbsStig",
        "Description": "Stigs a server",
        "Synopsis": "Stigs a server",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Start-DbsStig",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eStart-DbsStig -SqlInstance sqlserver\\instance\nAll databases, logins, job objects and sp_configure options will be exported from\r\nsqlserver\\instance to an automatically generated folder name in Documents.\n-------------------------- EXAMPLE 2 --------------------------\nPS C:\\\u003e$params = @{\nSqlInstance = \"sql2017\"\r\n AclOwner = \"ad\\dba\"\r\n AclAccount = \"ad\\dba\"\r\n Exclude = \"DbSchemaOwner\", \"AuditMaintainer\"\r\n ConnectionLimit = 3000\r\n DbAuditMaintainer = \"ad\\auditors\"\r\n SchemaOwner = \"ad\\bob\"\r\n}\r\nPS C:\\\u003e Start-DbsStig @params -Confirm:$false\nStigs dat\n-------------------------- EXAMPLE 3 --------------------------\nPS C:\\\u003e$params = @{\nSqlInstance = \"sql2017\"\r\n AclOwner = \"ad\\dba\"\r\n AclAccount = \"ad\\dba\"\r\n Exclude = \"DbSchemaOwner\", \"AuditMaintainer\"\r\n ConnectionLimit = 3000\r\n DbAuditMaintainer = \"ad\\auditors\"\r\n SchemaOwner = \"ad\\bob\"\r\n}\r\nPS C:\\\u003e Start-DbsStig @params -Confirm:$false\nStigs dat",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ],
                       [
                           "Exclude",
                           "Exclude one or more exports. This is autopopulated so just tab whatever you\u0027d like",
                           "",
                           false,
                           "false",
                           ""
                       ],
                       [
                           "AclOwner",
                           "The account that will be set as the folder owner",
                           "",
                           false,
                           "false",
                           ""
                       ],
                       [
                           "AclAccount",
                           "The account name or names that are to be granted permissions along with the service accounts",
                           "",
                           false,
                           "false",
                           ""
                       ],
                       [
                           "AuditMaintainer",
                           "Set the owner for Set-DbsDbSchemaOwner, this can be dangeroo",
                           "",
                           false,
                           "false",
                           ""
                       ],
                       [
                           "DbAuditMaintainer",
                           "The login or logins that are to be granted permissions. This should be a Windows Group or you may violate another STI",
                           "",
                           false,
                           "false",
                           ""
                       ],
                       [
                           "SchemaOwner",
                           "Set the owner for Set-DbsDbSchemaOwner, this can be dangeroo",
                           "",
                           false,
                           "false",
                           ""
                       ],
                       [
                           "ConnectionLimit",
                           "The max number of connections that can connect to the SQL Server",
                           "",
                           false,
                           "false",
                           "0"
                       ]
                   ],
        "Syntax": "Start-DbsStig [-SqlInstance] \u003cDbaInstanceParameter[]\u003e [[-SqlCredential] \u003cPSCredential\u003e] [[-Credential] \u003cPSCredential\u003e] [[-Exclude] \u003cString[]\u003e] [[-AclOwner] \u003cString\u003e] [[-AclAccount] \u003cString[]\u003e] [[-AuditMaintainer] \u003cString[]\u003e] [[-DbAuditMaintainer] \u003cString[]\u003e] [[-SchemaOwner] \u003cString\u003e] [[-ConnectionLimit] \u003cInt32\u003e] [-EnableException] [-WhatIf] [-Confirm] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Test-DbsBuild",
        "Description": "Obtains evidence that software patches are consistently applied to SQL Server within the time frame defined for each patch",
        "Tags": "V-79249",
        "Synopsis": "Obtains evidence that software patches are consistently applied to SQL Server within the time frame defined for each patch",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Test-DbsBuild",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eTest-DbsBuild -SqlInstance sql2017, sql2016, sql2012\nObtains evidence that software patches are consistently applied to SQL Server within the time frame defined for each patch",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Test-DbsBuild [-SqlInstance] \u003cDbaInstanceParameter[]\u003e [[-SqlCredential] \u003cPSCredential\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Test-DbsDbInputValidity",
        "Description": "Tests a db to see if it\u0027s got contraints",
        "Tags": "V-79095",
        "Synopsis": "Tests a db to see if it\u0027s got contraints",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Test-DbsDbInputValidity",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eTest-DbsDbInputValidity -SqlInstance sql2017, sql2016, sql2012\nTests a db to see if it\u0027s got contraints on sql2017, sql2016 and sql2012",
        "Params": [
                       [
                           "SqlInstance",
                           "The target SQL Server instance or instances",
                           "",
                           false,
                           "true (ByValue)",
                           ""
                       ],
                       [
                           "InputObject",
                           "Allows databases to be piped in from Get-DbaDatabase",
                           "",
                           false,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Test-DbsDbInputValidity [[-SqlInstance] \u003cDbaInstanceParameter[]\u003e] [[-SqlCredential] \u003cPSCredential\u003e] [[-InputObject] \u003cDatabase[]\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Test-DbsDiskSpace",
        "Description": "Returns a list of non-compliant disks that fall below the threshold (25% by default)",
        "Tags": [
                     "V-79229",
                     "NonCompliantResults"
                 ],
        "Synopsis": "Returns a list of non-compliant disks that fall below the threshold (25% by default)",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Test-DbsDiskSpace",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eTest-DbsDiskSpace -ComputerName sql01\nReturns a list of non-compliant disks that fall below the threshold (25% by default)",
        "Params": [
                       [
                           "ComputerName",
                           "The target SQL Server",
                           "cn,host,Server",
                           false,
                           "true (ByValue)",
                           ""
                       ],
                       [
                           "InputObject",
                           "Allows piping from Get-DbaDiskSpace",
                           "",
                           false,
                           "true (ByValue)",
                           ""
                       ],
                       [
                           "Threshold",
                           "The minimum disk space free threshold",
                           "",
                           false,
                           "false",
                           "25"
                       ]
                   ],
        "Syntax": "Test-DbsDiskSpace [[-ComputerName] \u003cDbaInstanceParameter[]\u003e] [[-Credential] \u003cPSCredential\u003e] [[-InputObject] \u003cDiskSpace[]\u003e] [[-Threshold] \u003cInt32\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Test-DbsInstallPath",
        "Description": "Tests the installation path to ensure it is not part of the Windows directory or in an application folder",
        "Tags": "V-79169",
        "Synopsis": "Tests the installation path to ensure it is not part of the Windows directory or in an application folder",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Test-DbsInstallPath",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eTest-DbsInstallPath -ComputerName sql01\nTests the installation path for all instances on sql01 to ensure they are not part of the Windows directory or in an application folder",
        "Params": [
                       [
                           "ComputerName",
                           "The target SQL Server",
                           "cn,host,Server",
                           false,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Test-DbsInstallPath [[-ComputerName] \u003cDbaInstanceParameter[]\u003e] [[-Credential] \u003cPSCredential\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Test-DbsServiceAccount",
        "Description": "Tests all SQL Server related services on a server to ensure none have the same service account",
        "Tags": "V-79245",
        "Synopsis": "Tests all SQL Server related services on a server to ensure none have the same service account",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Test-DbsServiceAccount",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eTest-DbsServiceAccount -ComputerName sql01\nTests all SQL Server related services to ensure none have the same service account",
        "Params": [
                       [
                           "ComputerName",
                           "The target SQL Server",
                           "cn,host,Server",
                           false,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Test-DbsServiceAccount [[-ComputerName] \u003cDbaInstanceParameter[]\u003e] [[-Credential] \u003cPSCredential\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    },
    {
        "Name": "Test-DbsSpn",
        "Description": "Returns a list of instances that do not have an SPN",
        "Tags": "V-79123",
        "Synopsis": "Returns a list of instances that do not have an SPN",
        "Alias": "",
        "Author": "Chrissy LeMaire (@cl), netnerds.net",
        "CommandName": "Test-DbsSpn",
        "Availability": "Windows, Linux, macOS",
        "Links": null,
        "Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eTest-DbsSpn -ComputerName sql2016, sql2017, sql2012\nGets all instances that do not have an SPN from sql2016, sql2017 and sql2012",
        "Params": [
                       [
                           "ComputerName",
                           "The target server or instance",
                           "",
                           true,
                           "true (ByValue)",
                           ""
                       ]
                   ],
        "Syntax": "Test-DbsSpn [-ComputerName] \u003cDbaInstanceParameter[]\u003e [[-Credential] \u003cPSCredential\u003e] [-EnableException] [\u003cCommonParameters\u003e]"
    }
]