AzResourceGraphPS.psm1
Function AzAKSNodePoolInfo-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" resources | where type == "microsoft.containerservice/managedclusters" | extend pool = properties.agentPoolProfiles | project subscriptionId, name, pool | mv-expand pool | extend sku = pool.vmSize | extend poolcount = pool.['count'] | extend powerStateCode = pool.powerState.code | project subscriptionId, name, sku, poolcount, powerStateCode "@ $Description = "AKS cluster details" $Category = "Configuration" $Credit = "Ludovic Alarcon (@alarco_l)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzAppServiceDetailed-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" resources | where type has 'microsoft.web' or type =~ 'microsoft.apimanagement/service' or type =~ 'microsoft.network/frontdoors' or type =~ 'microsoft.network/applicationgateways' or type =~ 'microsoft.appconfiguration/configurationstores' | extend type = case( type == 'microsoft.web/serverfarms', "App Service Plans", kind == 'functionapp', "Azure Functions", kind == "api", "API Apps", type == 'microsoft.web/sites', "App Services", type =~ 'microsoft.network/applicationgateways', 'App Gateways', type =~ 'microsoft.network/frontdoors', 'Front Door', type =~ 'microsoft.apimanagement/service', 'API Management', type =~ 'microsoft.web/certificates', 'App Certificates', type =~ 'microsoft.appconfiguration/configurationstores', 'App Config Stores', strcat("Not Translated: ", type)) | where type !has "Not Translated" | extend Sku = case( type =~ 'App Gateways', properties.sku.name, type =~ 'Azure Functions', properties.sku, type =~ 'API Management', sku.name, type =~ 'App Service Plans', sku.name, type =~ 'App Services', properties.sku, type =~ 'App Config Stores', sku.name, ' ') | extend State = case( type =~ 'App Config Stores', properties.provisioningState, type =~ 'App Service Plans', properties.status, type =~ 'Azure Functions', properties.enabled, type =~ 'App Services', properties.state, type =~ 'API Management', properties.provisioningState, type =~ 'App Gateways', properties.provisioningState, type =~ 'Front Door', properties.provisioningState, ' ') | mv-expand publicIpId=properties.frontendIPConfigurations | mv-expand publicIpId = publicIpId.properties.publicIPAddress.id | extend publicIpId = tostring(publicIpId) | join kind=leftouter( Resources | where type =~ 'microsoft.network/publicipaddresses' | project publicIpId = id, publicIpAddress = tostring(properties.ipAddress)) on publicIpId | extend PublicIP = case( type =~ 'API Management', properties.publicIPAddresses, type =~ 'App Gateways', publicIpAddress, ' ') | extend Details = pack_all() | project Resource=id, type, subscriptionId, Sku, State, PublicIP, Details "@ $Description = "App service detailed" $Category = "Configuration" $Credit = "Billy York (@SCAutomation)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzAppServicesGapHttpsEnforcement-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" resources | where type =~'Microsoft.Web/Sites' | extend httpsOnly = properties.httpsOnly | where httpsOnly =~ 'false' | project AppService=['name'], Kind=['kind'], Subscription=['subscriptionId'] "@ $Description = "App service with missing https enforcement" $Category = "Configuration" $Credit = "Billy York (@SCAutomation)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzAppServicesPlanBasicInfo-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" resources | where type=~'Microsoft.Web/serverfarms' | extend NumberOfApps = properties.numberOfSites | extend sku = sku.name | project Name=['name'], sku, NumberOfApps, Location=['location'] "@ $Description = "App Service Plans Basic Information" $Category = "Configuration" $Credit = "Wesley Haakman (@whaakman)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzAppServicesPlanCount-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" resources | where type=~'Microsoft.Web/serverfarms' | extend skuName = sku.name | summarize total = count() by tostring(skuName) | project skuName, total "@ $Description = "Count of App services Plans" $Category = "Configuration" $Credit = "Morten Knudsen (@knudsenmortendk)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzAppServicesPlansCountByWebApps-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" resources | where type=~'Microsoft.Web/serverfarms' | extend NumberOfApps = properties.numberOfSites | project Name=['name'], NumberOfApps, Location=['location'] "@ $Description = "App services plans count of Web apps" $Category = "Configuration" $Credit = "Wesley Haakman (@whaakman)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzAppServicesStopped-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" resources | where type=~'Microsoft.Web/Sites' | extend state = properties.state | where state =~ 'stopped' | project AppService=['name'], Kind=['kind'], State=['state'], Subscription=['subscriptionId'] "@ $Description = "Stopped App Services" $Category = "Availability" $Credit = "Wesley Haakman (@whaakman)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzAppServiceSummaryCount-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" resources | where type has 'microsoft.web' or type =~ 'microsoft.apimanagement/service' or type =~ 'microsoft.network/frontdoors' or type =~ 'microsoft.network/applicationgateways' or type =~ 'microsoft.appconfiguration/configurationstores' | extend type = case( type == 'microsoft.web/serverfarms', "App Service Plans", kind == 'functionapp', "Azure Functions", kind == "api", "API Apps", type == 'microsoft.web/sites', "App Services", type =~ 'microsoft.network/applicationgateways', 'App Gateways', type =~ 'microsoft.network/frontdoors', 'Front Door', type =~ 'microsoft.apimanagement/service', 'API Management', type =~ 'microsoft.web/certificates', 'App Certificates', type =~ 'microsoft.appconfiguration/configurationstores', 'App Config Stores', strcat("Not Translated: ", type)) | where type !has "Not Translated" | summarize count() by type "@ $Description = "Summary Count by type of App Service" $Category = "Configuration" $Credit = "Billy York (@SCAutomation)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzAutomationLogicDetailed-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" resources | where type has 'microsoft.automation' or type has 'microsoft.logic' or type has 'microsoft.web/customapis' | extend type = case( type =~ 'microsoft.automation/automationaccounts', 'Automation Accounts', type =~ 'microsoft.web/connections', 'LogicApp Connectors', type =~ 'microsoft.web/customapis','LogicApp API Connectors', type =~ 'microsoft.logic/workflows','LogicApps', type =~ 'microsoft.automation/automationaccounts/runbooks', 'Automation Runbooks', type =~ 'microsoft.automation/automationaccounts/configurations', 'Automation Configurations', strcat("Not Translated: ", type)) | extend RunbookType = tostring(properties.runbookType) | extend LogicAppTrigger = properties.definition.triggers | extend LogicAppTrigger = iif(type =~ 'LogicApps', case( LogicAppTrigger has 'manual', tostring(LogicAppTrigger.manual.type), LogicAppTrigger has 'Recurrence', tostring(LogicAppTrigger.Recurrence.type), strcat("Unknown Trigger type", LogicAppTrigger)), LogicAppTrigger) | extend State = case( type =~ 'Automation Runbooks', properties.state, type =~ 'LogicApps', properties.state, type =~ 'Automation Accounts', properties.state, type =~ 'Automation Configurations', properties.state, ' ') | extend CreatedDate = case( type =~ 'Automation Runbooks', properties.creationTime, type =~ 'LogicApps', properties.createdTime, type =~ 'Automation Accounts', properties.creationTime, type =~ 'Automation Configurations', properties.creationTime, ' ') | extend LastModified = case( type =~ 'Automation Runbooks', properties.lastModifiedTime, type =~ 'LogicApps', properties.changedTime, type =~ 'Automation Accounts', properties.lastModifiedTime, type =~ 'Automation Configurations', properties.lastModifiedTime, ' ') | extend Details = pack_all() | project Resource=id, subscriptionId, type, resourceGroup, RunbookType, LogicAppTrigger, State, Details "@ $Description = "Detailed view of Automation resources" $Category = "Configuration" $Credit = "Billy York (@SCAutomation)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzAutomationLogicSummaryCount-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" resources | where type has 'microsoft.automation' or type has 'microsoft.logic' or type has 'microsoft.web/customapis' | extend type = case( type =~ 'microsoft.automation/automationaccounts', 'Automation Accounts', type == 'microsoft.web/serverfarms', "App Service Plans", kind == 'functionapp', "Azure Functions", kind == "api", "API Apps", type == 'microsoft.web/sites', "App Services", type =~ 'microsoft.web/connections', 'LogicApp Connectors', type =~ 'microsoft.web/customapis','LogicApp API Connectors', type =~ 'microsoft.logic/workflows','LogicApps', type =~ 'microsoft.automation/automationaccounts/runbooks', 'Automation Runbooks', type =~ 'microsoft.automation/automationaccounts/configurations', 'Automation Configurations', strcat("Not Translated: ", type)) | summarize count() by type | where type !has "Not Translated" "@ $Description = "Summary count of Resources" $Category = "Configuration" $Credit = "Billy York (@SCAutomation)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzAvailabilitySets-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" resources | where type == 'microsoft.compute/availabilitysets' "@ $Description = "Availability Set details" $Category = "Configuration" $Credit = "Morten Knudsen (@knudsenmortendk)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzBackupRecoveryServicesJobs-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" recoveryservicesresources | where type == 'microsoft.recoveryservices/vaults/backupjobs' "@ $Description = "Backup Recovery Jobs" $Category = "Configuration" $Credit = "Morten Knudsen (@knudsenmortendk)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzBackupRecoveryServicesProtectionItems-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" recoveryservicesresources | where type == 'microsoft.recoveryservices/vaults/backupfabrics/protectioncontainers/protecteditems' "@ $Description = "Backup Recovery Protected Items" $Category = "Configuration" $Credit = "Morten Knudsen (@knudsenmortendk)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzBackupRecoveryServicesVaults-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" resources | where type == 'microsoft.recoveryservices/vaults' "@ $Description = "Backup Recovery Vaults" $Category = "Configuration" $Credit = "Morten Knudsen (@knudsenmortendk)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzBackupUnprotectedAzBlobStorage-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" Resources | where type in~ ('microsoft.storage/storageAccounts') | extend armResourceId = id | where properties.isHnsEnabled != true | where properties.isNfsV3Enabled != true | where kind =~ 'StorageV2' and isnotnull(sku) and sku.tier =~ 'Standard' | extend resourceId=tolower(armResourceId) | extend extendedLocationName=extendedLocation.name | join kind = leftouter ( RecoveryServicesResources | where type in~ ("microsoft.dataprotection/backupvaults/backupinstances", "microsoft.dataprotection/backupvaults/deletedbackupinstances") | where properties.dataSourceInfo.datasourceType == "Microsoft.Storage/storageAccounts/blobServices" | project resourceId = tolower(tostring(properties.dataSourceInfo.resourceID)), backupItemid = id, isBackedUp = isnotempty(id) ) on resourceId | extend isProtected = isnotempty(backupItemid) | where (isProtected == (0)) "@ $Description = "Azure Backup - Azure Blob Storage not configured for backup" $Category = "Backup" $Credit = "Microsoft" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzBackupUnprotectedAzDisks-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" Resources | where type in~ ('microsoft.compute/disks') | extend armResourceId = id | extend resourceId=tolower(armResourceId) | extend extendedLocationName=extendedLocation.name | join kind = leftouter ( RecoveryServicesResources | where type in~ ("microsoft.dataprotection/backupvaults/backupinstances", "microsoft.dataprotection/backupvaults/deletedbackupinstances") | where properties.dataSourceInfo.datasourceType == "Microsoft.Compute/disks" | project resourceId = tolower(tostring(properties.dataSourceInfo.resourceID)), backupItemid = id, isBackedUp = isnotempty(id) ) on resourceId | extend isProtected = isnotempty(backupItemid) | where (isProtected == (0)) "@ $Description = "Azure Backup - Azure Disks not configured for backup" $Category = "Backup" $Credit = "Microsoft" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzBackupUnprotectedAzFilesShare-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" Resources | where type in~ ('microsoft.storage/storageAccounts','microsoft.ClassicStorage/storageAccounts') | extend armResourceId = id | where kind !in~ ('blobstorage', 'blockblobstorage') | extend isValid = case( type =~ 'microsoft.ClassicStorage/storageAccounts', true, type =~ 'microsoft.storage/storageAccounts', ( sku.tier == 'Standard' or kind == 'FileStorage'), true) | where isValid == true | extend resourceId=tolower(armResourceId) | join kind = leftouter ( RecoveryServicesResources | where type == "microsoft.recoveryservices/vaults/backupfabrics/protectioncontainers/protecteditems" | where properties.backupManagementType == "AzureStorage" | where properties.workloadType in~ ("AzureFileShare") | project resourceId = tolower(tostring(properties.sourceResourceId)), backupItemid = id, isBackedUp = isnotempty(id) ) on resourceId | summarize backupInstancesCountByServer = count(isBackedUp) by resourceId, id, name, resourceGroup, location, tostring(tags) | where backupInstancesCountByServer == 0 "@ $Description = "Azure Backup - Storage accounts with no Azure Fileshares configured for backup" $Category = "Backup" $Credit = "Microsoft" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzBackupUnprotectedAzNativeVMs-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" Resources | where type in~ ('microsoft.compute/virtualmachines','microsoft.classiccompute/virtualmachines') | extend armResourceId = id | extend resourceId=tolower(armResourceId) | join kind = leftouter ( RecoveryServicesResources | where type == "microsoft.recoveryservices/vaults/backupfabrics/protectioncontainers/protecteditems" | where properties.backupManagementType == "AzureIaasVM" | where properties.workloadType in~ ("VM") | project resourceId = tolower(tostring(properties.sourceResourceId)), backupItemid = id, isBackedUp = isnotempty(id) ) on resourceId | extend isProtected = isnotempty(backupItemid) | where (isProtected == (0)) "@ $Description = "Azure Backup - Unprotected Azure Native VMs" $Category = "Backup" $Credit = "Microsoft" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzBackupUnprotectedKubernetesClusters-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" Resources | where type in~ ('Microsoft.ContainerService/managedClusters') | extend armResourceId = id | extend resourceId=tolower(armResourceId) | extend extendedLocationName=extendedLocation.name | join kind = leftouter ( RecoveryServicesResources | where type in~ ("microsoft.dataprotection/backupvaults/backupinstances", "microsoft.dataprotection/backupvaults/deletedbackupinstances") | where properties.dataSourceInfo.datasourceType == "Microsoft.ContainerService/managedClusters" | project resourceId = tolower(tostring(properties.dataSourceSetInfo.resourceID)), backupItemid = id, isBackedUp = isnotempty(id) ) on resourceId | summarize backupInstancesCountByServer = count(isBackedUp) by resourceId, id, name, resourceGroup, location, tostring(tags) | where backupInstancesCountByServer == 0 "@ $Description = "Azure Backup - Managed Kubernetes Clusters with no resources configured for backup" $Category = "Backup" $Credit = "Microsoft" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzBackupUnprotectedPostgreSQLDB-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" Resources | where type in~ ('microsoft.dbforpostgresql/servers') | extend armResourceId = id | extend resourceId=tolower(armResourceId) | extend extendedLocationName=extendedLocation.name | join kind = leftouter ( RecoveryServicesResources | where type in~ ("microsoft.dataprotection/backupvaults/backupinstances", "microsoft.dataprotection/backupvaults/deletedbackupinstances") | where properties.dataSourceInfo.datasourceType == "Microsoft.DBforPostgreSQL/servers/databases" | project resourceId = tolower(tostring(properties.dataSourceSetInfo.resourceID)), backupItemid = id, isBackedUp = isnotempty(id) ) on resourceId | summarize backupInstancesCountByServer = count(isBackedUp) by resourceId, id, name, resourceGroup, location, tostring(tags) | where backupInstancesCountByServer == 0 "@ $Description = "Azure Backup - Azure Database for PostgreSQL servers with no databases configured for backup" $Category = "Backup" $Credit = "Microsoft" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzBackupUnprotectedSAPHanainAzNativeVMs-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" Resources | where type in~ ('microsoft.compute/virtualmachines','microsoft.classiccompute/virtualmachines') | extend armResourceId = id | where properties.storageProfile.imageReference.offer contains("sap") or properties.storageProfile.imageReference.offer contains("hana") or properties.storageProfile.imageReference.publisher contains("sap") or properties.storageProfile.imageReference.publisher contains("hana") | extend resourceId=tolower(armResourceId) | join kind = leftouter ( RecoveryServicesResources | where type == "microsoft.recoveryservices/vaults/backupfabrics/protectioncontainers/protecteditems" | where properties.backupManagementType == "AzureWorkload" | where properties.workloadType in~ ("SAPHanaDatabase","SAPHanaDBInstance") | project resourceId = tolower(tostring(properties.sourceResourceId)), backupItemid = id, isBackedUp = isnotempty(id) ) on resourceId | extend isProtected = isnotempty(backupItemid) | where (isProtected == (0)) "@ $Description = "Azure Backup - Azure VMs with no HANA databases or DBInstances configured for backup" $Category = "Backup" $Credit = "Microsoft" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzBackupUnprotectedSQLinAzNativeVMs-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" Resources | where type in~ ('microsoft.compute/virtualmachines','microsoft.classiccompute/virtualmachines','microsoft.compute/virtualmachines/extensions') | extend armResourceId = id | where name =~ 'SqlIaasExtension' | where properties.type == 'SqlIaaSAgent' | extend armResourceId = split(armResourceId,'/extensions/')[0] | extend name = split(armResourceId, '/virtualMachines/')[1] | extend resourceId=tolower(armResourceId) | join kind = leftouter ( RecoveryServicesResources | where type == "microsoft.recoveryservices/vaults/backupfabrics/protectioncontainers/protecteditems" | where properties.backupManagementType == "AzureWorkload" | where properties.workloadType in~ ("SQLDataBase") | project resourceId = tolower(tostring(properties.sourceResourceId)), backupItemid = id, isBackedUp = isnotempty(id) ) on resourceId | extend isProtected = isnotempty(backupItemid) | where (isProtected == (0)) "@ $Description = "Azure Backup - Unprotected SQL Servers in Azure Native VMs" $Category = "Backup" $Credit = "Microsoft" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzCosmosDB-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" Resources | where type =~ 'microsoft.documentdb/databaseaccounts' | project id, name, writeLocations = (properties.writeLocations) | mv-expand writeLocations | project id, name, writeLocation = tostring(writeLocations.locationName) "@ $Description = "List Azure Cosmos DB" $Category = "Configuration" $Credit = "Microsoft" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzDataServices-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" resources | where type =~ 'microsoft.documentdb/databaseaccounts' or type =~ 'microsoft.sql/servers/databases' or type =~ 'microsoft.dbformysql/servers' or type =~ 'microsoft.sql/servers' | extend type = case( type =~ 'microsoft.documentdb/databaseaccounts', 'CosmosDB', type =~ 'microsoft.sql/servers/databases', 'SQL DBs', type =~ 'microsoft.dbformysql/servers', 'MySQL', type =~ 'microsoft.sql/servers', 'SQL Servers', strcat("Not Translated: ", type)) | extend Sku = case( type =~ 'CosmosDB', properties.databaseAccountOfferType, type =~ 'SQL DBs', sku.name, type =~ 'MySQL', sku.name, ' ') | extend Status = case( type =~ 'CosmosDB', properties.provisioningState, type =~ 'SQL DBs', properties.status, type =~ 'MySQL', properties.userVisibleState, ' ') | extend Endpoint = case( type =~ 'MySQL', properties.fullyQualifiedDomainName, type =~ 'SQL Servers', properties.fullyQualifiedDomainName, type =~ 'CosmosDB', properties.documentEndpoint, ' ') | extend maxSizeGB = todouble(case( type =~ 'SQL DBs', properties.maxSizeBytes, type =~ 'MySQL', properties.storageProfile.storageMB, ' ')) | extend maxSizeGB = iif(type has 'SQL DBs', maxSizeGB /1000 /1000, maxSizeGB) | extend Details = pack_all() | project Resource=id, resourceGroup, subscriptionId, type, Sku, Status, Endpoint, maxSizeGB, Details "@ $Description = "Count of data services" $Category = "Configuration" $Credit = "Billy York (@SCAutomation)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzDefenderForCloudDevicesWithoutTVM-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" securityresources | where type == 'microsoft.security/assessments' | where name contains 'ffff0522-1e88-47fc-8382-2a80ba848f5d' "@ $Description = "Defender for Cloud - Devices without TVM" $Category = "Security" $Credit = "Morten Knudsen (@knudsenmortendk)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzDefenderForCloudPlans-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" securityresources | where type == 'microsoft.security/pricings' | project DefenderPlan=name | distinct DefenderPlan | order by DefenderPlan asc "@ $Description = "Defender for Cloud Plans" $Category = "Security" $Credit = "Morten Knudsen (@knudsenmortendk)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzDefenderForCloudPlansStatus-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" securityresources | where type == 'microsoft.security/pricings' | extend tier = properties.pricingTier | project DefenderPlan=name,subscriptionId,Pricing=properties.pricingTier | order by DefenderPlan asc "@ $Description = "Defender for Cloud Plans status" $Category = "Security" $Credit = "Morten Knudsen (@knudsenmortendk)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzDefenderForCloudRecommendationsSubAssessmentsWithDetailedInfo-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" SecurityResources | where type == 'microsoft.security/assessments/subassessments' | extend AssessmentKey = extract('.*assessments/(.+?)/.*',1, id) | project AssessmentKey, subassessmentKey=name, id, parse_json(properties), resourceGroup, subscriptionId, tenantId | extend SubAssessDescription = properties.description, SubAssessDisplayName = properties.displayName, SubAssessResourceId = properties.resourceDetails.id, SubAssessResourceSource = properties.resourceDetails.source, SubAssessCategory = properties.category, SubAssessSeverity = properties.status.severity, SubAssessCode = properties.status.code, SubAssessTimeGenerated = properties.timeGenerated, SubAssessRemediation = properties.remediation, SubAssessImpact = properties.impact, SubAssessVulnId = properties.id, SubAssessMoreInfo = properties.additionalData, SubAssessMoreInfoAssessedResourceType = properties.additionalData.assessedResourceType, SubAssessMoreInfoData = properties.additionalData.data | join kind=leftouter (resourcecontainers | where type=='microsoft.resources/subscriptions' | project SubName=name, subscriptionId) on subscriptionId " "@ $Description = "Defender for Cloud Recommendations with Sub assessment (detailed info)" $Category = "Configuration" $Credit = "Morten Knudsen (@knudsenmortendk)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzDefenderForCloudRecommendationsWithLink-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" SecurityResources | where type == 'microsoft.security/assessments' | mvexpand Category=properties.metadata.categories | extend AssessmentId=id, AssessmentKey=name, ResourceId=properties.resourceDetails.Id, ResourceIdsplit = split(properties.resourceDetails.Id,'/'), RecommendationId=name, RecommendationName=properties.displayName, Source=properties.resourceDetails.Source, RecommendationState=properties.status.code, ActionDescription=properties.metadata.description, AssessmentType=properties.metadata.assessmentType, RemediationDescription=properties.metadata.remediationDescription, PolicyDefinitionId=properties.metadata.policyDefinitionId, ImplementationEffort=properties.metadata.implementationEffort, RecommendationSeverity=properties.metadata.severity, Threats=properties.metadata.threats, UserImpact=properties.metadata.userImpact, AzPortalLink=properties.links.azurePortal, MoreInfo=properties | extend ResourceSubId = tostring(ResourceIdsplit[(2)]), ResourceRgName = tostring(ResourceIdsplit[(4)]), ResourceType = tostring(ResourceIdsplit[(6)]), ResourceName = tostring(ResourceIdsplit[(8)]), FirstEvaluationDate = MoreInfo.status.firstEvaluationDate, StatusChangeDate = MoreInfo.status.statusChangeDate, Status = MoreInfo.status.code | join kind=leftouter (resourcecontainers | where type=='microsoft.resources/subscriptions' | project SubName=name, subscriptionId) on subscriptionId | where AssessmentType == 'BuiltIn' | project-away kind,managedBy,sku,plan,tags,identity,zones,location,ResourceIdsplit,id,name,type,resourceGroup,subscriptionId, extendedLocation,subscriptionId1 | project SubName, ResourceSubId, ResourceRgName,ResourceType,ResourceName,TenantId=tenantId, RecommendationName, RecommendationId, RecommendationState, RecommendationSeverity, AssessmentType, PolicyDefinitionId, ImplementationEffort, UserImpact, Category, Threats, Source, ActionDescription, RemediationDescription, MoreInfo, ResourceId, AzPortalLink, AssessmentKey | where RecommendationState == 'Unhealthy' "@ $Description = "Defender for Cloud Recommendations with link" $Category = "Configuration" $Credit = "Morten Knudsen (@knudsenmortendk)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzDefenderForCloudRecommendationsWithSubAssessments-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" SecurityResources | where type == 'microsoft.security/assessments' | mvexpand Category=properties.metadata.categories | extend AssessmentId=id, AssessmentKey=name, ResourceId=properties.resourceDetails.Id, ResourceIdsplit = split(properties.resourceDetails.Id,'/'), RecommendationId=name, RecommendationName=properties.displayName, Source=properties.resourceDetails.Source, RecommendationState=properties.status.code, ActionDescription=properties.metadata.description, AssessmentType=properties.metadata.assessmentType, RemediationDescription=properties.metadata.remediationDescription, PolicyDefinitionId=properties.metadata.policyDefinitionId, ImplementationEffort=properties.metadata.implementationEffort, RecommendationSeverity=properties.metadata.severity, Threats=properties.metadata.threats, UserImpact=properties.metadata.userImpact, AzPortalLink=properties.links.azurePortal, MoreInfo=properties | extend ResourceSubId = tostring(ResourceIdsplit[(2)]), ResourceRgName = tostring(ResourceIdsplit[(4)]), ResourceType = tostring(ResourceIdsplit[(6)]), ResourceName = tostring(ResourceIdsplit[(8)]), FirstEvaluationDate = MoreInfo.status.firstEvaluationDate, StatusChangeDate = MoreInfo.status.statusChangeDate, Status = MoreInfo.status.code | join kind=leftouter (resourcecontainers | where type=='microsoft.resources/subscriptions' | project SubName=name, subscriptionId) on subscriptionId | where AssessmentType == 'BuiltIn' | project-away kind,managedBy,sku,plan,tags,identity,zones,location,ResourceIdsplit,id,name,type,resourceGroup,subscriptionId, extendedLocation,subscriptionId1 | project SubName, ResourceSubId, ResourceRgName,ResourceType,ResourceName,TenantId=tenantId, RecommendationName, RecommendationId, RecommendationState, RecommendationSeverity, AssessmentType, PolicyDefinitionId, ImplementationEffort, UserImpact, Category, Threats, Source, ActionDescription, RemediationDescription, MoreInfo, ResourceId, AzPortalLink, AssessmentKey | where RecommendationState == 'Unhealthy' | join kind=leftouter ( securityresources | where type == 'microsoft.security/assessments/subassessments' | extend AssessmentKey = extract('.*assessments/(.+?)/.*',1, id) | project AssessmentKey, subassessmentKey=name, id, parse_json(properties), resourceGroup, subscriptionId, tenantId | extend SubAssessmentSescription = properties.description, SubAssessmentDisplayName = properties.displayName, SubAssessmentResourceId = properties.resourceDetails.id, SubAssessmentResourceSource = properties.resourceDetails.source, SubAssessmentCategory = properties.category, SubAssessmentSeverity = properties.status.severity, SubAssessmentCode = properties.status.code, SubAssessmentTimeGenerated = properties.timeGenerated, SubAssessmentRemediation = properties.remediation, SubAssessmentImpact = properties.impact, SubAssessmentVulnId = properties.id, SubAssessmentMoreInfo = properties.additionalData, SubAssessmentMoreInfoAssessedResourceType = properties.additionalData.assessedResourceType, SubAssessmentMoreInfoData = properties.additionalData.data ) on AssessmentKey "@ $Description = "Defender for Cloud Recommendations with Sub assessment" $Category = "Security" $Credit = "Morten Knudsen (@knudsenmortendk)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzDisksIllogicalSizes-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" resources | where type == 'microsoft.compute/disks' | where properties.diskSizeGB > 128 or properties.diskSizeGB < 126 | where properties.diskSizeGB > 256 or properties.diskSizeGB < 250 | where properties.diskSizeGB > 512 or properties.diskSizeGB < 490 | where properties.diskSizeGB > 1024 or properties.diskSizeGB < 1000 | where properties.diskSizeGB > 2048 or properties.diskSizeGB < 2030 | where properties.diskSizeGB > 4096 or properties.diskSizeGB < 4090 | project Name=name, Size=properties.diskSizeGB, ResourceGroup=resourceGroup, Subscription=subscriptionId "@ $Description = "Disks with illogical sizes" $Category = "Configuration" $Credit = "Wesley Haakman (@whaakman)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzEventResourcesDetailed-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" resources | where type has 'microsoft.servicebus' or type has 'microsoft.eventhub' or type has 'microsoft.eventgrid' or type has 'microsoft.relay' | extend type = case( type == 'microsoft.eventgrid/systemtopics', "EventGrid System Topics", type =~ "microsoft.eventgrid/topics", "EventGrid Topics", type =~ 'microsoft.eventhub/namespaces', "EventHub Namespaces", type =~ 'microsoft.servicebus/namespaces', 'ServiceBus Namespaces', type =~ 'microsoft.relay/namespaces', 'Relays', strcat("Not Translated: ", type)) | extend Sku = case( type =~ 'Relays', sku.name, type =~ 'EventGrid System Topics', properties.sku, type =~ 'EventGrid Topics', sku.name, type =~ 'EventHub Namespaces', sku.name, type =~ 'ServiceBus Namespaces', sku.sku, ' ') | extend Endpoint = case( type =~ 'Relays', properties.serviceBusEndpoint, type =~ 'EventGrid Topics', properties.endpoint, type =~ 'EventHub Namespaces', properties.serviceBusEndpoint, type =~ 'ServiceBus Namespaces', properties.serviceBusEndpoint, ' ') | extend Status = case( type =~ 'Relays', properties.provisioningState, type =~ 'EventGrid System Topics', properties.provisioningState, type =~ 'EventGrid Topics', properties.publicNetworkAccess, type =~ 'EventHub Namespaces', properties.status, type =~ 'ServiceBus Namespaces', properties.status, ' ') | extend Details = pack_all() | project Resource=id, subscriptionId, resourceGroup, Sku, Status, Endpoint, Details "@ $Description = "Event services (list)" $Category = "Configuration" $Credit = "Billy York (@SCAutomation)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzEventResourcesSummaryCount-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" resources | where type has 'microsoft.servicebus' or type has 'microsoft.eventhub' or type has 'microsoft.eventgrid' or type has 'microsoft.relay' | extend type = case( type == 'microsoft.eventgrid/systemtopics', "EventGrid System Topics", type =~ "microsoft.eventgrid/topics", "EventGrid Topics", type =~ 'microsoft.eventhub/namespaces', "EventHub Namespaces", type =~ 'microsoft.servicebus/namespaces', 'ServiceBus Namespaces', type =~ 'microsoft.relay/namespaces', 'Relays', strcat("Not Translated: ", type)) | where type !has "Not Translated" | summarize count() by type "@ $Description = "Count of Event services" $Category = "Configuration" $Credit = "Billy York (@SCAutomation)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzExtensionStatus-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" Resources | where (type == 'microsoft.compute/virtualmachines') or (type == 'microsoft.hybridcompute/machines') | extend JoinID = toupper(id) | join kind=leftouter( Resources | where (type == 'microsoft.compute/virtualmachines/extensions') or (type == 'microsoft.hybridcompute/machines/extensions') | extend VMId = toupper(substring(id, 0, indexof(id, '/extensions'))) | extend ExtName = name | extend ExtprovisioningState = properties.provisioningState | extend ExtType = properties.type | extend ExtAutoUpgradeMinorVersion = properties.autoUpgradeMinorVersion | extend ExtTypeHandlerVersion = properties.typeHandlerVersion | extend ExtPublisher = properties.publisher | extend ExtSettings = properties.settings | extend ExtStatus = properties.instanceView | extend ExtStatusMessage = properties.instanceView.status.message ) on `$left.JoinID == `$right.VMId "@ $Description = "Extension status" $Category = "Configuration" $Credit = "Morten Knudsen (@knudsenmortendk)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzFrontdoorRoutingRulesAcceptedPorts-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" resources | where type == "microsoft.network/frontdoors" | project subscriptionId, frontDoorName=name, routingRules = (properties.routingRules) | mv-expand routingRules | project subscriptionId, frontDoorName, routingRuleName=routingRules.name, protocols = routingRules.properties.acceptedProtocols "@ $Description = "Frontdoor Routing rules with accepted ports" $Category = "Configuration" $Credit = "Wilfried Woivre (@wilfriedwoivre)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzHybridMachines-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" resources | where type == 'microsoft.hybridcompute/machines' "@ $Description = "Hybrid machines" $Category = "Governance" $Credit = "Morten Knudsen (@knudsenmortendk)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzHybridMachinesWithTags-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" resources | where type == 'microsoft.hybridcompute/machines' | project id,name,type,location,resourceGroup,subscriptionId,tags,domain=tostring(properties.domainName) | mvexpand tags | extend tagKey = tostring(bag_keys(tags)[0]) | extend tagValue = tostring(tags[tagKey]) "@ $Description = "Hybrid machines with tagKey and tagValue" $Category = "Governance" $Credit = "Morten Knudsen (@knudsenmortendk)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzIPAddressAzNativeVMs-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" Resources | where type =~ 'microsoft.compute/virtualmachines' | project id, vmId = tolower(tostring(id)), vmName = name | join (Resources | where type =~ 'microsoft.network/networkinterfaces' | mv-expand ipconfig=properties.ipConfigurations | project vmId = tolower(tostring(properties.virtualMachine.id)), privateIp = ipconfig.properties.privateIPAddress, publicIpId = tostring(ipconfig.properties.publicIPAddress.id) | join kind=leftouter (Resources | where type =~ 'microsoft.network/publicipaddresses' | project publicIpId = id, publicIp = properties.ipAddress ) on publicIpId | project-away publicIpId, publicIpId1 | summarize privateIps = make_list(privateIp), publicIps = make_list(publicIp) by vmId ) on vmId | project-away vmId, vmId1 | sort by vmName asc "@ $Description = "IP addresses in native VMs" $Category = "Configuration" $Credit = "Microsoft" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzMGs-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" resourcecontainers | where type == 'microsoft.management/managementgroups' "@ $Description = "MGs" $Category = "Configuration" $Credit = "Morten Knudsen (@knudsenmortendk)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzMGsWithParentHierarchy-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" resourcecontainers | where type == 'microsoft.management/managementgroups' | extend mgParent = properties.details.managementGroupAncestorsChain | mv-expand with_itemindex=MGHierarchy mgParent | project id, name, properties.displayName, mgParent, MGHierarchy, mgParent.name | sort by MGHierarchy asc "@ $Description = "MGs with Parent (hierarchy)" $Category = "Configuration" $Credit = "Morten Knudsen (@knudsenmortendk)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzMonAlertsActive-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" AlertsManagementResources | extend AlertStatus = properties.essentials.monitorCondition | extend AlertState = properties.essentials.alertState | extend AlertTime = properties.essentials.startDateTime | extend AlertSuppressed = properties.essentials.actionStatus.isSuppressed | extend Severity = properties.essentials.severity | where AlertStatus == 'Fired' | extend Details = pack_all() | project id, name, subscriptionId, resourceGroup, AlertStatus, AlertState, AlertTime, AlertSuppressed, Severity, Details "@ $Description = "Active alerts in Azure Monitor" $Category = "Configuration" $Credit = "Billy York (@SCAutomation)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzMonAlertsActiveLastDay-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" alertsmanagementresources | where properties.essentials.lastModifiedDateTime > ago(1d) | project alertInstanceId = id, parentRuleId = tolower(tostring(properties['essentials']['alertRule'])), sourceId = properties['essentials']['sourceCreatedId'], alertName = name, severity = properties.essentials.severity, status = properties.essentials.monitorCondition, state = properties.essentials.alertState, affectedResource = properties.essentials.targetResourceName, monitorService = properties.essentials.monitorService, signalType = properties.essentials.signalType, firedTime = properties['essentials']['startDateTime'], lastModifiedDate = properties.essentials.lastModifiedDateTime, lastModifiedBy = properties.essentials.lastModifiedUserName "@ $Description = "Active alerts last day in Azure Monitor" $Category = "Monitoring" $Credit = "Microsoft" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzMonAlertsWithResourceTags-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" alertsmanagementresources | where tostring(properties.essentials.monitorService) <> "ActivityLog Administrative" | project // converting extracted fields to string / datetime to allow grouping alertId = id, name, monitorCondition = tostring(properties.essentials.monitorCondition), severity = tostring(properties.essentials.severity), monitorService = tostring(properties.essentials.monitorService), alertState = tostring(properties.essentials.alertState), targetResourceType = tostring(properties.essentials.targetResourceType), targetResource = tostring(properties.essentials.targetResource), subscriptionId, startDateTime = todatetime(properties.essentials.startDateTime), lastModifiedDateTime = todatetime(properties.essentials.lastModifiedDateTime), dimensions = properties.context.context.condition.allOf[0].dimensions, // usefor metric alerts and log search alerts properties | extend targetResource = tolower(targetResource) | join kind=leftouter ( resources | project targetResource = tolower(id), targetResourceTags = tags) on targetResource | project-away targetResource1 "@ $Description = "Azure Monitor alerts enriched with resource tags" $Category = "Monitoring" $Credit = "Microsoft" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzMonAppInsightsDetailed-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" resources | where type =~ 'microsoft.insights/components' | extend RetentionInDays = properties.RetentionInDays | extend IngestionMode = properties.IngestionMode | extend Details = pack_all() | project Resource=id, location, resourceGroup, subscriptionId, IngestionMode, RetentionInDays, Details "@ $Description = "AppInsight detailed" $Category = "Configuration" $Credit = "Billy York (@SCAutomation)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzMonDataCollectionEndpoints-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" Resources | where type =~ 'microsoft.insights/datacollectionendpoints' "@ $Description = "Data Collection Endpoints" $Category = "Configuration" $Credit = "Morten Knudsen (@knudsenmortendk)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzMonDataCollectionRules-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" Resources | where type =~ 'microsoft.insights/datacollectionrules' "@ $Description = "Data Collection Rules" $Category = "Configuration" $Credit = "Morten Knudsen (@knudsenmortendk)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzMonLogAnalyticsDetailed-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" resources | where type =~ 'microsoft.operationalinsights/workspaces' | extend Sku = properties.sku.name | extend RetentionInDays = properties.retentionInDays | extend Details = pack_all() | project Workspace=id, resourceGroup, location, subscriptionId, Sku, RetentionInDays, Details "@ $Description = "Azure LogAnalytics workspaces (detailed)" $Category = "Configuration" $Credit = "Billy York (@SCAutomation)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzMonLogAnalyticsWorkspaces-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" resources | where type =~ 'microsoft.operationalinsights/workspaces' or type =~ 'microsoft.insights/components' | summarize count() by type | extend type = case( type == 'microsoft.insights/components', "Application Insights", type == 'microsoft.operationalinsights/workspaces', "Log Analytics workspaces", strcat(type, type)) "@ $Description = "Azure LogAnalytics workspaces" $Category = "Configuration" $Credit = "Billy York (@SCAutomation)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzMonNoAzMonExtensionOnKubernetesClusters-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" Resources | where type =~ 'Microsoft.Kubernetes/connectedClusters' | extend connectedClusterId = tolower(id) | project connectedClusterId | join kind = leftouter (KubernetesConfigurationResources | where type == 'microsoft.kubernetesconfiguration/extensions' | where properties.ExtensionType == 'microsoft.azuremonitor.containers' | parse tolower(id) with connectedClusterId '/providers/microsoft.kubernetesconfiguration/extensions' * | project connectedClusterId ) on connectedClusterId | where connectedClusterId1 == '' | project connectedClusterId "@ $Description = "Azure Arc-enabled Kubernetes clusters without the Azure Monitor extension" $Category = "Monitoring" $Credit = "Microsoft" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzMonResources-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" resources | where type has 'microsoft.insights/' or type has 'microsoft.alertsmanagement/ smartdetectoralertrules' or type has 'microsoft.portal/dashboards' | where type != 'microsoft.insights/components' | extend type = case( type == 'microsoft.insights/workbooks', "Workbooks", type == 'microsoft.insights/activitylogalerts', "Activity Log Alerts", type == 'microsoft.insights/scheduledqueryrules', "Log Search Alerts", type == 'microsoft.insights/actiongroups', "Action Groups", type == 'microsoft.insights/metricalerts', "Metric Alerts", type =~ 'microsoft.alertsmanagement/smartdetectoralertrules','Smart Detection Rules', type =~ 'microsoft.insights/webtests', 'URL Web Tests', type =~ 'microsoft.portal/dashboards', 'Portal Dashboards', type =~ 'microsoft.insights/datacollectionrules', 'Data Collection Rules', strcat("Not Translated: ", type)) | summarize count() by type "@ $Description = "Count of Azure Monitor resources by type" $Category = "Configuration" $Credit = "Billy York (@SCAutomation)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzMonResourcesDetailed-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" resources | where type has 'microsoft.insights/' or type has 'microsoft.alertsmanagement/smartdetectoralertrules' or type has 'microsoft.portal/dashboards' | where type != 'microsoft.insights/components' | extend type = case( type == 'microsoft.insights/workbooks', "Workbooks", type == 'microsoft.insights/activitylogalerts', "Activity Log Alerts", type == 'microsoft.insights/scheduledqueryrules', "Log Search Alerts", type == 'microsoft.insights/actiongroups', "Action Groups", type == 'microsoft.insights/metricalerts', "Metric Alerts", type =~ 'microsoft.alertsmanagement/smartdetectoralertrules','Smart Detection Rules', type =~ 'microsoft.portal/dashboards', 'Portal Dashboards', strcat("Not Translated: ", type)) | extend Enabled = case( type =~ 'Smart Detection Rules', properties.state, type != 'Smart Detection Rules', properties.enabled, strcat("Not Translated: ", type)) | extend WorkbookType = iif(type =~ 'Workbooks', properties.category, ' ') | extend Details = pack_all() | project name, type, subscriptionId, location, resourceGroup, Enabled, WorkbookType, Details "@ $Description = "Azure Monitor resources (detailed)" $Category = "Configuration" $Credit = "Billy York (@SCAutomation)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzNativeVMsCountByImageOffer-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" resources | where type =~ 'Microsoft.Compute/virtualmachines' | extend OsOffer = properties.storageProfile.imageReference.offer | summarize count() by tostring(OsOffer) | project OsOffer, total=count_ "@ $Description = "Native VMs count by ImageOffer" $Category = "Configuration" $Credit = "Wesley Haakman (@whaakman)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzNativeVMsCountByOS-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" resources | where type =~ 'Microsoft.Compute/virtualmachines' | extend Os = properties.storageProfile.osDisk.osType | summarize total = count() by tostring(Os) | project Os, total "@ $Description = "Count of OS-type for Native VMs" $Category = "Configuration" $Credit = "Morten Knudsen (@knudsenmortendk)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzNativeVMsCountBySizeLocation-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" Resources | where type == "microsoft.compute/virtualmachines" | summarize Count=count(properties.hardwareProfile.vmSize) by OS=tostring(properties.storageProfile.osDisk.osType), location, vmSize=tostring(properties.hardwareProfile.vmSize) "@ $Description = "Count of VMs by Size, OS, Location" $Category = "Configuration" $Credit = "Billy York (@SCAutomation)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzNativeVMsCountBySku-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" resources | where type =~ 'Microsoft.Compute/virtualmachines' | extend sku = properties.storageProfile.imageReference.sku | summarize total = count() by tostring(sku) | project sku, total "@ $Description = "Count of Native VMs by sku & location" $Category = "Configuration" $Credit = "Morten Knusen (@knudsenmortendk)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzNativeVMsDiskSizeSkuByLocation-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" Resources | where type contains "microsoft.compute/disks" | summarize DiskSizeGB=sum(toint(properties.diskSizeGB)) by DiskSku=tostring(sku.name), location "@ $Description = "Disks by sku and location" $Category = "Configuration" $Credit = "Billy York (@SCAutomation)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzNativeVMsDiskSizeTotal-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" Resources | where type contains "microsoft.compute/disks" | summarize DiskSizeGB=sum(toint(properties.diskSizeGB)) "@ $Description = "Disk Size total" $Category = "Configuration" $Credit = "Billy York (@SCAutomation)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzNativeVMsHealthStatus-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" healthresources |�where�type�==�"microsoft.resourcehealth/availabilitystatuses" |�extend�RessId�=�properties.targetResourceId |�extend�previousAvailabilityState�=�properties.previousAvailabilityState |�extend�occurredTime�=�properties.occurredTime� |�extend�availabilityState�=�properties.availabilityState |�extend�VMName�=�split(RessId,�"/")[-1] |�sort�by�tostring(availabilityState)�desc | join kind=inner (resourcecontainers | where type == "microsoft.resources/subscriptions" | project subscriptionId, subscriptionName=name ) on `$left.subscriptionId == `$right.subscriptionId |�project�VMName,�availabilityState,�previousAvailabilityState,�occurredTime, subscriptionName, subscriptionId "@ $Description = "Native VM health state" $Category = "Availability" $Credit = "Morten Knudsen (@knudsenmortendk)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzNativeVMsHybridMachines-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" Resources | where type in ('microsoft.compute/virtualmachines','microsoft.hybridcompute/machines') | extend ostype = properties.osType | extend provisioningState = properties.provisioningState | extend licensetype = properties.licensetype | extend displayname = properties.displayName | extend status = properties.status | extend computerName = properties.osprofile.computerName | extend osVersion = properties.osVersion | extend osName = properties.osName | extend manufacturer = properties.detectedProperties.manufacturer | extend model = properties.detectedProperties.model | extend lastStatusChange = properties.lastStatusChange | extend agentVersion = properties.agentVersion | extend machineFqdn = properties.machineFqdn | extend domainName = properties.domainName | extend dnsFqdn = properties.dnsFqdn | extend adFqdn = properties.adFqdn | extend osSku = properties.osSku "@ $Description = "Native VMs and Hybrid machines details" $Category = "Configuration" $Credit = "Morten Knudsen (@knudsenmortendk)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzNativeVMsImageDetails-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" resources | where type =~ 'Microsoft.Compute/VirtualMachines' | extend OS = properties.storageProfile.osDisk.osType | extend imageOffer = properties.storageProfile.imageReference.offer | extend imageSku = properties.storageProfile.imageReference.sku | join kind=inner (resourcecontainers | where type == "microsoft.resources/subscriptions" | project subscriptionId, subscriptionName=name ) on `$left.subscriptionId == `$right.subscriptionId | project name, OS, imageOffer, imageSku, location, subscriptionId, subscriptionName "@ $Description = "Native VMs image details" $Category = "Configuration" $Credit = "Morten Knudsen (@knudsenmortendk)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzNativeVMsOsDetails-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" Resources | where type == 'microsoft.compute/virtualmachines' | extend vmName = properties.osProfile.computerName | extend osType = properties.storageProfile.osDisk.osType | extend osVersion = properties.extended.instanceView.osVersion | extend osName = properties.extended.instanceView.osName | extend licenseType = properties.licenseType | extend powerStateStatus = properties.extended.instanceView.powerState.displayStatus | join kind=inner (resourcecontainers | where type == "microsoft.resources/subscriptions" | project subscriptionId, subscriptionName=name ) on `$left.subscriptionId == `$right.subscriptionId | project vmName, osType, osVersion, osName, licenseType, powerStateStatus, location, subscriptionName, subscriptionId "@ $Description = "Native VMs OS details" $Category = "Configuration" $Credit = "Morten Knudsen (@knudsenmortendk)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzNativeVMsSizeCount-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" Resources | where type == "microsoft.compute/virtualmachines" | summarize Count=count(properties.hardwareProfile.vmSize) by vmSize=tostring(properties.hardwareProfile.vmSize) "@ $Description = "Count of native VMs by Size" $Category = "Configuration" $Credit = "Billy York (@SCAutomation)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzNativeVMsStatusCount-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" Resources | where type == "microsoft.compute/virtualmachines" | extend vmState = tostring(properties.extended.instanceView.powerState.displayStatus) | extend vmState = iif(isempty(vmState), "VM State Unknown", (vmState)) | summarize count() by vmState "@ $Description = "Native VMs status/state (count)" $Category = "Configuration" $Credit = "Billy York (@SCAutomation)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzNativeVMsStorageAdvProfile-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" Resources | where type == "microsoft.compute/virtualmachines" | extend osDiskId= tostring(properties.storageProfile.osDisk.managedDisk.id) | join kind=leftouter( resources | where type =~ 'microsoft.compute/disks' | where properties !has 'Unattached' | where properties has 'osType' | project OS = tostring(properties.osType), osSku = tostring(sku.name), osDiskSizeGB = toint(properties.diskSizeGB), osDiskId=tostring(id)) on osDiskId | join kind=leftouter( resources | where type =~ 'microsoft.compute/disks' | where properties !has "osType" | where properties !has 'Unattached' | project sku = tostring(sku.name), diskSizeGB = toint(properties.diskSizeGB), id = managedBy | summarize sum(diskSizeGB), count(sku) by id, sku) on id | project vmId=id, OS, location, resourceGroup, subscriptionId, osDiskId, osSku, osDiskSizeGB, DataDisksGB=sum_diskSizeGB, diskSkuCount=count_sku | sort by diskSkuCount desc "@ $Description = "Native VMs with Storage Profile (adv)" $Category = "Configuration" $Credit = "Billy York (@SCAutomation)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzNativeVMsStorageProfile-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" Resources | where type contains "microsoft.compute/disks" | project Os=properties.osType, DiskSku=sku.name, DiskSizeGB=properties.diskSizeGB, id = managedBy | join (Resources | where type == "microsoft.compute/virtualmachines") on id "@ $Description = "Native VMs with Storage Profile" $Category = "Configuration" $Credit = "Billy York (@SCAutomation)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzNativeVMsWithDefenderForCloudPlanEnabled-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" securityresources | where type == 'microsoft.security/pricings' | extend tier = properties.pricingTier | where ( (name == 'VirtualMachines') and (properties.pricingTier == 'Standard') ) | project DefenderPlan=name,subscriptionId,Pricing=properties.pricingTier | join kind=leftouter ( resources | where type in ('microsoft.compute/virtualmachines','microsoft.hybridcompute/machines') | project name, type, subscriptionId, resourceGroup, location ) on subscriptionId | project DefenderPlan, Pricing, name, type, subscriptionId, resourceGroup, location | where name != "" "@ $Description = "Defender for Cloud Plans (enabled)" $Category = "Configuration" $Credit = "Morten Knudsen (@knudsenmortendk)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzNativeVMsWithNICsPublicIP-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" Resources | where type =~ 'microsoft.compute/virtualmachines' | extend nics=array_length(properties.networkProfile.networkInterfaces) | mv-expand nic=properties.networkProfile.networkInterfaces | where nics == 1 or nic.properties.primary =~ 'true' or isempty(nic) | project vmId = id, vmName = name, vmSize=tostring(properties.hardwareProfile.vmSize), nicId = tostring(nic.id) | join kind=leftouter ( Resources | where type =~ 'microsoft.network/networkinterfaces' | extend ipConfigsCount=array_length(properties.ipConfigurations) | mv-expand ipconfig=properties.ipConfigurations | where ipConfigsCount == 1 or ipconfig.properties.primary =~ 'true' | project nicId = id, privateIP= tostring(ipconfig.properties.privateIPAddress), publicIpId = tostring(ipconfig.properties.publicIPAddress.id), subscriptionId) on nicId | project-away nicId1 | summarize by vmId, vmSize, nicId, privateIP, publicIpId, subscriptionId | join kind=leftouter ( Resources | where type =~ 'microsoft.network/publicipaddresses' | project publicIpId = id, publicIpAddress = tostring(properties.ipAddress)) on publicIpId | project-away publicIpId1 | sort by publicIpAddress desc "@ $Description = "Native VMs with their network interface and public IP" $Category = "Configuration" $Credit = "Microsoft" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzNativeVMsWithTags-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" resources | where type == 'microsoft.compute/virtualmachines' | mvexpand tags | extend tagKey = tostring(bag_keys(tags)[0]) | extend tagValue = tostring(tags[tagKey]) | join kind=inner (resourcecontainers | where type == "microsoft.resources/subscriptions" | project subscriptionId, subscriptionName=name ) on `$left.subscriptionId == `$right.subscriptionId | project id,name,type,location,resourceGroup,subscriptionName, subscriptionId,tagKey, tagValue "@ $Description = "Native VMs with tagKey and tagValue" $Category = "Governance" $Credit = "Morten Knudsen (@knudsenmortendk)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzNetworkNSGRules-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" Resources | where type =~ 'microsoft.network/networksecuritygroups' | project id, nsgRules = parse_json(parse_json(properties).securityRules), networksecurityGroupName = name, subscriptionId, resourceGroup , location | mvexpand nsgRule = nsgRules | project id, location, access=nsgRule.properties.access,protocol=nsgRule.properties.protocol ,direction=nsgRule.properties.direction,provisioningState= nsgRule.properties.provisioningState ,priority=nsgRule.properties.priority, sourceAddressPrefix = nsgRule.properties.sourceAddressPrefix, sourceAddressPrefixes = nsgRule.properties.sourceAddressPrefixes, destinationAddressPrefix = nsgRule.properties.destinationAddressPrefix, destinationAddressPrefixes = nsgRule.properties.destinationAddressPrefixes, networksecurityGroupName, networksecurityRuleName = tostring(nsgRule.name), subscriptionId, resourceGroup, destinationPortRanges = nsgRule.properties.destinationPortRanges, destinationPortRange = nsgRule.properties.destinationPortRange, sourcePortRanges = nsgRule.properties.sourcePortRanges, sourcePortRange = nsgRule.properties.sourcePortRange | extend Details = pack_all() | project id, location, access, direction, subscriptionId, resourceGroup, Details "@ $Description = "NSG Rules" $Category = "Configuration" $Credit = "Billy York (@SCAutomation)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzNetworkNSGsUnassociated-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" Resources | where type =~ 'microsoft.network/networksecuritygroups' and isnull(properties.networkInterfaces) and isnull(properties.subnets) | project Resource=id, resourceGroup, subscriptionId, location "@ $Description = "Unassociated NSGs" $Category = "Configuration" $Credit = "Billy York (@SCAutomation)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzNetworkPublicIPs-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" Resources | where type == "microsoft.network/publicipaddresses" | summarize PIPs=count() by IPType=tostring(properties.publicIPAddressVersion) "@ $Description = "Public IPs" $Category = "Configuration" $Credit = "Billy York (@SCAutomation)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzNetworkResources-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" resources | where type has "microsoft.network" | extend type = case( type == 'microsoft.network/networkinterfaces', "NICs", type == 'microsoft.network/networksecuritygroups', "NSGs", type == "microsoft.network/publicipaddresses", "Public IPs", type == 'microsoft.network/virtualnetworks', "vNets", type == 'microsoft.network/networkwatchers/connectionmonitors', "Connection Monitors", type == 'microsoft.network/privatednszones', "Private DNS", type == 'microsoft.network/virtualnetworkgateways', @"vNet Gateways", type == 'microsoft.network/connections', "Connections", type == 'microsoft.network/networkwatchers', "Network Watchers", type == 'microsoft.network/privateendpoints', "Private Endpoints", type == 'microsoft.network/localnetworkgateways', "Local Network Gateways", type == 'microsoft.network/privatednszones/virtualnetworklinks', "vNet Links", type == 'microsoft.network/dnszones', 'DNS Zones', type == 'microsoft.network/networkwatchers/flowlogs', 'Flow Logs', type == 'microsoft.network/routetables', 'Route Tables', type == 'microsoft.network/loadbalancers', 'Load Balancers', strcat("Not Translated: ", type)) | summarize count() by type | where type !has "Not Translated" "@ $Description = "Network resources" $Category = "Configuration" $Credit = "Billy York (@SCAutomation)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzNetworkRouteTables-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" resources | where type =~ 'microsoft.network/routetables' | project id, routes = parse_json(parse_json(properties).routes), routeTableName = name, subscriptionId, resourceGroup, location | mvexpand route = routes | project id, location, addressPrefix=route.properties.addressPrefix, nextHopType=route.properties.nextHopType, nextHopIpAddress=route.properties.nextHopIpAddress, hasBgpOverride=route.properties.hasBgpOverride, routeTableName, routeName = tostring(route.name), subscriptionId, resourceGroup | extend Details = pack_all() | project id, routeTableName, location, addressPrefix, nextHopType, nextHopIpAddress, subscriptionId, resourceGroup, Details "@ $Description = "Route tables info" $Category = "Configuration" $Credit = "Billy York (@SCAutomation)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzNetworkSubnets-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" resources | where type == "microsoft.network/virtualnetworks" | project vnetName = name, subnets = (properties.subnets) | mvexpand subnets | extend subnetName = (subnets.name) | project vnetName, subnetName "@ $Description = "Subnets" $Category = "Configuration" $Credit = "Wilfried Woivre (@wilfriedwoivre)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzNetworkSubnetsAddressSpace-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" resources | where type == "microsoft.network/virtualnetworks" | project vnetName = name, subnets = (properties.subnets) | mvexpand subnets | extend subnetName = (subnets.name) | extend addressRange = subnets.properties.addressPrefix | extend mask = split(subnets.properties.addressPrefix, '/', 1)[0] | extend usedIp = array_length(subnets.properties.ipConfigurations) | extend totalIp = case(mask == 29, 3, mask == 28, 11, mask == 27, 27, mask == 26, 59, mask == 25, 123, mask == 24, 251, mask == 23, 507, mask == 22, 1019, mask == 21, 2043, mask == 20, 4091, mask == 19, 8187, mask == 18, 16379, mask == 17, 32763, mask == 16, 65531, mask == 15, 131067, mask == 14, 262139, mask == 13, 524283, mask == 12, 1048571, mask == 11, 2097147, mask == 10, 4194299, mask == 9, 8388603, mask == 8, 16777211, -1) | extend availableIp = totalIp - usedIp | project vnetName, subnetName, addressRange, mask, usedIp, totalIp, availableIp, subnets | order by toint(mask) desc "@ $Description = "Subnets with address space info" $Category = "Configuration" $Credit = "Wilfried Woivre (@wilfriedwoivre)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzNetworkSubnetsWithDelegations-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" resources | where type == "microsoft.network/virtualnetworks" | project vnetName = name, subnets = (properties.subnets) | mvexpand subnets | extend subnetName = (subnets.name) | extend isDelegated = isnotnull(subnets.properties.delegations) and array_length(subnets.properties.delegations) != 0 | where isDelegated == 1 | project vnetName, subnetName "@ $Description = "Subnets with Delegations" $Category = "Configuration" $Credit = "Wilfried Woivre (@wilfriedwoivre)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzNetworkSubnetsWithNSG-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" resources | where type == "microsoft.network/virtualnetworks" | project vnetName = name, subnets = (properties.subnets) | mvexpand subnets | extend subnetName = (subnets.name) | extend hasNSG = isnotnull(subnets.properties.networkSecurityGroup) | where hasNSG == 1 | project vnetName, subnetName "@ $Description = "Subnets with NSGs" $Category = "Configuration" $Credit = "Wilfried Woivre (@wilfriedwoivre)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzNetworkSubnetsWithRouteTable-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" resources | where type == "microsoft.network/virtualnetworks" | project vnetName = name, subnets = (properties.subnets) | mvexpand subnets | extend subnetName = (subnets.name) | extend hasRouteTable = isnotnull(subnets.properties.routeTable) | where hasRouteTable == 1 | project vnetName, subnetName "@ $Description = "Subnets with Routetable" $Category = "Configuration" $Credit = "Wilfried Woivre (@wilfriedwoivre)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzNetworkSubnetsWithServiceEndpoints-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" resources | where type == "microsoft.network/virtualnetworks" | project vnetName = name, subnets = (properties.subnets) | mvexpand subnets | extend subnetName = (subnets.name) | extend hasServiceEndpoints = isnotnull(subnets.properties.serviceEndpoints) and array_length(subnets.properties.serviceEndpoints) != 0 | where hasServiceEndpoints == 1 | project vnetName, subnetName "@ $Description = "Subnets with Service Endpoints" $Category = "Configuration" $Credit = "Wilfried Woivre (@wilfriedwoivre)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzOrphanedAvailabilitySets-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" resources | where type =~ 'microsoft.compute/availabilitysets' | extend VirtualMachines = array_length(properties.virtualMachines) | where VirtualMachines == 0 "@ $Description = "Orphaned Availability Sets" $Category = "Configuration" $Credit = "Billy York (@SCAutomation)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzOrphanedDisks-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" Resources | where type has "microsoft.compute/disks" | extend diskState = tostring(properties.diskState) | where managedBy == "" and diskState != 'ActiveSAS' or diskState == 'Unattached' and diskState != 'ActiveSAS' | project id, diskState, resourceGroup, location, subscriptionId "@ $Description = "Orphaned Disks" $Category = "Configuration" $Credit = "Billy York (@SCAutomation)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzOrphanedNICs-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" resources | where type =~ "microsoft.network/networkinterfaces" | join kind=leftouter (resources | where type =~ 'microsoft.network/privateendpoints' | extend nic = todynamic(properties.networkInterfaces) | mv-expand nic | project id=tostring(nic.id) ) on id | where isempty(id1) | where properties !has 'virtualmachine' | project id, resourceGroup, location, subscriptionId "@ $Description = "Orphaned NICs" $Category = "Configuration" $Credit = "Billy York (@SCAutomation)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzOrphanedNSGs-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" Resources | where type =~ 'microsoft.network/networksecuritygroups' and isnull(properties.networkInterfaces) and isnull(properties.subnets) | project Resource=id, resourceGroup, subscriptionId, location "@ $Description = "Orphaned NSGs" $Category = "Configuration" $Credit = "Billy York (@SCAutomation)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzOrphanedPublicIPs-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" resources | where type =~ 'microsoft.network/publicipaddresses' | extend IpConfig = properties.ipConfiguration.id | where isempty(IpConfig) | extend natGateway = properties.natGateway.id | where isempty(natGateway) | order by ['name'] asc "@ $Description = "Orphaned Public IPs" $Category = "Configuration" $Credit = "Billy York (@SCAutomation)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzOrphanedWebAPIConnections-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" resources | where type =~ 'Microsoft.Web/connections' | project id | join kind= leftouter ( resources | where type == 'microsoft.logic/workflows' |extend propertiesJson=parse_json(properties) |extend ConJson=propertiesJson["parameters"]["$connections"]["value"] |mvexpand Conn=ConJson |where notnull(Conn) |extend connectionId=extract(""connectionId":"(.*)"",1,tostring(Conn)) |project connectionId ) on `$left.id==`$right.connectionId "@ $Description = "Orphaned Web API Connections" $Category = "Configuration" $Credit = "Mohammed Barqawi (@barqawi_JO)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzPolicyAssignmentCountByScope-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" policyresources | where type == "microsoft.authorization/policyassignments" | extend scope = tostring(properties.scope) | summarize count() by scope | order by count_ desc "@ $Description = "Count of Policy Assignments by Scope" $Category = "Governance" $Credit = "Wilfried Woivre (@wilfriedwoivre)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzPolicyDefinitionsCountByScope-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" policyresources | where type == "microsoft.authorization/policydefinitions" | extend policyType = tostring(properties.policyType) | where policyType == "Custom" | project id | extend scope = tostring(split(id, "/providers/Microsoft.Authorization/policyDefinitions/", 0)[0]) | summarize count() by scope | order by count_ desc "@ $Description = "Count of Policies by Scope" $Category = "Governance" $Credit = "Wilfried Woivre (@wilfriedwoivre)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzPolicyUnused-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" policyresources | where type == "microsoft.authorization/policydefinitions" | extend policyType = tostring(properties.policyType) | where policyType == "Custom" | join kind=leftouter ( policyresources | where type == "microsoft.authorization/policysetdefinitions" | extend policyType = tostring(properties.policyType) | extend policyDefinitions = properties.policyDefinitions | where policyType == "Custom" | mv-expand policyDefinitions | extend policyDefinitionId = tostring(policyDefinitions.policyDefinitionId) | project associedIdToInitiative=policyDefinitionId | distinct associedIdToInitiative) on `$left.id == `$right.associedIdToInitiative | where associedIdToInitiative == "" | join kind=leftouter( policyresources | where type == "microsoft.authorization/policyassignments" | extend policyDefinitionId = tostring(properties.policyDefinitionId) | project associatedDefinitionId=policyDefinitionId | distinct associatedDefinitionId ) on `$left.id == `$right.associatedDefinitionId | where associatedDefinitionId == "" | extend displayName = tostring(properties.displayName) | project id, displayName "@ $Description = "Policies without assignment, or not attached to an Azure initiatives" $Category = "Governance" $Credit = "Wilfried Woivre (@wilfriedwoivre)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzResources-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" resources "@ $Description = "Resources" $Category = "Configuration" $Credit = "Morten Knudsen (@knudsenmortendk)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzResourcesWithTags-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" resources | mvexpand tags | extend tagKey = tostring(bag_keys(tags)[0]) | extend tagValue = tostring(tags[tagKey]) | join kind=inner (resourcecontainers | where type == "microsoft.resources/subscriptions" | project subscriptionId, subscriptionName=name ) on `$left.subscriptionId == `$right.subscriptionId | project id, resourceName=name, type, location, resourceGroup, subscriptionName, subscriptionId, tagKey, tagValue "@ $Description = "Resources with tagKey and tagValue" $Category = "Governance" $Credit = "Morten Knudsen (@knudsenmortendk)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzResourceTypes-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" resources | distinct type "@ $Description = "Resource types" $Category = "Configuration" $Credit = "Morten Knudsen (@knudsenmortendk)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzRGs-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" resourcecontainers | where type == 'microsoft.resources/subscriptions/resourcegroups' | join kind=inner (resourcecontainers | where type == "microsoft.resources/subscriptions" | project subscriptionId, subscriptionName=name ) on `$left.subscriptionId == `$right.subscriptionId | project id, rgName=name, location, subscriptionName, subscriptionId "@ $Description = "Resource Groups" $Category = "Configuration" $Credit = "Morten Knudsen (@knudsenmortendk)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzRGsWithTags-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" resourcecontainers | where type == 'microsoft.resources/subscriptions/resourcegroups' | mvexpand tags | extend tagKey = tostring(bag_keys(tags)[0]) | extend tagValue = tostring(tags[tagKey]) | join kind=inner (resourcecontainers | where type == "microsoft.resources/subscriptions" | project subscriptionId, subscriptionName=name ) on `$left.subscriptionId == `$right.subscriptionId | project id, rgName=name, location, subscriptionName, subscriptionId, tagKey, tagValue "@ $Description = "Resource Groups with tagKey and tagValue" $Category = "Governance" $Credit = "Morten Knudsen (@knudsenmortendk)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzRoleAssignments-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" authorizationResources | where type == 'microsoft.authorization/roleassignments' | extend prop = properties | extend roleDefinitionIdFull = tostring(properties.roleDefinitionId) | extend roleDefinitionIdsplit = split(roleDefinitionIdFull,'/') | extend roleDefinitionId = tostring(roleDefinitionIdsplit[(4)]) | extend roleAssignmentPrincipalType = properties.principalType | extend roleAssignmentDescription = properties.description | extend roleAssignmentPrincipalId = properties.principalId | extend roleAssignmentCreatedOn = properties.createdOn | extend roleAssignmentUpdatedOn = properties.updatedOn | extend roleAssignmentUpdatedById = properties.updatedBy | extend roleAssignmentCreatedById = properties.createdBy | extend roleAssignmentScope = properties.scope | project-away managedBy,kind,sku,plan,tags,identity,zones,location,resourceGroup,subscriptionId, extendedLocation,tenantId | join kind=leftouter (authorizationResources | where type == 'microsoft.authorization/roledefinitions' | extend roleDefinitionIdFull = tostring(id) | extend roleDefinitionIdsplit = split(roleDefinitionIdFull,'/') | extend roleDefinitionId = tostring(roleDefinitionIdsplit[(4)]) | extend description = properties.description | extend roleName = properties.roleName | extend roleType = properties.type | project-away managedBy,kind,sku,plan,tags,identity,zones,location,resourceGroup,subscriptionId, extendedLocation,tenantId) on roleDefinitionId | project roleDefinitionId,roleName,roleType,roleAssignmentPrincipalType,roleAssignmentPrincipalId,roleAssignmentCreatedOn,roleAssignmentUpdatedOn,roleAssignmentUpdatedById,roleAssignmentCreatedById,roleAssignmentScope, prop "@ $Description = "RBAC Role Assignments" $Category = "Governance" $Credit = "Morten Knudsen (@knudsenmortendk)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzRoleDefinitions-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" authorizationresources | where type == "microsoft.authorization/roledefinitions" | mv-expand properties | extend description = properties.description | extend updatedOn = properties.updatedOn | extend createdOn = properties.createdOn | extend assignableScopes = properties.assignableScopes | extend isServiceRole = properties.isServiceRole | extend roleName = properties.roleName | extend type = properties.type | extend permissions = properties.permissions "@ $Description = "RBAC Role Definitions" $Category = "Governance" $Credit = "Morten Knudsen (@knudsenmortendk)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzSecureScoreByControls-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" securityresources | where type == 'microsoft.security/securescores/securescorecontrols' | extend SecureControl = properties.displayName, unhealthy = properties.unhealthyResourceCount, currentscore = properties.score.current, maxscore = properties.score.max, subscriptionId | join kind=inner (resourcecontainers | where type == "microsoft.resources/subscriptions" | project subscriptionId, subscriptionName=name ) on `$left.subscriptionId == `$right.subscriptionId | project SecureControl , unhealthy, currentscore, maxscore, subscriptionName,subscriptionId "@ $Description = "Secure Score by controls" $Category = "Configuration" $Credit = "Billy York (@SCAutomation)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzSecureScoreSubscription-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" securityresources | where type == "microsoft.security/securescores" | extend subscriptionSecureScore = round(100 * bin((todouble(properties.score.current))/ todouble(properties.score.max), 0.001)) | where subscriptionSecureScore > 0 | join kind=inner (resourcecontainers | where type == "microsoft.resources/subscriptions" | project subscriptionId, subscriptionName=name ) on `$left.subscriptionId == `$right.subscriptionId | project subscriptionSecureScore, subscriptionName, subscriptionId | order by subscriptionSecureScore asc "@ $Description = "Secure Score by subscription" $Category = "Configuration" $Credit = "Billy York (@SCAutomation)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzSQLPaaSCountByType-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" resources | where type=~ 'Microsoft.DBforMySQL/servers' or type=~'Microsoft.SQL/servers/databases' or type=~'Microsoft.DBforPostgreSQL/servers' or type=~'Microsoft.DBforMariaDB/servers' | summarize total= count() by type | project type, total | order by total desc "@ $Description = "Count of SQL PaaS by Type" $Category = "Configuration" $Credit = "Wesley Haakman (@whaakman)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzSQLServicesByLocation-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" resources | where type=~ 'Microsoft.DBforMySQL/servers' or type=~'Microsoft.SQL/servers/databases' or type=~'Microsoft.DBforPostgreSQL/servers' or type=~'Microsoft.DBforMariaDB/servers' | summarize count() by location | project location, total=count_ | order by total desc "@ $Description = "Count of SQL services by location" $Category = "Configuration" $Credit = "Billy York (@SCAutomation)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzSQLServicesCount-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" resources | where type =~ 'microsoft.documentdb/databaseaccounts' or type =~ 'microsoft.sql/servers/databases' or type =~ 'microsoft.dbformysql/servers' or type =~ 'microsoft.sql/servers' | extend type = case( type =~ 'microsoft.documentdb/databaseaccounts', 'CosmosDB', type =~ 'microsoft.sql/servers/databases', 'SQL DBs', type =~ 'microsoft.dbformysql/servers', 'MySQL', type =~ 'microsoft.sql/servers', 'SQL Servers', strcat("Not Translated: ", type)) | where type !has "Not Translated" | summarize count() by type "@ $Description = "Count of SQL services" $Category = "Configuration" $Credit = "Billy York (@SCAutomation)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzStorageAccountsByLocation-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" where type =~ 'microsoft.storage/storageaccounts' | summarize total = count() by location | project location, total "@ $Description = "Count of Storage accounts by location" $Category = "Configuration" $Credit = "Morten Knudsen (@knudsenmortendk)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzStorageAccountsDetails-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" resources | where type == 'microsoft.storage/storageaccounts' "@ $Description = "Storage Accounts" $Category = "Configuration" $Credit = "Morten Knudsen (@knudsenmortendk)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzStorageAccountSecurity-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" resources | where type =~ 'microsoft.storage/storageaccounts' | extend Prop = properties | extend HTTPSOnly = properties.supportsHttpsTrafficOnly | extend BlobEncryption = properties.enableBlobEncryption | extend FileEncryption = properties.enableFileEncryption | join kind=inner (resourcecontainers | where type == "microsoft.resources/subscriptions" | project subscriptionId, subscriptionName=name ) on `$left.subscriptionId == `$right.subscriptionId | project name, kind, HTTPSOnly, BlobEncryption, FileEncryption, location, subscriptionName, subscriptionId, Prop "@ $Description = "Storage Account security" $Category = "Security" $Credit = "Morten Knudsen (@knudsenmortendk)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzStorageAccountsGapHttpsEnforcement-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" resources | where type =~ 'microsoft.storage/storageaccounts' | extend Prop = properties | extend HTTPSOnly = properties.supportsHttpsTrafficOnly | extend BlobEncryption = properties.enableBlobEncryption | extend FileEncryption = properties.enableFileEncryption | join kind=inner (resourcecontainers | where type == "microsoft.resources/subscriptions" | project subscriptionId, subscriptionName=name ) on `$left.subscriptionId == `$right.subscriptionId | where HTTPSOnly =~ 'false' | project name, kind, HTTPSOnly, BlobEncryption, FileEncryption, location, subscriptionName, subscriptionId, Prop "@ $Description = "Storage account security gap HTTPS enforcement missing" $Category = "Security" $Credit = "Morten Knudsen (@knudsenmortendk)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzSubscriptions-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" ResourceContainers | where type =~ 'microsoft.resources/subscriptions' | extend status = properties.state | project id, subscriptionId, subsciptionName=name, status | order by subsciptionName asc "@ $Description = "Subscriptions" $Category = "Configuration" $Credit = "Morten Knudsen (@knudsenmortendk)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzSubscriptionsCountByMG-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" resourcecontainers | where type == 'microsoft.resources/subscriptions' | project subscriptionName = name, managementgroup = (properties.managementGroupAncestorsChain) | mv-expand managementgroup | extend mgName=tostring(managementgroup.displayName) | summarize total = count() by mgName | order by total desc "@ $Description = "Number of subscriptions per management group" $Category = "Configuration" $Credit = "Morten Knudsen (@knudsenmortendk)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzSubscriptionsCountByResourceType-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" resources | join kind=leftouter (resourcecontainers | where type == 'microsoft.resources/subscriptions' | project subscriptionName=name, subscriptionId) on subscriptionId | where subscriptionName != "" | summarize total=count() by type, subscriptionName "@ $Description = "Count of resource types per subscriptions" $Category = "Configuration" $Credit = "Morten Knudsen (@knudsenmortendk)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzSubscriptionsWithTags-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" resourcecontainers | where type == 'microsoft.resources/subscriptions' | project id,subscriptionId,subscriptionName=name,tags | mvexpand tags | extend tagKey = tostring(bag_keys(tags)[0]) | extend tagValue = tostring(tags[tagKey]) | project-away tags "@ $Description = "Subscriptions with tagKey and tagValue" $Category = "Governance" $Credit = "Morten Knudsen (@knudsenmortendk)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzTagsKeyValuePairs-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" resources | where isnotempty(tags) | where tags !has "hidden-" | mv-expand tags | extend tagName = tostring(bag_keys(tags)[0]) | extend tagValue = tostring(tags[tagName]) "@ $Description = "Resources by tagKey and tagValue" $Category = "Governance" $Credit = "Morten Knudsen (@knudsenmortendk)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzTagsResourcesCountByTagName-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" resources | where isnotempty(tags) | where tags !has "hidden-" | mv-expand tags | extend tagName = tostring(bag_keys(tags)[0]) | extend tagValue = tostring(tags[tagName]) | summarize total = count() by tagName | order by total desc "@ $Description = "Count of resources by tagKey" $Category = "Governance" $Credit = "Morten Knudsen (@knudsenmortendk)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzTagsResourcesCountByTagNameValue-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" resources | where isnotempty(tags) | where tags !has "hidden-" | mv-expand tags | extend tagName = tostring(bag_keys(tags)[0]) | extend tagValue = tostring(tags[tagName]) | summarize total = count() by tagName, tagValue | order by total desc "@ $Description = "Count of resources by tagKey and tagValue" $Category = "Governance" $Credit = "Morten Knudsen (@knudsenmortendk)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzTagsResourceTypesCountByTagNameValue-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" resources | where isnotempty(tags) | where tags !has "hidden-" | mv-expand tags | extend tagName = tostring(bag_keys(tags)[0]) | extend tagValue = tostring(tags[tagName]) | summarize total = count() by type, tagName, tagValue | order by total desc "@ $Description = "Resource Types count by TagKey and TagValue" $Category = "Governance" $Credit = "Morten Knudsen (@knudsenmortendk)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzUpdateManagerAvailableUpdatesByUpdateCategory-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" patchassessmentresources | where type !has "softwarepatches" | extend prop = parse_json(properties) | extend lastTime = properties.lastModifiedDateTime | extend updateRollupCount = prop.availablePatchCountByClassification.updateRollup, featurePackCount = prop.availablePatchCountByClassification.featurePack, servicePackCount = prop.availablePatchCountByClassification.servicePack, definitionCount = prop.availablePatchCountByClassification.definition, securityCount = prop.availablePatchCountByClassification.security, criticalCount = prop.availablePatchCountByClassification.critical, updatesCount = prop.availablePatchCountByClassification.updates, toolsCount = prop.availablePatchCountByClassification.tools, otherCount = prop.availablePatchCountByClassification.other, OS = prop.osType | project lastTime, id, OS, updateRollupCount, featurePackCount, servicePackCount, definitionCount, securityCount, criticalCount, updatesCount, toolsCount, otherCount "@ $Description = "Azure Update Manager - Available updates by update category" $Category = "Security" $Credit = "Microsoft" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzUpdateManagerInstallationsCount-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" patchinstallationresources | where type !has "softwarepatches" | extend subscriptionId = tostring(split(id, "/", 2)[0]) | extend rg = tostring(split(id, "/", 4)[0]) | extend machineName = tostring(split(id, "/", 8)[0]) | extend prop = parse_json(properties) | extend RunTime = todatetime(prop.lastModifiedDateTime) | extend OS = tostring(prop.osType) | extend installedPatchCount = tostring(prop.installedPatchCount) | extend failedPatchCount = tostring(prop.failedPatchCount) | extend pendingPatchCount = tostring(prop.pendingPatchCount) | extend excludedPatchCount = tostring(prop.excludedPatchCount) | extend notSelectedPatchCount = tostring(prop.notSelectedPatchCount) | where RunTime > ago(7d) | join kind=inner (resourcecontainers | where type == "microsoft.resources/subscriptions" | project subscriptionId, subscriptionName=name ) on `$left.subscriptionId == `$right.subscriptionId | project RunTime, RunID=name,machineName, subscriptionId, subscriptionName, rg, OS, installedPatchCount, failedPatchCount, pendingPatchCount, excludedPatchCount, notSelectedPatchCount "@ $Description = "Azure Update Manager - Update assessment status (last 7 days)" $Category = "Security" $Credit = "Microsoft / Morten Knudsen (@knudsenmortendk)" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzUpdateManagerMaintenanceRunVM-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" maintenanceresources | where ['type'] == "microsoft.maintenance/applyupdates" | where properties.maintenanceScope == "InGuestPatch" "@ $Description = "Azure Update Manager - Maintenance configurations" $Category = "Security" $Credit = "Microsoft" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzUpdateManagerPatchInstallationsLinuxOS { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" patchinstallationresources | where type has "softwarepatches" and properties has "version" | extend machineName = tostring(split(id, "/", 8)), resourceType = tostring(split(type, "/", 0)), tostring(rgName = split(id, "/", 4)), tostring(RunID = split(id, "/", 10)) | extend prop = parse_json(properties) | extend lTime = todatetime(prop.lastModifiedDateTime), patchName = tostring(prop.patchName), version = tostring(prop.version), installationState = tostring(prop.installationState), classifications = tostring(prop.classifications) | where lTime > ago(7d) | project lTime, RunID, machineName, rgName, resourceType, patchName, version, classifications, installationState | sort by RunID "@ $Description = "Azure Update Manager - Installed updates by AzUM (Linux OS)" $Category = "Security" $Credit = "Microsoft" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function AzUpdateManagerPatchInstallationsWindowsOS-Query-AzARG { [CmdletBinding()] param( [Parameter()] [switch]$Details = $false ) $Query = @" patchinstallationresources | where type has "softwarepatches" and properties !has "version" | extend machineName = tostring(split(id, "/", 8)), resourceType = tostring(split(type, "/", 0)), tostring(rgName = split(id, "/", 4)), tostring(RunID = split(id, "/", 10)) | extend prop = parse_json(properties) | extend lTime = todatetime(prop.lastModifiedDateTime), patchName = tostring(prop.patchName), kbId = tostring(prop.kbId), installationState = tostring(prop.installationState), classifications = tostring(prop.classifications) | where lTime > ago(7d) | project lTime, RunID, machineName, rgName, resourceType, patchName, kbId, classifications, installationState | sort by RunID "@ $Description = "Azure Update Manager - Installed updates by AzUM (Windows OS)" $Category = "Security" $Credit = "Microsoft" If ($Details) { Return $Query, $Description, $Category, $Credit } Else { # only return Query Return $Query } } Function Query-AzResourceGraph { <# .SYNOPSIS Runs query against Azure Resource Graph and returns the result .DESCRIPTION You can run custom query or pre-defined queries against Azure Resource Graph. Query can be targetted on Tenant, MG or Subscription scope. .PARAMETER Scope This parameter defines the scope where necessary PS modules will be installed (if missing). Possible values are AllUsers (default) or CurrentUser .PARAMETER Query This parameter is the entire Query, which must be run against Azure Resource Graph .PARAMETER QueryScope You can choose between MG, Tenant or Subscription If you don't choose Scope, then tenant is default. .PARAMETER Target Syntax if you chose -QueryScope MG You will need to define -Target <mg-name> (Ex: -Target mg-2linkit) This MG will be the root for query and all sub-MGs will be included Syntax if you chose -QueryScope SubScription: You will need to define -Target <subscription name or id> (Ex: -Target MySub) Syntax if you chose -QueryScope Tenant: Search will automatically be done in entire tenant, part of context .PARAMETER First This parameter will take only the first x records .PARAMETER Skip This parameter will skip x records and then show the remaining .PARAMETER SelectQuery This switch will list all available queries in a GUI to select from .PARAMETER ShowQueryOnly This switch will only show the query - not run the query ! .PARAMETER InstallAutoUpdateCleanupOldVersions This switch will install Az.Accounts, Az.ResourceGraph and AzResourceGraphPS (if missing), auto-update PS modules Az.ResourceGraph and AzResourceGraphPS (if updates available) and remove older versions of Az.ResourceGraph and AzResourceGraphPS (if found) NOTE: Parameter will NOT update or remove Az.Accounts-module .PARAMETER AzAppId This is the Azure app id .PARAMETER AzAppSecret This is the secret of the Azure app .PARAMETER TenantId This is the Azure AD tenant id .INPUTS Yes, you can pipe query data into function .OUTPUTS Results from Azure Resource Graph, based on the defined parameters. .LINK https://github.com/KnudsenMorten/AzResourceGraphPS .EXAMPLE # Run pre-defined query against tenant - and output result to screen AzMGsWithParentHierarchy-Query-AzARG | Query-AzResourceGraph -QueryScope Tenant # Run pre-defined query against MG "2linkit"- and output result to screen AzRGs-Query-AzARG | Query-AzResourceGraph -QueryScope MG -Target "2linkit" # Run pre-defined query and return result to $Result-variable $Result = AzRGs-Query-AzARG | Query-AzResourceGraph -QueryScope MG -Target "2linkit" $Result | fl # Run Custom Query and return result to $Result-variable $Query = @" resourcecontainers | where type == 'microsoft.management/managementgroups' | extend mgParent = properties.details.managementGroupAncestorsChain | mv-expand with_itemindex=MGHierarchy mgParent | project id, name, properties.displayName, mgParent, MGHierarchy, mgParent.name | sort by MGHierarchy asc "@ $Result = $Query | Query-AzResourceGraph -QueryScope "Tenant" $Result | fl # Show query only AzMGsWithParentHierarchy-Query-AzARG | Query-AzResourceGraph -ShowQueryOnly # Select from list of pre-defined queries Query-AzResourceGraph -SelectQuery # Select from list of pre-defined queries - output to $results $result = Query-AzResourceGraph -SelectQuery # Run query using unattended login with AzApp & AzSecret # Variables $AzAppId = "xxxx" $AzAppSecret = "xxxx" $TenantId = "xxxx" # Disconnect existing sessions Disconnect-AzAccount AzRGs-Query-AzARG | Query-AzResourceGraph -QueryScope "Tenant" -AzAppId $AzAppId ` -AzAppSecret $AzAppSecret ` -TenantId $TenantId ` # Get all Azure Resource Groups in specific subscription - show only first 2 RGs AzRGs-Query-AzARG | Query-AzResourceGraph -QueryScope Subscription ` -Target "fce4f282-fcc6-43fb-94d8-bf1701b862c3" ` -First 2 # Get all management groups under management group '2linkit' - skip first 3 AzMGsWithParentHierarchy-Query-AzARG | Query-AzResourceGraph -QueryScope "MG" ` -Target "2linkit" ` -Skip 3 # Get all management groups under management group '2linkit' - only show first 3 AzMGsWithParentHierarchy | Query-AzResourceGraph -QueryScope "MG" ` -Target "2linkit" ` -First 3 #> [CmdletBinding()] param( [Parameter(ValueFromPipeline = $true)] [string]$Query, [Parameter()] [ValidateSet("Tenant","MG","Subscription")] $QueryScope = "Tenant", [Parameter()] [string]$Target = $null, # Only needed for MG or Subscription [Parameter()] [string]$First, [Parameter()] [string]$Skip, [Parameter()] [switch]$SelectQuery = $false, [Parameter()] [switch]$ShowQueryOnly = $false, [Parameter()] [string]$AzAppId, [Parameter()] [string]$AzAppSecret, [Parameter()] [string]$TenantId, [Parameter()] [switch]$InstallAutoUpdateCleanupOldVersions = $false, [Parameter()] [ValidateSet("AllUsers","CurrentUser")] $Scope = "AllUsers" ) #--------------------------------------------- # Header #--------------------------------------------- Write-host "" Write-host "------------------------------------------------------------------------" Write-Host "AzResourceGraphPS | Unleash the Power of Azure Resource Graph" -ForegroundColor Green Write-host "Developed by Morten Knudsen, Microsoft MVP (@knudsenmortendk)" Write-Host "" Write-host "Github repository: https://github.com/KnudsenMorten/AzResourceGraphPS" Write-host "PS Gallery: https://www.powershellgallery.com/packages/AzResourceGraphPS" Write-host "------------------------------------------------------------------------" Write-host "" #-------------------------------------------------------------------------- # Check Prereq for PS Module #-------------------------------------------------------------------------- If ($InstallAutoUpdateCleanupOldVersions -eq $true) { Write-host "Checking PS modules ... Please Wait !" Write-host "" ##################################################################### # Az.ResourceGraph ##################################################################### $Module = "Az.ResourceGraph" $ModuleCheck = Get-Module -Name $Module -ListAvailable -ErrorAction SilentlyContinue If (!($ModuleCheck)) { # check for NuGet package provider [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 Write-host "" Write-host "Checking Powershell PackageProvider NuGet ... Please Wait !" if (Get-PackageProvider -ListAvailable -Name NuGet -ErrorAction SilentlyContinue -WarningAction SilentlyContinue) { Write-Host "OK - PackageProvider NuGet is installed" } else { try { Write-Host "Installing NuGet package provider .. Please Wait !" Install-PackageProvider -Name NuGet -Scope $Scope -Confirm:$false -Force } catch [Exception] { $_.message exit } } Write-host "" Write-host "Installing latest version of $($Module) from PsGallery in scope $($Scope) .... Please Wait !" Install-module -Name $Module -Repository PSGallery -Force -Scope $Scope import-module -Name $Module -Global -force -DisableNameChecking -WarningAction SilentlyContinue } Else { ##################################### # Check for any available updates ##################################### # Current version $InstalledVersions = Get-module $Module -ListAvailable $LatestVersion = $InstalledVersions | Sort-Object Version -Descending | Select-Object -First 1 $CleanupVersions = $InstalledVersions | Where-Object { $_.Version -ne $LatestVersion.Version } # Online version in PSGallery (online) $Online = Find-Module -Name $Module -Repository PSGallery # Compare versions if ( ([version]$Online.Version) -gt ([version]$LatestVersion.Version) ) { Write-host "" Write-host "Newer version ($($Online.version)) of $($Module) was detected in PSGallery" Write-host "" Write-host "Updating to latest version $($Online.version) of $($Module) from PSGallery ... Please Wait !" Update-module $Module -Force import-module -Name $Module -Global -force -DisableNameChecking -WarningAction SilentlyContinue } Else { # No new version detected ... continuing ! Write-host "" Write-host "OK - Running latest version ($($LatestVersion.version)) of $($Module)" } ##################################### # Clean-up older versions, if found ##################################### $InstalledVersions = Get-module $Module -ListAvailable $LatestVersion = $InstalledVersions | Sort-Object Version -Descending | Select-Object -First 1 $CleanupVersions = $InstalledVersions | Where-Object { $_.Version -ne $LatestVersion.Version } Write-host "" ForEach ($ModuleRemove in $CleanupVersions) { Write-Host "Removing older version $($ModuleRemove.Version) of $($ModuleRemove.Name) ... Please Wait !" Uninstall-module -Name $ModuleRemove.Name -RequiredVersion $ModuleRemove.Version -Force -ErrorAction SilentlyContinue # Removing left-overs if uninstall doesn't complete task $ModulePath = (get-item $ModuleRemove.Path -ErrorAction SilentlyContinue).DirectoryName if ( ($ModulePath) -and (Test-Path $ModulePath) ) { $Result = takeown /F $ModulePath /A /R $Result = icacls $modulePath /reset $Result = icacls $modulePath /grant Administrators:'F' /inheritance:d /T $Result = Remove-Item -Path $ModulePath -Recurse -Force -Confirm:$false } } } #If (!($ModuleCheck)) ##################################################################### # Az.Accounts ##################################################################### $Module = "Az.Accounts" $ModuleCheck = Get-Module -Name $Module -ListAvailable -ErrorAction SilentlyContinue If (!($ModuleCheck)) { Write-host "" Write-host "Installing latest version of $($Module) from PsGallery in scope $($Scope) .... Please Wait !" Install-module -Name $Module -Repository PSGallery -Force -Scope $Scope import-module -Name $Module -Global -force -DisableNameChecking -WarningAction SilentlyContinue } ##################################################################### # AzResourceGraphPS ##################################################################### $Module = "AzResourceGraphPS" $ModuleCheck = Get-Module -Name $Module -ListAvailable -ErrorAction SilentlyContinue If (!($ModuleCheck)) { Write-host "" Write-host "Installing latest version of $($Module) from PsGallery in scope $($Scope) .... Please Wait !" Install-module -Name $Module -Repository PSGallery -Force -Scope $Scope import-module -Name $Module -Global -force -DisableNameChecking -WarningAction SilentlyContinue } Else { ##################################### # Check for any available updates ##################################### # Current version $InstalledVersions = Get-module $Module -ListAvailable $LatestVersion = $InstalledVersions | Sort-Object Version -Descending | Select-Object -First 1 $CleanupVersions = $InstalledVersions | Where-Object { $_.Version -ne $LatestVersion.Version } # Online version in PSGallery (online) $Online = Find-Module -Name $Module -Repository PSGallery # Compare versions if ( ([version]$Online.Version) -gt ([version]$LatestVersion.Version) ) { Write-host "" Write-host "Newer version ($($Online.version)) of $($Module) was detected in PSGallery" Write-host "" Write-host "Updating to latest version $($Online.version) of $($Module) from PSGallery ... Please Wait !" Update-module $Module -Force import-module -Name $Module -Global -force -DisableNameChecking -WarningAction SilentlyContinue } Else { # No new version detected ... continuing ! Write-host "" Write-host "OK - Running latest version ($($LatestVersion.version)) of $($Module)" } ##################################### # Clean-up older versions, if found ##################################### $InstalledVersions = Get-module $Module -ListAvailable $LatestVersion = $InstalledVersions | Sort-Object Version -Descending | Select-Object -First 1 $CleanupVersions = $InstalledVersions | Where-Object { $_.Version -ne $LatestVersion.Version } Write-host "" ForEach ($ModuleRemove in $CleanupVersions) { Write-Host "Removing older version $($ModuleRemove.Version) of $($ModuleRemove.Name) ... Please Wait !" Uninstall-module -Name $ModuleRemove.Name -RequiredVersion $ModuleRemove.Version -Force -ErrorAction SilentlyContinue # Removing left-overs if uninstall doesn't complete task $ModulePath = (get-item $ModuleRemove.Path -ErrorAction SilentlyContinue).DirectoryName if ( ($ModulePath) -and (Test-Path $ModulePath) ) { $Result = takeown /F $ModulePath /A /R $Result = icacls $modulePath /reset $Result = icacls $modulePath /grant Administrators:'F' /inheritance:d /T $Result = Remove-Item -Path $ModulePath -Recurse -Force -Confirm:$false } } } #If (!($ModuleCheck)) } #If ($InstallAutoUpdateCleanupOldVersions -eq $true) #-------------------------------------------------------------------------- # Checking Prereq for Query #-------------------------------------------------------------------------- If ( ($QueryScope -eq "MG") -and (([string]::IsNullOrWhitespace($Target))) ) { Write-host "" Write-host "Syntax Error: When parameter QueryScope is [MG], you also need to define -Target <MG Name>" -ForegroundColor Red Break } If ( ($QueryScope -eq "Subscription") -and (([string]::IsNullOrWhitespace($Target))) ) { Write-host "" Write-host "Syntax Error: When parameter QueryScope is [Subscription], you also need to define -Target <Subscription Name/Id>" -ForegroundColor Red Break } #-------------------------------------------------------------------------- # Connection #-------------------------------------------------------------------------- If ($InstallAutoUpdateCleanupOldVersions -eq $false) { # Check current AzContext $AzContext = Get-AzContext If ([string]::IsNullOrWhitespace($AzContext)) { If ($AzAppId) { $AzAppSecretSecure = $AzAppSecret | ConvertTo-SecureString -AsPlainText -Force $SecureCreds = New-Object -TypeName System.Management.Automation.PSCredential -ArgumentList $AzAppId, $AzAppSecretSecure Connect-AzAccount -ServicePrincipal -Credential $SecureCreds -Tenant $TenantId -WarningAction SilentlyContinue $AzContext = Get-AzContext } Else { Connect-AzAccount -WarningAction SilentlyContinue $AzContext = Get-AzContext } } } #-------------------------------------------------------------------------- # Select built-in queries using GUI #-------------------------------------------------------------------------- If ( ($InstallAutoUpdateCleanupOldVersions -eq $false) -and ( ($SelectQuery) -or ([string]::IsNullOrWhitespace($Query)) -or ( ($ShowQueryOnly) -and ([string]::IsNullOrWhitespace($Query) ) ) ) ) { $QueryCmdlets = Get-Command -Name "*-Query-AzARG" -ListImported | Sort-Object -Unique $QueryCmdletsArray = @() ForEach ($QueryCmdlet in $QueryCmdlets) { # Run the function $QueryCmdletInfo = & $QueryCmdlet.Name -Details # load cmdlet properties into memory $QueryName = $QueryCmdlet.Name $Object = New-Object PSObject $Object | add-member Noteproperty -name QueryName -Value $QueryName $Object | add-member Noteproperty -name Query -Value $QueryCmdletInfo[0] $Object | add-member Noteproperty -name QueryDescription -Value $QueryCmdletInfo[1] $Object | add-member Noteproperty -name QueryCategory -Value $QueryCmdletInfo[2] $Object | add-member Noteproperty -name QueryCredit -Value $QueryCmdletInfo[3] $QueryCmdletsArray += $Object } $SelectedQuery = $QueryCmdletsArray | select QueryName,QueryDescription,QueryCategory,QueryCredit | Out-GridView -Title 'Choose a predefined query' -PassThru If ($SelectedQuery) { Write-host "Selected Query:" Write-host "$($SelectedQuery.QueryName)" -ForegroundColor Yellow Write-host "" Write-host "Query syntax (pipe result to screen):" If ($Target) { Write-host "$($SelectedQuery.QueryName) | Query-AzResourceGraph -QueryScope $($QueryScope) -Target '$($Target)'" -ForegroundColor Yellow } Else { Write-host "$($SelectedQuery.QueryName) | Query-AzResourceGraph -QueryScope $($QueryScope)" -ForegroundColor Yellow } Write-host "" Write-host " - or -" Write-host "" Write-host "Query syntax (pipe result to variable `$Result):" If ($Target) { Write-host "`$Result = $($SelectedQuery.QueryName) | Query-AzResourceGraph -QueryScope $($QueryScope) -Target '$($Target)'" -ForegroundColor Yellow } Else { Write-host "`$Result = $($SelectedQuery.QueryName) | Query-AzResourceGraph -QueryScope $($QueryScope)" -ForegroundColor Yellow } Write-host "" # Run selected function to load query $Query = & $SelectedQuery.QueryName } } #-------------------------------------------------------------------------- # Show Query Only #-------------------------------------------------------------------------- If ( ($ShowQueryOnly) -and ($Query) ) { Write-host "Query, which will be run against Azure Resource Graph: " Write-host "" Write-host "$($Query)" -ForegroundColor Yellow Write-host "" Write-host "---------------------------------------------------------------------" Write-host "" Break } #-------------------------------------------------------------------------- # First #-------------------------------------------------------------------------- If ( ($First) -and ($Query) ) { Write-host "" Write-host "Scoping - Only First Number of Records:" Write-host "$($First)" -ForegroundColor Yellow Write-host "" } #-------------------------------------------------------------------------- # Skip #-------------------------------------------------------------------------- If ( ($Skip) -and ($Query) ) { Write-host "" Write-host "Scoping - Skip Number of Records:" Write-host "$($Skip)" -ForegroundColor Yellow Write-host "" } #-------------------------------------------------------------------------- # Running Query and returning result #-------------------------------------------------------------------------- If (!([string]::IsNullOrWhitespace($Query))) { Write-host "Query Scope:" Write-host "$($QueryScope)" -ForegroundColor Yellow Write-host "" If ($Target) { Write-host "Target:" Write-host "$($Target)" -ForegroundColor Yellow Write-host "" } Write-host "Context Account:" Write-host "$($AzContext.Account)" -ForegroundColor Yellow Write-host "" Write-host "Context TenantId:" Write-host "$($AzContext.Tenant)" -ForegroundColor Yellow Write-host "" Write-host "Query, which will be run against Azure Resource Graph: " Write-host "" Write-host "$($Query)" -ForegroundColor Yellow Write-host "" Write-host "---------------------------------------------------------------------" Write-host "" Write-host "Running Query against Azure Resource Graph ... Please Wait !" $QueryStart = (Get-date) $ReturnData = @() $pageSize = 1000 $iteration = 0 $searchParams = @{ Query = $Query First = $pageSize } If ( ($QueryScope -eq "MG") -and ($Target) ) # Management group(s) to run query against { do { $iteration += 1 $pageResults = Search-AzGraph -ManagementGroup $Target @searchParams $searchParams.Skip += $pageResults.Count $ReturnData += $pageResults } while ($pageResults.Count -eq $pageSize) } ElseIf ( ($QueryScope -eq "Subscription") -and ($Target) ) # Subscription(s) to run query against { do { $iteration += 1 $pageResults = Search-AzGraph -Subscription $Target @searchParams $searchParams.Skip += $pageResults.Count $ReturnData += $pageResults } while ($pageResults.Count -eq $pageSize) } ElseIf ($QueryScope -eq "Tenant") # UseTenantScope = Run query across all available subscriptions in the current tenant { do { $iteration += 1 $pageResults = Search-AzGraph -UseTenantScope @searchParams $searchParams.Skip += $pageResults.Count $ReturnData += $pageResults } while ($pageResults.Count -eq $pageSize) } If ($First) { $First = $First - 1 # subtract first record (0) $ReturnData = $ReturnData[0..$First] } If ($Skip) { $ReturnDataCount = $ReturnData.count $ReturnData = $ReturnData[$Skip..$ReturnDataCount] } #-------------------------------------------------------------------------- # Return Result #-------------------------------------------------------------------------- $QueryEnd = (Get-date) $QueryTimeTotal = New-Timespan -Start $QueryStart -End $QueryEnd $RecordsReceived = ($ReturnData | Measure-Object).Count Write-host "" Write-host "Raw Records Received (excluding header record):" Write-host "$($RecordsReceived)" -ForegroundColor Green Write-host "" Write-host "Time Used to Get Records:" Write-host "$($QueryTimeTotal)" -ForegroundColor Green Write-host "" Return $ReturnData } } # SIG # Begin signature block # MIIXHgYJKoZIhvcNAQcCoIIXDzCCFwsCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBlbg1c5vAIboeY # v3ix9xpyKLCuUu5I0BzM/sfjZhOneaCCE1kwggVyMIIDWqADAgECAhB2U/6sdUZI # k/Xl10pIOk74MA0GCSqGSIb3DQEBDAUAMFMxCzAJBgNVBAYTAkJFMRkwFwYDVQQK # ExBHbG9iYWxTaWduIG52LXNhMSkwJwYDVQQDEyBHbG9iYWxTaWduIENvZGUgU2ln # bmluZyBSb290IFI0NTAeFw0yMDAzMTgwMDAwMDBaFw00NTAzMTgwMDAwMDBaMFMx # CzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMSkwJwYDVQQD # EyBHbG9iYWxTaWduIENvZGUgU2lnbmluZyBSb290IFI0NTCCAiIwDQYJKoZIhvcN # AQEBBQADggIPADCCAgoCggIBALYtxTDdeuirkD0DcrA6S5kWYbLl/6VnHTcc5X7s # k4OqhPWjQ5uYRYq4Y1ddmwCIBCXp+GiSS4LYS8lKA/Oof2qPimEnvaFE0P31PyLC # o0+RjbMFsiiCkV37WYgFC5cGwpj4LKczJO5QOkHM8KCwex1N0qhYOJbp3/kbkbuL # ECzSx0Mdogl0oYCve+YzCgxZa4689Ktal3t/rlX7hPCA/oRM1+K6vcR1oW+9YRB0 # RLKYB+J0q/9o3GwmPukf5eAEh60w0wyNA3xVuBZwXCR4ICXrZ2eIq7pONJhrcBHe # OMrUvqHAnOHfHgIB2DvhZ0OEts/8dLcvhKO/ugk3PWdssUVcGWGrQYP1rB3rdw1G # R3POv72Vle2dK4gQ/vpY6KdX4bPPqFrpByWbEsSegHI9k9yMlN87ROYmgPzSwwPw # jAzSRdYu54+YnuYE7kJuZ35CFnFi5wT5YMZkobacgSFOK8ZtaJSGxpl0c2cxepHy # 1Ix5bnymu35Gb03FhRIrz5oiRAiohTfOB2FXBhcSJMDEMXOhmDVXR34QOkXZLaRR # kJipoAc3xGUaqhxrFnf3p5fsPxkwmW8x++pAsufSxPrJ0PBQdnRZ+o1tFzK++Ol+ # A/Tnh3Wa1EqRLIUDEwIrQoDyiWo2z8hMoM6e+MuNrRan097VmxinxpI68YJj8S4O # JGTfAgMBAAGjQjBAMA4GA1UdDwEB/wQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB0G # A1UdDgQWBBQfAL9GgAr8eDm3pbRD2VZQu86WOzANBgkqhkiG9w0BAQwFAAOCAgEA # Xiu6dJc0RF92SChAhJPuAW7pobPWgCXme+S8CZE9D/x2rdfUMCC7j2DQkdYc8pzv # eBorlDICwSSWUlIC0PPR/PKbOW6Z4R+OQ0F9mh5byV2ahPwm5ofzdHImraQb2T07 # alKgPAkeLx57szO0Rcf3rLGvk2Ctdq64shV464Nq6//bRqsk5e4C+pAfWcAvXda3 # XaRcELdyU/hBTsz6eBolSsr+hWJDYcO0N6qB0vTWOg+9jVl+MEfeK2vnIVAzX9Rn # m9S4Z588J5kD/4VDjnMSyiDN6GHVsWbcF9Y5bQ/bzyM3oYKJThxrP9agzaoHnT5C # JqrXDO76R78aUn7RdYHTyYpiF21PiKAhoCY+r23ZYjAf6Zgorm6N1Y5McmaTgI0q # 41XHYGeQQlZcIlEPs9xOOe5N3dkdeBBUO27Ql28DtR6yI3PGErKaZND8lYUkqP/f # obDckUCu3wkzq7ndkrfxzJF0O2nrZ5cbkL/nx6BvcbtXv7ePWu16QGoWzYCELS/h # AtQklEOzFfwMKxv9cW/8y7x1Fzpeg9LJsy8b1ZyNf1T+fn7kVqOHp53hWVKUQY9t # W76GlZr/GnbdQNJRSnC0HzNjI3c/7CceWeQIh+00gkoPP/6gHcH1Z3NFhnj0qinp # J4fGGdvGExTDOUmHTaCX4GUT9Z13Vunas1jHOvLAzYIwggbmMIIEzqADAgECAhB3 # vQ4DobcI+FSrBnIQ2QRHMA0GCSqGSIb3DQEBCwUAMFMxCzAJBgNVBAYTAkJFMRkw # FwYDVQQKExBHbG9iYWxTaWduIG52LXNhMSkwJwYDVQQDEyBHbG9iYWxTaWduIENv # ZGUgU2lnbmluZyBSb290IFI0NTAeFw0yMDA3MjgwMDAwMDBaFw0zMDA3MjgwMDAw # MDBaMFkxCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMS8w # LQYDVQQDEyZHbG9iYWxTaWduIEdDQyBSNDUgQ29kZVNpZ25pbmcgQ0EgMjAyMDCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBANZCTfnjT8Yj9GwdgaYw90g9 # z9DljeUgIpYHRDVdBs8PHXBg5iZU+lMjYAKoXwIC947Jbj2peAW9jvVPGSSZfM8R # Fpsfe2vSo3toZXer2LEsP9NyBjJcW6xQZywlTVYGNvzBYkx9fYYWlZpdVLpQ0LB/ # okQZ6dZubD4Twp8R1F80W1FoMWMK+FvQ3rpZXzGviWg4QD4I6FNnTmO2IY7v3Y2F # QVWeHLw33JWgxHGnHxulSW4KIFl+iaNYFZcAJWnf3sJqUGVOU/troZ8YHooOX1Re # veBbz/IMBNLeCKEQJvey83ouwo6WwT/Opdr0WSiMN2WhMZYLjqR2dxVJhGaCJedD # CndSsZlRQv+hst2c0twY2cGGqUAdQZdihryo/6LHYxcG/WZ6NpQBIIl4H5D0e6lS # TmpPVAYqgK+ex1BC+mUK4wH0sW6sDqjjgRmoOMieAyiGpHSnR5V+cloqexVqHMRp # 5rC+QBmZy9J9VU4inBDgoVvDsy56i8Te8UsfjCh5MEV/bBO2PSz/LUqKKuwoDy3K # 1JyYikptWjYsL9+6y+JBSgh3GIitNWGUEvOkcuvuNp6nUSeRPPeiGsz8h+WX4VGH # aekizIPAtw9FbAfhQ0/UjErOz2OxtaQQevkNDCiwazT+IWgnb+z4+iaEW3VCzYkm # eVmda6tjcWKQJQ0IIPH/AgMBAAGjggGuMIIBqjAOBgNVHQ8BAf8EBAMCAYYwEwYD # VR0lBAwwCgYIKwYBBQUHAwMwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQU # 2rONwCSQo2t30wygWd0hZ2R2C3gwHwYDVR0jBBgwFoAUHwC/RoAK/Hg5t6W0Q9lW # ULvOljswgZMGCCsGAQUFBwEBBIGGMIGDMDkGCCsGAQUFBzABhi1odHRwOi8vb2Nz # cC5nbG9iYWxzaWduLmNvbS9jb2Rlc2lnbmluZ3Jvb3RyNDUwRgYIKwYBBQUHMAKG # Omh0dHA6Ly9zZWN1cmUuZ2xvYmFsc2lnbi5jb20vY2FjZXJ0L2NvZGVzaWduaW5n # cm9vdHI0NS5jcnQwQQYDVR0fBDowODA2oDSgMoYwaHR0cDovL2NybC5nbG9iYWxz # aWduLmNvbS9jb2Rlc2lnbmluZ3Jvb3RyNDUuY3JsMFYGA1UdIARPME0wQQYJKwYB # BAGgMgEyMDQwMgYIKwYBBQUHAgEWJmh0dHBzOi8vd3d3Lmdsb2JhbHNpZ24uY29t # L3JlcG9zaXRvcnkvMAgGBmeBDAEEATANBgkqhkiG9w0BAQsFAAOCAgEACIhyJsav # +qxfBsCqjJDa0LLAopf/bhMyFlT9PvQwEZ+PmPmbUt3yohbu2XiVppp8YbgEtfjr # y/RhETP2ZSW3EUKL2Glux/+VtIFDqX6uv4LWTcwRo4NxahBeGQWn52x/VvSoXMNO # Ca1Za7j5fqUuuPzeDsKg+7AE1BMbxyepuaotMTvPRkyd60zsvC6c8YejfzhpX0FA # Z/ZTfepB7449+6nUEThG3zzr9s0ivRPN8OHm5TOgvjzkeNUbzCDyMHOwIhz2hNab # XAAC4ShSS/8SS0Dq7rAaBgaehObn8NuERvtz2StCtslXNMcWwKbrIbmqDvf+28rr # vBfLuGfr4z5P26mUhmRVyQkKwNkEcUoRS1pkw7x4eK1MRyZlB5nVzTZgoTNTs/Z7 # KtWJQDxxpav4mVn945uSS90FvQsMeAYrz1PYvRKaWyeGhT+RvuB4gHNU36cdZytq # tq5NiYAkCFJwUPMB/0SuL5rg4UkI4eFb1zjRngqKnZQnm8qjudviNmrjb7lYYuA2 # eDYB+sGniXomU6Ncu9Ky64rLYwgv/h7zViniNZvY/+mlvW1LWSyJLC9Su7UpkNpD # R7xy3bzZv4DB3LCrtEsdWDY3ZOub4YUXmimi/eYI0pL/oPh84emn0TCOXyZQK8ei # 4pd3iu/YTT4m65lAYPM8Zwy2CHIpNVOBNNwwggb1MIIE3aADAgECAgx5Y9ljauM7 # cdkFAm4wDQYJKoZIhvcNAQELBQAwWTELMAkGA1UEBhMCQkUxGTAXBgNVBAoTEEds # b2JhbFNpZ24gbnYtc2ExLzAtBgNVBAMTJkdsb2JhbFNpZ24gR0NDIFI0NSBDb2Rl # U2lnbmluZyBDQSAyMDIwMB4XDTIzMDMyNzEwMjEzNFoXDTI2MDMyMzE2MTgxOFow # YzELMAkGA1UEBhMCREsxEDAOBgNVBAcTB0tvbGRpbmcxEDAOBgNVBAoTBzJsaW5r # SVQxEDAOBgNVBAMTBzJsaW5rSVQxHjAcBgkqhkiG9w0BCQEWD21va0AybGlua2l0 # Lm5ldDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAMykjWtM6hY5IRPe # VIVB+yX+3zcMJQR2gjTZ81LnGVRE94Zk2GLFAwquGYWt1shoTHTV5j6Ef2AXYBDV # kNruisJVJ17UsMGdsU8upwdZblFbLNzLw+qBXVC/OUVua9M0cub7CfUNkn/Won4D # 7i41QyuDXdZFOIfRhZ3qnCYCJCSgYLoUXAS6xei2tPkkk1w8aXEFxybyy7eRqQjk # HqIS5N4qH3YQkz+SbSlz/yj6mD65H5/Ts+lZxX2xL/8lgJItpdaJx+tarprv/tT+ # +n9a13P53YNzCWOmyhd376+7DMXxxSzT24kq13Ks3xnUPGoWUx2UPRnJHjTWoBfg # Y7Zd3MffrdO0QEoDC9X5F5boh6oankVSOdSPRFns085KI+vkbt3bdG62MIeUbNtS # v7mZBX8gcYv0szlo0ey7bbOJWoiZFT2fB+pBVvxDhpYP0/3aFveM1wfhshaJBhxx # /2GCswYYBHH7B3+8j4BT8N8S030q4snys2Qt9tdFIHvSV7lIw/yorT1WM1cr+Lqo # 74eR+Hi982db0k68p2BGdCOY0QhhaNqxufwbK+gVWrQY57GIX/1cUrBt0akMsli2 # 19xVmUGhIw85ZF7wcQplhslbUxyNUilY+c93q1bsIFjaOnjjvo56g+kyKICm5zsG # FQLRVaXUSLY+i8NSiH8fd64etaptAgMBAAGjggGxMIIBrTAOBgNVHQ8BAf8EBAMC # B4AwgZsGCCsGAQUFBwEBBIGOMIGLMEoGCCsGAQUFBzAChj5odHRwOi8vc2VjdXJl # Lmdsb2JhbHNpZ24uY29tL2NhY2VydC9nc2djY3I0NWNvZGVzaWduY2EyMDIwLmNy # dDA9BggrBgEFBQcwAYYxaHR0cDovL29jc3AuZ2xvYmFsc2lnbi5jb20vZ3NnY2Ny # NDVjb2Rlc2lnbmNhMjAyMDBWBgNVHSAETzBNMEEGCSsGAQQBoDIBMjA0MDIGCCsG # AQUFBwIBFiZodHRwczovL3d3dy5nbG9iYWxzaWduLmNvbS9yZXBvc2l0b3J5LzAI # BgZngQwBBAEwCQYDVR0TBAIwADBFBgNVHR8EPjA8MDqgOKA2hjRodHRwOi8vY3Js # Lmdsb2JhbHNpZ24uY29tL2dzZ2NjcjQ1Y29kZXNpZ25jYTIwMjAuY3JsMBMGA1Ud # JQQMMAoGCCsGAQUFBwMDMB8GA1UdIwQYMBaAFNqzjcAkkKNrd9MMoFndIWdkdgt4 # MB0GA1UdDgQWBBQxxpY2q5yrKa7VFODTZhTfPKmyyTANBgkqhkiG9w0BAQsFAAOC # AgEAe38NgZR4IV9u264/n/jiWlHbBu847j1vpN6dovxMvdUQZ780eH3JzcvG8fo9 # 1uO1iDIZksSigiB+d8Sj5Yvh+oXlfYEffjIQCwcIlWNciOzWYZzl9qPHXgdTnaIu # JA5cR846TepQLVMXc1Yb72Z7OGjldmRIxGjRimDsmzY+TdTu15lF4IkUj0VJhr8F # PYOdEVZVOXHtPmUjPqsq9M7WpALYbc0pUawcy0FOOwXqzaCk7O3vMXej4Oycm6RB # GfRH3JPOCvH2ddiIfPq2Lce4nhTuLsgumBJE2vOalVddIfTBjE9PpMub15lHyp1m # fW0ZJvXOghPvRqufMT3SjPTHt6PV8LwhQD8BiGSZ9rp94js4xTnGexSOFKLLMxWE # PTr5EPe3kmtspGgKCqLEZvsMYz7JlWNuaHBy+vdQZWV3376luwV4IHfGT+1wxe0E # 90dMRI+9SNIKkVvKV3FUtToZUh3Np4cCIHJLQ1eslXFzIJa6wrjVsnWM/3OyedpQ # JERGNYXlVmxdgGFjrY1I6UWII0Y1iZW3t+JvhXosUaha8i/YSxaDH+5H/Klad2OZ # Xq4Eg39QxkCELbmJmSU0sUYNnl0JTEu6jJY9UJMFikzf5s3p2ZuKdyMbRgN5GNNV # 883meI/X5KVHBJDG1epigMer7fFXMVZUGoI12iIz/gOolQExggMbMIIDFwIBATBp # MFkxCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMS8wLQYD # VQQDEyZHbG9iYWxTaWduIEdDQyBSNDUgQ29kZVNpZ25pbmcgQ0EgMjAyMAIMeWPZ # Y2rjO3HZBQJuMA0GCWCGSAFlAwQCAQUAoIGEMBgGCisGAQQBgjcCAQwxCjAIoAKA # AKECgAAwGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIPuWa9H6TRxKelEsdgWP3Yhf # +lFh8lkVn9EaexHlLRUIMA0GCSqGSIb3DQEBAQUABIICADXwRNgJaVjLukbfzRjJ # yf1YoMizr1Qs2jewfRDrxX7R9Y5Onu2fWLoY1Z+CRczE3XyPoB9OA8oDSSfRWHze # +xcDakLP8RFlDHeVF5PNIWnOXgSlwFjwQocmUWoQo2z+dHdMtPdo3iheZ1LN75ON # gBaKrFGMxOoccCHBv92fGsi39OOP/zoByTYXGtGn46ZOiUNhZpnjeiKH/9gkjtsH # wWCx8vI3OZ0MVlgdMJjk1esWl5X9WLVNfZf+Czcyy0+DYtpVqR1xx2wIO10aJowq # AupyV3qGL6kMBJXwwSQfFd2Yre0Robt7C3tNG+lAT4JXnRhxJklvomsA4emksAnm # iMaEx0ZW/KvJtGYpt0FgLtH5vtsTO77IJ7qPL6r2Y0nFqkIJyxQdGzmwoJkzSjlR # vhHqzYaDc5ja44DSh5VhbPnd8gIXygS6TVmPzWZPPBUyy17Je19aquw/oPftTjrS # /yFReJnWKErCie/XbnztSO+OpH3oTgupFLTvk8oE5+RoTuO2qsSB7zKF150pNONH # amlCOZE6DCSzTpOGSyG3XCXzs0DWlpIy5a7d0dXnWBp9i9Jb3sS+tXUe4zjqPDD9 # a93b62ldLCNjzHGsFmSXSokwvjA+EL+Bw8/VJ4+MHun5apcyMCOqwzf+m0sxPpY3 # 8s6tq9RUYKnUE0cAq2yKd9iy # SIG # End signature block |