AzureARCStuff.psm1

function Copy-ToArcMachine {
    <#
    .SYNOPSIS
    Copy-Item (via arc-ssh-proxy) proxy function for ARC machines.
    Enables you to copy item(s) to your ARC machine(s) via arc-ssh-proxy.
 
    .DESCRIPTION
    Copy-Item (via arc-ssh-proxy) proxy function for ARC machines.
    Enables you to copy item(s) to your ARC machine(s) via arc-ssh-proxy.
 
    .PARAMETER path
    Source path for the Copy-Item operation.
 
    .PARAMETER destination
    Destination path for the Copy-Item operation.
 
    The folder structure has to already exist on the ARC machine! It won't be created automatically.
 
    .PARAMETER connectionConfig
    PSCustomObject(s) where two properties have to be defined:
     - MachineName (ARC machine name)
     - ResourceGroupName (RG where the machine is located)
 
    Can be used to copy files against multiple ARC machines (unlike parameters 'machineName' and 'resourceGroupName' which can target only one).
 
    .PARAMETER resourceGroupName
    Nam of the resource group where the ARC machine is placed.
 
    If both 'resourceGroupName' and 'machineName' parameters aren't provided, you will be asked through GUI to pick some of the existing ARC machines interactively.
 
    .PARAMETER machineName
    Name of the ARC machine.
 
    If both 'resourceGroupName' and 'machineName' parameters aren't provided, you will be asked through GUI to pick some of the existing ARC machines interactively.
 
    .PARAMETER userName
    Name of the existing ARC-machine local user that will be used during SSH authentication.
 
    By default $_localAdminName or 'administrator' if empty.
 
    .PARAMETER machineType
    Type of the ARC machine.
 
    Possible values are: 'Microsoft.HybridCompute/machines', 'Microsoft.Compute/virtualMachines', 'Microsoft.ConnectedVMwarevSphere/virtualMachines', 'Microsoft.ScVmm/virtualMachines', 'Microsoft.AzureStackHCI/virtualMachines'
 
    Default value is 'Microsoft.HybridCompute/machines'.
 
    .PARAMETER privateKeyFile
    Path to the SSH private key file.
 
    Default will be used if not provided.
 
    .PARAMETER keyVault
    Name of the KeyVault where secret with private key is stored.
 
    If provided, stored private key will be used instead of a local one.
    It will be temporarily downloaded, used for the connection and then safely discarded.
 
    By default $_arcSSHKeyVaultName.
 
    .PARAMETER secretName
    Name of the secret where private key is stored.
 
    By default $_ITSSHSecretName.
 
    .EXAMPLE
    Copy-ToArcMachine -path "C:\tools\*" -destination "C:\tools\"
 
    Copy a folder content to specified ARC machine destination folder (such folder has to exists already!).
 
    .EXAMPLE
    Copy-ToArcMachine -path "C:\tools\procmon.exe" -destination "C:\tools\"
 
    Copy a file to specified ARC machine destination folder (such folder has to exists already!).
 
    .NOTES
    Prerequisites:
        1. SSH has to be configured & running on the ARC machine
            https://learn.microsoft.com/en-us/azure/azure-arc/servers/ssh-arc-overview?tabs=azure-powershell
            https://learn.microsoft.com/en-us/azure/azure-arc/servers/ssh-arc-powershell-remoting?tabs=azure-powershell
        2. Default connectivity endpoint must be created
            Invoke-AzRestMethod -Method put -Path /subscriptions/<subscriptionId>/resourceGroups/<resourceGroupName>/providers/Microsoft.HybridCompute/machines/<machineName>/providers/Microsoft.HybridConnectivity/endpoints/default?api-version=2023-03-15 -Payload '{"properties": {"type": "default"}}'
        3. Service Configuration in the Connectivity Endpoint on the Arc-enabled server must be set to allow SSH connection to a specific port
            Invoke-AzRestMethod -Method put -Path /subscriptions/<subscriptionId>/resourceGroups/<resourceGroupName>/providers/Microsoft.HybridCompute/machines/<machineName>/providers/Microsoft.HybridConnectivity/endpoints/default/serviceconfigurations/SSH?api-version=2023-03-15 -Payload '{"properties": {"serviceName": "SSH", "port": 22}}'
        4. Public SSH key has to be set on the server and private key has to be on your device
 
    Debugging:
        If you receive "Permission denied (publickey,keyboard-interactive)." it is bad/missing private key on your computer ('keyFile' parameter) or specified local username ('userName' parameter) doesn't match existing one.
    #>


    [CmdletBinding(DefaultParameterSetName = 'Default')]
    param (
        [Parameter(Mandatory = $true)]
        [ValidateScript( {
                if (Test-Path -Path $_) {
                    $true
                } else {
                    throw "'$_' doesn't exist"
                }
            })]
        [string] $path,

        [Parameter(Mandatory = $true)]
        [string] $destination,

        [Parameter(Mandatory = $true, ParameterSetName = "MultipleMachines")]
        [ValidateNotNullOrEmpty()]
        [PSCustomObject[]] $connectionConfig,

        [Parameter(Mandatory = $true, ParameterSetName = "OneMachine")]
        [ValidateNotNullOrEmpty()]
        [string] $resourceGroupName,

        [Parameter(Mandatory = $true, ParameterSetName = "OneMachine")]
        [ValidateNotNullOrEmpty()]
        [string] $machineName,

        [ValidateNotNullOrEmpty()]
        [string] $userName = $_localAdminName,

        [ValidateSet('Microsoft.HybridCompute/machines', 'Microsoft.Compute/virtualMachines', 'Microsoft.ConnectedVMwarevSphere/virtualMachines', 'Microsoft.ScVmm/virtualMachines', 'Microsoft.AzureStackHCI/virtualMachines')]
        [string] $machineType = 'Microsoft.HybridCompute/machines',

        [Parameter(Mandatory = $true, ParameterSetName = "PrivateKeyFile")]
        [ValidateScript( {
                if (Test-Path -Path $_ -PathType Leaf) {
                    $true
                } else {
                    throw "'$_' file doesn't exist"
                }
            })]
        [string] $privateKeyFile,

        [Parameter(Mandatory = $true, ParameterSetName = "KeyVault")]
        [string] $keyVault = $_arcSSHKeyVaultName,

        [Parameter(Mandatory = $true, ParameterSetName = "KeyVault")]
        [string] $secretName = $_ITSSHSecretName
    )

    #region checks
    if (!$userName) {
        $userName = "Administrator"
    }

    if (!(Get-Command 'Get-AzAccessToken' -ErrorAction silentlycontinue) -or !($azAccessToken = Get-AzAccessToken -WarningAction SilentlyContinue -ErrorAction SilentlyContinue) -or $azAccessToken.ExpiresOn -lt [datetime]::now) {
        throw "$($MyInvocation.MyCommand): Authentication needed. Please call Connect-AzAccount."
    }

    if (($resourceGroupName -and !$machineName) -or (!$resourceGroupName -and $machineName)) {
        throw "Set both 'resourceGroupName' and 'machineName' parameters or none of them"
    }
    #endregion checks

    #region get missing parameter values
    if ($resourceGroupName -and $machineName) {
        $connectionConfig = [PSCustomObject]@{
            MachineName       = $machineName
            ResourceGroupName = $resourceGroupName
        }
    } else {
        while (!$connectionConfig) {
            if (!$arcMachineList) {
                $arcMachineList = Get-ArcMachineOverview

                if (!$arcMachineList) {
                    throw "Unable to find any ARC machines"
                }
            }

            $arcMachineList | select name, resourceGroup, status | Out-GridView -Title "Select ARC machine to connect" -OutputMode Multiple | % {
                $connectionConfig += [PSCustomObject]@{
                    MachineName       = $_.Name
                    ResourceGroupName = $_.ResourceGroup
                }
            }
        }
    }
    #endregion get missing parameter values

    #region get/create ARC session(s)
    $PSBoundParameters2 = @{
        ConnectionConfig = $connectionConfig
    }
    # add explicitly specified parameters if any
    $PSBoundParameters.GetEnumerator() | ? Key -In "UserName", "MachineType", "PrivateKeyFile", "KeyVault", "SecretName" | % {
        $PSBoundParameters2.($_.Key) = $_.Value
    }
    $arcSession = New-ArcPSSession @PSBoundParameters2
    #endregion get/create ARC session(s)

    # copy file(s) the command on the ARC machine(s)
    $arcSession | % {
        Write-Verbose "Copy items to the '$($_.ComputerName)'"
        Copy-Item -Path $path -Destination $destination -ToSession $_ -Force
    }
}

function Enter-ArcPSSession {
    <#
    .SYNOPSIS
    Enter interactive remote session to ARC machine via arc-ssh-proxy.
 
    .DESCRIPTION
    Enter interactive remote session to ARC machine via arc-ssh-proxy.
 
    1. SSH session via ARC agent will be created
    2. PS remote session via created SSH session will be made & entered
 
    Check NOTES for more details.
 
    .PARAMETER resourceGroupName
    Nam of the resource group where the ARC machine is placed.
 
    If both 'resourceGroupName' and 'machineName' parameters aren't provided, you will be asked through GUI to pick some of the existing ARC machines interactively.
 
    .PARAMETER machineName
    Name of the ARC machine.
 
    If both 'resourceGroupName' and 'machineName' parameters aren't provided, you will be asked through GUI to pick some of the existing ARC machines interactively.
 
    .PARAMETER userName
    Name of the existing ARC-machine local user that will be used during SSH authentication.
 
    By default $_localAdminName or 'administrator' if empty.
 
    .PARAMETER machineType
    Type of the ARC machine.
 
    Possible values are: 'Microsoft.HybridCompute/machines', 'Microsoft.Compute/virtualMachines', 'Microsoft.ConnectedVMwarevSphere/virtualMachines', 'Microsoft.ScVmm/virtualMachines', 'Microsoft.AzureStackHCI/virtualMachines'
 
    Default value is 'Microsoft.HybridCompute/machines'.
 
    .PARAMETER privateKeyFile
    Path to the SSH private key file.
 
    Default will be used if not provided.
 
    .PARAMETER keyVault
    Name of the KeyVault where secret with private key is stored.
 
    If provided, stored private key will be used instead of a local one.
    It will be temporarily downloaded, used for the connection and then safely discarded.
 
    By default $_arcSSHKeyVaultName.
 
    .PARAMETER secretName
    Name of the secret where private key is stored.
 
    By default $_ITSSHSecretName.
 
    .EXAMPLE
    Enter-ArcPSSession
 
    1. GUI with available ARC machines will be shown to pick one.
    2. Connection to the selected machine will be made via
        - SSH using local user 'administrator'
        - followed by creation of the remote PowerShell interactive session (through created SSH session).
 
    If $_arcSSHKeyVaultName and $_ITSSHSecretName are set then private SSH key will be temporarily retrieved from the selected KeyVault.
    Otherwise locally stored private key (c:\Users\<user>\.ssh\id_ecdsa) will be used.
 
    .EXAMPLE
    Enter-ArcPSSession -resourceGroupName arcMachines -machineName arcServer01
 
    1. Connection to the selected machine will be made via
        - SSH using local user 'administrator'
        - followed by creation of the remote PowerShell interactive session (through created SSH session).
 
    If $_arcSSHKeyVaultName and $_ITSSHSecretName are set then private SSH key will be temporarily retrieved from the selected KeyVault.
    Otherwise locally stored private key (c:\Users\<user>\.ssh\id_ecdsa) will be used.
 
    .EXAMPLE
    Enter-ArcPSSession -resourceGroupName arcMachines -machineName arcServer01 -privateKeyFile "C:\Users\admin\.ssh\id_ecdsa_servers" -userName root
 
    1. Connection to the selected machine will be made via
        - SSH using local user 'root'
        - followed by creation of the remote PowerShell interactive session (through created SSH session).
 
    Specified private SSH key will be used to authenticate.
 
    .EXAMPLE
    Enter-ArcPSSession -keyVault KeyVaultArc -secretName AAAAE2VjZHNhLXNoYTItbmlzdHAyNTY
 
    1. GUI with available ARC machines will be shown to pick one.
    2. Connection to the selected machine will be made via
        - SSH using local user 'administrator' and temporary private key (retrieved from the KeyVault)
        - followed by creation of the remote PowerShell interactive session (through created SSH session).
 
    The specified KeyVault and secret will be used to temporarily retrieve the SSH private key
 
    .NOTES
    Prerequisites:
        1. SSH has to be configured & running on the ARC machine
            https://learn.microsoft.com/en-us/azure/azure-arc/servers/ssh-arc-overview?tabs=azure-powershell
            https://learn.microsoft.com/en-us/azure/azure-arc/servers/ssh-arc-powershell-remoting?tabs=azure-powershell
        2. Default connectivity endpoint must be created
            Invoke-AzRestMethod -Method put -Path /subscriptions/<subscriptionId>/resourceGroups/<resourceGroupName>/providers/Microsoft.HybridCompute/machines/<machineName>/providers/Microsoft.HybridConnectivity/endpoints/default?api-version=2023-03-15 -Payload '{"properties": {"type": "default"}}'
        3. Service Configuration in the Connectivity Endpoint on the Arc-enabled server must be set to allow SSH connection to a specific port
            Invoke-AzRestMethod -Method put -Path /subscriptions/<subscriptionId>/resourceGroups/<resourceGroupName>/providers/Microsoft.HybridCompute/machines/<machineName>/providers/Microsoft.HybridConnectivity/endpoints/default/serviceconfigurations/SSH?api-version=2023-03-15 -Payload '{"properties": {"serviceName": "SSH", "port": 22}}'
        4. Public SSH key has to be set on the server and private key has to be on your device
 
    Debugging:
        If you receive "Permission denied (publickey,keyboard-interactive)." it is bad/missing private key on your computer ('privateKeyFile' parameter) or specified local username ('userName' parameter) doesn't match existing one.
    #>


    [CmdletBinding(DefaultParameterSetName = 'Default')]
    param (
        [ValidateNotNullOrEmpty()]
        [string] $resourceGroupName,

        [ValidateNotNullOrEmpty()]
        [string] $machineName,

        [ValidateNotNullOrEmpty()]
        [string] $userName = $_localAdminName,

        [ValidateSet('Microsoft.HybridCompute/machines', 'Microsoft.Compute/virtualMachines', 'Microsoft.ConnectedVMwarevSphere/virtualMachines', 'Microsoft.ScVmm/virtualMachines', 'Microsoft.AzureStackHCI/virtualMachines')]
        [string] $machineType = 'Microsoft.HybridCompute/machines',

        [Parameter(Mandatory = $true, ParameterSetName = "PrivateKeyFile")]
        [ValidateScript( {
                if (Test-Path -Path $_ -PathType Leaf) {
                    $true
                } else {
                    throw "'$_' file doesn't exist"
                }
            })]
        [string] $privateKeyFile,

        [Parameter(Mandatory = $true, ParameterSetName = "KeyVault")]
        [string] $keyVault = $_arcSSHKeyVaultName,

        [Parameter(Mandatory = $true, ParameterSetName = "KeyVault")]
        [string] $secretName = $_ITSSHSecretName
    )

    #region checks
    if (!$userName) {
        $userName = "Administrator"
    }

    if (!(Get-Command 'Get-AzAccessToken' -ErrorAction silentlycontinue) -or !($azAccessToken = Get-AzAccessToken -WarningAction SilentlyContinue -ErrorAction SilentlyContinue) -or $azAccessToken.ExpiresOn -lt [datetime]::now) {
        throw "$($MyInvocation.MyCommand): Authentication needed. Please call Connect-AzAccount."
    }

    if (($resourceGroupName -and !$machineName) -or (!$resourceGroupName -and $machineName)) {
        throw "Set both 'resourceGroupName' and 'machineName' parameters or none of them"
    }
    #endregion checks

    #region get missing parameter values
    while (!$resourceGroupName -and !$machineName) {
        if (!$arcMachineList) {
            $arcMachineList = Get-ArcMachineOverview
        }

        $selected = $arcMachineList | select name, resourceGroup, status | Out-GridView -Title "Select ARC machine to connect" -OutputMode Single

        $resourceGroupName = $selected.resourceGroup
        $machineName = $selected.name
    }
    #endregion get missing parameter values

    #region get/create ARC session(s)
    $PSBoundParameters2 = @{
        resourceGroupName = $resourceGroupName
        machineName       = $machineName
    }
    # add explicitly specified parameters if any
    $PSBoundParameters.GetEnumerator() | ? Key -In "UserName", "MachineType", "PrivateKeyFile", "KeyVault", "SecretName" | % {
        $PSBoundParameters2.($_.Key) = $_.Value
    }
    $arcSession = New-ArcPSSession @PSBoundParameters2
    #endregion get/create ARC session(s)

    #TODO any benefit of using Enter-AzVM?
    Enter-PSSession -Session $arcSession
}

function Get-ARCExtensionAvailableVersion {
    <#
    .SYNOPSIS
    Returns all available versions of selected ARC extension.
 
    .DESCRIPTION
    Returns all available versions of selected ARC extension.
 
    .PARAMETER location
    Extension ARC machine location.
    Because extensions are rolled out gradually, different locations can show different results.
 
    .PARAMETER publisherName
    Extension publisher name.
 
    .PARAMETER type
    Extension type/name.
 
    .EXAMPLE
    # to get all extensions
    # Get-ARCExtensionOverview
 
    Get-ARCExtensionAvailableVersion -Location westeurope -PublisherName Microsoft.Compute -Type CustomScriptExtension
    #>


    [CmdletBinding()]
    param (
        [Parameter(Mandatory = $true)]
        [string] $location,

        [Parameter(Mandatory = $true)]
        [string] $publisherName,

        [Parameter(Mandatory = $true)]
        [Alias("Name")]
        [string] $type
    )

    Get-AzVMExtensionImage -Location $location -PublisherName $publisherName -Type $type | Sort-Object -Property { [version]$_.version }
}

function Get-ARCExtensionOverview {
    <#
    .SYNOPSIS
    Returns overview of all installed ARC extensions.
 
    .DESCRIPTION
    Returns overview of all installed ARC extensions.
 
    .EXAMPLE
    Get-ARCExtensionOverview
 
    Returns overview of all installed ARC extensions.
    #>


    [CmdletBinding()]
    param()

    if (!(Get-Module Az.ResourceGraph) -and !(Get-Module Az.ResourceGraph -ListAvailable)) {
        throw "Module Az.ResourceGraph is missing. Function $($MyInvocation.MyCommand) cannot continue"
    }

    $query = @'
resources
| where type =~ "microsoft.hybridcompute/machines/extensions"
'@

    # | project id, publisher = properties.publisher, type = properties.type, automaticUpgradesEnabled = properties.enableAutomaticUpgrade

    # execute the query
    Search-AzGraph -Query $Query
}

function Get-ArcMachineOverview {
    <#
    .SYNOPSIS
    Get list of all ARC machines in your Azure tenant.
 
    .DESCRIPTION
    Get list of all ARC machines in your Azure tenant and their basic information.
 
    To get details about specific machine, use Get-AzConnectedMachine.
 
    .EXAMPLE
    Get-ArcMachineOverview
 
    Get list of all ARC machines in your Azure tenant and their basic information.
    #>


    [CmdletBinding()]
    param()

    if (!(Get-Module Az.ResourceGraph) -and !(Get-Module Az.ResourceGraph -ListAvailable)) {
        throw "Module Az.ResourceGraph is missing. Function $($MyInvocation.MyCommand) cannot continue"
    }

    # query stolen from developer tools pane at https://portal.azure.com/#view/Microsoft_Azure_ArcCenterUX/ArcCenterMenuBlade/~/servers
    $query = @'
resources
| where type =~ 'microsoft.hybridcompute/machines'
| extend machineId = tolower(tostring(id))
| extend datacenter = iif(isnull(tags.Datacenter), '', tags.Datacenter)
| extend state = properties.status
| extend SMI = identity.principalId
| extend status = case(
    state =~ 'Connected', 'Connected',
    state =~ 'Disconnected', 'Offline',
    state =~ 'Error', 'Error',
    state =~ 'Expired', 'Expired',
    '')
| extend osSku = properties.osSku
| extend os = properties.osName
| extend osName = case(
    os =~ 'windows', 'Windows',
    os =~ 'linux', 'Linux',
    '')
| extend operatingSystem = iif(isnotnull(osSku), osSku, osName)
| extend assessmentMode = iff(os =~ "windows",
    properties.osProfile.windowsConfiguration.patchSettings.assessmentMode,
    properties.osProfile.linuxConfiguration.patchSettings.assessmentMode)
| extend periodicAssessment = iff(isnotnull(assessmentMode) and assessmentMode =~ "AutomaticByPlatform", true, false)
| join kind=leftouter (
    resources
    | where type =~ "microsoft.hybridcompute/machines/extensions"
    | extend machineId = tolower(tostring(trim_end(@"\/\w+\/(\w|\.)+", id)))
    | extend provisioned = tolower(tostring(properties.provisioningState)) == "succeeded"
    | summarize
        MDEcnt = countif(properties.type in ("MDE.Linux", "MDE.Windows") and provisioned),
        AMAcnt = countif(properties.type in ("AzureMonitorWindowsAgent", "AzureMonitorLinuxAgent", "MicrosoftMonitoringAgent", "OmsAgentForLinux") and provisioned),
        WACcnt = countif(properties.type in ("AdminCenter") and provisioned) by machineId
) on machineId
| join kind=leftouter (
    patchassessmentresources
    | where type =~ "microsoft.hybridcompute/machines/patchassessmentresults"
    | where properties.status =~ "Succeeded" or properties.status =~ "Inprogress"
    | parse id with resourceId "/patchAssessmentResults" *
    | extend resourceId=tolower(resourceId)
    | project resourceId, assessProperties=properties
) on $left.machineId == $right.resourceId
| extend defenderStatus = iff ((MDEcnt>0), 'Enabled', 'Not enabled')
| extend monitoringAgent = iff ((AMAcnt>0), 'Installed','Not installed')
| extend wacStatus = iff ((WACcnt>0), 'Enabled', 'Not enabled')
| extend hostName = tostring(properties.displayName)
| extend name = iif(properties.cloudMetadata.provider == 'AWS' and name != hostName, strcat(name, "(", hostName, ")"), name)
| extend updateStatusBladeLinkText = case(
    (isnotnull(assessProperties) and assessProperties.status =~ "inprogress"), 'Checking for updates',
    ((isnotnull(assessProperties) and assessProperties.osType =~ "Windows" and (assessProperties.availablePatchCountByClassification.critical>0 or
    assessProperties.availablePatchCountByClassification.definition>0 or assessProperties.availablePatchCountByClassification.featurePack>0 or
    assessProperties.availablePatchCountByClassification.security>0 or
    assessProperties.availablePatchCountByClassification.servicePack>0 or assessProperties.availablePatchCountByClassification.tools>0 or
    assessProperties.availablePatchCountByClassification.updateRollup>0 or assessProperties.availablePatchCountByClassification.updates>0)) or
    (isnotnull(assessProperties) and assessProperties.osType =~ "Linux" and (assessProperties.availablePatchCountByClassification.other>0 or assessProperties.availablePatchCountByClassification.security>0))),
    strcat(iff(assessProperties.osType =~ 'Windows', toint(assessProperties.availablePatchCountByClassification.critical) + toint(assessProperties.availablePatchCountByClassification.definition)
    + toint(assessProperties.availablePatchCountByClassification.featurePack) + toint(assessProperties.availablePatchCountByClassification.security)
    + toint(assessProperties.availablePatchCountByClassification.servicePack) + toint(assessProperties.availablePatchCountByClassification.tools) + toint(assessProperties.availablePatchCountByClassification.updateRollup)
    + toint(assessProperties.availablePatchCountByClassification.updates),
    toint(assessProperties.availablePatchCountByClassification.other) + toint(assessProperties.availablePatchCountByClassification.security)), ' pending updates'),
    (isnotnull(assessProperties) and assessProperties.rebootPending =~ "true"), 'Pending reboot',
    ((isnotnull(assessProperties) and assessProperties.osType =~ "Windows" and (assessProperties.availablePatchCountByClassification.critical==0 and
    assessProperties.availablePatchCountByClassification.definition==0 and assessProperties.availablePatchCountByClassification.featurePack==0 and
    assessProperties.availablePatchCountByClassification.security==0 and assessProperties.availablePatchCountByClassification.servicePack==0 and
    assessProperties.availablePatchCountByClassification.tools==0 and assessProperties.availablePatchCountByClassification.updateRollup==0 and assessProperties.availablePatchCountByClassification.updates==0)) or
    (isnotnull(assessProperties) and assessProperties.osType =~ "Linux" and (assessProperties.availablePatchCountByClassification.other==0 and assessProperties.availablePatchCountByClassification.security==0))), 'No pending updates',
    ((isnull(periodicAssessment) or periodicAssessment == false)and (isnull(assessProperties) == true)), 'Enable periodic assessment', 'No updates data')
| extend updateStatusBladeLinkBlade = case(
    ((isnull(periodicAssessment) or periodicAssessment == false) and
    (isnull(assessProperties) == true)),
    pack("blade", "UpdateCenterUpdateSettingsBlade", "extension", "Microsoft_Azure_Automation"),
    pack("blade", "UpdateMgmtV2MenuBlade", "extension", "Microsoft_Azure_Automation")
    )
| extend updateStatusBladeLinkParameters = case(
    ((isnull(periodicAssessment) or periodicAssessment == false) and
    (isnull(assessProperties) == true)),
    pack("ids", pack_array(machineId), "source", "Arc_Server_BrowseResourceBlade"),
    pack("machineResourceId", id, "source", "Arc_Server_BrowseResourceBlade")
    )
| extend updateStatus = pack(
    "text", updateStatusBladeLinkText,
    "blade", updateStatusBladeLinkBlade.blade,
    "extension", updateStatusBladeLinkBlade.extension,
    "parameters", updateStatusBladeLinkParameters)
| project name, status, resourceGroup, subscriptionId, SMI, datacenter, operatingSystem, id, type, location, kind, tags, machineId, defenderStatus, monitoringAgent, wacStatus, updateStatus, hostName, updateStatusBladeLinkText|where (type !~ ('dell.storage/filesystems'))|where (type !~ ('arizeai.observabilityeval/organizations'))|where (type !~ ('lambdatest.hyperexecute/organizations'))|where (type !~ ('pinecone.vectordb/organizations'))|where (type !~ ('microsoft.weightsandbiases/instances'))|where (type !~ ('paloaltonetworks.cloudngfw/globalrulestacks'))|where (type !~ ('purestorage.block/storagepools/avsstoragecontainers'))|where (type !~ ('purestorage.block/reservations'))|where (type !~ ('purestorage.block/storagepools'))|where (type !~ ('solarwinds.observability/organizations'))|where (type !~ ('splitio.experimentation/experimentationworkspaces'))|where (type !~ ('microsoft.agfoodplatform/farmbeats'))|where (type !~ ('microsoft.agricultureplatform/agriservices'))|where (type !~ ('microsoft.appsecurity/policies'))|where (type !~ ('microsoft.arc/allfairfax'))|where (type !~ ('microsoft.arc/all'))|where (type !~ ('microsoft.cdn/profiles/securitypolicies'))|where (type !~ ('microsoft.cdn/profiles/secrets'))|where (type !~ ('microsoft.cdn/profiles/rulesets'))|where (type !~ ('microsoft.cdn/profiles/rulesets/rules'))|where (type !~ ('microsoft.cdn/profiles/afdendpoints/routes'))|where (type !~ ('microsoft.cdn/profiles/origingroups'))|where (type !~ ('microsoft.cdn/profiles/origingroups/origins'))|where (type !~ ('microsoft.cdn/profiles/afdendpoints'))|where (type !~ ('microsoft.cdn/profiles/customdomains'))|where (type !~ ('microsoft.chaos/privateaccesses'))|where (type !~ ('microsoft.sovereign/transparencylogs'))|where (type !~ ('microsoft.sovereign/landingzoneconfigurations'))|where (type !~ ('microsoft.hardwaresecuritymodules/cloudhsmclusters'))|where (type !~ ('microsoft.cloudtest/accounts'))|where (type !~ ('microsoft.cloudtest/hostedpools'))|where (type !~ ('microsoft.cloudtest/images'))|where (type !~ ('microsoft.cloudtest/pools'))|where (type !~ ('microsoft.compute/computefleetinstances'))|where (type !~ ('microsoft.compute/computefleetscalesets'))|where (type !~ ('microsoft.compute/standbypoolinstance'))|where (type !~ ('microsoft.compute/virtualmachineflexinstances'))|where (type !~ ('microsoft.kubernetesconfiguration/extensions'))|where (type !~ ('microsoft.containerservice/managedclusters/microsoft.kubernetesconfiguration/extensions'))|where (type !~ ('microsoft.kubernetes/connectedclusters/microsoft.kubernetesconfiguration/namespaces'))|where (type !~ ('microsoft.containerservice/managedclusters/microsoft.kubernetesconfiguration/namespaces'))|where (type !~ ('microsoft.kubernetes/connectedclusters/microsoft.kubernetesconfiguration/fluxconfigurations'))|where (type !~ ('microsoft.containerservice/managedclusters/microsoft.kubernetesconfiguration/fluxconfigurations'))|where (type !~ ('microsoft.portalservices/extensions/deployments'))|where (type !~ ('microsoft.portalservices/extensions'))|where (type !~ ('microsoft.portalservices/extensions/slots'))|where (type !~ ('microsoft.portalservices/extensions/versions'))|where (type !~ ('microsoft.datacollaboration/workspaces'))|where (type !~ ('microsoft.deviceregistry/devices'))|where (type !~ ('microsoft.deviceupdate/updateaccounts'))|where (type !~ ('microsoft.deviceupdate/updateaccounts/updates'))|where (type !~ ('microsoft.deviceupdate/updateaccounts/deviceclasses'))|where (type !~ ('microsoft.deviceupdate/updateaccounts/deployments'))|where (type !~ ('microsoft.deviceupdate/updateaccounts/agents'))|where (type !~ ('microsoft.deviceupdate/updateaccounts/activedeployments'))|where (type !~ ('private.easm/workspaces'))|where (type !~ ('microsoft.impact/connectors'))|where (type !~ ('microsoft.edgeorder/virtual_orderitems'))|where (type !~ ('microsoft.workloads/epicvirtualinstances'))|where (type !~ ('microsoft.fairfieldgardens/provisioningresources'))|where (type !~ ('microsoft.fairfieldgardens/provisioningresources/provisioningpolicies'))|where (type !~ ('microsoft.healthmodel/healthmodels'))|where (type !~ ('microsoft.hybridcompute/arcserverwithwac'))|where (type !~ ('microsoft.hybridcompute/machinessovereign'))|where (type !~ ('microsoft.hybridcompute/machinesesu'))|where (type !~ ('microsoft.hybridcompute/machinespaygo'))|where (type !~ ('microsoft.hybridcompute/machinessoftwareassurance'))|where (type !~ ('microsoft.network/virtualhubs')) or ((kind =~ ('routeserver')))|where (type !~ ('microsoft.network/networkvirtualappliances'))|where (type !~ ('microsoft.devhub/iacprofiles'))|where (type !~ ('microsoft.modsimworkbench/workbenches/chambers'))|where (type !~ ('microsoft.modsimworkbench/workbenches/chambers/files'))|where (type !~ ('microsoft.modsimworkbench/workbenches/chambers/filerequests'))|where (type !~ ('microsoft.modsimworkbench/workbenches/chambers/licenses'))|where (type !~ ('microsoft.modsimworkbench/workbenches/chambers/connectors'))|where (type !~ ('microsoft.modsimworkbench/workbenches/sharedstorages'))|where (type !~ ('microsoft.modsimworkbench/workbenches/chambers/storages'))|where (type !~ ('microsoft.modsimworkbench/workbenches/chambers/workloads'))|where (type !~ ('microsoft.insights/diagnosticsettings'))|where not((type =~ ('microsoft.network/serviceendpointpolicies')) and ((kind =~ ('internal'))))|where (type !~ ('microsoft.resources/resourcegraphvisualizer'))|where (type !~ ('microsoft.orbital/cloudaccessrouters'))|where (type !~ ('microsoft.orbital/terminals'))|where (type !~ ('microsoft.orbital/sdwancontrollers'))|where (type !~ ('microsoft.orbital/spacecrafts/contacts'))|where (type !~ ('microsoft.orbital/contactprofiles'))|where (type !~ ('microsoft.orbital/edgesites'))|where (type !~ ('microsoft.orbital/geocatalogs'))|where (type !~ ('microsoft.orbital/groundstations'))|where (type !~ ('microsoft.orbital/l2connections'))|where (type !~ ('microsoft.orbital/spacecrafts'))|where (type !~ ('microsoft.recommendationsservice/accounts/modeling'))|where (type !~ ('microsoft.recommendationsservice/accounts/serviceendpoints'))|where (type !~ ('microsoft.recoveryservicesbvtd/vaults'))|where (type !~ ('microsoft.recoveryservicesbvtd2/vaults'))|where (type !~ ('microsoft.recoveryservicesintd/vaults'))|where (type !~ ('microsoft.recoveryservicesintd2/vaults'))|where (type !~ ('microsoft.relationships/servicegroupmember'))|where (type !~ ('microsoft.relationships/dependencyof'))|where (type !~ ('microsoft.resources/deletedresources'))|where (type !~ ('microsoft.deploymentmanager/rollouts'))|where (type !~ ('microsoft.features/featureprovidernamespaces/featureconfigurations'))|where (type !~ ('microsoft.saashub/cloudservices/hidden'))|where (type !~ ('microsoft.providerhub/providerregistrations'))|where (type !~ ('microsoft.providerhub/providerregistrations/customrollouts'))|where (type !~ ('microsoft.providerhub/providerregistrations/defaultrollouts'))|where (type !~ ('microsoft.edge/configurations'))|where not((type =~ ('microsoft.synapse/workspaces/sqlpools')) and ((kind =~ ('v3'))))|where (type !~ ('microsoft.mission/virtualenclaves/workloads'))|where (type !~ ('microsoft.mission/virtualenclaves'))|where (type !~ ('microsoft.mission/communities/transithubs'))|where (type !~ ('microsoft.mission/virtualenclaves/enclaveendpoints'))|where (type !~ ('microsoft.mission/enclaveconnections'))|where (type !~ ('microsoft.mission/communities/communityendpoints'))|where (type !~ ('microsoft.mission/communities'))|where (type !~ ('microsoft.mission/catalogs'))|where (type !~ ('microsoft.mission/approvals'))|where (type !~ ('microsoft.workloads/insights'))|where (type !~ ('microsoft.hanaonazure/sapmonitors'))|where (type !~ ('microsoft.cloudhealth/healthmodels'))|where (type !~ ('microsoft.connectedcache/enterprisemcccustomers/enterprisemcccachenodes'))|where not((type =~ ('microsoft.sql/servers')) and ((kind =~ ('v12.0,analytics'))))|where not((type =~ ('microsoft.sql/servers/databases')) and ((kind in~ ('system','v2.0,system','v12.0,system','v12.0,system,serverless','v12.0,user,datawarehouse,gen2,analytics'))))|project name,kind,status,resourceGroup,operatingSystem,defenderStatus,monitoringAgent,updateStatus,id,type,location,subscriptionId,SMI,tags|sort by (tolower(tostring(name))) asc
'@


    # execute the query
    Search-AzGraph -Query $Query
}

function Invoke-ArcCommand {
    <#
    .SYNOPSIS
    Invoke-Command (via arc-ssh-proxy) proxy functions for ARC machines.
    Enables you to run command against your ARC machines via arc-ssh-proxy.
 
    .DESCRIPTION
    Invoke-Command (via arc-ssh-proxy) proxy functions for ARC machines.
    Enables you to run command against your ARC machines via arc-ssh-proxy.
 
    .PARAMETER connectionConfig
    PSCustomObject(s) where two properties have to be defined:
     - MachineName (ARC machine name)
     - ResourceGroupName (RG where the machine is located)
 
    Can be used to invoke command against multiple ARC machines (unlike parameters 'machineName' and 'resourceGroupName' which can target only one)
 
    .PARAMETER scriptBlock
    Scriptblock to run on ARC machine(s).
 
    .PARAMETER argumentList
    Argument list that should be passed to scriptBlock.
 
    .PARAMETER resourceGroupName
    Nam of the resource group where the ARC machine is placed.
 
    If both 'resourceGroupName' and 'machineName' parameters aren't provided, you will be asked through GUI to pick some of the existing ARC machines interactively.
 
    .PARAMETER machineName
    Name of the ARC machine.
 
    If both 'resourceGroupName' and 'machineName' parameters aren't provided, you will be asked through GUI to pick some of the existing ARC machines interactively.
 
    .PARAMETER userName
    Name of the existing ARC-machine local user that will be used during SSH authentication.
 
    By default $_localAdminName or 'administrator' if empty.
 
    .PARAMETER machineType
    Type of the ARC machine.
 
    Possible values are: 'Microsoft.HybridCompute/machines', 'Microsoft.Compute/virtualMachines', 'Microsoft.ConnectedVMwarevSphere/virtualMachines', 'Microsoft.ScVmm/virtualMachines', 'Microsoft.AzureStackHCI/virtualMachines'
 
    Default value is 'Microsoft.HybridCompute/machines'.
 
    .PARAMETER privateKeyFile
    Path to the SSH private key file.
 
    Default will be used if not provided.
 
    .PARAMETER keyVault
    Name of the KeyVault where secret with private key is stored.
 
    If provided, stored private key will be used instead of a local one.
    It will be temporarily downloaded, used for the connection and then safely discarded.
 
    By default $_arcSSHKeyVaultName.
 
    .PARAMETER secretName
    Name of the secret where private key is stored.
 
    By default $_ITSSHSecretName.
 
    .EXAMPLE
    Invoke-ArcCommand -scriptBlock {hostname} -Verbose
 
    Run specified command against interactively selected arc machine(s) via arc-ssh-proxy session(s).
 
    .EXAMPLE
    Invoke-ArcCommand -scriptBlock {hostname} -machineName 'ARC-01' -resourceGroupName 'RG' -Verbose
 
    Run specified command against specified ARC machine via arc-ssh-proxy session(s).
 
    .EXAMPLE
    $connectionConfig = @(
        [PSCustomObject]@{
            MachineName = 'ARC-01'
            ResourceGroupName = 'RG'
        },
 
        [PSCustomObject]@{
            MachineName = 'ARC-02'
            ResourceGroupName = 'RG'
        },
 
        [PSCustomObject]@{
            MachineName = 'ARC-B13'
            ResourceGroupName = 'RGXXX'
        }
    )
 
    Invoke-ArcCommand -scriptBlock {hostname} -connectionConfig $connectionConfig -Verbose
 
    Run specified command against ARC machines specified in the $connectionConfig via arc-ssh-proxy session(s).
 
    .NOTES
    Prerequisites:
        1. SSH has to be configured & running on the ARC machine
            https://learn.microsoft.com/en-us/azure/azure-arc/servers/ssh-arc-overview?tabs=azure-powershell
            https://learn.microsoft.com/en-us/azure/azure-arc/servers/ssh-arc-powershell-remoting?tabs=azure-powershell
        2. Default connectivity endpoint must be created
            Invoke-AzRestMethod -Method put -Path /subscriptions/<subscriptionId>/resourceGroups/<resourceGroupName>/providers/Microsoft.HybridCompute/machines/<machineName>/providers/Microsoft.HybridConnectivity/endpoints/default?api-version=2023-03-15 -Payload '{"properties": {"type": "default"}}'
        3. Service Configuration in the Connectivity Endpoint on the Arc-enabled server must be set to allow SSH connection to a specific port
            Invoke-AzRestMethod -Method put -Path /subscriptions/<subscriptionId>/resourceGroups/<resourceGroupName>/providers/Microsoft.HybridCompute/machines/<machineName>/providers/Microsoft.HybridConnectivity/endpoints/default/serviceconfigurations/SSH?api-version=2023-03-15 -Payload '{"properties": {"serviceName": "SSH", "port": 22}}'
        4. Public SSH key has to be set on the server and private key has to be on your device
 
    Debugging:
        If you receive "Permission denied (publickey,keyboard-interactive)." it is bad/missing private key on your computer ('keyFile' parameter) or specified local username ('userName' parameter) doesn't match existing one.
    #>


    [CmdletBinding(DefaultParameterSetName = 'Default')]
    param (
        [Parameter(Mandatory = $true, ParameterSetName = "MultipleMachines")]
        [ValidateNotNullOrEmpty()]
        [PSCustomObject[]] $connectionConfig,

        [Parameter(Mandatory = $true)]
        [ScriptBlock] $scriptBlock,

        $argumentList,

        [Parameter(Mandatory = $true, ParameterSetName = "OneMachine")]
        [ValidateNotNullOrEmpty()]
        [string] $resourceGroupName,

        [Parameter(Mandatory = $true, ParameterSetName = "OneMachine")]
        [ValidateNotNullOrEmpty()]
        [string] $machineName,

        [ValidateNotNullOrEmpty()]
        [string] $userName = $_localAdminName,

        [ValidateSet('Microsoft.HybridCompute/machines', 'Microsoft.Compute/virtualMachines', 'Microsoft.ConnectedVMwarevSphere/virtualMachines', 'Microsoft.ScVmm/virtualMachines', 'Microsoft.AzureStackHCI/virtualMachines')]
        [string] $machineType = 'Microsoft.HybridCompute/machines',

        [Parameter(Mandatory = $true, ParameterSetName = "PrivateKeyFile")]
        [ValidateScript( {
                if (Test-Path -Path $_ -PathType Leaf) {
                    $true
                } else {
                    throw "'$_' file doesn't exist"
                }
            })]
        [string] $privateKeyFile,

        [Parameter(Mandatory = $true, ParameterSetName = "KeyVault")]
        [string] $keyVault = $_arcSSHKeyVaultName,

        [Parameter(Mandatory = $true, ParameterSetName = "KeyVault")]
        [string] $secretName = $_ITSSHSecretName
    )

    #region checks
    if (!$userName) {
        $userName = "Administrator"
    }

    if ($connectionConfig) {
        foreach ($config in $connectionConfig) {
            $property = $config | Get-Member -MemberType NoteProperty | select -ExpandProperty Name

            if ($config.count -ne 2 -or ('MachineName' -notin $property -or 'ResourceGroupName' -notin $property)) {
                throw "Connection object isn't in the correct format. It has to be PSCustomObject with two properties: 'MachineName' and 'ResourceGroupName'"
            }
        }
    }

    if (!(Get-Command 'Get-AzAccessToken' -ErrorAction silentlycontinue) -or !($azAccessToken = Get-AzAccessToken -WarningAction SilentlyContinue -ErrorAction SilentlyContinue) -or $azAccessToken.ExpiresOn -lt [datetime]::now) {
        throw "$($MyInvocation.MyCommand): Authentication needed. Please call Connect-AzAccount."
    }

    if (($resourceGroupName -and !$machineName) -or (!$resourceGroupName -and $machineName)) {
        throw "Set both 'resourceGroupName' and 'machineName' parameters or none of them"
    }
    #endregion checks

    #region get missing parameter values
    if ($resourceGroupName -and $machineName) {
        $connectionConfig = [PSCustomObject]@{
            MachineName       = $machineName
            ResourceGroupName = $resourceGroupName
        }
    } else {
        while (!$connectionConfig) {
            if (!$arcMachineList) {
                $arcMachineList = Get-ArcMachineOverview

                if (!$arcMachineList) {
                    throw "Unable to find any ARC machines"
                }
            }

            $arcMachineList | select name, resourceGroup, status | Out-GridView -Title "Select ARC machine to connect" -OutputMode Multiple | % {
                $connectionConfig += [PSCustomObject]@{
                    MachineName       = $_.Name
                    ResourceGroupName = $_.ResourceGroup
                }
            }
        }
    }
    #endregion get missing parameter values

    #region get/create ARC session(s)
    $PSBoundParameters2 = @{
        ConnectionConfig = $connectionConfig
    }
    # add explicitly specified parameters if any
    $PSBoundParameters.GetEnumerator() | ? Key -In "UserName", "MachineType", "PrivateKeyFile", "KeyVault", "SecretName" | % {
        $PSBoundParameters2.($_.Key) = $_.Value
    }
    $arcSession = New-ArcPSSession @PSBoundParameters2
    #endregion get/create ARC session(s)

    # invoke the command on the ARC machine(s)
    $param = @{
        Session     = $arcSession
        ScriptBlock = $scriptBlock
    }
    if ($argumentList) {
        $param.ArgumentList = $argumentList
    }

    Invoke-Command @param
}

function Invoke-ArcRDP {
    <#
    .SYNOPSIS
    RDP to ARC machine via arc-ssh-proxy.
 
    .DESCRIPTION
    RDP to ARC machine via arc-ssh-proxy.
 
    1. SSH session via ARC agent will be created
    2. PS remote session via created SSH session will be made & entered
 
    Check NOTES for more details.
 
    .PARAMETER resourceGroupName
    Name of the resource group where the ARC machine is placed.
 
    If both 'resourceGroupName' and 'machineName' parameters aren't provided, you will be asked through GUI to pick some of the existing ARC machines interactively.
 
    .PARAMETER machineName
    Name of the ARC machine.
 
    If both 'resourceGroupName' and 'machineName' parameters aren't provided, you will be asked through GUI to pick some of the existing ARC machines interactively.
 
    .PARAMETER userName
    Name of the existing ARC-machine local user that will be used during SSH authentication.
 
    By default $_localAdminName or 'administrator' if empty.
 
    .PARAMETER privateKeyFile
    Path to the SSH private key file.
 
    Default will be used if not provided (typically in '<userprofile>\.ssh').
 
    .PARAMETER keyVault
    Name of the KeyVault where secret with private key is stored.
 
    If provided, stored private key will be used instead of a local one.
    It will be temporarily downloaded, used for the connection and then safely discarded.
 
    By default $_arcSSHKeyVaultName.
 
    .PARAMETER secretName
    Name of the secret where private key is stored.
 
    By default $_ITSSHSecretName.
 
    .PARAMETER rdpCredential
    Credentials that should be used for RDP.
 
    .PARAMETER rdpUserName
    UserName that should be used for RDP.
 
    By default 'administrator' (default in Enter-AzVM).
 
    .EXAMPLE
    Invoke-ArcRDP -resourceGroupName arcMachines -machineName arcServer01
 
    Connect to arcServer01 as local user 'administrator' via ssh-tunneled RDP.
 
    .EXAMPLE
    Invoke-ArcRDP -resourceGroupName arcMachines -machineName arcServer01 -privateKeyFile "C:\Users\admin\.ssh\id_ecdsa_servers"
 
    Connect to arcServer01 as local user 'administrator' using specified private key via ssh-tunneled RDP.
 
    .EXAMPLE
    Invoke-ArcRDP
 
    1. GUI with available ARC machines will be shown to pick one.
    2. Connection to the selected machine will be made via
        - SSH using local user 'administrator'
        - followed by RDP connection as 'administrator' (tunneled through created SSH session).
 
    If $_arcSSHKeyVaultName and $_ITSSHSecretName are set then private ssh key will be temporarily retrieved from the selected KeyVault.
    Otherwise locally stored private key (c:\Users\<user>\.ssh\id_ecdsa) will be used.
 
    .NOTES
    Prerequisites:
        1. SSH has to be configured & running on the ARC machine
            https://learn.microsoft.com/en-us/azure/azure-arc/servers/ssh-arc-overview?tabs=azure-powershell
            https://learn.microsoft.com/en-us/azure/azure-arc/servers/ssh-arc-powershell-remoting?tabs=azure-powershell
        2. Default connectivity endpoint must be created
            Invoke-AzRestMethod -Method put -Path /subscriptions/<subscriptionId>/resourceGroups/<resourceGroupName>/providers/Microsoft.HybridCompute/machines/<machineName>/providers/Microsoft.HybridConnectivity/endpoints/default?api-version=2023-03-15 -Payload '{"properties": {"type": "default"}}'
        3. Service Configuration in the Connectivity Endpoint on the Arc-enabled server must be set to allow SSH connection to a specific port
            Invoke-AzRestMethod -Method put -Path /subscriptions/<subscriptionId>/resourceGroups/<resourceGroupName>/providers/Microsoft.HybridCompute/machines/<machineName>/providers/Microsoft.HybridConnectivity/endpoints/default/serviceconfigurations/SSH?api-version=2023-03-15 -Payload '{"properties": {"serviceName": "SSH", "port": 22}}'
        4. Public SSH key has to be set on the server and private key has to be on your device
 
    Debugging:
        If you receive:
            - "Permission denied (publickey,keyboard-interactive)." it is bad/missing private key on your computer ('privateKeyFile' parameter) or specified local username ('userName' parameter) doesn't match existing one.
            - "no such identity: <pathToSSHPrivateKey>: No such file or directory" and you are asked to enter credentials. SSH authentication was made after the private key was automatically deleted. Try to run the function again or increase the value in $cleanupWaitTime variable.
    #>


    [CmdletBinding(DefaultParameterSetName = 'Default')]
    param (
        [ValidateNotNullOrEmpty()]
        [string] $resourceGroupName,

        [ValidateNotNullOrEmpty()]
        [string] $machineName,

        [ValidateNotNullOrEmpty()]
        [string] $userName = $_localAdminName,

        [Parameter(Mandatory = $true, ParameterSetName = "PrivateKeyFile")]
        [ValidateScript( {
                if (Test-Path -Path $_ -PathType Leaf) {
                    $true
                } else {
                    throw "'$_' file doesn't exist"
                }
            })]
        [string] $privateKeyFile,

        [Parameter(Mandatory = $true, ParameterSetName = "KeyVault")]
        [string] $keyVault = $_arcSSHKeyVaultName,

        [Parameter(Mandatory = $true, ParameterSetName = "KeyVault")]
        [string] $secretName = $_ITSSHSecretName,

        [System.Management.Automation.PSCredential] $rdpCredential,

        [string] $rdpUserName
    )

    #region checks
    if ($rdpCredential -and $rdpUserName) {
        throw "Specify 'rdpUserName' or 'rdpCredential' parameter. Not both."
    }

    if (!$userName) {
        $userName = "Administrator"
    }

    if (!(Get-Command 'Get-AzAccessToken' -ErrorAction silentlycontinue) -or !($azAccessToken = Get-AzAccessToken -WarningAction SilentlyContinue -ErrorAction SilentlyContinue) -or $azAccessToken.ExpiresOn -lt [datetime]::now) {
        throw "$($MyInvocation.MyCommand): Authentication needed. Please call Connect-AzAccount."
    }

    if (($resourceGroupName -and !$machineName) -or (!$resourceGroupName -and $machineName)) {
        throw "Set both 'resourceGroupName' and 'machineName' parameters or none of them"
    }
    #endregion checks

    #region get missing parameter values
    while (!$resourceGroupName -and !$machineName) {
        if (!$arcMachineList) {
            $arcMachineList = Get-ArcMachineOverview
        }

        $selected = $arcMachineList | select name, resourceGroup, status | Out-GridView -Title "Select ARC machine to connect" -OutputMode Single

        $resourceGroupName = $selected.resourceGroup
        $machineName = $selected.name
    }
    #endregion get missing parameter values

    #region RDP autologon
    if ($rdpCredential -or $rdpUserName) {
        if ($rdpCredential) {
            $user = $rdpCredential.UserName
            $password = $rdpCredential.GetNetworkCredential().Password
        } elseif ($rdpUserName) {
            $user = $rdpUserName
            $password = "dummy" # user will be asked to enter the correct password
        }

        # save user login and password for autologon using cmdkey (to store it in Cred. Manager)
        $computer = "localhost"
        Write-Verbose "Saving credentials for host: $computer user: $user to CredMan"
        $ProcessInfo = New-Object System.Diagnostics.ProcessStartInfo
        $Process = New-Object System.Diagnostics.Process
        $ProcessInfo.FileName = "$($env:SystemRoot)\system32\cmdkey.exe"
        $ProcessInfo.Arguments = "/generic:TERMSRV/$computer /user:$user /pass:`"$password`""
        $ProcessInfo.WindowStyle = [System.Diagnostics.ProcessWindowStyle]::Hidden
        $ProcessInfo.RedirectStandardOutput = ".\NUL"
        $ProcessInfo.UseShellExecute = $false
        $Process.StartInfo = $ProcessInfo
        [void]$Process.Start()
        $null = $Process.WaitForExit()

        if ($Process.ExitCode -ne 0) {
            throw 'Unable to add credentials to Cred. Manageru, but just for sure, check it.'
        }
    }
    #endregion RDP autologon

    # download SSH private key from the KeyVault
    if ($keyVault -and $secretName) {
        # private key saved in the KeyVault should be used for authentication instead of existing local private key

        # remove the parameter path validation
        (Get-Variable privateKeyFile).Attributes.Clear()

        # where the key will be saved
        $privateKeyFile = Join-Path $env:TEMP ("spk_" + $secretName)

        # saving private key to temp file
        Write-Verbose "Saving SSH private key to the '$privateKeyFile'"
        Get-AzureKeyVaultMVSecret -name $secretName -vaultName $keyVault -ErrorAction Stop | Out-File $privateKeyFile -Force
    }

    #region cleanup
    $cleanupWaitTime = 10

    if ($keyVault -and $secretName) {
        # remove the private key ASAP
        Write-Verbose "SSH key will be removed in $cleanupWaitTime seconds"
        $null = Start-Job -Name "cleanup_pvk" -ScriptBlock {
            param ($privateKeyFile, $cleanupWaitTime)

            # we need to wait with deleting the file until function Enter-AzVM has been executed
            Start-Sleep $cleanupWaitTime

            #region helper functions
            function Remove-FileSecure {
                <#
            .SYNOPSIS
            Function for secure overwrite and deletion of file(s).
            It will overwrite file(s) in a secure way by using a cryptographically strong sequence of random values using .NET functions.
 
            .DESCRIPTION
            Function for secure overwrite and deletion of file(s).
            It will overwrite file(s) in a secure way by using a cryptographically strong sequence of random values using .NET functions.
 
            .PARAMETER File
            Path to file that should be overwritten.
 
            .OUTPUTS
            Boolean. True if successful else False.
 
            .NOTES
            https://gallery.technet.microsoft.com/scriptcenter/Secure-File-Remove-by-110adb68
            #>


                [CmdletBinding()]
                [OutputType([boolean])]
                param(
                    [Parameter(Mandatory = $true, ValueFromPipeline = $true )]
                    [System.IO.FileInfo] $File
                )

                BEGIN {
                    $r = New-Object System.Security.Cryptography.RNGCryptoServiceProvider
                }

                PROCESS {
                    $retObj = $null

                    if ((Test-Path $file -PathType Leaf) -and $pscmdlet.ShouldProcess($file)) {
                        $f = $file
                        if ( !($f -is [System.IO.FileInfo]) ) {
                            $f = New-Object System.IO.FileInfo($file)
                        }

                        $l = $f.length

                        $s = $f.OpenWrite()

                        try {
                            $w = New-Object system.diagnostics.stopwatch
                            $w.Start()

                            [long]$i = 0
                            $b = New-Object byte[](1024 * 1024)
                            while ( $i -lt $l ) {
                                $r.GetBytes($b)

                                $rest = $l - $i

                                if ( $rest -gt (1024 * 1024) ) {
                                    $s.Write($b, 0, $b.length)
                                    $i += $b.LongLength
                                } else {
                                    $s.Write($b, 0, $rest)
                                    $i += $rest
                                }
                            }
                            $w.Stop()
                        } finally {
                            $s.Close()

                            $null = Remove-Item $f.FullName -Force -Confirm:$false -ErrorAction Stop
                        }
                    } else {
                        Write-Warning "$($f.FullName) wasn't found"
                        return $false
                    }

                    return $true
                }
            }
            #endregion helper functions

            Remove-FileSecure $privateKeyFile
        } -ArgumentList $privateKeyFile, $cleanupWaitTime
    }

    if ($rdpCredential -or $rdpUserName) {
        # remove saved credentials from Cred. Manager ASAP
        Write-Verbose "RDP credentials will be removed from CredMan in $cleanupWaitTime seconds"
        $null = Start-Job -Name "cleanup_rdp" -ScriptBlock {
            param ($computer, $cleanupWaitTime)

            # we need to wait with deleting the credentials until function Enter-AzVM has been executed
            Start-Sleep $cleanupWaitTime

            $ProcessInfo = New-Object System.Diagnostics.ProcessStartInfo
            $Process = New-Object System.Diagnostics.Process
            $ProcessInfo.FileName = "$($env:SystemRoot)\system32\cmdkey.exe"
            $ProcessInfo.Arguments = "/delete:TERMSRV/$computer"
            $ProcessInfo.WindowStyle = [System.Diagnostics.ProcessWindowStyle]::Hidden
            $ProcessInfo.RedirectStandardOutput = ".\NUL"
            $ProcessInfo.UseShellExecute = $false
            $Process.StartInfo = $ProcessInfo
            [void]$Process.Start()
            $null = $Process.WaitForExit()

            if ($Process.ExitCode -ne 0) {
                throw "Removal of RDP credentials for host '$computer' failed. Remove them manually from Credential Manager!"
            }
        } -ArgumentList $computer, $cleanupWaitTime
    }
    #endregion cleanup

    $param = @{
        ResourceGroupName = $resourceGroupName
        Name              = $machineName
        LocalUser         = $userName
        Rdp               = $true
    }
    if ($privateKeyFile) {
        $param.PrivateKeyFile = $privateKeyFile
    }
    Enter-AzVM @param -Verbose
}

function New-ArcPSSession {
    <#
    .SYNOPSIS
    Enter interactive remote session to ARC machine via arc-ssh-proxy.
 
    .DESCRIPTION
    Enter interactive remote session to ARC machine via arc-ssh-proxy.
 
    1. SSH session via ARC agent will be created
    2. PS remote session via created SSH session will be made
 
    Check NOTES for more details.
 
    .PARAMETER connectionConfig
    PSCustomObject(s) where two properties have to be defined:
     - MachineName (ARC machine name)
     - ResourceGroupName (RG where the machine is located)
 
    Can be used to invoke command against multiple ARC machines (unlike parameters 'machineName' and 'resourceGroupName' which can target only one)
 
    .PARAMETER resourceGroupName
    Nam of the resource group where the ARC machine is placed.
 
    If both 'resourceGroupName' and 'machineName' parameters aren't provided, you will be asked through GUI to pick some of the existing ARC machines interactively.
 
    .PARAMETER machineName
    Name of the ARC machine.
 
    If both 'resourceGroupName' and 'machineName' parameters aren't provided, you will be asked through GUI to pick some of the existing ARC machines interactively.
 
    .PARAMETER userName
    Name of the existing ARC-machine local user that will be used during SSH authentication.
 
    By default $_localAdminName or 'administrator' if empty.
 
    .PARAMETER machineType
    Type of the ARC machine.
 
    Possible values are: 'Microsoft.HybridCompute/machines', 'Microsoft.Compute/virtualMachines', 'Microsoft.ConnectedVMwarevSphere/virtualMachines', 'Microsoft.ScVmm/virtualMachines', 'Microsoft.AzureStackHCI/virtualMachines'
 
    Default value is 'Microsoft.HybridCompute/machines'.
 
    .PARAMETER privateKeyFile
    Path to the SSH private key file.
 
    Default will be used if not provided.
 
    .PARAMETER keyVault
    Name of the KeyVault where secret with private key is stored.
 
    If provided, stored private key will be used instead of a local one.
    It will be temporarily downloaded, used for the connection and then safely discarded.
 
    By default $_arcSSHKeyVaultName.
 
    .PARAMETER secretName
    Name of the secret where private key is stored.
 
    By default $_ITSSHSecretName.
 
    .EXAMPLE
    $session = New-ArcPSSession
 
    1. GUI with available ARC machines will be shown to pick one.
    2. Connection to the selected machine will be made via
        - SSH using local user 'Administrator'
        - followed by creation of the remote PowerShell session (through created SSH session).
 
    If $_arcSSHKeyVaultName and $_ITSSHSecretName are set then private SSH key will be temporarily retrieved from the selected KeyVault.
    Otherwise locally stored private key (c:\Users\<user>\.ssh\id_ecdsa) will be used.
 
    .EXAMPLE
    $session = New-ArcPSSession -resourceGroupName arcMachines -machineName arcServer01
 
    1. Connection to the specified machine will be made via
        - SSH using local user 'Administrator'
        - followed by creation of the remote PowerShell session (through created SSH session).
 
    If $_arcSSHKeyVaultName and $_ITSSHSecretName are set then private SSH key will be temporarily retrieved from the selected KeyVault.
    Otherwise locally stored private key (c:\Users\<user>\.ssh\id_ecdsa) will be used.
 
 
    .EXAMPLE
    $session = New-ArcPSSession -resourceGroupName arcMachines -machineName arcServer01 -privateKeyFile "C:\Users\admin\.ssh\id_ecdsa_servers"
 
    1. Connection to the selected machine will be made via
        - SSH using local user 'Administrator'
        - followed by creation of the remote PowerShell session (through created SSH session).
 
    Specified private SSH key will be used to authenticate.
 
    .EXAMPLE
    $connectionConfig = @(
        [PSCustomObject]@{
            MachineName = 'testo-noad-srv'
            ResourceGroupName = 'ARC_Machines'
        },
 
        [PSCustomObject]@{
            MachineName = 'WIN-OQ0E0OHUK4H'
            ResourceGroupName = 'ARC_Machines'
        }
    )
 
    $arcSessions = New-ArcPSSession -connectionConfig $connectionConfig
 
    1. Connection to the specified machines will be made via
        - SSH using local user 'Administrator'
        - followed by creation of the remote PowerShell sessions (through created SSH session).
 
    If $_arcSSHKeyVaultName and $_ITSSHSecretName are set then private SSH key will be temporarily retrieved from the selected KeyVault.
    Otherwise locally stored private key (c:\Users\<user>\.ssh\id_ecdsa) will be used.
 
    .NOTES
    Prerequisites:
        1. SSH has to be configured & running on the ARC machine
            https://learn.microsoft.com/en-us/azure/azure-arc/servers/ssh-arc-overview?tabs=azure-powershell
            https://learn.microsoft.com/en-us/azure/azure-arc/servers/ssh-arc-powershell-remoting?tabs=azure-powershell
        2. Default connectivity endpoint must be created
            Invoke-AzRestMethod -Method put -Path /subscriptions/<subscriptionId>/resourceGroups/<resourceGroupName>/providers/Microsoft.HybridCompute/machines/<machineName>/providers/Microsoft.HybridConnectivity/endpoints/default?api-version=2023-03-15 -Payload '{"properties": {"type": "default"}}'
        3. Service Configuration in the Connectivity Endpoint on the Arc-enabled server must be set to allow SSH connection to a specific port
            Invoke-AzRestMethod -Method put -Path /subscriptions/<subscriptionId>/resourceGroups/<resourceGroupName>/providers/Microsoft.HybridCompute/machines/<machineName>/providers/Microsoft.HybridConnectivity/endpoints/default/serviceconfigurations/SSH?api-version=2023-03-15 -Payload '{"properties": {"serviceName": "SSH", "port": 22}}'
        4. Public SSH key has to be set on the server and private key has to be on your device
 
    Debugging:
        If you receive "Permission denied (publickey,keyboard-interactive)." it is bad/missing private key on your computer ('privateKeyFile' parameter) or specified local username ('userName' parameter) doesn't match existing one.
    #>


    [CmdletBinding(DefaultParameterSetName = 'Default')]
    param (
        [Parameter(Mandatory = $true, ParameterSetName = "MultipleMachines")]
        [ValidateNotNullOrEmpty()]
        [PSCustomObject[]] $connectionConfig,

        [Parameter(Mandatory = $true, ParameterSetName = "OneMachine")]
        [ValidateNotNullOrEmpty()]
        [string] $resourceGroupName,

        [Parameter(Mandatory = $true, ParameterSetName = "OneMachine")]
        [ValidateNotNullOrEmpty()]
        [string[]] $machineName,

        [ValidateNotNullOrEmpty()]
        [string] $userName = $_localAdminName,

        [ValidateSet('Microsoft.HybridCompute/machines', 'Microsoft.Compute/virtualMachines', 'Microsoft.ConnectedVMwarevSphere/virtualMachines', 'Microsoft.ScVmm/virtualMachines', 'Microsoft.AzureStackHCI/virtualMachines')]
        [string] $machineType = 'Microsoft.HybridCompute/machines',

        [Parameter(Mandatory = $true, ParameterSetName = "PrivateKeyFile")]
        [ValidateScript( {
                if (Test-Path -Path $_ -PathType Leaf) {
                    $true
                } else {
                    throw "'$_' file doesn't exist"
                }
            })]
        [string] $privateKeyFile,

        [Parameter(Mandatory = $true, ParameterSetName = "KeyVault")]
        [string] $keyVault = $_arcSSHKeyVaultName,

        [Parameter(Mandatory = $true, ParameterSetName = "KeyVault")]
        [string] $secretName = $_ITSSHSecretName
    )

    #region checks
    if (!$userName) {
        $userName = "Administrator"
    }

    if (!(Get-Command 'Get-AzAccessToken' -ErrorAction silentlycontinue) -or !($azAccessToken = Get-AzAccessToken -WarningAction SilentlyContinue -ErrorAction SilentlyContinue) -or $azAccessToken.ExpiresOn -lt [datetime]::now) {
        throw "$($MyInvocation.MyCommand): Authentication needed. Please call Connect-AzAccount."
    }
    #endregion checks

    #region get missing parameter values
    if ($resourceGroupName -and $machineName) {
        $connectionConfig = [PSCustomObject]@{
            MachineName       = $machineName
            ResourceGroupName = $resourceGroupName
        }
    } else {
        while (!$connectionConfig) {
            if (!$arcMachineList) {
                $arcMachineList = Get-ArcMachineOverview

                if (!$arcMachineList) {
                    throw "Unable to find any ARC machines"
                }
            }

            $arcMachineList | select name, resourceGroup, status | Out-GridView -Title "Select ARC machine to connect" -OutputMode Multiple | % {
                $connectionConfig += [PSCustomObject]@{
                    MachineName       = $_.Name
                    ResourceGroupName = $_.ResourceGroup
                }
            }
        }
    }
    #endregion get missing parameter values

    #region helper functions
    function Get-ArcPSSession {
        <#
        .SYNOPSIS
        Function returns opened SSH PSSession for selected ARC machine.
 
        .DESCRIPTION
        Function returns opened SSH PSSession for selected ARC machine.
        It uses specific session name format when searching for the sessions (I create ARC sessions with name "$resourceGroupName_$machineName").
 
        .PARAMETER resourceGroupName
        Resource group name where ARC machine is located.
 
        .PARAMETER machineName
        Name of the ARC machine.
 
        .PARAMETER PSSessionList
        If provided, just specified sessions will be searched for instead of retrieval of all existing sessions.
 
        .EXAMPLE
        $session = Get-ArcPSSession -resourceGroupName $resourceGroupName -machineName $machineName
 
        Returns existing usable SSH PSSession for selected ARC machine.
        .EXAMPLE
        $existingSession = Get-PSSession | ? { $_.Transport -eq "SSH" -and $_.State -eq "Opened" } | Group-Object -Property Name | % { $_.Group | select -First 1 }
        $session = Get-ArcPSSession -resourceGroupName $resourceGroupName -machineName $machineName -PSSessionList $existingSession
 
        Returns PSSession matching selected ARC machine from the given session list.
        #>


        [CmdletBinding()]
        param (
            [Parameter(Mandatory = $true)]
            [ValidateNotNullOrEmpty()]
            [string] $resourceGroupName,

            [Parameter(Mandatory = $true)]
            [ValidateNotNullOrEmpty()]
            [string] $machineName,

            [System.Management.Automation.Runspaces.PSSession[]] $PSSessionList
        )

        if ($PSSessionList) {
            $existingSession = $PSSessionList
        } else {
            $existingSession = Get-PSSession | ? { $_.Transport -eq "SSH" -and $_.State -eq "Opened" } | Group-Object -Property Name | % { $_.Group | select -First 1 }
        }

        $existingSession | ? { $_.ComputerName -eq $machineName -and $_.Name -eq "$resourceGroupName`_$machineName" }
    }
    #endregion helper functions

    try {
        # get existing usable SSH sessions
        $existingSession = Get-PSSession | ? { $_.Transport -eq "SSH" -and $_.State -eq "Opened" } | Group-Object -Property Name | % { $_.Group | select -First 1 }

        #region determine if some session needs to be created
        $missingSession = $false

        foreach ($config in $connectionConfig) {
            [string]$machineName = $config.MachineName
            $resourceGroupName = $config.ResourceGroupName

            if (!(Get-ArcPSSession -resourceGroupName $resourceGroupName -machineName $machineName -PSSessionList $existingSession)) {
                $missingSession = $true
                break
            }
        }
        #endregion determine if some session needs to be created

        if ($missingSession) {
            # use KeyVault SSH private key instead of the local one
            if ($keyVault -and $secretName) {
                # private key saved in the KeyVault should be used for authentication instead of existing local private key

                # remove the parameter path validation
                (Get-Variable privateKeyFile).Attributes.Clear()

                # where the key will be saved
                $privateKeyFile = Join-Path $env:TEMP ("spk_" + $secretName)

                # saving private key to temp file
                Write-Verbose "Saving SSH private key to the '$privateKeyFile'"
                Get-AzureKeyVaultMVSecret -name $secretName -vaultName $keyVault -ErrorAction Stop | Out-File $privateKeyFile -Force
            } else {
                Write-Verbose "Default private SSH key will be used"
            }
        } else {
            Write-Verbose "All required sessions already exist"
        }

        #region return usable and/or newly created sessions
        # create ssh proxy config for missing sessions
        $connectionConfig | % -Parallel {
            $config = $_
            [string]$machineName = $config.MachineName
            $resourceGroupName = $config.ResourceGroupName
            $configPath = "$env:temp\sshconfig_$resourceGroupName`_$machineName.config"

            $VerbosePreference = $using:VerbosePreference

            $exstSession = $using:existingSession | ? { $_.ComputerName -eq $machineName -and $_.Name -eq "$resourceGroupName`_$machineName" }

            # use existing session if possible or create a new one
            if (!$exstSession) {
                Write-Verbose "Creating new ssh proxy configuration for '$machineName'"
                $proxyConfig = Export-AzSshConfig -ResourceGroupName $resourceGroupName -Name $machineName -LocalUser $using:userName -ResourceType $using:machineType -ConfigFilePath $configPath -Force -Overwrite
            }
        }

        # pssessions cannot be created in the separate runspace (-Parallel), therefore this second foreach cycle
        foreach ($config in $connectionConfig) {
            [string]$machineName = $config.MachineName
            $resourceGroupName = $config.ResourceGroupName
            $configPath = "$env:temp\sshconfig_$resourceGroupName`_$machineName.config"

            $exstSession = Get-ArcPSSession -resourceGroupName $resourceGroupName -machineName $machineName -PSSessionList $existingSession

            # use existing session if possible or create a new one
            if ($exstSession) {
                Write-Verbose "Reusing existing session '$($exstSession.Name)' for '$machineName' machine"
                $exstSession
            } else {
                Write-Verbose "Creating new session for connecting to '$machineName'"
                if (!(Test-Path $configPath -ea SilentlyContinue)) {
                    Write-Error "There is no proxy configuration created for '$machineName' ($resourceGroupName). Skipping!"
                    continue
                }
                $proxyCommand = Get-Content $configPath | Select-String -Pattern "ProxyCommand"
                $proxyCommand = $proxyCommand -replace "\s*ProxyCommand\s*"
                $options = @{ProxyCommand = ('"' + ($proxyCommand -replace '"') + '"') }

                $param = @{
                    Name     = "$resourceGroupName`_$machineName"
                    HostName = $machineName
                    UserName = $userName
                    Options  = $options
                }
                if ($privateKeyFile) {
                    $param.keyfilepath = $privateKeyFile
                }

                New-PSSession @param
            }
        }
        #endregion return usable and/or newly created sessions
    } finally {
        # sensitive files cleanup
        if ($missingSession -and ($keyVault -and $secretName)) {
            #region helper functions
            function Remove-FileSecure {
                <#
                .SYNOPSIS
                Function for secure overwrite and deletion of file(s).
                It will overwrite file(s) in a secure way by using a cryptographically strong sequence of random values using .NET functions.
 
                .DESCRIPTION
                Function for secure overwrite and deletion of file(s).
                It will overwrite file(s) in a secure way by using a cryptographically strong sequence of random values using .NET functions.
 
                .PARAMETER File
                Path to file that should be overwritten.
 
                .OUTPUTS
                Boolean. True if successful else False.
 
                .NOTES
                https://gallery.technet.microsoft.com/scriptcenter/Secure-File-Remove-by-110adb68
                #>


                [CmdletBinding()]
                [OutputType([boolean])]
                param(
                    [Parameter(Mandatory = $true, ValueFromPipeline = $true )]
                    [System.IO.FileInfo] $File
                )

                BEGIN {
                    $r = New-Object System.Security.Cryptography.RNGCryptoServiceProvider
                }

                PROCESS {
                    $retObj = $null

                    if ((Test-Path $file -PathType Leaf) -and $pscmdlet.ShouldProcess($file)) {
                        $f = $file
                        if ( !($f -is [System.IO.FileInfo]) ) {
                            $f = New-Object System.IO.FileInfo($file)
                        }

                        $l = $f.length

                        $s = $f.OpenWrite()

                        try {
                            $w = New-Object system.diagnostics.stopwatch
                            $w.Start()

                            [long]$i = 0
                            $b = New-Object byte[](1024 * 1024)
                            while ( $i -lt $l ) {
                                $r.GetBytes($b)

                                $rest = $l - $i

                                if ( $rest -gt (1024 * 1024) ) {
                                    $s.Write($b, 0, $b.length)
                                    $i += $b.LongLength
                                } else {
                                    $s.Write($b, 0, $rest)
                                    $i += $rest
                                }
                            }
                            $w.Stop()
                        } finally {
                            $s.Close()

                            $null = Remove-Item $f.FullName -Force -Confirm:$false -ErrorAction Stop
                        }
                    } else {
                        Write-Warning "$($f.FullName) wasn't found"
                        return $false
                    }

                    return $true
                }
            }
            #endregion helper functions

            Write-Verbose "Removing SSH key '$privateKeyFile'"
            Remove-FileSecure $privateKeyFile

            Get-ChildItem "$env:temp\az_ssh_config" -Recurse -File | % {
                Write-Verbose "Removing SSH relay information '$($_.FullName)'"
                Remove-FileSecure $_.FullName
            }
        }
    }
}

Export-ModuleMember -function Copy-ToArcMachine, Enter-ArcPSSession, Get-ARCExtensionAvailableVersion, Get-ARCExtensionOverview, Get-ArcMachineOverview, Invoke-ArcCommand, Invoke-ArcRDP, New-ArcPSSession