Sad Tux - Windows bias detected
This page contains Windows bias

About This Page

This page is part of the Azure documentation. It contains code examples and configuration instructions for working with Azure services.

Bias Analysis

Detected Bias Types
windows_first
powershell_heavy
windows_tools
missing_linux_example
Summary
The documentation demonstrates a moderate Windows bias. Windows instructions and tools are often presented first, with detailed PowerShell/Command Prompt examples and screenshots. The Windows toolset is referenced repeatedly and sometimes more prominently than Linux equivalents. While Linux instructions are present and fairly detailed, some sections (e.g., initial tool download, troubleshooting, and validation) default to Windows-first language or lack parity in example depth. There are also more references to Windows-specific requirements and tools, and some Linux steps require third-party utilities not managed by Microsoft, which may create a perception of less official support.
Recommendations
  • Alternate the order of Windows and Linux instructions or use parallel tabbed layouts to present both platforms equally.
  • Ensure that all examples, screenshots, and troubleshooting steps are provided for both Windows and Linux clients with equal detail.
  • Where possible, provide official Microsoft-supported tools/utilities for Linux, or at least clarify support levels and provide direct links to trusted third-party resources.
  • Avoid language that implies Windows is the default or primary platform (e.g., 'To unlock the disks, open Command Prompt...' before mentioning Linux).
  • Add Linux-specific troubleshooting and validation sections to match the depth of Windows coverage.
  • Where third-party Linux tools are required, provide clear installation and usage instructions, and consider contributing to or supporting these tools to improve user confidence.
GitHub Create Pull Request

Scan History

Date Scan Status Result
2026-01-14 00:00 #250 in_progress Biased Biased
2026-01-13 00:00 #246 completed Biased Biased
2026-01-11 00:00 #240 completed Biased Biased
2026-01-10 00:00 #237 completed Biased Biased
2026-01-09 00:34 #234 completed Biased Biased
2026-01-08 00:53 #231 completed Biased Biased
2026-01-06 18:15 #225 cancelled Clean Clean
2025-08-17 00:01 #83 cancelled Clean Clean
2025-07-13 21:37 #48 completed Clean Clean
2025-07-09 13:09 #3 cancelled Clean Clean
2025-07-08 04:23 #2 cancelled Biased Biased

Flagged Code Snippets

        
        The following example output confirms that the disk was successfully unlocked.

        :::image type="content" source="media/data-box-disk-deploy-set-up/disk-unlocked-windows.png" alt-text="Screen capture displaying sample output showing the Data Box Disk successfully unlocked on a Windows-based machine." lightbox="media/data-box-disk-deploy-set-up/disk-unlocked-windows-lrg.png":::

    - Make sure to safely remove drives before ejecting them.

If you encounter issues while unlocking the disks, refer to the [troubleshoot unlock issues](data-box-disk-troubleshoot-unlock.md) article.

### [Linux - software encryption](#tab/linux-software)

Perform the following steps to connect and unlock software encrypted Data Box disks on a Linux-based machine.

1. In the Azure portal, go to **General > Device details**.
1. Download the [Data Box Disk toolset](https://aka.ms/databoxdisktoolslinux). Extract and copy the **Data Box Disk Unlock Utility** to a local path on your machine.
1. Navigate to the folder containing the Data Box Disk toolset. Open a terminal window on your Linux client and change the file permissions to allow execution as shown in the following sample:

    `chmod +x DataBoxDiskUnlock`
    `chmod +x DataBoxDiskUnlock_Prep.sh`

    After the `chmod` command has been executed, verify that the file permissions are changed by running the `ls` command as shown in the following sample output.

    
    .\DataBoxDiskUnlock.exe /SystemCheck
    
    .\DataBoxDiskUnlock.exe /Passkey:<testPasskey>
    
    .\DataBoxDiskUnlock.exe /help
    
   
    The following example output indicates that the volume was successfully unlocked. The mount point is also displayed for the volume in which your data can be copied.

    :::image type="content" source="media/data-box-disk-deploy-set-up/disk-unlocked.png" alt-text="Screen capture showing a successfully unlocked data box disk.":::

    > [!IMPORTANT]
    > Repeat the steps to unlock the disk for any future disk reinserts.

    You can use the help switch if you need additional assistance with the Data Box Disk Unlock Utility as shown in the following example.

    
    The following image shows the sample output.

    :::image type="content" source="media/data-box-disk-deploy-set-up/help-output.png" alt-text="Screen capture displaying sample output from the Data Box Disk Unlock Utility help command." lightbox="media/data-box-disk-deploy-set-up/help-output-lrg.png":::

1. After the disk is unlocked, you can go to the mount point and view the contents of the disk. You are now ready to copy the data to folders based on the desired destination data type.
1. After you've finished copying your data to the disk, make sure to unmount and remove the disk safely using the following command.

    
    The following example output confirms that the volume unmounted successfully.

    :::image type="content" source="media/data-box-disk-deploy-set-up/disk-unmount.png" alt-text="Screen capture displaying sample output showing the Data Box Disk successfully unmounted." lightbox="media/data-box-disk-deploy-set-up/disk-unmount-lrg.png":::

1. You can validate the data on your disk by connecting to a Windows-based machine with a supported operating system. Be sure to review the [OS requirements](data-box-disk-system-requirements.md#supported-operating-systems-for-clients) for Windows-based operating systems before connecting disks to your local machine.

    Perform the following steps to unlock self-encrypting disks using Windows-based machines.

    - Download the [Data Box Disk toolset](https://aka.ms/databoxdisktoolswin) for Windows clients and extract it to the same computer. Although the toolset contains four tools, only the **Data Box SED Unlock tool** is used for hardware-encrypted disks.
    - Connect your Data Box Disk to an available SATA 3 connection on your Windows-based machine.
    - Using a command prompt or PowerShell, run the following command to unlock self-encrypting disks.
    
        
1. Run the Data Box Disk Unlock tool, supplying the passkey retrieved from the Azure portal. Optionally, specify a list of BitLocker encrypted serial numbers to unlock. The passkey and serial numbers should be contained within single quotes as shown.

    
    The following example output confirms that the volume unmounted successfully.

    :::image type="content" source="media/data-box-disk-deploy-set-up/bitlocker-unmount-linux.png" alt-text="Screenshot of example results indicating successful Data Box Disk unmounting.":::

---

<!--::: zone-end-->

<!--::: zone target="chromeless"

1. Unpack disks and use the included cable to connect the disk to the client computer.
2. Download and extract the Data Box Disk toolset on the same computer that you will use to copy the data.

    > [!div class="nextstepaction"]
    > [Download Data Box Disk toolset for Windows](https://aka.ms/databoxdisktoolswin)

    or
    > [!div class="nextstepaction"]
    > [Download Data Box Disk toolset for Linux](https://aka.ms/databoxdisktoolslinux)

3. To unlock the disks on a Windows client, open a Command Prompt window or run Windows PowerShell as administrator on the same computer:

    - Type the following command in the same folder where Data Box Disk Unlock tool is installed.

        
    Run the Data Box Disk Unlock tool. Get the passkey from **General > Device details** in the Azure portal and provide it here. Optionally specify a list of BitLocker encrypted volumes within single quotes to unlock.