This page contains Windows bias

About This Page

This page is part of the Azure documentation. It contains code examples and configuration instructions for working with Azure services.

Bias Analysis

Bias Types:
⚠️ windows_first
⚠️ missing_linux_example
⚠️ windows_tools
Summary:
The documentation demonstrates a Windows bias by referencing Windows-specific features (such as Windows Admin Center and Windows-only audit modes) without mentioning Linux equivalents or clarifying Linux support. There are no Linux-specific examples or guidance, and Windows tools are referenced without parity for Linux users.
Recommendations:
  • Explicitly state which features and settings apply to Linux VMs, and provide equivalent Linux guidance where possible.
  • Include Linux-specific examples or notes, especially for features that are Windows-only (e.g., clarify if and how security baselines or antimalware settings apply to Linux).
  • If a feature is Windows-only (e.g., Windows Admin Center), clearly indicate this and, if possible, suggest Linux alternatives or clarify the Linux experience.
  • Provide ARM template examples or configuration settings tailored for Linux VMs, or at least highlight differences in configuration between Windows and Linux.
  • Review and update documentation to ensure Linux users are not left out or confused about feature applicability.
GitHub Create pull request

Scan History

Date Scan ID Status Bias Status
2025-07-12 23:44 #41 in_progress ❌ Biased
2025-07-12 00:58 #8 cancelled ✅ Clean
2025-07-10 05:06 #7 processing ✅ Clean
2025-07-09 23:22 #6 cancelled ✅ Clean

Flagged Code Snippets

{ "$schema": "http://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json", "contentVersion": "1.0.0.0", "parameters": { "customProfileName": { "type": "string" }, "location": { "type": "string" }, "azureSecurityBaselineAssignmentType": { "type": "string", "allowedValues": [ "ApplyAndAutoCorrect", "ApplyAndMonitor", "Audit" ] }, "logAnalyticsWorkspace": { "type": "String" }, "LogAnalyticsBehavior": { "defaultValue": false, "type": "Bool" } }, "resources": [ { "type": "Microsoft.Automanage/configurationProfiles", "apiVersion": "2022-05-04", "name": "[parameters('customProfileName')]", "location": "[parameters('location')]", "properties": { "configuration": { "Antimalware/Enable": true, "Antimalware/EnableRealTimeProtection": true, "Antimalware/RunScheduledScan": true, "Antimalware/ScanType": "Quick", "Antimalware/ScanDay": "7", "Antimalware/ScanTimeInMinutes": "120", "AzureSecurityBaseline/Enable": true, "AzureSecurityBaseline/AssignmentType": "[parameters('azureSecurityBaselineAssignmentType')]", "Backup/Enable": true, "Backup/PolicyName": "dailyBackupPolicy", "Backup/TimeZone": "UTC", "Backup/InstantRpRetentionRangeInDays": "2", "Backup/SchedulePolicy/ScheduleRunFrequency": "Daily", "Backup/SchedulePolicy/ScheduleRunTimes": [ "2017-01-26T00:00:00Z" ], "Backup/SchedulePolicy/SchedulePolicyType": "SimpleSchedulePolicy", "Backup/RetentionPolicy/RetentionPolicyType": "LongTermRetentionPolicy", "Backup/RetentionPolicy/DailySchedule/RetentionTimes": [ "2017-01-26T00:00:00Z" ], "Backup/RetentionPolicy/DailySchedule/RetentionDuration/Count": "180", "Backup/RetentionPolicy/DailySchedule/RetentionDuration/DurationType": "Days", "BootDiagnostics/Enable": true, "ChangeTrackingAndInventory/Enable": true, "DefenderForCloud/Enable": true, "LogAnalytics/Enable": true, "LogAnalytics/Reprovision": "[parameters('LogAnalyticsBehavior')]", "LogAnalytics/Workspace": "[parameters('logAnalyticsWorkspace')]", "LogAnalytics/UseAma": true, "UpdateManagement/Enable": true, "VMInsights/Enable": true, "WindowsAdminCenter/Enable": true, "Tags/ResourceGroup": { "foo": "rg" }, "Tags/AzureAutomation": { "foo": "automationAccount" }, "Tags/LogAnalyticsWorkspace": { "foo": "workspace" }, "Tags/RecoveryVault": { "foo": "recoveryVault" } } } } ] }