Sad Tux - Windows bias detected
This page contains Windows bias

About This Page

This page is part of the Azure documentation. It contains code examples and configuration instructions for working with Azure services.

Bias Analysis

Detected Bias Types
powershell_heavy
windows_first
missing_linux_example
windows_tools
Summary
The documentation page demonstrates a Windows bias by providing only Azure PowerShell examples for configuring Azure Firewall service tags. There are no examples using Azure CLI (which is cross-platform and commonly used on Linux/macOS), nor are there references to Linux-native tools or shell environments. The configuration section leads with and exclusively details PowerShell commands, reinforcing a Windows-centric approach.
Recommendations
  • Add equivalent Azure CLI examples for all PowerShell commands shown, ensuring Linux/macOS users can follow along without needing PowerShell.
  • Explicitly mention that Azure CLI can be used from any platform and provide links to relevant CLI documentation.
  • Consider including Bash shell examples where appropriate, especially for scripting or automation scenarios.
  • Reorder the configuration section to present Azure CLI and PowerShell examples side by side, or start with the more cross-platform Azure CLI.
  • Review and update any references or links that are PowerShell-specific to include CLI alternatives.
GitHub Create Pull Request

Scan History

Date Scan Status Result
2026-01-14 00:00 #250 in_progress Biased Biased
2026-01-13 00:00 #246 completed Biased Biased
2026-01-11 00:00 #240 completed Biased Biased
2026-01-10 00:00 #237 completed Biased Biased
2026-01-09 00:34 #234 completed Biased Biased
2026-01-08 00:53 #231 completed Biased Biased
2026-01-06 18:15 #225 cancelled Clean Clean
2025-08-17 00:01 #83 cancelled Clean Clean
2025-07-13 21:37 #48 completed Clean Clean
2025-07-09 13:09 #3 cancelled Clean Clean
2025-07-08 04:23 #2 cancelled Biased Biased

Flagged Code Snippets

$azFirewall.NetworkRuleCollections.add($ruleCollection)
$FirewallName = "AzureFirewall"
$ResourceGroup = "AzureFirewall-RG"
$azfirewall = Get-AzFirewall -Name $FirewallName -ResourceGroupName $ResourceGroup
$rule = New-AzFirewallNetworkRule -Name "AllowSQL" -Description "Allow access to Azure Database as a Service (SQL, MySQL, PostgreSQL, Datawarehouse)" -SourceAddress "10.0.0.0/16" -DestinationAddress Sql -DestinationPort 1433 -Protocol TCP
$ruleCollection = New-AzFirewallNetworkRuleCollection -Name "Data Collection" -Priority 1000 -Rule $rule -ActionType Allow
Set-AzFirewall -AzureFirewall $azfirewall