Sad Tux - Windows bias detected
This page contains Windows bias

About This Page

This page is part of the Azure documentation. It contains code examples and configuration instructions for working with Azure services.

Bias Analysis

Detected Bias Types
powershell_heavy
windows_first
missing_linux_example
windows_tools
Summary
The documentation demonstrates a Windows bias by providing a PowerShell script only for bulk updating extensions (with no Bash or cross-platform alternative), prioritizing PowerShell-based workflows, and referencing Windows tools and patterns. While some CLI examples are provided for both Linux and Windows, the advanced automation scenario (bulk update) is only covered for Windows/PowerShell. Linux users are not given equivalent scripting guidance, and PowerShell is presented as the primary automation method.
Recommendations
  • Provide a Bash or Azure CLI script example for bulk updating the Network Watcher extension across multiple Linux VMs, similar to the PowerShell script for Windows.
  • When presenting manual update instructions, ensure Linux and Windows examples are equally detailed and appear in parallel, rather than PowerShell (Windows) first.
  • Explicitly mention cross-platform tools (such as Azure CLI and Bash) as automation options, not just PowerShell.
  • Where possible, use cross-platform scripting (e.g., Azure CLI in Bash or PowerShell Core) for automation examples.
  • Add a section or note clarifying automation options for Linux users, and link to relevant Linux scripting resources.
GitHub Create Pull Request

Scan History

Date Scan Status Result
2026-01-14 00:00 #250 in_progress Biased Biased
2026-01-13 00:00 #246 completed Biased Biased
2026-01-11 00:00 #240 completed Biased Biased
2026-01-10 00:00 #237 completed Biased Biased
2026-01-09 00:34 #234 completed Biased Biased
2026-01-08 00:53 #231 completed Biased Biased
2026-01-06 18:15 #225 cancelled Clean Clean
2025-08-17 00:01 #83 cancelled Clean Clean
2025-07-13 21:37 #48 completed Clean Clean
2025-07-12 23:44 #41 cancelled Biased Biased
2025-07-09 13:09 #3 cancelled Clean Clean
2025-07-08 04:23 #2 cancelled Biased Biased

Flagged Code Snippets

Locate **"AzureNetworkWatcherExtension"** in the output and identify the version number from the *“TypeHandlerVersion”* field in the output.  

Information about the extension appears multiple times in the JSON output. The full version number of the extension is available under the Extensions block. 

You should see something like the below:
![Azure CLI Screenshot](./media/network-watcher-agent-update/azure-cli-screenshot.png)

#### Use PowerShell

Run the following commands from a PowerShell prompt:

Locate the Azure Network Watcher extension in the output and identify the version number from the *“TypeHandlerVersion”* field in the output.   

You should see something like the below:
![PowerShell Screenshot](./media/network-watcher-agent-update/powershell-screenshot.png)

### Update your extension

If your version is below the latest version mentioned above, update your extension by using any of the following options.

#### Option 1: Use PowerShell

Run the following commands:

---

## Update your extension using a PowerShell script

If you have large deployments, use a PowerShell script to update multiple VMs at once. The following PowerShell script updates Network Watcher extension of all Windows VMs in a subscription: 

# [Windows](#tab/windows)