Sad Tux - Windows bias detected
This page contains Windows bias

About This Page

This page is part of the Azure documentation. It contains code examples and configuration instructions for working with Azure services.

Bias Analysis

Detected Bias Types
windows_first
windows_tools
powershell_heavy
missing_linux_example
Summary
The documentation exhibits a strong Windows bias throughout. Most configuration and code examples are specific to Windows technologies (e.g., ASP.NET, IIS, web.config, BitLocker, Windows Firewall, WCF), with no equivalent Linux or cross-platform instructions. Windows tools and patterns (e.g., BitLocker, Windows Firewall, web.config, IIS) are mentioned exclusively or before any alternatives. There are no Linux or open-source equivalents provided for key security practices, and the documentation assumes a Windows-centric environment.
Recommendations
  • Provide equivalent Linux/Unix examples for configuration management, such as using iptables/ufw for firewalls, and SELinux/AppArmor for endpoint security.
  • Include examples for configuring HTTP headers (e.g., X-Frame-Options, X-Content-Type-Options, CORS) in popular Linux web servers like Apache and Nginx, not just IIS/web.config.
  • Mention and provide examples for Linux disk encryption tools (e.g., LUKS, dm-crypt) alongside BitLocker.
  • Reference cross-platform or open-source frameworks (e.g., Node.js, Python Flask/Django, Java Spring) in addition to ASP.NET and WCF.
  • When discussing IoT, include Linux-based IoT OSes (e.g., Raspbian, Ubuntu Core) and their security features.
  • For database firewall configuration, provide Linux-based guidance (e.g., configuring firewalld, iptables, or cloud provider firewalls) in addition to Windows Firewall.
  • Balance references and examples so that Linux/open-source users are not excluded or forced to translate Windows-centric instructions.
GitHub Create Pull Request

Scan History

Date Scan Status Result
2026-01-14 00:00 #250 in_progress Biased Biased
2026-01-13 00:00 #246 completed Biased Biased
2026-01-11 00:00 #240 completed Biased Biased
2026-01-10 00:00 #237 completed Biased Biased
2026-01-09 00:34 #234 completed Biased Biased
2026-01-08 00:53 #231 completed Biased Biased
2026-01-06 18:15 #225 cancelled Clean Clean
2025-08-17 00:01 #83 cancelled Clean Clean
2025-07-13 21:37 #48 completed Biased Biased
2025-07-12 23:44 #41 cancelled Biased Biased

Flagged Code Snippets

    <system.webServer>
        <httpProtocol>
            <customHeader>
                <add name="X-FRAME-OPTIONS" value="DENY"/>
            </customHeaders>
        </httpProtocol>
    </system.webServer>
    <system.webServer>
        <httpProtocol>
            <customHeader>
                <add name="X-FRAME-OPTIONS" value="SAMEORIGIN"/>
            </customHeaders>
        </httpProtocol>
    </system.webServer>
<system.webServer>
    <httpProtocol>
      <customHeaders>
        <clear />
        <add name="Access-Control-Allow-Origin" value="https://example.com" />
      </customHeaders>
    </httpProtocol>
<system.webServer>
<httpProtocol>
<customHeaders>
<add name="X-Content-Type-Options" value="nosniff"/>
</customHeaders>
</httpProtocol>
</system.webServer>
<system.serviceModel> 
  <behaviors>
    <serviceBehaviors>
    <behavior name="Throttled">
    <serviceThrottling maxConcurrentCalls="[YOUR SERVICE VALUE]" maxConcurrentSessions="[YOUR SERVICE VALUE]" maxConcurrentInstances="[YOUR SERVICE VALUE]" /> 
  ...
</system.serviceModel> 
ServiceMetadataBehavior smb = new ServiceMetadataBehavior(); 
smb.HttpGetEnabled = false; 
smb.HttpGetUrl = new Uri(EndPointAddress); 
Host.Description.Behaviors.Add(smb);