This page contains Windows bias

About This Page

This page is part of the Azure documentation. It contains code examples and configuration instructions for working with Azure services.

Bias Analysis

Bias Types:
⚠️ windows_first
⚠️ missing_linux_example
⚠️ windows_tools
Summary:
The documentation is heavily focused on Windows environments, specifically referencing Windows Security Events, Windows event IDs, and Windows-centric connectors. There are no examples or mentions of equivalent Linux audit logs, connectors, or event IDs for RDP or remote login detection. The instructions and prerequisites are exclusively tailored to Windows, with no guidance for Linux systems.
Recommendations:
  • Include information on how to collect and analyze remote login events from Linux systems (e.g., using syslog, auditd, or SSH logs).
  • Provide equivalent event IDs or log types for Linux (such as SSH login events) and describe how to configure connectors for these sources.
  • Add Linux-specific examples and configuration steps alongside Windows instructions.
  • Clarify whether the anomalous login detection feature supports non-Windows platforms, and if not, note this limitation explicitly.
GitHub Create pull request

Scan History

Date Scan ID Status Bias Status
2025-08-17 00:01 #83 in_progress ✅ Clean
2025-07-13 21:37 #48 completed ✅ Clean
2025-07-12 23:44 #41 in_progress ❌ Biased