This page contains Windows bias

About This Page

This page is part of the Azure documentation. It contains code examples and configuration instructions for working with Azure services.

Bias Analysis

Bias Types:
⚠️ powershell_heavy
⚠️ windows_tools
⚠️ missing_linux_example
⚠️ windows_first
Summary:
The documentation exclusively provides PowerShell code samples and references to Windows-centric tools and file paths (e.g., C:\ paths, .exe processes). There are no examples or guidance for Linux VMs or cross-platform alternatives, and all extension configuration is shown using Windows/PowerShell paradigms. Linux support or parity is not mentioned, and the documentation implicitly assumes a Windows environment.
Recommendations:
  • Add equivalent examples for deploying and configuring antimalware on Linux VMs, using Azure CLI, ARM templates, or REST API.
  • Clarify whether Microsoft Antimalware is available for Linux VMs, and if not, explicitly state this limitation.
  • If Linux support exists, provide sample configuration files and command-line instructions relevant to Linux environments.
  • Avoid using only Windows file paths and process names in configuration samples; include Linux-style paths and process examples where applicable.
  • Present cross-platform tools (e.g., Azure CLI) before or alongside PowerShell, to ensure parity and inclusivity.
GitHub Create pull request

Scan History

Date Scan ID Status Bias Status
2025-08-17 00:01 #83 in_progress ✅ Clean
2025-07-13 21:37 #48 completed ❌ Biased
2025-07-12 23:44 #41 in_progress ❌ Biased

Flagged Code Snippets

#Before using Azure PowerShell to manage VM extensions on your hybrid server managed by Azure Arc-enabled servers, you need to install the Az.ConnectedMachine module. Run the following command on your Azure Arc-enabled server: #If you have Az.ConnectedMachine installed, please make sure the version is at least 0.4.0 install-module -Name Az.ConnectedMachine Import-Module -name Az.ConnectedMachine # specify location, resource group, and VM for the extension $subscriptionid =" SUBSCRIPTION ID HERE " $location = " LOCATION HERE " # eg., “Southeast Asia” or “Central US” $resourceGroupName = " RESOURCE GROUP NAME HERE " $machineName = "MACHINE NAME HERE " # Enable Antimalware with default policies $setting = @{"AntimalwareEnabled"=$true} # Enable Antimalware with custom policies $setting2 = @{ "AntimalwareEnabled"=$true; "RealtimeProtectionEnabled"=$true; "ScheduledScanSettings"= @{ "isEnabled"=$true; "day"=0; "time"=120; "scanType"="Quick" }; "Exclusions"= @{ "Extensions"=".ext1, .ext2"; "Paths"=""; "Processes"="sampl1e1.exe, sample2.exe" }; "SignatureUpdates"= @{ "FileSharesSources"=“”; "FallbackOrder”=“”; "ScheduleDay"=0; "UpdateInterval"=0; }; "CloudProtection"=$true } # Will be prompted to login Connect-AzAccount # Enable Antimalware with the policies New-AzConnectedMachineExtension -Name "IaaSAntimalware" -ResourceGroupName $resourceGroupName -MachineName $machineName -Location $location -SubscriptionId $subscriptionid -Publisher “Microsoft.Azure.Security” -Settings $setting -ExtensionType “IaaSAntimalware”