116
Total Pages
38
Linux-Friendly Pages
78
Pages with Bias
67.2%
Bias Rate

Bias Trend Over Time

Pages with Bias Issues

380 issues found
Showing 76-100 of 380 flagged pages
Security Azure encryption overview | Microsoft Docs .../articles/security/fundamentals/encryption-overview.md
High Priority View Details →
Scanned: 2026-01-10 00:00
Reviewed by: LLM Analysis
Issues: 3 bias types
Detected Bias Types
Windows First 🔧 Windows Tools Missing Linux Example
Summary
The documentation page demonstrates a mild Windows bias. SMB encryption is discussed exclusively in the context of Windows operating systems (Windows Server 2012 R2, Windows 8/8.1/10), with no mention of Linux or cross-platform SMB support. There are no examples or references to Linux tools, commands, or patterns for encryption, VPN, or storage access. The documentation does not provide parity for Linux users in terms of examples or tool recommendations.
Recommendations
  • Include information about SMB encryption support on Linux, such as using smbclient or mount.cifs with encryption options.
  • Provide Linux-specific examples for connecting to Azure services securely (e.g., using OpenVPN, strongSwan, or WireGuard for VPN connections).
  • Mention cross-platform tools and commands for interacting with Azure Storage (e.g., Azure CLI, azcopy) and clarify their usage on Linux.
  • Add references to Linux documentation or guides for configuring encryption and secure access to Azure resources.
  • Ensure that examples and tool recommendations are presented in a platform-neutral or parallel manner (Windows and Linux side-by-side).
Security Cloud feature availability for commercial and US Government customers ...articles/security/fundamentals/feature-availability.md
High Priority View Details →
Scanned: 2026-01-10 00:00
Reviewed by: LLM Analysis
Issues: 3 bias types
Detected Bias Types
Powershell Heavy 🔧 Windows Tools Missing Linux Example
Summary
The documentation page demonstrates a bias toward Windows environments and tooling. PowerShell is the only command-line example referenced for administration and configuration tasks (e.g., Azure Attestation, AIP administration), with no mention of Linux equivalents such as Bash, CLI, or cross-platform SDK usage. Windows-centric tools and patterns (Office, PowerShell, RMS, Outlook, SharePoint) are referenced exclusively or predominantly, while Linux or open-source alternatives are absent. There are no Linux-specific configuration or usage examples, and the documentation does not address how to perform equivalent tasks on Linux systems.
Recommendations
  • Provide Linux/Bash/Azure CLI examples alongside PowerShell for all administrative and configuration tasks.
  • Reference cross-platform SDKs and APIs, and clarify their usage on Linux systems.
  • Include documentation and examples for configuring and managing features from Linux environments, not just Windows/Office/PowerShell.
  • Highlight any limitations or differences for Linux users, and offer workarounds or alternatives where possible.
  • Ensure parity in feature descriptions and instructions for both Windows and Linux platforms, especially for security and compliance tooling.
Security Azure identity & access security best practices | Microsoft Docs ...ity/fundamentals/identity-management-best-practices.md
High Priority View Details →
Scanned: 2026-01-10 00:00
Reviewed by: LLM Analysis
Issues: 3 bias types
Detected Bias Types
Windows First 🔧 Windows Tools Missing Linux Example
Summary
The documentation page demonstrates a Windows bias by consistently referencing Windows-centric tools, patterns, and terminology (Active Directory, Windows Server, Windows Hello for Business, Privileged Access Workstations), and by omitting Linux-specific equivalents or examples. The guidance for admin workstations, password protection, and privileged access is focused on Windows environments, with no mention of Linux-based identity management, authentication, or security tooling. Examples and recommendations for automation reference PowerShell and Windows tools, while Linux CLI or open-source alternatives are not discussed.
Recommendations
  • Include Linux-specific examples for identity management, such as using Azure CLI on Linux, configuring authentication for Linux-based admin workstations, and integrating Linux PAM or SSSD with Microsoft Entra ID.
  • Mention Linux equivalents for password protection and policy enforcement, such as using pam_pwquality or other password policy modules.
  • Provide guidance for securing privileged access on Linux systems, including recommendations for sudoers configuration, SSH key management, and Linux-specific admin workstation hardening.
  • Reference cross-platform automation tools (e.g., Azure CLI, Terraform) with examples for both Windows and Linux environments.
  • Discuss Linux-compatible phishing-resistant authentication methods, such as FIDO2 keys and certificate-based authentication with Linux desktop environments.
  • Balance references to Windows Hello for Business and Privileged Access Workstations with Linux desktop security features and best practices.
Security Azure infrastructure integrity ...cles/security/fundamentals/infrastructure-integrity.md
High Priority View Details →
Scanned: 2026-01-10 00:00
Reviewed by: LLM Analysis
Issues: 3 bias types
Detected Bias Types
Windows First 🔧 Windows Tools Missing Linux Example
Summary
The documentation page demonstrates a Windows bias by referencing Windows-specific concepts (such as Windows administrator accounts, Windows Fabric platform, and SQL Server authentication) without mentioning Linux equivalents or providing examples relevant to Linux environments. There is no discussion of Linux-based tools, authentication patterns, or infrastructure management, and all examples and terminology are centered around Windows technologies.
Recommendations
  • Include examples and references for Linux-based Azure deployments, such as how administrator accounts and authentication are managed on Linux VMs.
  • Mention Linux equivalents to Windows Fabric and clarify whether similar platform-management endpoints exist for Linux clusters.
  • Discuss virus scanning tools and processes for Linux builds, not just Endpoint Protection (which is Windows-centric).
  • Provide information about ACLs, firewalls, and monitoring agents in the context of Linux environments.
  • Ensure terminology and examples are balanced between Windows and Linux, or explicitly state when a feature is Windows-only.
Security Azure security logging and auditing | Microsoft Docs .../blob/main/articles/security/fundamentals/log-audit.md
High Priority View Details →
Scanned: 2026-01-10 00:00
Reviewed by: LLM Analysis
Issues: 3 bias types
Detected Bias Types
Windows First 🔧 Windows Tools Missing Linux Example
Summary
The documentation demonstrates a Windows bias by listing Windows event logs before Linux Syslog in the VM logging section, referencing Windows-specific tools (Windows Event Log service, Azure Diagnostics for Windows), and failing to provide Linux-specific logging integration examples or details. Linux is mentioned only in passing, with no equivalent depth or guidance for Linux environments.
Recommendations
  • Provide Linux-specific examples for log collection and integration, such as configuring Syslog forwarding, using Linux agents, or integrating with Linux-native SIEM tools.
  • Ensure parity in documentation by describing both Windows and Linux logging mechanisms in equal detail, including setup, configuration, and troubleshooting steps.
  • List Linux logging options alongside Windows options rather than after them, or present them in parallel to avoid implicit prioritization.
  • Reference Linux tools and patterns (e.g., rsyslog, auditd, journald) and how they integrate with Azure Monitor and SIEM solutions.
  • Include sample commands or configuration snippets for both Windows (PowerShell, Event Viewer) and Linux (shell commands, config files) environments.
Security Hypervisor security on the Azure fleet - Azure Security ...blob/main/articles/security/fundamentals/hypervisor.md
High Priority View Details →
Scanned: 2026-01-10 00:00
Reviewed by: LLM Analysis
Issues: 3 bias types
Detected Bias Types
Windows First 🔧 Windows Tools Missing Linux Example
Summary
The documentation page demonstrates a Windows bias by exclusively referencing Windows Hyper-V as the hypervisor technology, with no mention of Linux-based hypervisors (such as KVM or Xen) or Linux-specific security practices. All technical descriptions, security objectives, and mitigation strategies are framed in the context of Windows tools and terminology, with no examples or guidance for Linux environments. The documentation assumes the reader is operating in a Windows-centric Azure environment and omits Linux parity in both conceptual and practical aspects.
Recommendations
  • Include references to Linux-based hypervisors (e.g., KVM, Xen) where relevant, especially for Azure environments that support Linux VMs.
  • Provide examples or explanations of how hypervisor security objectives and mitigations apply to Linux guests and host environments.
  • Mention Linux-specific security features (such as SELinux, AppArmor, or seccomp) and how they interact with Azure hypervisor security.
  • Clarify whether the described security boundaries and mitigations are applicable to Linux VMs and, if so, provide Linux-focused documentation links.
  • Add Linux command-line or configuration examples where appropriate, alongside Windows/Powershell examples.
Security Security best practices for IaaS workloads in Azure | Microsoft Docs ...-docs/blob/main/articles/security/fundamentals/iaas.md
High Priority View Details →
Scanned: 2026-01-10 00:00
Reviewed by: LLM Analysis
Issues: 4 bias types
Detected Bias Types
Windows First Powershell Heavy 🔧 Windows Tools Missing Linux Example
Summary
The documentation demonstrates several forms of Windows bias. Windows-specific tools (e.g., PowerShell cmdlets, Windows Defender, WSUS) are mentioned or exemplified before Linux equivalents, and some examples (such as disk encryption and backup) use PowerShell commands without Linux CLI alternatives. Antimalware recommendations are Windows-centric, and monitoring/diagnostics extensions are described primarily for Windows VMs. Linux-specific instructions, tools, or examples are often missing or referenced only as secondary options.
Recommendations
  • Provide Linux CLI (bash, az CLI) equivalents for all PowerShell examples, especially for disk encryption and backup operations.
  • Include Linux-specific antimalware solutions and examples (e.g., ClamAV, Sophos, ESET) alongside Windows Defender and Microsoft Antimalware.
  • Ensure that monitoring and diagnostics instructions cover both Windows and Linux agents/extensions, with explicit Linux setup steps.
  • When listing best practices or tools, present Windows and Linux options in parallel, rather than Windows-first ordering.
  • Expand explanations for Linux VM management, such as update strategies (apt, yum, zypper), and reference Linux-specific documentation where appropriate.
  • Add explicit examples of Linux VM lifecycle management, authentication, and security posture monitoring.
Security Azure information system components and boundaries ...les/security/fundamentals/infrastructure-components.md
High Priority View Details →
Scanned: 2026-01-10 00:00
Reviewed by: LLM Analysis
Issues: 3 bias types
Detected Bias Types
Windows First 🔧 Windows Tools Missing Linux Example
Summary
The documentation page demonstrates a Windows bias by repeatedly referencing Windows Server as the host operating system for Azure VMs, mentioning Windows Firewall as the default security tool, and omitting any discussion of Linux-based hosts or Linux-specific management/security tools. No examples or references to Linux equivalents (such as iptables, SELinux, or Linux-based hypervisors) are provided, and the narrative assumes Windows as the default or only platform for Azure infrastructure components.
Recommendations
  • Explicitly mention that Azure supports both Windows and Linux VMs, and clarify which components are Windows-specific versus cross-platform.
  • Include references to Linux-based host images and describe their security and management features (e.g., use of iptables, firewalld, SELinux, AppArmor).
  • Provide examples or explanations of how firewall and security configuration is handled for Linux VMs in Azure.
  • Discuss whether the Azure hypervisor and fabric controller support Linux hosts, and if so, describe any differences in architecture or management.
  • Ensure parity in documentation by listing Linux tools and patterns alongside Windows ones, and avoid presenting Windows tools (e.g., Windows Firewall) as the default without mentioning Linux equivalents.
Security Isolation in the Azure Public Cloud | Microsoft Docs ...in/articles/security/fundamentals/isolation-choices.md
High Priority View Details →
Scanned: 2026-01-10 00:00
Reviewed by: LLM Analysis
Issues: 4 bias types
Detected Bias Types
🔧 Windows Tools Windows First Powershell Heavy Missing Linux Example
Summary
The documentation page demonstrates a Windows bias in several ways: Windows-specific tools and technologies (e.g., Windows Firewall, BitLocker, Active Directory Federation Services, Group Policy) are mentioned exclusively or before Linux equivalents. Examples and explanations often reference Windows-centric patterns (such as Windows Firewall and BitLocker) without providing Linux alternatives or parity in detail. Powershell and Windows administrative models are implied as defaults, and Linux-specific tooling or patterns (e.g., iptables, SELinux, Linux authentication mechanisms) are largely absent or only briefly mentioned. In sections where both Windows and Linux are supported (e.g., disk encryption), the Windows solution is described first and in greater detail, while Linux solutions are referenced with less explanation.
Recommendations
  • Provide Linux-specific examples and tooling references (e.g., iptables, firewalld, SELinux, Linux authentication and RBAC models) alongside Windows examples.
  • Ensure parity in technical detail for Linux solutions (e.g., explain dm-crypt and Linux disk encryption workflows as thoroughly as BitLocker).
  • Mention Linux administrative patterns (e.g., sudo, SSH, Linux user/group management) where Windows admin models (e.g., Group Policy, Active Directory) are discussed.
  • Include Linux command-line examples (bash, CLI tools) in sections referencing Azure management, not just Powershell or Windows GUI.
  • Order references to Windows and Linux solutions equally, or alternate which is mentioned first, to avoid implicit prioritization.
  • Highlight cross-platform Azure features and clarify where functionality or workflows differ between Windows and Linux.
Security Azure security management and monitoring overview ...ecurity/fundamentals/management-monitoring-overview.md
High Priority View Details →
Scanned: 2026-01-10 00:00
Reviewed by: LLM Analysis
Issues: 3 bias types
Detected Bias Types
Powershell Heavy 🔧 Windows Tools Windows First
Summary
The documentation demonstrates mild Windows bias. Azure Automation highlights PowerShell runbooks before Python, and features like Hotpatching in Azure Update Manager are described as Windows-specific. There is a tendency to mention Windows tools and patterns (PowerShell, Windows Server features) before or more prominently than Linux equivalents, and some advanced features are noted as Windows-only. However, Linux support is acknowledged in several places, such as Azure Update Manager and Automation, but Linux-specific examples, tooling, or parity details are missing.
Recommendations
  • Provide Linux-specific examples and tooling details alongside Windows (e.g., Bash, Python, Ansible runbooks in Azure Automation).
  • Explicitly state feature parity or limitations for Linux where Windows-only features are mentioned (e.g., Hotpatching).
  • Balance the order of presentation so Linux and Windows are mentioned equally, or alternate which platform is listed first.
  • Include references to Linux-native tools and workflows (e.g., shell scripts, configuration management with Chef/Puppet/Ansible) where appropriate.
  • Add documentation links or sections for Linux-specific security management and monitoring scenarios.
Security Azure operational security checklist| Microsoft Docs ...rticles/security/fundamentals/operational-checklist.md
High Priority View Details →
Scanned: 2026-01-10 00:00
Reviewed by: LLM Analysis
Issues: 3 bias types
Detected Bias Types
🔧 Windows Tools Windows First Missing Linux Example
Summary
The documentation page demonstrates Windows bias primarily through the exclusive mention of Windows-centric technologies and protocols (e.g., SMB 3.0), and by referencing Windows tools and concepts before or instead of Linux equivalents. There are no Linux-specific operational security examples, and some features (like disk encryption) link to Windows documentation even when referencing Linux VMs. The checklist omits Linux command-line or tool usage, and does not provide parity for Linux administrators.
Recommendations
  • Include Linux-specific examples and references alongside Windows ones, such as NFS for file shares and Linux-native encryption tools.
  • Provide operational security checklist items relevant to Linux environments, including SELinux/AppArmor, Linux audit logging, and integration with Azure security features.
  • Ensure documentation links for features like disk encryption point to both Linux and Windows guides, and clarify differences in implementation.
  • Add examples using Bash/CLI commands for Linux where PowerShell or Windows GUI is mentioned.
  • Review and update references to protocols and tools (e.g., mention NFS as an alternative to SMB for Azure File Shares) to ensure cross-platform applicability.
Security Securing PaaS web & mobile applications ...y/fundamentals/paas-applications-using-app-services.md
High Priority View Details →
Scanned: 2026-01-10 00:00
Reviewed by: LLM Analysis
Issues: 3 bias types
Detected Bias Types
Windows First Missing Linux Example 🔧 Windows Tools
Summary
The documentation page demonstrates Windows bias by providing a specific example for restricting IP addresses using web.config, which is only applicable to App Service on Windows. There is no equivalent example or mention of how to achieve similar functionality on Linux-based App Service environments. Additionally, the reference to IIS (Internet Information Services) and web.config is a Windows-centric tool and pattern, with no Linux alternative discussed.
Recommendations
  • Include examples or instructions for restricting IP addresses on App Service for Linux, such as using .htaccess for Apache, nginx configuration, or other relevant Linux web server methods.
  • When mentioning Windows-specific tools (e.g., web.config, IIS), provide Linux equivalents in parallel or note the differences explicitly.
  • Ensure that security best practices are presented in a cross-platform manner, with equal coverage for both Windows and Linux hosting environments.
  • Add a section or note clarifying how App Service security features differ between Windows and Linux, and link to platform-specific documentation where appropriate.
Security Enhance remote management security in Azure | Microsoft Docs ...blob/main/articles/security/fundamentals/management.md
High Priority View Details →
Scanned: 2026-01-10 00:00
Reviewed by: LLM Analysis
Issues: 4 bias types
Detected Bias Types
Windows First 🔧 Windows Tools Powershell Heavy Missing Linux Example
Summary
The documentation page demonstrates a strong Windows bias throughout. It consistently references Windows-specific tools and technologies (such as Group Policy, AppLocker, Hyper-V, Windows Firewall, BitLocker, and PowerShell) as primary or sole examples for securing remote management in Azure. There are no equivalent Linux or cross-platform examples provided, and Linux tools, patterns, or best practices are not mentioned. The guidance assumes a Windows-centric environment, omitting Linux administration scenarios and tools.
Recommendations
  • Include equivalent Linux examples and tools for each Windows-specific recommendation (e.g., SELinux or AppArmor for AppLocker, iptables/firewalld for Windows Firewall, LUKS for BitLocker, sudoers and PAM for Group Policy/least privilege).
  • Provide PowerShell alternatives using Azure CLI, Bash, or Python scripts for Linux administrators.
  • Mention Linux-based hardening practices (such as CIS Benchmarks for Linux, using SSH keys, and Linux patch management tools).
  • Describe how to configure secure remote management workstations on Linux (e.g., using QEMU/KVM for virtualization, Linux VPN clients, and Linux desktop security best practices).
  • Ensure that tables and diagrams reflect both Windows and Linux scenarios, or explicitly state when guidance is Windows-only.
  • Add references to Linux security documentation and Azure's Linux management guidance.
Security Azure Operational Security | Microsoft Docs ...articles/security/fundamentals/operational-security.md
High Priority View Details →
Scanned: 2026-01-10 00:00
Reviewed by: LLM Analysis
Issues: 3 bias types
Detected Bias Types
Windows First 🔧 Windows Tools Missing Linux Example
Summary
The documentation page exhibits a Windows bias in several ways. Windows terminology (e.g., 'Windows Azure', 'Windows Server') is used preferentially or exclusively in multiple sections, and Windows-centric tools and logs (such as Windows event logs, IIS logs, System Center Data Protection Manager) are mentioned without equivalent Linux examples or alternatives. Where cross-platform support is referenced, details and examples for Linux are minimal or absent. Instructions and tool references (e.g., PowerShell, Azure portal) are presented without parity for Linux command-line tools or workflows.
Recommendations
  • Add explicit Linux examples and instructions alongside Windows ones, especially for monitoring, logging, and backup scenarios.
  • Reference Linux tools and logs (e.g., syslog, journald, rsyslog) wherever Windows event logs are mentioned.
  • When mentioning backup solutions, include details for Linux workloads and alternatives to System Center Data Protection Manager.
  • Provide CLI and REST API usage examples for both Windows and Linux environments, not just PowerShell or portal-based workflows.
  • Use neutral terminology (e.g., 'Azure' instead of 'Windows Azure') and avoid Windows-first phrasing.
  • Highlight cross-platform agent installation and configuration steps for Azure Monitor and related services.
Security Best practices for secure PaaS deployments - Microsoft Azure ...ain/articles/security/fundamentals/paas-deployments.md
High Priority View Details →
Scanned: 2026-01-10 00:00
Reviewed by: LLM Analysis
Issues: 3 bias types
Detected Bias Types
🔧 Windows Tools Missing Linux Example Windows First
Summary
The documentation page exhibits a bias towards Windows environments and Microsoft-centric tools. It references Windows-specific management interfaces (such as remote PowerShell), focuses exclusively on Microsoft authentication and security tools, and omits Linux-specific or cross-platform command-line examples. There is no mention of Linux-native security practices, tools, or integration patterns, and Windows-centric terminology (e.g., PowerShell, .pfx files) is used without Linux equivalents or alternatives.
Recommendations
  • Include Linux-specific examples for identity management, such as using Azure CLI or REST APIs from Linux shells.
  • Mention Linux-native tools and practices for key management and credential storage, such as integration with Azure Key Vault via CLI or SDKs on Linux.
  • Provide parity in remote management examples, e.g., show how to manage Azure resources from Bash or other Linux shells, not just PowerShell.
  • Reference cross-platform authentication libraries and patterns, not just Microsoft Entra ID and OAuth flows as implemented in Microsoft stacks.
  • Clarify that Azure services and security features are accessible and manageable from Linux environments, and provide links or examples for Linux users.
  • Avoid Windows-centric terminology (e.g., .pfx files) without also mentioning Linux equivalents (e.g., PEM files, OpenSSL usage).
Security Detect and respond to ransomware attacks ...les/security/fundamentals/ransomware-detect-respond.md
High Priority View Details →
Scanned: 2026-01-10 00:00
Reviewed by: LLM Analysis
Issues: 4 bias types
Detected Bias Types
🔧 Windows Tools Powershell Heavy Windows First Missing Linux Example
Summary
The documentation page demonstrates a Windows bias by referencing Windows-specific tools (e.g., Defender for Endpoint, PowerShell Operational logs, Security Event log) and patterns (RDP, Windows event logs) without mentioning Linux equivalents or providing Linux-specific guidance. Examples and recommendations are focused on Windows environments and Azure VMs, with no discussion of Linux detection/response patterns, logs, or tools. Windows terminology and tools are presented first and exclusively, leaving Linux users without clear parity.
Recommendations
  • Include explicit guidance for Linux VMs in Azure, such as monitoring syslog, auth.log, and Linux-specific ransomware indicators.
  • Provide examples of containment and response actions for Linux systems, including commands and tools (e.g., iptables, fail2ban, Linux EDR solutions).
  • Mention Linux equivalents for event log monitoring and security tool disabling (e.g., auditd, systemd-journald).
  • Reference cross-platform security solutions and clarify which recommendations apply to Linux, Windows, or both.
  • Add Linux-specific resources and links for ransomware detection and response in Azure environments.
Security Best practices for Azure Service Fabric security ...security/fundamentals/service-fabric-best-practices.md
High Priority View Details →
Scanned: 2026-01-10 00:00
Reviewed by: LLM Analysis
Issues: 4 bias types
Detected Bias Types
Powershell Heavy Windows First 🔧 Windows Tools Missing Linux Example
Summary
The documentation page demonstrates a Windows bias by consistently referencing Windows-specific tools (PowerShell, Windows Server certificate service, MakeCert.exe), and providing configuration guidance and examples only for Windows clusters. Linux equivalents (such as CLI or bash scripting, OpenSSL, Linux certificate management, or Linux cluster configuration) are not mentioned or are omitted entirely. Windows terminology and technologies (Active Directory, Remote Desktop Connection) are prioritized or exclusively discussed, with no parity for Linux-based deployments.
Recommendations
  • Include examples and instructions for Linux-based Service Fabric clusters, such as using Bash scripts and the Azure CLI.
  • Reference Linux-compatible certificate creation tools (e.g., OpenSSL) alongside Windows tools like MakeCert.exe.
  • Provide guidance for configuring security policies and cluster settings on Linux, including file permissions and user/group management.
  • Mention Linux alternatives to Windows-specific technologies (e.g., SSH for remote access instead of Remote Desktop Connection).
  • Ensure that all best practices and scenarios are covered for both Windows and Linux clusters, with equal prominence and detail.
  • Add links to Linux-focused documentation where appropriate.
Security Prevent subdomain takeovers with Azure DNS alias records and Azure App Service's custom domain verification ...n/articles/security/fundamentals/subdomain-takeover.md
High Priority View Details →
Scanned: 2026-01-10 00:00
Reviewed by: LLM Analysis
Issues: 3 bias types
Detected Bias Types
Powershell Heavy Windows First Missing Linux Example
Summary
The documentation page exhibits a Windows bias primarily through exclusive use of PowerShell scripts and references, with no equivalent Linux shell (bash/CLI) examples provided. The main tool for identifying dangling DNS records is a PowerShell script, and the only example for automating resource graph queries is via PowerShell. There is no mention of Linux-native tools, nor are cross-platform alternatives or instructions given. Windows/PowerShell patterns are presented as the default, with no parity for Linux users.
Recommendations
  • Provide equivalent examples using Azure CLI (az) commands and/or bash scripts for identifying dangling DNS records and running resource graph queries.
  • Explicitly state that the PowerShell tools can be run on Linux/macOS via PowerShell Core, and provide installation instructions if relevant.
  • Include links or references to cross-platform tools or scripts (e.g., Python, bash) for DNS record auditing.
  • Where PowerShell is mentioned, offer side-by-side Linux shell/CLI alternatives to ensure parity.
  • Clarify any platform requirements for the provided scripts and tools, and recommend best practices for Linux environments.
Security Best practices for protecting secrets ...ticles/security/fundamentals/secrets-best-practices.md
High Priority View Details →
Scanned: 2026-01-10 00:00
Reviewed by: LLM Analysis
Issues: 3 bias types
Detected Bias Types
Windows First Missing Linux Example 🔧 Windows Tools
Summary
The documentation page exhibits Windows bias by exclusively referencing Azure and Microsoft-centric tools and patterns, with examples and guidance focused on Azure Key Vault, Azure Managed HSM, and other Azure services. Service-specific best practices and links are almost entirely oriented toward Azure, with no mention of Linux-native secret management tools (such as HashiCorp Vault, GnuPG, or Linux environment variable management), nor examples for Linux shell usage. Where tooling is mentioned (e.g., Azure Automation, Azure Web PubSub), PowerShell is referenced, but Linux equivalents (such as Bash or CLI) are not provided. The page omits Linux-specific patterns for secret management, such as integration with systemd, file permissions, or open-source alternatives.
Recommendations
  • Include examples and guidance for Linux environments, such as using Bash scripts, environment variables, and Linux file permissions.
  • Reference open-source secret management tools commonly used on Linux, such as HashiCorp Vault, GnuPG, or sops.
  • Provide parity in CLI examples, showing both Azure CLI and PowerShell, and clarify cross-platform usage.
  • Mention Linux-specific best practices for secret storage, rotation, and access control, such as leveraging systemd services, SELinux/AppArmor, and native logging/auditing tools.
  • Add links to documentation for Linux and open-source secret management solutions alongside Azure-specific links.
Security Secure your Microsoft Entra identity infrastructure ...rticles/security/fundamentals/steps-secure-identity.md
High Priority View Details →
Scanned: 2026-01-10 00:00
Reviewed by: LLM Analysis
Issues: 3 bias types
Detected Bias Types
🔧 Windows Tools Windows First Missing Linux Example
Summary
The documentation page demonstrates a Windows bias by referencing Windows-specific tools and patterns (such as AD FS, Windows Server Active Directory, and Windows Hello for Business) without mentioning Linux equivalents or alternatives. Windows-centric terminology and features are presented as defaults or primary options, and there are no examples or guidance for Linux-based identity infrastructure or hybrid environments involving Linux servers. The absence of Linux-focused instructions, tools, or parity in examples makes the documentation less inclusive for organizations running non-Windows platforms.
Recommendations
  • Include examples and guidance for securing identity infrastructure in Linux environments, such as integrating Linux servers with Microsoft Entra ID.
  • Mention and provide instructions for Linux-compatible authentication methods (e.g., FIDO2 security keys, PAM integration, SSSD, or Azure AD authentication for Linux VMs).
  • When discussing password protection and synchronization, clarify how these features apply to Linux-based systems or hybrid environments with Linux servers.
  • Provide parity in monitoring and logging instructions, referencing SIEM tools and log integration methods commonly used on Linux (e.g., syslog, auditd, ELK stack).
  • Reference open standards and cross-platform tools where possible, and avoid presenting Windows tools (AD FS, Windows Hello) as the only or default solution.
  • Add sections or links to documentation for Linux administrators, including best practices for securing Linux identities with Microsoft Entra ID.
Security Security technical capabilities in Azure - Microsoft Azure ...ticles/security/fundamentals/technical-capabilities.md
High Priority View Details →
Scanned: 2026-01-10 00:00
Reviewed by: LLM Analysis
Issues: 3 bias types
Detected Bias Types
Windows First 🔧 Windows Tools Missing Linux Example
Summary
The documentation page demonstrates a Windows bias primarily through the prioritization of Windows-centric tools, terminology, and examples. Windows technologies (Active Directory, Windows error reporting, Microsoft Accounts) are referenced first or exclusively in identity and security sections. There is a lack of Linux-specific examples, tools, or command-line instructions, and PowerShell or Windows-based management patterns are implicitly assumed. While Linux is mentioned as a supported platform, practical parity in examples and tool coverage is missing.
Recommendations
  • Include Linux-specific examples and instructions alongside Windows ones, such as CLI commands for identity management, security monitoring, and VM management.
  • Reference open-source and Linux-native tools (e.g., SSH, iptables, auditd, SELinux) where relevant, and show how they integrate with Azure security services.
  • Provide explicit parity in documentation for Linux VM security, including antimalware, backup, and monitoring solutions.
  • Avoid Windows-first terminology (e.g., 'domain-joined devices', 'Windows error reporting') and clarify cross-platform applicability.
  • Add sample workflows for Linux administrators (e.g., using Azure CLI/Bash, integrating with LDAP, configuring Linux firewalls) in security scenarios.
  • Highlight Azure features that are platform-agnostic or provide equivalent functionality for both Windows and Linux.
Security https://github.com/MicrosoftDocs/azure-docs/blob/main/articles/security/develop/threat-modeling-tool-releases-73002061.md ...rity/develop/threat-modeling-tool-releases-73002061.md
High Priority View Details →
Scanned: 2026-01-09 00:34
Reviewed by: LLM Analysis
Issues: 3 bias types
Detected Bias Types
🔧 Windows Tools Missing Linux Example Windows First
Summary
The documentation page exclusively references Windows as the supported operating system for the Microsoft Threat Modeling Tool, with no mention of Linux or cross-platform compatibility. System requirements specify Windows 10 and .NET Framework, both of which are Windows-centric. There are no examples, instructions, or notes for Linux users, nor any mention of Linux equivalents or alternatives.
Recommendations
  • Explicitly state whether Linux is supported or not. If not, provide rationale and suggest alternatives for Linux users.
  • If possible, add instructions or guidance for running the tool on Linux (e.g., via Wine, Mono, or a cross-platform version).
  • Include Linux system requirements or compatibility notes if support is planned.
  • Provide links to threat modeling tools available for Linux, or mention open-source alternatives.
Security https://github.com/MicrosoftDocs/azure-docs/blob/main/articles/security/fundamentals/antimalware.md ...lob/main/articles/security/fundamentals/antimalware.md
High Priority View Details →
Scanned: 2026-01-09 00:34
Reviewed by: LLM Analysis
Issues: 4 bias types
Detected Bias Types
Windows First Missing Linux Example Powershell Heavy 🔧 Windows Tools
Summary
The documentation is heavily biased towards Windows environments. All deployment, configuration, and monitoring instructions and examples are for Windows Server VMs and Windows-based Azure services. There is no support or guidance for Linux VMs, and Linux is explicitly listed as unsupported. All tooling references are to Windows-centric tools (PowerShell, Visual Studio, Windows event logs), and all code samples and workflows use PowerShell cmdlets. Linux alternatives, if any, are not mentioned or provided.
Recommendations
  • Clearly state Linux support limitations at the top of the documentation.
  • If Linux support is planned, provide equivalent instructions, tooling, and examples for Linux VMs (e.g., Bash scripts, CLI commands, Linux event log integration).
  • Reference and link to antimalware solutions for Linux on Azure (e.g., third-party or Microsoft-supported Linux antimalware extensions).
  • Where possible, use cross-platform Azure CLI examples in addition to PowerShell.
  • Add a comparison table of antimalware options for Windows and Linux in Azure, with guidance for Linux users.
Security https://github.com/MicrosoftDocs/azure-docs/blob/main/articles/security/fundamentals/infrastructure-components.md ...les/security/fundamentals/infrastructure-components.md
High Priority View Details →
Scanned: 2026-01-09 00:34
Reviewed by: LLM Analysis
Issues: 3 bias types
Detected Bias Types
Windows First 🔧 Windows Tools Missing Linux Example
Summary
The documentation page demonstrates a Windows bias by exclusively referencing Windows Server as the host OS for Azure VMs, mentioning Windows Firewall as the default security tool, and omitting any discussion of Linux-based host or guest operating systems. There are no examples or references to Linux tools, patterns, or equivalents, and the architecture is described solely in terms of Windows technologies.
Recommendations
  • Explicitly mention support for Linux-based VMs and describe how Linux guest operating systems are managed and secured in Azure.
  • Include references to Linux firewall tools (e.g., iptables, firewalld, ufw) alongside Windows Firewall when discussing VM security.
  • Clarify whether the Azure hypervisor and fabric controller support Linux host or guest images, and provide details on their management.
  • Add examples or explanations of how Linux-based images are built, hardened, and deployed in Azure environments.
  • Ensure that documentation covers both Windows and Linux administrative patterns, tools, and security practices to provide parity for cross-platform users.
Security https://github.com/MicrosoftDocs/azure-docs/blob/main/articles/security/fundamentals/operational-checklist.md ...rticles/security/fundamentals/operational-checklist.md
High Priority View Details →
Scanned: 2026-01-09 00:34
Reviewed by: LLM Analysis
Issues: 3 bias types
Detected Bias Types
🔧 Windows Tools Windows First Missing Linux Example
Summary
The documentation page demonstrates a Windows bias by referencing Windows-specific technologies (e.g., SMB 3.0) and tools without providing equivalent Linux examples or alternatives. Windows-centric terminology and links (such as SMB protocol and CIFS) are mentioned exclusively or before Linux equivalents. In several checklist items, only Windows or Microsoft tools are referenced, and Linux-specific operational patterns or commands are missing.
Recommendations
  • Provide Linux equivalents for Windows technologies, such as mentioning NFS for Azure File Shares alongside SMB.
  • Include Linux-specific examples or links, such as Azure Disk Encryption for Linux VMs, and ensure parity with Windows VM documentation.
  • Reference cross-platform tools and patterns where possible, and avoid exclusively mentioning Windows technologies.
  • When discussing protocols or operational steps, present both Windows and Linux approaches side-by-side.
  • Add examples or links for Linux command-line tools (e.g., Bash, CLI) in addition to PowerShell or Windows-based instructions.