turbot/azure_compliance

Query: compute_vm_malware_agent_automatic_upgrade_enabled

Usage

powerpipe query azure_compliance.query.compute_vm_malware_agent_automatic_upgrade_enabled

SQL

with malware_agent_installed_vm as (
select
distinct a.vm_id
from
azure_compute_virtual_machine as a,
jsonb_array_elements(extensions) as b
where
b ->> 'Publisher' = 'Microsoft.Azure.Security'
and b ->> 'ExtensionType' = 'IaaSAntimalware'
and b ->> 'AutoUpgradeMinorVersion' = 'true'
)
select
a.vm_id as resource,
case
when a.os_type <> 'Windows' then 'skip'
when b.vm_id is not null then 'ok'
else 'alarm'
end as status,
case
when a.os_type <> 'Windows' then a.title || ' is of ' || a.os_type || ' operating syetem.'
when b.vm_id is not null then a.title || ' automatic update of Microsoft Antimalware protection signatures enabled.'
else a.title || ' automatic update of Microsoft Antimalware protection signatures not enabled.'
end as reason,
a.resource_group as resource_group,
sub.display_name as subscription
from
azure_compute_virtual_machine as a
left join malware_agent_installed_vm as b on a.vm_id = b.vm_id,
azure_subscription as sub
where
sub.subscription_id = a.subscription_id;

Controls

The query is being used by the following controls: