User Profile
Sahitya95
Former Employee
Joined Jul 19, 2020
User Widgets
Recent Discussions
Attach multiple Data disks to Azure VM without removing\overwriting existing Data Disks
Hi Everyone i am trying to achieve "Attach multiple Data disks to Azure VM without removing\overwriting existing Data Disks" I am able to add multiple data disks to existing vm but i am unable to achieve below condition. Can anyone please help me IF name=ABC-DataDisk-1 ABC-DataDisk-0 -> Attach IF name=ABC-DataDisk-2 ABC-DataDisk-0 - Attach ABC-DataDisk-1 - Attach IF name=ABC-DataDisk-3 ABC-DataDisk-0 - Attach ABC-DataDisk-1 - Attach ABC-DataDisk-2 - Attach IF name=ABC-DataDisk-4 ABC-DataDisk-0 - Attach ABC-DataDisk-1 - Attach ABC-DataDisk-2 - Attach ABC-DataDisk-3 - Attach # STEP 1: Sign-in to Azure via Azure Resource Manager Connect-AzAccount # STEP 2: Select Azure Subscription $subscriptionId = ( Get-AzSubscription | Out-GridView ` -Title "Select an Azure Subscription …" ` -PassThru ).SubscriptionId Get-AzSubscription -SubscriptionId $subscriptionId | Select-AzSubscription $rgName = 'DEVNETWORK-RG' $vmName = 'test-vm' $location = 'West Europe' $storageType = 'Standard_LRS' $zone = '1' $vm = Get-AzVM -Name $vmName -ResourceGroupName $rgName for ($i = 1; $i -lt 3; $i++) { $dataDiskName = $vmName + "_datadisk$i" $diskConfig = New-AzDiskConfig -AccountType $storageType -Location $location -CreateOption Empty -DiskSizeGB "1024" -Zone $zone $dataDisk = New-AzDisk -DiskName $dataDiskName -Disk $diskConfig -ResourceGroupName $rgName $vm = Add-AzVMDataDisk -VM $vm -Name $dataDiskName -CreateOption Attach -ManagedDiskId $dataDisk.Id -Lun $i -Caching None } Update-AzVM -VM $vm -ResourceGroupName $rgName1KViews0likes0CommentsDeploying partner vulnerability scanners to virtual machines
Hello Team, I am looking for a solution to deploy "deploying partner vulnerability scanners to virtual machines using (Third party vulnerability solution BYOL )" . I have created a partner vulnerability solution using REST API method and modified to loop over all subscriptions. https://docs.microsoft.com/en-us/azure/security-center/partner-vulnerability-assessment The above solution though I select AutoDeploy ON it will not link existing VM to solution in Azure Security Center. Can anyone help me to find automated way to deploy partner vulnerability scanners to virtual machines across 200 subscriptions VM's. Thanks in Advance.1.2KViews0likes1CommentConfuguring Partner vulnerability solution
Hi, I have been trying to use Deploying a partner vulnerability scanning solution using Azure Security Center as per below article. https://docs.microsoft.com/en-us/azure/security-center/partner-vulnerability-assessment#configuring- I am experiencing below error , I have cross verified API version for microsoft.security\security solutions which is same. can anyone help me on this please. Invoke-RestMethod : {"error":{"code":"InvalidResourceType","message":"The resource type could not be found in the namespace 'Microsoft.Security' for api version '2015-06-01-preview'."}} I also would like to know if we select auto deploy off, how can i push qualys agent to vm's using this solution?1.4KViews0likes1CommentAzure AD service Principal Audit
I have requirement for service principal audit to detect if there is an inactive owner or an expired key/Service Principal within Azure for the Service Principal. The remediation of that resource will execute as follows: Service Principal Status 1. Detect if service principal is Inactive 2. Detect an inactive owner (utilizing API) 3. (Future Remediation) If there is multiple owners on a Service Principal, remove the Inactive Owner ii. Key credentials 1. Detect if the service principal key is expired 2. (Future Remediation) Delete expired key b. Generates a report of Active/Inactive Service Principals within the Tenant that is output to a Teams channel or as a email report. >> I am trying below commands to get list of all Service principal along with expiration date but i also needed owner details $apps = Get-AzureADApplication -All $true | Select-Object ObjectId foreach($app in $apps) { $temp = Get-AzureADApplication -ObjectId $app.ObjectId $temp.DisplayName $temp.PasswordCredentials | Format-list EndDate Write-Host "" } Can anyone help me with the above requirement?4.2KViews0likes5Comments
Recent Blog Articles
No content to show