From 5fcb9e43b2daa68e236c18621978e0ecbc8264a0 Mon Sep 17 00:00:00 2001 From: Ahmad Abas Date: Mon, 12 Apr 2021 16:27:08 +0300 Subject: [PATCH 1/3] Fix typo in printing va scan results --- src/Security/Security/ChangeLog.md | 2 +- .../PSSqlVulnerabilityAssessmentRemediation.cs | 2 +- .../Get-AzSecuritySqlVulnerabilityAssessmentScanResult.md | 8 ++++---- 3 files changed, 6 insertions(+), 6 deletions(-) diff --git a/src/Security/Security/ChangeLog.md b/src/Security/Security/ChangeLog.md index bb530524e021..9cc7278e4907 100644 --- a/src/Security/Security/ChangeLog.md +++ b/src/Security/Security/ChangeLog.md @@ -19,7 +19,7 @@ --> ## Upcoming Release - +* Fix typo in printing SQL vulnerability assessment scan results ## Version 0.10.0 * Added Sql Vulnerability Assessment cmdlets for IAAS: `Get-AzSecuritySqlVulnerabilityAssessmentScanRecord` diff --git a/src/Security/Security/Models/SqlVulnerabilityAssessment/PSSqlVulnerabilityAssessmentRemediation.cs b/src/Security/Security/Models/SqlVulnerabilityAssessment/PSSqlVulnerabilityAssessmentRemediation.cs index b74666c69c3c..f3aa2c40fc3b 100644 --- a/src/Security/Security/Models/SqlVulnerabilityAssessment/PSSqlVulnerabilityAssessmentRemediation.cs +++ b/src/Security/Security/Models/SqlVulnerabilityAssessment/PSSqlVulnerabilityAssessmentRemediation.cs @@ -16,7 +16,7 @@ public override string ToString() { return string.Join(Environment.NewLine, $"{{", $"{Description}", - $"IsAutimated: {Automated}", + $"IsAutomated: {Automated}", $"Portal Link: {PortalLink}", $"Script:", (Scripts.Any() ? $"{string.Join(Environment.NewLine, Scripts)}" : "{}"), diff --git a/src/Security/Security/help/Get-AzSecuritySqlVulnerabilityAssessmentScanResult.md b/src/Security/Security/help/Get-AzSecuritySqlVulnerabilityAssessmentScanResult.md index bff7a029bc46..7b52b7598f4d 100644 --- a/src/Security/Security/help/Get-AzSecuritySqlVulnerabilityAssessmentScanResult.md +++ b/src/Security/Security/help/Get-AzSecuritySqlVulnerabilityAssessmentScanResult.md @@ -41,7 +41,7 @@ IsTrimmed : False QueryResults : {dbo db_owner SQL_USER} Remediation : { Remove members who should not have access to the database role - IsAutimated: True + IsAutomated: True Portal Link: Script: ALTER ROLE [db_owner] DROP MEMBER [dbo] @@ -119,7 +119,7 @@ IsTrimmed : False QueryResults : {dbo db_owner SQL_USER} Remediation : { Remove members who should not have access to the database role - IsAutimated: True + IsAutomated: True Portal Link: Script: ALTER ROLE [db_owner] DROP MEMBER [dbo] @@ -179,7 +179,7 @@ IsTrimmed : False QueryResults : {} Remediation : { Revoke EXECUTE permission on xp_cmdshell to all users (except dbo) - IsAutimated: False + IsAutomated: False Portal Link: Script: {} @@ -221,7 +221,7 @@ IsTrimmed : False QueryResults : {True} Remediation : { Install the latest SQL Server CU corresponding to your version of SQL Server. Go to https://technet.microsoft.com/en-us/sqlserver/ff803383.aspx to find and download the required CU. - IsAutimated: True + IsAutomated: True Portal Link: Script: {} From 3a2be594cb615e45171ddce9ba8c6fe4e6125841 Mon Sep 17 00:00:00 2001 From: Ahmad Abas Date: Mon, 12 Apr 2021 18:10:26 +0300 Subject: [PATCH 2/3] add reference to compute, network and operational insights to the solution to try to mitigate issue with tests --- src/Security/Security.sln | 18 ++++++++++++++++++ 1 file changed, 18 insertions(+) diff --git a/src/Security/Security.sln b/src/Security/Security.sln index 0d13ac88a45a..c373c1948321 100644 --- a/src/Security/Security.sln +++ b/src/Security/Security.sln @@ -20,6 +20,12 @@ Project("{9A19103F-16F7-4668-BE54-9A1E7A4F7556}") = "ScenarioTest.ResourceManage EndProject Project("{9A19103F-16F7-4668-BE54-9A1E7A4F7556}") = "TestFx", "..\..\tools\TestFx\TestFx.csproj", "{BC80A1D0-FFA4-43D9-AA74-799F5CB54B58}" EndProject +Project("{9A19103F-16F7-4668-BE54-9A1E7A4F7556}") = "Compute", "..\Compute\Compute\Compute.csproj", "{5C16925E-2F00-4254-AF14-029609FEFFCA}" +EndProject +Project("{9A19103F-16F7-4668-BE54-9A1E7A4F7556}") = "Network", "..\Network\Network\Network.csproj", "{1EC44FBB-41F6-425A-8489-9643DBDB45E3}" +EndProject +Project("{9A19103F-16F7-4668-BE54-9A1E7A4F7556}") = "OperationalInsights", "..\OperationalInsights\OperationalInsights\OperationalInsights.csproj", "{AC0EA5E7-BD16-4E47-A8D9-0DBC18E6BB70}" +EndProject Global GlobalSection(SolutionConfigurationPlatforms) = preSolution Debug|Any CPU = Debug|Any CPU @@ -58,6 +64,18 @@ Global {BC80A1D0-FFA4-43D9-AA74-799F5CB54B58}.Debug|Any CPU.Build.0 = Debug|Any CPU {BC80A1D0-FFA4-43D9-AA74-799F5CB54B58}.Release|Any CPU.ActiveCfg = Release|Any CPU {BC80A1D0-FFA4-43D9-AA74-799F5CB54B58}.Release|Any CPU.Build.0 = Release|Any CPU + {5C16925E-2F00-4254-AF14-029609FEFFCA}.Debug|Any CPU.ActiveCfg = Debug|Any CPU + {5C16925E-2F00-4254-AF14-029609FEFFCA}.Debug|Any CPU.Build.0 = Debug|Any CPU + {5C16925E-2F00-4254-AF14-029609FEFFCA}.Release|Any CPU.ActiveCfg = Release|Any CPU + {5C16925E-2F00-4254-AF14-029609FEFFCA}.Release|Any CPU.Build.0 = Release|Any CPU + {1EC44FBB-41F6-425A-8489-9643DBDB45E3}.Debug|Any CPU.ActiveCfg = Debug|Any CPU + {1EC44FBB-41F6-425A-8489-9643DBDB45E3}.Debug|Any CPU.Build.0 = Debug|Any CPU + {1EC44FBB-41F6-425A-8489-9643DBDB45E3}.Release|Any CPU.ActiveCfg = Release|Any CPU + {1EC44FBB-41F6-425A-8489-9643DBDB45E3}.Release|Any CPU.Build.0 = Release|Any CPU + {AC0EA5E7-BD16-4E47-A8D9-0DBC18E6BB70}.Debug|Any CPU.ActiveCfg = Debug|Any CPU + {AC0EA5E7-BD16-4E47-A8D9-0DBC18E6BB70}.Debug|Any CPU.Build.0 = Debug|Any CPU + {AC0EA5E7-BD16-4E47-A8D9-0DBC18E6BB70}.Release|Any CPU.ActiveCfg = Release|Any CPU + {AC0EA5E7-BD16-4E47-A8D9-0DBC18E6BB70}.Release|Any CPU.Build.0 = Release|Any CPU EndGlobalSection GlobalSection(SolutionProperties) = preSolution HideSolutionNode = FALSE From d45755259b8bcca7196296ac3c344767d84fad75 Mon Sep 17 00:00:00 2001 From: Yabo Hu Date: Wed, 14 Apr 2021 13:40:40 +0800 Subject: [PATCH 3/3] added new line --- src/Security/Security/ChangeLog.md | 1 + 1 file changed, 1 insertion(+) diff --git a/src/Security/Security/ChangeLog.md b/src/Security/Security/ChangeLog.md index 9cc7278e4907..528d18a07dde 100644 --- a/src/Security/Security/ChangeLog.md +++ b/src/Security/Security/ChangeLog.md @@ -20,6 +20,7 @@ ## Upcoming Release * Fix typo in printing SQL vulnerability assessment scan results + ## Version 0.10.0 * Added Sql Vulnerability Assessment cmdlets for IAAS: `Get-AzSecuritySqlVulnerabilityAssessmentScanRecord`