SlideShare a Scribd company logo
How to use Prancer to detect and fix the Azure SQL Resources which uses
TLS Version less than 1.2
Feb 2, 2021
Introduction
There are many reports out that TLS 1.0 and 1.1 are no longer secure and you need to
upgrade to at least TLS 1.2 to get the maximum security for your web application. You can
review this Stack Exchange post to get more information. It is very important that Azure
resources that are deployed to your tenant disable the support for TLS 1.0 and 1.1 and
rely at least on TLS 1.2 for their operations. Fortunately, Azure SQL supports TLS1.2. In
this post, I am showing you how to find this security vulnerability in your Azure tenant
using Prancer platform, and how to auto remediate this issue.
As per Microsoft Azure blog, now Azure SQL instance requires TLS version 1.2 to maintain
stable and secure connectivity. Prancer provides an automated way for finding out the
Azure SQL resources which have configured TLS Version less than 1.2. And also auto
remediate those vulnerabilities with a click of a button!
Look at this screenshot here you can see Minimum TLS Version is set to 1.1 (Which is a
security issue!)
•
Here are the steps for how to configure in Prancer and Remediate the Azure SQL
configuration.
Create configuration files
• Connector Configuration file:
Connector file is used for authenticating to Azure Cloud services to manage the resources
on the cloud. Use the below azure connector sample file and
create azure_structure.json file with the updated Azure AD credentials in it.
{
"container": "azure_remediation_demo",
"name": "azure_structure",
"json": {
"type": "azure",
"fileType": "structure",
"companyName": "Prancer",
// replace your tenant id
"tenant_id": "f997f2f9-a48f-****-****-************",
"autoRemediate": true,
"accounts": [
{
"department": "Network Security",
"subscription": [
{
"subscription_name": "whitekite",
"subscription_description": "whitekite",
// replace your subscription id
"subscription_id": "d34d6141-7a19-****-****-************",
"users": [
{
// subscription user name.
"name": "abc*****@gmail.com",
// replace your client id
"client_id": "db57053a-7bce-****-****-************"
}
]
}
]
}
]
}
}
• Master Snapshot Configuration file:
Master Snapshot configuration file is used to define resource type details which you want
to execute the compliance test on.
Create azure_snapshot.json file, based on the below sample configuration json file.
{
"container": "azure_remediation_demo",
"name": "azure_snapshot",
"json": {
"contentVersion": "1.0.0.0",
"fileType": "masterSnapshot",
"snapshots": [
{
"source": "azure_structure",
"type": "azure",
// subscription user name, should be same as used in connector file
"testUser": "abc*****@gmail.com",
// subscription id, should be same as used in connector file
"subscription_id": "d34d6141-7a19-****-****-************",
"nodes": [
{
"masterSnapshotId": "AZURE_SQL",
"type": "Microsoft.Sql/servers",
"collection": "Microsoft.Servers"
}
]
}
]
}
}
• Master Compliance Configuration file:
Master Compliance configuration file contains the list of testcases that will be run on
fetched cloud resource json files.
Create azure_test.json file, based on the below configuration json file.
{
"container": "azure_remediation_demo",
"name": "azure_test",
"json": {
"contentVersion": "1.0.0.0",
"fileType": "mastertest",
"masterSnapshot": "azure_snapshot",
"testSet": [
{
"masterTestName": "AZURE_TEST",
"version": "0.1",
"cases": [
{
"masterTestId": "AZURE_SQL_TEST",
"type": "rego",
"rule": "file(azure_sql.rego)",
"tags": [
{
"cloud": "Azure",
"compliance": [],
"service": [
"Databases"
]
}
],
"evals": [
{
"id": "sql_tls_version",
"eval": "data.rule.tls_version",
"message": "data.rule.tls_version_err",
"remediationDescription": "Mannual Steps: n 1) Open Azure Portal. n 2) Open
SQL Servers list n 3) Select the SQL Server for which you want to modify the Mimimal TLS
Version. n 4) Click on `Firewalls and virtual networks` option under `Security` section. n
5) Update the Minimum TLS Version to `1.2` and click on save button.",
"remediationFunction": "remediate_security_rule.py"
}
],
"title": "Azure SQL Database check minumum TLS version",
"description": "This policy will find the Azure SQL Databases which are set the
minumum TLS version lower then 1.2",
"masterSnapshotId": [
"AZURE_SQL"
],
"status": "enable"
}
]
}
],
"notification": []
}
}
• Rego file:
Create the azure_sql.rego file which contains the rule checks which will be perform
against cloud resource.
Create azure_sql.rego file as below.
package rule
sql_database_issue["invalid_minimal_tls_version"] {
lower(input.type) == "microsoft.sql/servers"
input.properties.minimalTlsVersion != "1.2"
}
default tls_version = null
tls_version = true {
not sql_database_issue["invalid_minimal_tls_version"]
}
tls_version = false {
sql_database_issue["invalid_minimal_tls_version"]
}
tls_version_err = "Azure SQL Database has set minumum TLS version lower then 1.2" {
sql_database_issue["invalid_minimal_tls_version"]
}
Upload configuration files on Prancer
• Create Collection:
All the configuration files Connector configuration file, Snapshot configuration
file, Compliance Configuration file, Rego files should be store in a collection. The name
of the collection should be same as one which we defined in all configuration json files.
Here we have set azure_remediation_demo value as container_name in all configuration
json files.
To create a new collection on Prancer:
1. Open the collection screen from left side menu items.
2. Click on Add Collection button.
3. Enter the collection name and click on save button.
• Upload Rego file
Once collection is created, you can see the created collection in the collection list. Now
we can upload the Rego file to that collection. To upload the Rego file,
1. Click on upload button
2. Drag and drop the azure_sql.rego file in file upload area.
3. Click on Upload button.
• Upload Connector file
For upload a Connector Configuration file,
1. Open connector upload screen.
2. Drag and drop the azure_structure.json file in file upload area.
3. Click on Upload Connector button.
• Upload Master Snapshot Configuration file
For upload a Master Snapshot configuration file,
1. Open screen for upload new snapshot.
2. Drag and drop the azure_snapshot.json file in file upload area.
3. Select Master Resource Snapshot option as a Snapshot Type.
4. Click on Submit button.
• Upload Compliance Configuration file
For upload a compliance file,
1. Open screen for upload new compliance.
2. Drag and drop the azure_test.json file in file upload area.
3. Select Master Compliance option as a Compliance Type.
4. Click on Submit button.
Set client secret value in vault
• For security purpose we are storing the confidential data in azure vault.
• In azure_structure.json file, we have set the Client Id db57053a-7bce-****-****-
************.
Now require to add the Client Secret value of that client id into the vault.
Run Crawler
• Crawler is the process in which Prancer will connect to Azure cloud with your
provided credentials and will get the list of cloud resources. It generates
the Snapshot Configuration file which contains the list of cloud resources.
To crawl the resources:
1. Open the Run Crawler screen.
2. Select the collection name azure_remediation_demo.
3. Click on Run Crawler button.
Verify generated snapshot files:
Once the crawler is done then verify that the cloud resources are fetched correctly or not.
• Open All Resource Configuration screen.
• Select the Resource Configuration Tab
• Search for your collection name.
• It should show the generated snapshot in the list.
’
Click on the generated snapshot list item to verify that resources are fetched correctly.
Run compliance
Once you verify that all the resources are fetched correctly, we can run the compliance on
it.
• Open the Run Compliance screen.
• Select the collection name azure_remediation_demo
• Click on Run Test button.
Check Report
Once the compliance process is completed then we can see the pass/fail reports in report
page.
• Open the Report screen.
• It will show the latest compliance report by default.
• It takes sometime to show the latest report based on number of resources
available. so if you did not see the report then after few seconds click
on filter button for see the latest report.
• In report you can see the list of resources and it’s status (pass/fail)
• Click on the failed resource for view detail information of it.
• You can see the path of the cloud resource and manual steps for fix the issue.
• Click on Remediation button for fix the problem. It will run the process for fix
the problem on cloud and will give the success message about Remediation
done.
Verify Azure SQL on Portal

More Related Content

PDF
Detect and fix the azure sql resources which uses tls version less than 1.2
PDF
Solr Security: Tips and Tricks and Things You Really Ought to Know - Kevin Co...
PDF
SafePeak - How to manually configure SafePeak Cluster
PDF
Get database properties using power shell in sql server 2008 techrepublic
PDF
How To Connect To Active Directory PowerShell
PDF
Optimize Is (Not) Bad For You - Rafał Kuć, Sematext Group, Inc.
PDF
Connect Amazon EC2 Linux Instance
PDF
State of Solr Security 2016: Presented by Ishan Chattopadhyaya, Lucidworks
Detect and fix the azure sql resources which uses tls version less than 1.2
Solr Security: Tips and Tricks and Things You Really Ought to Know - Kevin Co...
SafePeak - How to manually configure SafePeak Cluster
Get database properties using power shell in sql server 2008 techrepublic
How To Connect To Active Directory PowerShell
Optimize Is (Not) Bad For You - Rafał Kuć, Sematext Group, Inc.
Connect Amazon EC2 Linux Instance
State of Solr Security 2016: Presented by Ishan Chattopadhyaya, Lucidworks

What's hot (18)

PPTX
patchVantage Cloud Starter Pack
PPTX
2018 Student360 - Beyond xp_cmdshell - Owning the Empire Through SQL Server
ZIP
Introduction to SQLite in Adobe AIR 1.5
PPT
Download Presentation
DOCX
How to Configure Amazon AWS EC2 Elastic IP Address
PDF
TROOPERS 20 - SQL Server Hacking Tips for Active Directory Environments
PPTX
2017 Thotcon - Hacking SQL Servers on Scale with PowerShell
DOCX
Hadoop sqoop2 server setup and application integration
PDF
Amazon AWS Identity Access Management
PPTX
Secure360 - Beyond xp cmdshell - Owning the Empire through SQL Server
PDF
AWS essentials S3
PDF
PowerUpSQL - 2018 Blackhat USA Arsenal Presentation
PPTX
Beyond xp_cmdshell: Owning the Empire through SQL Server
PPTX
Beyond XP_CMDSHELL: Owning the Empire Through SQL Server
DOC
EMC Networker installation Document
PPTX
Weblogic12 c installation guide
PDF
Oracle business intelligence enterprise edition 11g
PPTX
2016 aRcTicCON - Hacking SQL Server on Scale with PowerShell (Slide Updates)
patchVantage Cloud Starter Pack
2018 Student360 - Beyond xp_cmdshell - Owning the Empire Through SQL Server
Introduction to SQLite in Adobe AIR 1.5
Download Presentation
How to Configure Amazon AWS EC2 Elastic IP Address
TROOPERS 20 - SQL Server Hacking Tips for Active Directory Environments
2017 Thotcon - Hacking SQL Servers on Scale with PowerShell
Hadoop sqoop2 server setup and application integration
Amazon AWS Identity Access Management
Secure360 - Beyond xp cmdshell - Owning the Empire through SQL Server
AWS essentials S3
PowerUpSQL - 2018 Blackhat USA Arsenal Presentation
Beyond xp_cmdshell: Owning the Empire through SQL Server
Beyond XP_CMDSHELL: Owning the Empire Through SQL Server
EMC Networker installation Document
Weblogic12 c installation guide
Oracle business intelligence enterprise edition 11g
2016 aRcTicCON - Hacking SQL Server on Scale with PowerShell (Slide Updates)
Ad

Similar to How to use prancer to detect and fix the azure sql resources which uses tls version less than 1.2 (20)

PDF
KoprowskiT_session1_SDNEvent_WASDforBeginners
PPTX
Azure governance
PPTX
Running Regulated Workloads on Azure PaaS services (DogFoodCon 2018)
PDF
KoprowskiT_SQLSat419_WADBforBeginners
PPTX
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
PPTX
Azure Governance for Enterprise
PPTX
Azure Fundamentals || AZ-900
PDF
Azure Arcの様々なパターンを図で理解する!
PPTX
Getting Started in Pentesting the Cloud: Azure
PPTX
Microsoft Azure News - August 2021
PPTX
Building Automated Governance Using Code, Platform Services & Several Small P...
PPTX
Azure from scratch part 3 By Girish Kalamati
PDF
Az 900 Session 3 Security, privacy, compliance, trust, pricing, SLA and Lifec...
PPTX
70 533 - Module 01 - Introduction to Azure
PDF
Innovation morning agenda+azure arc
PDF
Adelaide Global Azure Bootcamp 2018 - Azure 101
PDF
KoprowskiT_SQLSatDenmark_WASDforBeginners
PDF
KoprowskiT_SQLAzureLandingInBelfast
PDF
Fundamentals of Azure
PDF
KoprowskiT_SQLSatMoscow_WASDforBeginners
KoprowskiT_session1_SDNEvent_WASDforBeginners
Azure governance
Running Regulated Workloads on Azure PaaS services (DogFoodCon 2018)
KoprowskiT_SQLSat419_WADBforBeginners
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
Azure Governance for Enterprise
Azure Fundamentals || AZ-900
Azure Arcの様々なパターンを図で理解する!
Getting Started in Pentesting the Cloud: Azure
Microsoft Azure News - August 2021
Building Automated Governance Using Code, Platform Services & Several Small P...
Azure from scratch part 3 By Girish Kalamati
Az 900 Session 3 Security, privacy, compliance, trust, pricing, SLA and Lifec...
70 533 - Module 01 - Introduction to Azure
Innovation morning agenda+azure arc
Adelaide Global Azure Bootcamp 2018 - Azure 101
KoprowskiT_SQLSatDenmark_WASDforBeginners
KoprowskiT_SQLAzureLandingInBelfast
Fundamentals of Azure
KoprowskiT_SQLSatMoscow_WASDforBeginners
Ad

More from Prancer Io (20)

PDF
Prancer Enterprise has achieved SOC 2 Type I compliance in accordance with Am...
PDF
Prancer Enterprise announces today the release of the Zero Trust Security Val...
PDF
Prancer for Offensive Security Testing
PDF
Why do Next-generation snapshot scanning security solutions raise security co...
PDF
Announcing the launch of Red and Blue Cyber Security Show
PDF
9 tips for assessing your modern cloud security toolsets.pdf
PDF
Infrastructure as Code
PDF
IAC Compliance.pdf
PDF
IaC Security and Continuous Compliance
PDF
IaC Security and Continuous Compliance
PDF
Security Validation as Code
PDF
Automated Pentesting vs Dynamic Application Security Testing
PDF
Security Validation
PDF
Cloud Security Validation at Scale
PDF
Security Validation as Code.pdf
PDF
Prancer web interface for the ease of use
PDF
What are the configuration files in the prancer framework
PDF
Automated pentesting vs dynamic application security testing (dast) (2)
PDF
Is iac scanning scalable in the git ops era
PDF
Prancer web interface for the ease of use
Prancer Enterprise has achieved SOC 2 Type I compliance in accordance with Am...
Prancer Enterprise announces today the release of the Zero Trust Security Val...
Prancer for Offensive Security Testing
Why do Next-generation snapshot scanning security solutions raise security co...
Announcing the launch of Red and Blue Cyber Security Show
9 tips for assessing your modern cloud security toolsets.pdf
Infrastructure as Code
IAC Compliance.pdf
IaC Security and Continuous Compliance
IaC Security and Continuous Compliance
Security Validation as Code
Automated Pentesting vs Dynamic Application Security Testing
Security Validation
Cloud Security Validation at Scale
Security Validation as Code.pdf
Prancer web interface for the ease of use
What are the configuration files in the prancer framework
Automated pentesting vs dynamic application security testing (dast) (2)
Is iac scanning scalable in the git ops era
Prancer web interface for the ease of use

Recently uploaded (20)

PPTX
sap open course for s4hana steps from ECC to s4
PDF
Encapsulation theory and applications.pdf
PPTX
A Presentation on Artificial Intelligence
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Electronic commerce courselecture one. Pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPT
Teaching material agriculture food technology
PPTX
Machine Learning_overview_presentation.pptx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
sap open course for s4hana steps from ECC to s4
Encapsulation theory and applications.pdf
A Presentation on Artificial Intelligence
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
“AI and Expert System Decision Support & Business Intelligence Systems”
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
MIND Revenue Release Quarter 2 2025 Press Release
Spectral efficient network and resource selection model in 5G networks
Electronic commerce courselecture one. Pdf
Big Data Technologies - Introduction.pptx
gpt5_lecture_notes_comprehensive_20250812015547.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Teaching material agriculture food technology
Machine Learning_overview_presentation.pptx
Dropbox Q2 2025 Financial Results & Investor Presentation
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...

How to use prancer to detect and fix the azure sql resources which uses tls version less than 1.2

  • 1. How to use Prancer to detect and fix the Azure SQL Resources which uses TLS Version less than 1.2 Feb 2, 2021 Introduction There are many reports out that TLS 1.0 and 1.1 are no longer secure and you need to upgrade to at least TLS 1.2 to get the maximum security for your web application. You can review this Stack Exchange post to get more information. It is very important that Azure resources that are deployed to your tenant disable the support for TLS 1.0 and 1.1 and rely at least on TLS 1.2 for their operations. Fortunately, Azure SQL supports TLS1.2. In this post, I am showing you how to find this security vulnerability in your Azure tenant using Prancer platform, and how to auto remediate this issue. As per Microsoft Azure blog, now Azure SQL instance requires TLS version 1.2 to maintain stable and secure connectivity. Prancer provides an automated way for finding out the Azure SQL resources which have configured TLS Version less than 1.2. And also auto remediate those vulnerabilities with a click of a button! Look at this screenshot here you can see Minimum TLS Version is set to 1.1 (Which is a security issue!) • Here are the steps for how to configure in Prancer and Remediate the Azure SQL configuration. Create configuration files • Connector Configuration file: Connector file is used for authenticating to Azure Cloud services to manage the resources on the cloud. Use the below azure connector sample file and create azure_structure.json file with the updated Azure AD credentials in it. { "container": "azure_remediation_demo", "name": "azure_structure",
  • 2. "json": { "type": "azure", "fileType": "structure", "companyName": "Prancer", // replace your tenant id "tenant_id": "f997f2f9-a48f-****-****-************", "autoRemediate": true, "accounts": [ { "department": "Network Security", "subscription": [ { "subscription_name": "whitekite", "subscription_description": "whitekite", // replace your subscription id "subscription_id": "d34d6141-7a19-****-****-************", "users": [ { // subscription user name. "name": "abc*****@gmail.com", // replace your client id "client_id": "db57053a-7bce-****-****-************" } ] } ] } ] } } • Master Snapshot Configuration file: Master Snapshot configuration file is used to define resource type details which you want to execute the compliance test on. Create azure_snapshot.json file, based on the below sample configuration json file. { "container": "azure_remediation_demo",
  • 3. "name": "azure_snapshot", "json": { "contentVersion": "1.0.0.0", "fileType": "masterSnapshot", "snapshots": [ { "source": "azure_structure", "type": "azure", // subscription user name, should be same as used in connector file "testUser": "abc*****@gmail.com", // subscription id, should be same as used in connector file "subscription_id": "d34d6141-7a19-****-****-************", "nodes": [ { "masterSnapshotId": "AZURE_SQL", "type": "Microsoft.Sql/servers", "collection": "Microsoft.Servers" } ] } ] } } • Master Compliance Configuration file: Master Compliance configuration file contains the list of testcases that will be run on fetched cloud resource json files. Create azure_test.json file, based on the below configuration json file. { "container": "azure_remediation_demo", "name": "azure_test", "json": { "contentVersion": "1.0.0.0", "fileType": "mastertest", "masterSnapshot": "azure_snapshot", "testSet": [ {
  • 4. "masterTestName": "AZURE_TEST", "version": "0.1", "cases": [ { "masterTestId": "AZURE_SQL_TEST", "type": "rego", "rule": "file(azure_sql.rego)", "tags": [ { "cloud": "Azure", "compliance": [], "service": [ "Databases" ] } ], "evals": [ { "id": "sql_tls_version", "eval": "data.rule.tls_version", "message": "data.rule.tls_version_err", "remediationDescription": "Mannual Steps: n 1) Open Azure Portal. n 2) Open SQL Servers list n 3) Select the SQL Server for which you want to modify the Mimimal TLS Version. n 4) Click on `Firewalls and virtual networks` option under `Security` section. n 5) Update the Minimum TLS Version to `1.2` and click on save button.", "remediationFunction": "remediate_security_rule.py" } ], "title": "Azure SQL Database check minumum TLS version", "description": "This policy will find the Azure SQL Databases which are set the minumum TLS version lower then 1.2", "masterSnapshotId": [ "AZURE_SQL" ], "status": "enable" }
  • 5. ] } ], "notification": [] } } • Rego file: Create the azure_sql.rego file which contains the rule checks which will be perform against cloud resource. Create azure_sql.rego file as below. package rule sql_database_issue["invalid_minimal_tls_version"] { lower(input.type) == "microsoft.sql/servers" input.properties.minimalTlsVersion != "1.2" } default tls_version = null tls_version = true { not sql_database_issue["invalid_minimal_tls_version"] } tls_version = false { sql_database_issue["invalid_minimal_tls_version"] } tls_version_err = "Azure SQL Database has set minumum TLS version lower then 1.2" { sql_database_issue["invalid_minimal_tls_version"] } Upload configuration files on Prancer • Create Collection: All the configuration files Connector configuration file, Snapshot configuration file, Compliance Configuration file, Rego files should be store in a collection. The name of the collection should be same as one which we defined in all configuration json files. Here we have set azure_remediation_demo value as container_name in all configuration json files. To create a new collection on Prancer:
  • 6. 1. Open the collection screen from left side menu items. 2. Click on Add Collection button. 3. Enter the collection name and click on save button. • Upload Rego file Once collection is created, you can see the created collection in the collection list. Now we can upload the Rego file to that collection. To upload the Rego file, 1. Click on upload button 2. Drag and drop the azure_sql.rego file in file upload area. 3. Click on Upload button.
  • 7. • Upload Connector file For upload a Connector Configuration file, 1. Open connector upload screen. 2. Drag and drop the azure_structure.json file in file upload area. 3. Click on Upload Connector button. • Upload Master Snapshot Configuration file For upload a Master Snapshot configuration file, 1. Open screen for upload new snapshot. 2. Drag and drop the azure_snapshot.json file in file upload area. 3. Select Master Resource Snapshot option as a Snapshot Type.
  • 8. 4. Click on Submit button. • Upload Compliance Configuration file For upload a compliance file, 1. Open screen for upload new compliance. 2. Drag and drop the azure_test.json file in file upload area. 3. Select Master Compliance option as a Compliance Type. 4. Click on Submit button. Set client secret value in vault
  • 9. • For security purpose we are storing the confidential data in azure vault. • In azure_structure.json file, we have set the Client Id db57053a-7bce-****-****- ************. Now require to add the Client Secret value of that client id into the vault. Run Crawler • Crawler is the process in which Prancer will connect to Azure cloud with your provided credentials and will get the list of cloud resources. It generates the Snapshot Configuration file which contains the list of cloud resources. To crawl the resources: 1. Open the Run Crawler screen. 2. Select the collection name azure_remediation_demo. 3. Click on Run Crawler button.
  • 10. Verify generated snapshot files: Once the crawler is done then verify that the cloud resources are fetched correctly or not. • Open All Resource Configuration screen. • Select the Resource Configuration Tab • Search for your collection name. • It should show the generated snapshot in the list. ’ Click on the generated snapshot list item to verify that resources are fetched correctly.
  • 11. Run compliance Once you verify that all the resources are fetched correctly, we can run the compliance on it. • Open the Run Compliance screen. • Select the collection name azure_remediation_demo • Click on Run Test button. Check Report Once the compliance process is completed then we can see the pass/fail reports in report page.
  • 12. • Open the Report screen. • It will show the latest compliance report by default. • It takes sometime to show the latest report based on number of resources available. so if you did not see the report then after few seconds click on filter button for see the latest report. • In report you can see the list of resources and it’s status (pass/fail) • Click on the failed resource for view detail information of it. • You can see the path of the cloud resource and manual steps for fix the issue. • Click on Remediation button for fix the problem. It will run the process for fix the problem on cloud and will give the success message about Remediation done.
  • 13. Verify Azure SQL on Portal