Control: Audit Windows machines that do not have the password complexity setting enabled
Description
Requires that prerequisites are deployed to the policy assignment scope. Machines are non-compliant if Windows machines that do not have the password complexity setting enabled.
Usage
Run the control in your terminal:
powerpipe control run azure_compliance.control.compute_vm_password_complexity_setting_enabled_windows
Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run azure_compliance.control.compute_vm_password_complexity_setting_enabled_windows --share
SQL
This control uses a named query:
with vm_password_complexity_setting as ( select distinct a.vm_id from azure_compute_virtual_machine as a, jsonb_array_elements(guest_configuration_assignments) as b where b -> 'guestConfiguration' ->> 'name'= 'PasswordMustMeetComplexityRequirements' and b ->> 'complianceStatus' = 'Compliant')select a.vm_id as resource, case when a.os_type <> 'Windows' then 'skip' when b.vm_id is not null then 'ok' else 'alarm' end as status, case when a.os_type <> 'Windows' then a.title || ' is of ' || a.os_type || ' operating system.' when b.vm_id is not null then a.title || ' password complexity setting enabled.' else a.title || ' password complexity setting disabled.' end as reason , a.resource_group as resource_group , sub.display_name as subscriptionfrom azure_compute_virtual_machine as a left join vm_password_complexity_setting as b on a.vm_id = b.vm_id, azure_subscription as subwhere sub.subscription_id = a.subscription_id;