Control: Deploy default Microsoft IaaSAntimalware extension for Windows Server
Description
This policy deploys a Microsoft IaaSAntimalware extension with a default configuration when a VM is not configured with the anti-malware extension.
Usage
Run the control in your terminal:
powerpipe control run terraform_azure_compliance.control.compute_vm_malware_agent_installedSnapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run terraform_azure_compliance.control.compute_vm_malware_agent_installed --shareSQL
This control uses a named query:
with all_vm as (  select    *  from    terraform_resource  where    type = 'azurerm_virtual_machine'), vm_extensions as (    select      *    from      terraform_resource    where      type = 'azurerm_virtual_machine_extension'),vm_amtimalware_extension as (  select    split_part((b.attributes_std ->> 'virtual_machine_id'), '.', 2) as vm_name  from    all_vm as a    left join vm_extensions as b on (split_part((b.attributes_std ->> 'virtual_machine_id'), '.', 2)) = a.name  where    (b.attributes_std ->> 'publisher') = 'Microsoft.Azure.Security'    and (b.attributes_std ->> 'type') = 'IaaSAntimalware')select  address as resource,  case    when d.vm_name is null then 'alarm'    else 'ok'  end as status,  split_part(address, '.', 2) || case    when d.vm_name is null then ' IaaSAntimalware extension not installed'    else ' IaaSAntimalware extension installed'  end || '.' reason    , path || ':' || start_linefrom  all_vm as c left join vm_amtimalware_extension as d on c.name = d.vm_name;