Using Console
Using CLI
az login
.
az account set --subscription <subscription_id>
to set your subscription ID.
az policy definition create --name 'Monitor-OS-Vulnerabilities' --mode All --rules 'https://raw.githubusercontent.com/Azure/azure-policy/master/samples/Compute/monitor-vm-os-vulnerabilities/azurepolicy.rules.json' --params 'https://raw.githubusercontent.com/Azure/azure-policy/master/samples/Compute/monitor-vm-os-vulnerabilities/azurepolicy.parameters.json' --display-name 'Monitor OS Vulnerabilities' --description 'This policy enables monitoring of OS vulnerabilities on virtual machines'
to create a new policy definition.
az policy assignment create --name 'Monitor-OS-Vulnerabilities-Assignment' --scope /subscriptions/<subscription_id>/resourceGroups/<resource_group_name> --policy 'Monitor-OS-Vulnerabilities'
.
az policy assignment show --name 'Monitor-OS-Vulnerabilities-Assignment' --query 'properties.status.message'
. The output should show “Policy assignment is compliant” which means the “Monitor OS Vulnerabilities” setting is enabled.
Using Python
MonitorManagementClient
using the authenticated credentials:<your-client-id>
, <your-client-secret>
, <your-tenant-id>
, <your-subscription-id>
, <your-resource-group>
, <your-vm-name>
, <your-event-hub-name>
, and <your-event-hub-auth-rule-id>
with your own values.These steps will enable the “Monitor OS Vulnerabilities” setting for the specified virtual machine in Azure.