01 Run monitor diagnostic-settings subscription list command (Windows/macOS/Linux) with custom query filters to describe the name of each diagnostic setting created for the selected Azure subscription:
123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899
az monitor diagnostic-settings subscription list
--subscription abcdabcd-1234-abcd-1234-abcd1234abcd
--query 'value[*].name'
02 The command output should return the diagnostic setting identifier(s):
123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899
[
"cc-log-diagnostic-setting"
]
03 Run monitor diagnostic-settings subscription show command (Windows/macOS/Linux) using the name of the diagnostic setting that you want to examine as the identifier parameter and custom query filters to get the ID of the Azure storage account configured to store activity logs within the selected subscription:
123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899
az monitor diagnostic-settings subscription show
--name "cc-log-diagnostic-setting"
--query 'storageAccountId'
04 The command output should return the full ID of the associated storage account (the ID contains the storage account name):
123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899
"/subscriptions/abcdabcd-1234-abcd-1234-abcd1234abcd/resourceGroups/cloud-shell-storage-westeurope/providers/Microsoft.Storage/storageAccounts/abcd1234abcdabcd1234abcd"
05 Run storage container show command (Windows/macOS/Linux) using the ID of the storage account returned at the previous step and the name of the container that stores the activity log files (i.e. "insights-operational-logs") as the identifier parameters, to describe the public access level set for the selected container:
123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899
az storage container show
--account-name abcd1234abcdabcd1234abcd
--name insights-operational-logs
--query 'properties.publicAccess'
06 The command output should return the name of the public access level configured for the selected container. There are three levels of public access: Private (no anonymous access), Blob (anonymous read access for blobs only) and Container (anonymous read access for containers and blobs):
123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899
"container"
If the
storage container show command output returns "
container", as shown in the output example above, the storage container that holds your activity log files is publicly accessible, therefore your Microsoft Azure activity log data can be read by anyone using anonymous requests.
07 Repeat steps no. 1 – 6 for each subscription available in your Microsoft Azure cloud account.