azure-quick-review
SKILL.md
Azure Quick Review Compliance Assessment
This skill enables comprehensive Azure compliance assessments using Azure Quick Review (azqr), analyzing findings against Azure best practices, and providing actionable remediation guidance.
When to Use This Skill
- User asks to check Azure compliance or best practices
- User wants to assess Azure resources for configuration issues
- User mentions running azqr or Azure Quick Review
- User wants to identify orphaned or misconfigured resources
- User needs to review Azure security posture
- Before major deployments to establish a compliance baseline
- After deployments to verify no compliance regressions
Prerequisites
- Azure authentication - Logged in via Azure CLI (
az login) or using Service Principal/Managed Identity - Reader permissions - Minimum Reader role on target subscription or management group
Assessment Workflow
Step 1: Determine Scan Scope
Ask the user or detect from context:
| Scope | Use Case | Required Info |
|---|---|---|
| Subscription | Full subscription assessment | Subscription ID |
| Resource Group | Targeted assessment | Subscription ID + Resource Group name |
| Management Group | Enterprise-wide assessment | Management Group ID |
| Specific Service | Deep-dive on one resource type | Subscription ID + Service abbreviation |
Step 2: Run Compliance Scan
Use the Azure MCP tool to run the scan:
mcp_azure_mcp_extension_azqr
subscription: <subscription-id>
resource-group: <optional-rg-name>
Step 3: Analyze Scan Results
The scan produces an Excel file with these sheets:
| Sheet | Contents | Priority |
|---|---|---|
| Recommendations | All recommendations with impacted resource count | High |
| ImpactedResources | Resources with specific issues to address | High |
| Inventory | All scanned resources with SKU, Tier, SLA details | Medium |
| Advisor | Azure Advisor recommendations | Medium |
| DefenderRecommendations | Microsoft Defender for Cloud findings | High |
| Azure Policy | Non-compliant resources per Azure Policy | Medium |
| Costs | 3-month cost history by subscription | Low |
| Defender | Defender plan status and tiers | Medium |
| OutOfScope | Resources not scanned | Low |
Focus analysis on:
- High-severity recommendations from ImpactedResources
- Defender recommendations (security-critical)
- Advisor recommendations (reliability/performance)
- Policy non-compliance (governance)
Step 4: Categorize Findings
Group findings by category for prioritized remediation:
| Category | Examples | Severity |
|---|---|---|
| Security | Public endpoints, missing encryption, no private endpoints | Critical |
| Reliability | No zone redundancy, single instance, no backup | High |
| Performance | Undersized SKUs, missing caching, no CDN | Medium |
| Cost | Orphaned resources, oversized SKUs, unused reservations | Medium |
| Operations | Missing diagnostics, no alerts, no tags | Low |
Step 5: Generate Remediation Guidance
For each high-priority finding:
- Explain the risk in plain language
- Provide remediation options (Portal, CLI, Bicep)
- Estimate effort and impact
See references/remediation-patterns.md for common fix templates.
Step 6: Present Summary
Provide a structured summary:
## Compliance Assessment Summary
**Scope:** [Subscription/RG/MG name]
**Scanned:** [Date/Time]
**Resources Analyzed:** [Count]
### Key Findings
| Severity | Count | Top Issues |
|----------|-------|------------|
| Critical | X | [List top 3] |
| High | X | [List top 3] |
| Medium | X | [List top 3] |
### Recommended Actions
1. **[Issue]** - [Brief remediation]
2. **[Issue]** - [Brief remediation]
3. **[Issue]** - [Brief remediation]
### Next Steps
- [ ] Address critical security findings
- [ ] Review and remediate high-severity items
- [ ] Schedule follow-up scan to verify fixes
Supported Azure Services
azqr supports 70+ Azure resource types including:
- Azure Kubernetes Service (AKS)
- API Management
- App Configuration
- App Service
- Container Apps
- Cosmos DB
- Container Registry
- Key Vault
- Load Balancer
- Azure Database for MySQL
- Azure Database for PostgreSQL
- Azure Cache for Redis
- Service Bus
- Azure SQL Database
- Storage Accounts
- Virtual Machines
- Virtual Networks
Tools Used
| Tool | Purpose |
|---|---|
mcp_azure_mcp_extension_azqr |
Run azqr scans via Azure MCP |
mcp_azure_mcp_subscription_list |
List available subscriptions |
mcp_azure_mcp_group_list |
List resource groups in subscription |
Troubleshooting
| Issue | Symptom | Solution |
|---|---|---|
| Permission denied | 403 errors during scan | Verify Reader role on scope |
| Not authenticated | AADSTS errors |
Run az login first |
| Slow scan | Scan takes very long | Use resource group scope |
Example Prompts
- "Check my Azure subscription for compliance issues"
- "Run azqr on my production resource group"
- "What Azure resources don't follow best practices?"
- "Assess my storage accounts for security issues"
Reference Documentation
Weekly Installs
2
Repository
microsoft/github-copilot-for-azureFirst Seen
Feb 4, 2026
Installed on
mcpjam2
claude-code2
replit2
junie2
windsurf2
zencoder2