Scan your on-premises servers connected via Azure Arc
Azure Arc extends Azure management to your on-premises servers. AuditKit Pro can scan Arc-enabled machines for compliance by pulling:
Security recommendations and vulnerabilities from Microsoft Defender
Azure Policy compliance status for Windows/Linux baselines
Arc agent connectivity status for all connected servers
Before scanning Arc machines, you need:
az login or service principal configured# List Arc-enabled servers in your subscription
az connectedmachine list --query "[].{name:name, status:status}" -o table
For security assessments, enable Defender for Servers on Arc machines:
# Interactive login
az login
# Set subscription containing Arc machines
export AZURE_SUBSCRIPTION_ID="your-subscription-id"
# Verify access
az account show
For automation/CI/CD:
# Create service principal with Reader access
az ad sp create-for-rbac \
--name "auditkit-arc-scanner" \
--role Reader \
--scopes /subscriptions/YOUR_SUBSCRIPTION_ID
# Set environment variables
export AZURE_CLIENT_ID="app-id-from-output"
export AZURE_CLIENT_SECRET="password-from-output"
export AZURE_TENANT_ID="tenant-from-output"
export AZURE_SUBSCRIPTION_ID="your-subscription-id"
# Scan Arc machines against PCI-DSS
auditkit-pro scan -provider arc -framework pci
# Scan against SOC2
auditkit-pro scan -provider arc -framework soc2
# Scan against CMMC Level 2
auditkit-pro scan -provider arc -framework cmmc
# Generate PDF report
auditkit-pro scan -provider arc -framework pci -format pdf -output arc-compliance.pdf
# Verbose output
auditkit-pro scan -provider arc -framework soc2 -verbose
http://localhost:1337)Checks connectivity status of all Arc-enabled servers:
Frameworks: PCI 10.1, SOC2 CC7.1, ISO 27001 A.12.4, CMMC AU.L2-3.3.1
Pulls security recommendations from Microsoft Defender:
| Assessment Type | Framework Mapping |
|---|---|
| System updates missing | PCI 6.2, SOC2 CC7.1, CMMC SI.L2-3.14.1 |
| Endpoint protection issues | PCI 5.1, SOC2 CC6.8, CMMC SI.L2-3.14.2 |
| Disk encryption | PCI 3.4, SOC2 CC6.1, CMMC SC.L2-3.13.11 |
| Vulnerability findings | PCI 11.2, SOC2 CC7.1, CMMC RA.L2-3.11.2 |
| Network/firewall issues | PCI 1.3, SOC2 CC6.6, CMMC SC.L2-3.13.1 |
| Access control issues | PCI 8.2, SOC2 CC6.1, CMMC AC.L2-3.1.1 |
| Logging/monitoring gaps | PCI 10.2, SOC2 CC7.2, CMMC AU.L2-3.3.1 |
Reports on Azure Policy Guest Configuration assignments:
Frameworks: PCI 2.2, SOC2 CC6.1, ISO 27001 A.12.6
The scanning identity needs:
| Permission | Scope | Purpose |
|---|---|---|
| Reader | Subscription | List Arc machines, read assessments |
| Security Reader | Subscription | Read Defender for Cloud data |
# Assign Reader role
az role assignment create \
--assignee YOUR_SP_OR_USER \
--role Reader \
--scope /subscriptions/YOUR_SUBSCRIPTION_ID
# Assign Security Reader role
az role assignment create \
--assignee YOUR_SP_OR_USER \
--role "Security Reader" \
--scope /subscriptions/YOUR_SUBSCRIPTION_ID
# Verify Arc machines exist
az connectedmachine list -o table
# Check subscription
echo $AZURE_SUBSCRIPTION_ID
az account show --query id
# Re-authenticate
az login
# Or check service principal
az ad sp show --id $AZURE_CLIENT_ID