Source
Azure Portal
Display name
Configure ChangeTracking Extension for Linux virtual machines
Id
ec88097d-843f-4a92-8471-78016d337ba4 Copy Id Copy resourceId
Version
2.1.0 Details on versioning
Versioning
Versions supported for Versioning: 2 2.1.0 2.0.0-preview Built-in Versioning [Preview]
Category
Security Center Microsoft Learn
Description
Configure Linux virtual machines to automatically install the ChangeTracking Extension to enable File Integrity Monitoring(FIM) in Azure Security Center. FIM examines operating system files, Windows registries, application software, Linux system files, and more, for changes that might indicate an attack. The extension can be installed in virtual machines and locations supported by Azure Monitor Agent.
Cloud environments
AzureCloud = true AzureUSGovernment = unknown AzureChinaCloud = unknown
Available in AzUSGov
Unknown, no evidence if Policy definition is/not available in AzureUSGovernment
Mode
Indexed
Type
BuiltIn
Preview
False
Deprecated
False
Effect
Default DeployIfNotExists
Allowed DeployIfNotExists, Disabled
RBAC role(s)
Rule aliases
IF (6)
Alias
Namespace
ResourceType
Path
PathIsDefault
DefaultPath
Modifiable
Microsoft.Compute/imageId
Microsoft.Compute Microsoft.Compute Microsoft.Compute
virtualMachines virtualMachineScaleSets disks
properties.storageProfile.imageReference.id properties.virtualMachineProfile.storageProfile.imageReference.id properties.creationData.imageReference.id
True True True
False False False
Microsoft.Compute/imageOffer
Microsoft.Compute Microsoft.Compute Microsoft.Compute
virtualMachines virtualMachineScaleSets disks
properties.storageProfile.imageReference.offer properties.virtualMachineProfile.storageProfile.imageReference.offer properties.creationData.imageReference.id
True True True
False False False
Microsoft.Compute/imagePublisher
Microsoft.Compute Microsoft.Compute Microsoft.Compute
virtualMachines virtualMachineScaleSets disks
properties.storageProfile.imageReference.publisher properties.virtualMachineProfile.storageProfile.imageReference.publisher properties.creationData.imageReference.id
True True True
False False False
Microsoft.Compute/imageSku
Microsoft.Compute Microsoft.Compute Microsoft.Compute
virtualMachines virtualMachineScaleSets disks
properties.storageProfile.imageReference.sku properties.virtualMachineProfile.storageProfile.imageReference.sku properties.creationData.imageReference.id
True True True
False False False
Microsoft.Compute/virtualMachines/storageProfile.osDisk.createOption
Microsoft.Compute
virtualMachines
properties.storageProfile.osDisk.createOption
True
True
Microsoft.Compute/virtualMachines/storageProfile.osDisk.osType
Microsoft.Compute
virtualMachines
properties.storageProfile.osDisk.osType
True
True
THEN-ExistenceCondition (3)
Rule resource types
IF (3)
THEN-Deployment (1)
Compliance
Not a Compliance control
Initiatives usage
Records: 10 25 100 200 Use the filters above each column to filter and limit table data. Advanced searches can be performed by using the following operators:
< ,
<= ,
> ,
>= ,
= ,
* ,
! ,
{ ,
} ,
|| ,
&& ,
[empty] ,
[nonempty] ,
rgx: Learn more ? Page 1 of 1
Clear ChangeTrackingAndInventory Clear GA Clear BuiltIn
Initiative DisplayName
Initiative Id
Initiative Category
State
Type
polSet in AzUSGov
Enable ChangeTracking and Inventory for virtual machines
92a36f05-ebc9-4bba-9128-b47ad2ea3354
ChangeTrackingAndInventory
GA BuiltIn
unknown
No results
History
Date/Time (UTC ymd) (i)
Change type
Change detail
2024-11-01 18:49:23
change
Minor, old suffix: preview (2.0.0-preview > 2.1.0)
2022-12-21 17:43:51
change
Major, suffix remains equal (1.1.0-preview > 2.0.0-preview)
2022-09-23 16:35:49
change
Minor, suffix remains equal (1.0.0-preview > 1.1.0-preview)
2021-11-12 16:23:07
add
ec88097d-843f-4a92-8471-78016d337ba4
JSON compareHide
compare mode:
side-by-side
line-by-line
version left: 2.0.0-preview 1.1.0-preview 1.0.0-preview
version right: 2.1.0 2.0.0-preview 1.1.0-preview 1.0.0-preview
@@ -1,13 +1,12 @@
1
{
2
-
"displayName": "[Preview]: Configure ChangeTracking Extension for Linux virtual machines",
3
"policyType": "BuiltIn",
4
"mode": "Indexed",
5
"description": "Configure Linux virtual machines to automatically install the ChangeTracking Extension to enable File Integrity Monitoring(FIM) in Azure Security Center. FIM examines operating system files, Windows registries, application software, Linux system files, and more, for changes that might indicate an attack. The extension can be installed in virtual machines and locations supported by Azure Monitor Agent.",
6
"metadata": {
7
-
"version": "2.0.0-preview",
8
-
"category": "Security Center",
9
-
"preview": true
10
},
11
"parameters": {
12
"effect": {
13
"type": "String",
@@ -28,60 +27,124 @@
28
"description": "The list of locations where the policy should be applied.",
29
"strongType": "location"
30
},
31
"allowedValues": [
32
"australiasoutheast",
33
-
"australiaeast",
34
"brazilsouth",
35
"canadacentral",
36
"centralindia",
37
"centralus",
38
"eastasia",
39
-
"eastus2euap",
40
"eastus",
41
"eastus2",
42
"francecentral",
43
"japaneast",
44
"koreacentral",
45
"northcentralus",
46
"northeurope",
47
"norwayeast",
48
"southcentralus",
49
"southeastasia",
50
"switzerlandnorth",
51
"uaenorth",
52
"uksouth",
53
"westcentralus",
54
"westeurope",
55
"westus",
56
-
"westus2"
57
],
58
"defaultValue": [
59
"australiasoutheast",
60
-
"australiaeast",
61
"brazilsouth",
62
"canadacentral",
63
"centralindia",
64
"centralus",
65
"eastasia",
66
-
"eastus2euap",
67
"eastus",
68
"eastus2",
69
"francecentral",
70
"japaneast",
71
"koreacentral",
72
"northcentralus",
73
"northeurope",
74
"norwayeast",
75
"southcentralus",
76
"southeastasia",
77
"switzerlandnorth",
78
"uaenorth",
79
"uksouth",
80
"westcentralus",
81
"westeurope",
82
"westus",
83
-
"westus2"
84
]
85
}
86
},
87
"policyRule": {
@@ -99,8 +162,32 @@
99
"anyOf": [
100
{
101
"allOf": [
102
{
103
"field": "Microsoft.Compute/imagePublisher",
104
"equals": "RedHat"
105
},
106
{
@@ -126,13 +213,21 @@
126
"like": "8*"
127
},
128
{
129
"field": "Microsoft.Compute/imageSku",
130
"like": "rhel-lvm7*"
131
},
132
{
133
"field": "Microsoft.Compute/imageSku",
134
"like": "rhel-lvm8*"
135
}
136
]
137
}
138
]
@@ -275,8 +370,20 @@
275
},
276
{
277
"field": "Microsoft.Compute/imageSku",
278
"like": "8*"
279
}
280
]
281
}
282
]
@@ -298,12 +405,8 @@
298
{
299
"anyOf": [
300
{
301
"field": "Microsoft.Compute/imageSku",
302
-
"like": "6*"
303
-
},
304
-
{
305
-
"field": "Microsoft.Compute/imageSku",
306
"like": "7*"
307
},
308
{
309
"field": "Microsoft.Compute/imageSku",
@@ -339,10 +442,18 @@
339
"field": "Microsoft.Compute/imageOffer",
340
"equals": "almalinux"
341
},
342
{
343
-
"field": "Microsoft.Compute/imageSku",
344
-
"like": "8*"
345
}
346
]
347
},
348
{
1
{
2
+
"displayName": "Configure ChangeTracking Extension for Linux virtual machines",
3
"policyType": "BuiltIn",
4
"mode": "Indexed",
5
"description": "Configure Linux virtual machines to automatically install the ChangeTracking Extension to enable File Integrity Monitoring(FIM) in Azure Security Center. FIM examines operating system files, Windows registries, application software, Linux system files, and more, for changes that might indicate an attack. The extension can be installed in virtual machines and locations supported by Azure Monitor Agent.",
6
"metadata": {
7
+
"version": "2.1 .0",
8
+
"category": "Security Center"
9
},
10
"parameters": {
11
"effect": {
12
"type": "String",
27
"description": "The list of locations where the policy should be applied.",
28
"strongType": "location"
29
},
30
"allowedValues": [
31
+
"australiacentral",
32
+
"australiacentral2",
33
+
"australiaeast",
34
"australiasoutheast",
35
"brazilsouth",
36
+
"brazilsoutheast",
37
"canadacentral",
38
+
"canadaeast",
39
"centralindia",
40
"centralus",
41
+
"centraluseuap",
42
"eastasia",
43
"eastus",
44
"eastus2",
45
+
"eastus2euap",
46
"francecentral",
47
+
"francesouth",
48
+
"germanynorth",
49
+
"germanywestcentral",
50
+
"israelcentral",
51
+
"italynorth",
52
"japaneast",
53
+
"japanwest",
54
+
"jioindiacentral",
55
+
"jioindiawest",
56
"koreacentral",
57
+
"koreasouth",
58
+
"malaysiasouth",
59
+
"mexicocentral",
60
"northcentralus",
61
"northeurope",
62
"norwayeast",
63
+
"norwaywest",
64
+
"polandcentral",
65
+
"qatarcentral",
66
+
"southafricanorth",
67
+
"southafricawest",
68
"southcentralus",
69
"southeastasia",
70
+
"southindia",
71
+
"spaincentral",
72
+
"swedencentral",
73
+
"swedensouth",
74
"switzerlandnorth",
75
+
"switzerlandwest",
76
+
"taiwannorth",
77
+
"taiwannorthwest",
78
+
"uaecentral",
79
"uaenorth",
80
"uksouth",
81
+
"ukwest",
82
"westcentralus",
83
"westeurope",
84
+
"westindia",
85
"westus",
86
+
"westus2",
87
+
"westus3"
88
],
89
"defaultValue": [
90
+
"australiacentral",
91
+
"australiacentral2",
92
+
"australiaeast",
93
"australiasoutheast",
94
"brazilsouth",
95
+
"brazilsoutheast",
96
"canadacentral",
97
+
"canadaeast",
98
"centralindia",
99
"centralus",
100
+
"centraluseuap",
101
"eastasia",
102
"eastus",
103
"eastus2",
104
+
"eastus2euap",
105
"francecentral",
106
+
"francesouth",
107
+
"germanynorth",
108
+
"germanywestcentral",
109
+
"israelcentral",
110
+
"italynorth",
111
"japaneast",
112
+
"japanwest",
113
+
"jioindiacentral",
114
+
"jioindiawest",
115
"koreacentral",
116
+
"koreasouth",
117
+
"malaysiasouth",
118
+
"mexicocentral",
119
"northcentralus",
120
"northeurope",
121
"norwayeast",
122
+
"norwaywest",
123
+
"polandcentral",
124
+
"qatarcentral",
125
+
"southafricanorth",
126
+
"southafricawest",
127
"southcentralus",
128
"southeastasia",
129
+
"southindia",
130
+
"spaincentral",
131
+
"swedencentral",
132
+
"swedensouth",
133
"switzerlandnorth",
134
+
"switzerlandwest",
135
+
"taiwannorth",
136
+
"taiwannorthwest",
137
+
"uaecentral",
138
"uaenorth",
139
"uksouth",
140
+
"ukwest",
141
"westcentralus",
142
"westeurope",
143
+
"westindia",
144
"westus",
145
+
"westus2",
146
+
"westus3"
147
]
148
}
149
},
150
"policyRule": {
162
"anyOf": [
163
{
164
"allOf": [
165
{
166
+
"field": "Microsoft.Compute/virtualMachines/storageProfile.osDisk.osType",
167
+
"like": "Linux*"
168
+
},
169
+
{
170
+
"anyOf": [
171
+
{
172
+
"field": "Microsoft.Compute/imageId",
173
+
"contains": "Microsoft.Compute/galleries"
174
+
},
175
+
{
176
+
"field": "Microsoft.Compute/imageId",
177
+
"contains": "Microsoft.Compute/images"
178
+
},
179
+
{
180
+
"field": "Microsoft.Compute/virtualMachines/storageProfile.osDisk.createOption",
181
+
"equals": "Attach"
182
+
}
183
+
]
184
+
}
185
+
]
186
+
},
187
+
{
188
+
"allOf": [
189
+
{
190
"field": "Microsoft.Compute/imagePublisher",
191
"equals": "RedHat"
192
},
193
{
213
"like": "8*"
214
},
215
{
216
"field": "Microsoft.Compute/imageSku",
217
+
"like": "9*"
218
+
},
219
+
{
220
+
"field": "Microsoft.Compute/imageSku",
221
"like": "rhel-lvm7*"
222
},
223
{
224
"field": "Microsoft.Compute/imageSku",
225
"like": "rhel-lvm8*"
226
+
},
227
+
{
228
+
"field": "Microsoft.Compute/imageSku",
229
+
"like": "rhel-lvm9*"
230
}
231
]
232
}
233
]
370
},
371
{
372
"field": "Microsoft.Compute/imageSku",
373
"like": "8*"
374
+
},
375
+
{
376
+
"field": "Microsoft.Compute/imageSku",
377
+
"like": "ol7*"
378
+
},
379
+
{
380
+
"field": "Microsoft.Compute/imageSku",
381
+
"like": "ol8*"
382
+
},
383
+
{
384
+
"field": "Microsoft.Compute/imageSku",
385
+
"like": "ol9*"
386
}
387
]
388
}
389
]
405
{
406
"anyOf": [
407
{
408
"field": "Microsoft.Compute/imageSku",
409
"like": "7*"
410
},
411
{
412
"field": "Microsoft.Compute/imageSku",
442
"field": "Microsoft.Compute/imageOffer",
443
"equals": "almalinux"
444
},
445
{
446
+
"anyOf": [
447
+
{
448
+
"field": "Microsoft.Compute/imageSku",
449
+
"like": "8*"
450
+
},
451
+
{
452
+
"field": "Microsoft.Compute/imageSku",
453
+
"like": "9*"
454
+
}
455
+
]
456
}
457
]
458
},
459
{
JSON
api-version=2021-06-01
Copy definition Copy definition 4 EPAC EPAC
{ 7 items displayName: "Configure ChangeTracking Extension for Linux virtual machines" , policyType: "BuiltIn" , mode: "Indexed" , description: "Configure Linux virtual machines to automatically install the ChangeTracking Extension to enable File Integrity Monitoring(FIM) in Azure Security Center. FIM examines operating system files, Windows registries, application software, Linux system files, and more, for changes that might indicate an attack. The extension can be installed in virtual machines and locations supported by Azure Monitor Agent." , metadata: { 2 items version: "2.1.0" , category: "Security Center" } , parameters: { 2 items effect: { 4 items type: "String" , metadata: { 2 items displayName: "Effect" , description: "Enable or disable the execution of the policy" } , allowedValues: [ 2 items "DeployIfNotExists" , "Disabled" ] , defaultValue: "DeployIfNotExists" } , listOfApplicableLocations: { 4 items type: "Array" , metadata: { 3 items displayName: "Applicable Locations" , description: "The list of locations where the policy should be applied." , strongType: "location" } , allowedValues: [ 57 items "australiacentral" , "australiacentral2" , "australiaeast" , "australiasoutheast" , "brazilsouth" , "brazilsoutheast" , "canadacentral" , "canadaeast" , "centralindia" , "centralus" , "centraluseuap" , "eastasia" , "eastus" , "eastus2" , "eastus2euap" , "francecentral" , "francesouth" , "germanynorth" , "germanywestcentral" , "israelcentral" , "italynorth" , "japaneast" , "japanwest" , "jioindiacentral" , "jioindiawest" , "koreacentral" , "koreasouth" , "malaysiasouth" , "mexicocentral" , "northcentralus" , "northeurope" , "norwayeast" , "norwaywest" , "polandcentral" , "qatarcentral" , "southafricanorth" , "southafricawest" , "southcentralus" , "southeastasia" , "southindia" , "spaincentral" , "swedencentral" , "swedensouth" , "switzerlandnorth" , "switzerlandwest" , "taiwannorth" , "taiwannorthwest" , "uaecentral" , "uaenorth" , "uksouth" , "ukwest" , "westcentralus" , "westeurope" , "westindia" , "westus" , "westus2" , "westus3" ] , defaultValue: [ 57 items "australiacentral" , "australiacentral2" , "australiaeast" , "australiasoutheast" , "brazilsouth" , "brazilsoutheast" , "canadacentral" , "canadaeast" , "centralindia" , "centralus" , "centraluseuap" , "eastasia" , "eastus" , "eastus2" , "eastus2euap" , "francecentral" , "francesouth" , "germanynorth" , "germanywestcentral" , "israelcentral" , "italynorth" , "japaneast" , "japanwest" , "jioindiacentral" , "jioindiawest" , "koreacentral" , "koreasouth" , "malaysiasouth" , "mexicocentral" , "northcentralus" , "northeurope" , "norwayeast" , "norwaywest" , "polandcentral" , "qatarcentral" , "southafricanorth" , "southafricawest" , "southcentralus" , "southeastasia" , "southindia" , "spaincentral" , "swedencentral" , "swedensouth" , "switzerlandnorth" , "switzerlandwest" , "taiwannorth" , "taiwannorthwest" , "uaecentral" , "uaenorth" , "uksouth" , "ukwest" , "westcentralus" , "westeurope" , "westindia" , "westus" , "westus2" , "westus3" ] } } , policyRule: { 2 items if: { 1 item allOf: [ 3 items { 2 items field: "type" , equals: "Microsoft.Compute/virtualMachines" } , { 2 items field: "location" , in: "[parameters('listOfApplicableLocations')]" } , { 1 item anyOf: [ 12 items { 1 item allOf: [ 2 items { 2 items field: "Microsoft.Compute/virtualMachines/storageProfile.osDisk.osType" , like: "Linux*" } , { 1 item anyOf: [ 3 items { 2 items field: "Microsoft.Compute/imageId" , contains: "Microsoft.Compute/galleries" } , { 2 items field: "Microsoft.Compute/imageId" , contains: "Microsoft.Compute/images" } , { 2 items field: "Microsoft.Compute/virtualMachines/storageProfile.osDisk.createOption" , equals: "Attach" } ] } ] } , { 1 item allOf: [ 3 items { 2 items field: "Microsoft.Compute/imagePublisher" , equals: "RedHat" } , { 2 items field: "Microsoft.Compute/imageOffer" , in: [ 7 items "RHEL" , "RHEL-ARM64" , "RHEL-BYOS" , "RHEL-HA" , "RHEL-SAP" , "RHEL-SAP-APPS" , "RHEL-SAP-HA" ] } , { 1 item anyOf: [ 6 items { 2 items field: "Microsoft.Compute/imageSku" , like: "7*" } , { 2 items field: "Microsoft.Compute/imageSku" , like: "8*" } , { 2 items field: "Microsoft.Compute/imageSku" , like: "9*" } , { 2 items field: "Microsoft.Compute/imageSku" , like: "rhel-lvm7*" } , { 2 items field: "Microsoft.Compute/imageSku" , like: "rhel-lvm8*" } , { 2 items field: "Microsoft.Compute/imageSku" , like: "rhel-lvm9*" } ] } ] } , { 1 item allOf: [ 2 items { 2 items field: "Microsoft.Compute/imagePublisher" , equals: "SUSE" } , { 1 item anyOf: [ 2 items { 1 item allOf: [ 2 items { 2 items field: "Microsoft.Compute/imageOffer" , in: [ 9 items "SLES" , "SLES-HPC" , "SLES-HPC-Priority" , "SLES-SAP" , "SLES-SAP-BYOS" , "SLES-Priority" , "SLES-BYOS" , "SLES-SAPCAL" , "SLES-Standard" ] } , { 1 item } ] } , { 1 item } ] } ] } , { 1 item allOf: [ 3 items { 2 items field: "Microsoft.Compute/imagePublisher" , equals: "Canonical" } , { 1 item anyOf: [ 3 items { 2 items field: "Microsoft.Compute/imageOffer" , equals: "UbuntuServer" } , { 2 items field: "Microsoft.Compute/imageOffer" , like: "0001-com-ubuntu-server-*" } , { 2 items field: "Microsoft.Compute/imageOffer" , like: "0001-com-ubuntu-pro-*" } ] } , { 2 items field: "Microsoft.Compute/imageSku" , in: [ 26 items "14.04.0-lts" , "14.04.1-lts" , "14.04.2-lts" , "14.04.3-lts" , "14.04.4-lts" , "14.04.5-lts" , "16_04_0-lts-gen2" , "16_04-lts-gen2" , "16.04-lts" , "16.04.0-lts" , "18_04-lts-arm64" , "18_04-lts-gen2" , "18.04-lts" , "20_04-lts-arm64" , "20_04-lts-gen2" , "20_04-lts" , "22_04-lts-gen2" , "22_04-lts" , "pro-16_04-lts-gen2" , "pro-16_04-lts" , "pro-18_04-lts-gen2" , "pro-18_04-lts" , "pro-20_04-lts-gen2" , "pro-20_04-lts" , "pro-22_04-lts-gen2" , "pro-22_04-lts" ] } ] } , { 1 item allOf: [ 3 items { 2 items field: "Microsoft.Compute/imagePublisher" , equals: "Oracle" } , { 2 items field: "Microsoft.Compute/imageOffer" , equals: "Oracle-Linux" } , { 1 item anyOf: [ 5 items { 2 items field: "Microsoft.Compute/imageSku" , like: "7*" } , { 2 items field: "Microsoft.Compute/imageSku" , like: "8*" } , { 2 items field: "Microsoft.Compute/imageSku" , like: "ol7*" } , { 2 items field: "Microsoft.Compute/imageSku" , like: "ol8*" } , { 2 items field: "Microsoft.Compute/imageSku" , like: "ol9*" } ] } ] } , { 1 item } , { 1 item allOf: [ 3 items { 2 items field: "Microsoft.Compute/imagePublisher" , equals: "cloudera" } , { 2 items field: "Microsoft.Compute/imageOffer" , equals: "cloudera-centos-os" } , { 2 items field: "Microsoft.Compute/imageSku" , like: "7*" } ] } , { 1 item } , { 1 item allOf: [ 3 items { 2 items field: "Microsoft.Compute/imagePublisher" , equals: "ctrliqinc1648673227698" } , { 2 items field: "Microsoft.Compute/imageOffer" , like: "rocky-8*" } , { 2 items field: "Microsoft.Compute/imageSku" , like: "rocky-8*" } ] } , { 1 item } , { 1 item } , { 1 item allOf: [ 3 items { 2 items field: "Microsoft.Compute/imagePublisher" , equals: "microsoftcblmariner" } , { 2 items field: "Microsoft.Compute/imageOffer" , equals: "cbl-mariner" } , { 2 items field: "Microsoft.Compute/imageSku" , in: [ 5 items "1-gen2" , "cbl-mariner-1" , "cbl-mariner-2" , "cbl-mariner-2-arm64" , "cbl-mariner-2-gen2" ] } ] } ] } ] } , then: { 2 items effect: "[parameters('effect')]" , details: { 4 items type: "Microsoft.Compute/virtualMachines/extensions" , roleDefinitionIds: [ 1 item ] , existenceCondition: { 1 item allOf: [ 3 items { 2 items field: "Microsoft.Compute/virtualMachines/extensions/type" , equals: "ChangeTracking-Linux" } , { 2 items field: "Microsoft.Compute/virtualMachines/extensions/Publisher" , equals: "Microsoft.Azure.ChangeTrackingAndInventory" } , { 2 items field: "Microsoft.Compute/virtualMachines/extensions/provisioningState" , equals: "Succeeded" } ] } , deployment: { 1 item properties: { 3 items mode: "incremental" , template: { 5 items $schema: "https://schema.management.azure.com/schemas/2015-01-01/deploymentTemplate.json#" , contentVersion: "1.0.0.0" , parameters: { 2 items } , variables: { 4 items vmExtensionName: "ChangeTracking-Linux" , vmExtensionPublisher: "Microsoft.Azure.ChangeTrackingAndInventory" , vmExtensionType: "ChangeTracking-Linux" , vmExtensionTypeHandlerVersion: "2.0" } , resources: [ 1 item { 5 items name: 🔍 "[
concat(
parameters('vmName'),
'/',
variables(
'vmExtensionName'
)
)
]", type: "Microsoft.Compute/virtualMachines/extensions" , location: "[parameters('location')]" , apiVersion: "2019-07-01" , properties: { 7 items publisher: "[variables('vmExtensionPublisher')]" , type: "[variables('vmExtensionType')]" , typeHandlerVersion: "[variables('vmExtensionTypeHandlerVersion')]" , autoUpgradeMinorVersion: true , enableAutomaticUpgrade: true , settings : {} , protectedSettings : {} } } ] } , parameters: { 2 items } } } } } } }