Performs Azure compliance assessments using Azure Quick Review (azqr) to identify resources that don't comply with Azure best practices. Use this skill when users ask to check compliance, assess Azure resources, run azqr, identify best practice violations, find orphaned resources, or review Azure resource configurations. Activate when users mention compliance scan, resource review, Azure assessment, or security posture evaluation.
View on GitHubmicrosoft/GitHub-Copilot-for-Azure
azure
February 1, 2026
Select agents to install to:
npx add-skill https://github.com/microsoft/GitHub-Copilot-for-Azure/blob/main/plugin/skills/azure-quick-review/SKILL.md -a claude-code --skill azure-quick-reviewInstallation paths:
.claude/skills/azure-quick-review/# Azure Quick Review Compliance Assessment This skill enables comprehensive Azure compliance assessments using Azure Quick Review (azqr), analyzing findings against Azure best practices, and providing actionable remediation guidance. ## When to Use This Skill - User asks to check Azure compliance or best practices - User wants to assess Azure resources for configuration issues - User mentions running azqr or Azure Quick Review - User wants to identify orphaned or misconfigured resources - User needs to review Azure security posture - Before major deployments to establish a compliance baseline - After deployments to verify no compliance regressions ## Prerequisites - **Azure authentication** - Logged in via Azure CLI (`az login`) or using Service Principal/Managed Identity - **Reader permissions** - Minimum Reader role on target subscription or management group ## Assessment Workflow ### Step 1: Determine Scan Scope Ask the user or detect from context: | Scope | Use Case | Required Info | |-------|----------|---------------| | Subscription | Full subscription assessment | Subscription ID | | Resource Group | Targeted assessment | Subscription ID + Resource Group name | | Management Group | Enterprise-wide assessment | Management Group ID | | Specific Service | Deep-dive on one resource type | Subscription ID + Service abbreviation | ### Step 2: Run Compliance Scan Use the Azure MCP tool to run the scan: ``` mcp_azure_mcp_extension_azqr subscription: <subscription-id> resource-group: <optional-rg-name> ``` ### Step 3: Analyze Scan Results The scan produces an Excel file with these sheets: | Sheet | Contents | Priority | |-------|----------|----------| | **Recommendations** | All recommendations with impacted resource count | High | | **ImpactedResources** | Resources with specific issues to address | High | | **Inventory** | All scanned resources with SKU, Tier, SLA details | Medium | | **Advisor** | Azure Advisor recommendations | Medium | | **Defe