Back to Skills

azure-quick-review

verified

Performs Azure compliance assessments using Azure Quick Review (azqr) to identify resources that don't comply with Azure best practices. Use this skill when users ask to check compliance, assess Azure resources, run azqr, identify best practice violations, find orphaned resources, or review Azure resource configurations. Activate when users mention compliance scan, resource review, Azure assessment, or security posture evaluation.

View on GitHub

Marketplace

github-copilot-for-azure

microsoft/GitHub-Copilot-for-Azure

Plugin

azure

Repository
Verified Org

microsoft/GitHub-Copilot-for-Azure
102stars

plugin/skills/azure-quick-review/SKILL.md

Last Verified

February 1, 2026

Install Skill

Select agents to install to:

Scope:
npx add-skill https://github.com/microsoft/GitHub-Copilot-for-Azure/blob/main/plugin/skills/azure-quick-review/SKILL.md -a claude-code --skill azure-quick-review

Installation paths:

Claude
.claude/skills/azure-quick-review/
Powered by add-skill CLI

Instructions

# Azure Quick Review Compliance Assessment

This skill enables comprehensive Azure compliance assessments using Azure Quick Review (azqr), analyzing findings against Azure best practices, and providing actionable remediation guidance.

## When to Use This Skill

- User asks to check Azure compliance or best practices
- User wants to assess Azure resources for configuration issues
- User mentions running azqr or Azure Quick Review
- User wants to identify orphaned or misconfigured resources
- User needs to review Azure security posture
- Before major deployments to establish a compliance baseline
- After deployments to verify no compliance regressions

## Prerequisites

- **Azure authentication** - Logged in via Azure CLI (`az login`) or using Service Principal/Managed Identity
- **Reader permissions** - Minimum Reader role on target subscription or management group

## Assessment Workflow

### Step 1: Determine Scan Scope

Ask the user or detect from context:

| Scope | Use Case | Required Info |
|-------|----------|---------------|
| Subscription | Full subscription assessment | Subscription ID |
| Resource Group | Targeted assessment | Subscription ID + Resource Group name |
| Management Group | Enterprise-wide assessment | Management Group ID |
| Specific Service | Deep-dive on one resource type | Subscription ID + Service abbreviation |

### Step 2: Run Compliance Scan

Use the Azure MCP tool to run the scan:

```
mcp_azure_mcp_extension_azqr
  subscription: <subscription-id>
  resource-group: <optional-rg-name>
```

### Step 3: Analyze Scan Results

The scan produces an Excel file with these sheets:

| Sheet | Contents | Priority |
|-------|----------|----------|
| **Recommendations** | All recommendations with impacted resource count | High |
| **ImpactedResources** | Resources with specific issues to address | High |
| **Inventory** | All scanned resources with SKU, Tier, SLA details | Medium |
| **Advisor** | Azure Advisor recommendations | Medium |
| **Defe

Validation Details

Front Matter
Required Fields
Valid Name Format
Valid Description
Has Sections
Allowed Tools
Instruction Length:
5470 chars