||Security Configuration Monitoring
||Ensure that Security Configuration Monitoring is set to audit on the Default Policy
||By enabling audit on Security Configuration Monitoring, Security Vulnerabilities on machines can be detected, keeping security up to date and following security best practices.
||1. Navigate to the Policy service. 2. Select the Assignments blade. 3. Select the ASC Default policy. 4. Select Edit Assignment and Look for Vulnerabilities in Security Configuration On Your Machine Should Be Remediated and select AuditIfNotExists in the drop down menu.