Skip to content

Commit 9f5a570

Browse files
committed
Refreshes azure-policy.md
1 parent a592f2e commit 9f5a570

File tree

1 file changed

+27
-27
lines changed

1 file changed

+27
-27
lines changed

articles/ai-foundry/how-to/azure-policy.md

Lines changed: 27 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ titleSuffix: Azure AI Foundry
44
description: Learn how to use Azure Policy with Azure AI Foundry to make sure your hubs and projects are compliant with your requirements.
55
ms.author: jburchel
66
author: jonburchel
7-
ms.date: 07/31/2025
7+
ms.date: 10/01/2025
88
ms.service: azure-ai-foundry
99
ms.custom:
1010
- hub-only
@@ -58,27 +58,27 @@ To view the built-in policy definitions, use the following steps:
5858
1. Select __Definitions__.
5959
1. For __Type__, select __Built-in__. For __Category__, select __Machine Learning__.
6060

61-
From here, you can select policy definitions to view them. While viewing a definition, you can use the __Assign__ link to assign the policy to a specific scope, and configure the parameters for the policy. For more information, see [Create a policy assignment to identify noncompliant resources using Azure portal](/azure/governance/policy/assign-policy-portal).
61+
Select a policy definition to view it. While viewing a definition, select __Assign__ to assign the policy to a scope and configure its parameters. For more information, see [Create a policy assignment to identify noncompliant resources using Azure portal](/azure/governance/policy/assign-policy-portal).
6262

63-
You can also assign policies by using [Azure PowerShell](/azure/governance/policy/assign-policy-powershell), [Azure CLI](/azure/governance/policy/assign-policy-azurecli), or [templates](/azure/governance/policy/assign-policy-template).
63+
Assign policies by using [Azure PowerShell](/azure/governance/policy/assign-policy-powershell), [Azure CLI](/azure/governance/policy/assign-policy-azurecli), or [templates](/azure/governance/policy/assign-policy-template).
6464

6565
## Conditional access policies
6666

67-
To control who can access your Azure AI Foundry hubs and projects, use [Microsoft Entra Conditional Access](/azure/active-directory/conditional-access/overview). To use Conditional Access for hubs, [assign the Conditional Access policy](/azure/active-directory/conditional-access/concept-conditional-access-cloud-apps) to the following apps:
67+
Control access to Azure AI Foundry hubs and projects by using [Microsoft Entra Conditional Access](/azure/active-directory/conditional-access/overview). For hubs, [assign the Conditional Access policy](/azure/active-directory/conditional-access/concept-conditional-access-cloud-apps) to these apps:
6868

6969
| App name | App ID | Description |
7070
|---|---|---|
71-
| Azure AI Foundry App | cb2ff863-7f30-4ced-ab89-a00194bcf6d9 | Use to control access to the Azure AI Foundry portal. |
72-
| Azure Machine Learning Web App | d7304df8-741f-47d3-9bc2-df0e24e2071f | Use to control access to Azure Machine Learning studio. |
73-
| Azure Machine Learning | 0736f41a-0425-bdb5-1563eff02385 | Use to control direct access to the Azure Machine Learning API. For example, when using the SDK or REST API. Azure AI Foundry hub-based projects rely on the Azure Machine Learning API. |
71+
| Azure AI Foundry App | cb2ff863-7f30-4ced-ab89-a00194bcf6d9 | Controls access to the Azure AI Foundry portal. |
72+
| Azure Machine Learning Web App | d7304df8-741f-47d3-9bc2-df0e24e2071f | Controls access to Azure Machine Learning studio. |
73+
| Azure Machine Learning | 0736f41a-0425-bdb5-1563eff02385 | Controls direct access to the Azure Machine Learning API (for example, when using the SDK or REST API). Azure AI Foundry hub-based projects rely on this API. |
7474

7575
## Configure built-in policies
7676

7777
### Compute instance should have idle shutdown
7878

7979
This policy controls whether a compute instance should have idle shutdown enabled. Idle shutdown automatically stops the compute instance when it's idle for a specified period of time. This policy is useful for cost savings and to ensure that resources aren't being used unnecessarily.
8080

81-
To configure this policy, set the effect parameter to __Audit__, __Deny__, or __Disabled__. If set to __Audit__, you can create a compute instance without idle shutdown enabled and a warning event is created in the activity log.
81+
To configure this policy, set the effect parameter to __Audit__, __Deny__, or __Disabled__. If you set the effect to __Audit__, you can create a compute instance without idle shutdown. The service creates a warning event in the activity log.
8282

8383
### Compute instances should be recreated to get software updates
8484

@@ -92,15 +92,15 @@ Controls auditing of compute cluster and instance resources behind a virtual net
9292

9393
To configure this policy, set the effect parameter to __Audit__ or __Disabled__. If set to __Audit__, you can create a compute that isn't configured behind a virtual network and a warning event is created in the activity log.
9494

95-
### Computes should have local authentication methods disabled.
95+
### Compute clusters and instances should have local authentication disabled
9696

9797
Controls whether a compute cluster or instance should disable local authentication (SSH).
9898

9999
To configure this policy, set the effect parameter to __Audit__, __Deny__, or __Disabled__. If set to __Audit__, you can create a compute with SSH enabled and a warning event is created in the activity log.
100100

101101
If the policy is set to __Deny__, then you can't create a compute unless SSH is disabled. Attempting to create a compute with SSH enabled results in an error. The error is also logged in the activity log. The policy identifier is returned as part of this error.
102102

103-
### Hubs should be encrypted with customer-managed key
103+
### Hubs should be encrypted with a customer-managed key
104104

105105
Controls whether a hub and its projects should be encrypted with a customer-managed key, or with a Microsoft-managed key to encrypt metrics and metadata. For more information on using customer-managed key, see the [Customer-managed keys](../concepts/encryption-keys-portal.md) article.
106106

@@ -116,73 +116,73 @@ To configure this policy, set the effect parameter to __Audit__, __Deny__, or __
116116

117117
If the policy is set to __Deny__, then you can't create a hub that allows network access from the public internet.
118118

119-
### Hubs should use private link
119+
### Hubs should use Azure Private Link
120120

121121
Controls whether a hub and its projects should use Azure Private Link to communicate with Azure Virtual Network. For more information on using private link, see [Configure a private endpoint](configure-private-link.md).
122122

123123
To configure this policy, set the effect parameter to __Audit__ or __Deny__. If set to __Audit__, you can create a hub without using private link and a warning event is created in the activity log.
124124

125125
If the policy is set to __Deny__, then you can't create a hub unless it uses a private link. Attempting to create a hub without a private link results in an error. The error is also logged in the activity log. The policy identifier is returned as part of this error.
126126

127-
### Hubs should use user-assigned managed identity
127+
### Hubs should use a user-assigned managed identity
128128

129129
Controls whether a hub is created using a system-assigned managed identity (default) or a user-assigned managed identity. The managed identity for the hub is used to access associated resources such as Azure Storage, Azure Container Registry, Azure Key Vault, and Azure Application Insights.
130130

131131
To configure this policy, set the effect parameter to __Audit__, __Deny__, or __Disabled__. If set to __Audit__, you can create a hub without specifying a user-assigned managed identity. A system-assigned identity is used, and a warning event is created in the activity log.
132132

133133
If the policy is set to __Deny__, then you can't create a hub unless you provide a user-assigned identity during the creation process. Attempting to create a hub without providing a user-assigned identity results in an error. The error is also logged to the activity log. The policy identifier is returned as part of this error.
134134

135-
### Configure computes to modify/disable local authentication
135+
### Configure compute resources to modify or disable local authentication
136136

137137
This policy modifies any compute cluster or instance creation request to disable local authentication (SSH).
138138

139139
To configure this policy, set the effect parameter to __Modify__ or __Disabled__. If set __Modify__, any creation of a compute cluster or instance within the scope where the policy applies automatically has local authentication disabled.
140140

141-
### Configure hub to use private DNS zones
141+
### Configure a hub to use private DNS zones
142142

143143
This policy configures a hub to use a private DNS zone, overriding the default DNS resolution for a private endpoint.
144144

145145
To configure this policy, set the effect parameter to __DeployIfNotExists__. Set the __privateDnsZoneId__ to the Azure Resource Manager ID of the private DNS zone to use.
146146

147-
### Configure hub to disable public network access
147+
### Configure a hub to disable public network access
148148

149149
Configures a hub and its projects to disable network access from the public internet. Disabling public network access helps protect against data leakage risks. You can instead access your hub and projects by creating private endpoints. For more information, see [Configure a private endpoint](configure-private-link.md).
150150

151151
To configure this policy, set the effect parameter to __Modify__ or __Disabled__. If set to __Modify__, any creation of a hub within the scope where the policy applies automatically has public network access disabled.
152152

153-
### Configure hub with private endpoints
153+
### Configure a hub with private endpoints
154154

155155
Configures a hub to create a private endpoint within the specified subnet of an Azure Virtual Network.
156156

157157
To configure this policy, set the effect parameter to __DeployIfNotExists__. Set the __privateEndpointSubnetID__ to the Azure Resource Manager ID of the subnet.
158158

159-
### Configure diagnostic hub to send logs to log analytics workspaces
159+
### Configure diagnostic hub to send logs to Log Analytics workspaces
160160

161161
Configures the diagnostic settings for a hub to send logs to a Log Analytics workspace.
162162

163163
To configure this policy, set the effect parameter to __DeployIfNotExists__ or __Disabled__. If set to __DeployIfNotExists__, the policy creates a diagnostic setting to send logs to a Log Analytics workspace if it doesn't already exist.
164164

165-
### Resource logs in hub should be enabled
165+
### Resource logs in a hub should be enabled
166166

167167
Audits whether resource logs are enabled for a hub. Resource logs provide detailed information about operations performed on resources in the hub.
168168

169169
To configure this policy, set the effect parameter to __AuditIfNotExists__ or __Disabled__. If set to __AuditIfNotExists__, the policy audits if resource logs aren't enabled for the hub.
170170

171171
## Create custom definitions
172172

173-
When you need to create custom policies for your organization, you can use the [Azure Policy definition structure](/azure/governance/policy/concepts/definition-structure-basics) to create your own definitions. You can use the [Azure Policy Visual Studio Code extension](https://marketplace.visualstudio.com/items?itemName=AzurePolicy.azurepolicyextension) to author and test your policies.
173+
Create custom policies by using the [Azure Policy definition structure](/azure/governance/policy/concepts/definition-structure-basics). Use the [Azure Policy Visual Studio Code extension](https://marketplace.visualstudio.com/items?itemName=AzurePolicy.azurepolicyextension) to author and test policies.
174174

175-
To discover the policy aliases you can use in your definition, use the following Azure CLI command to list the aliases for Azure Machine Learning:
175+
List policy aliases for Azure Machine Learning with this Azure CLI command:
176176

177177
```azurecli
178178
az provider show --namespace Microsoft.MachineLearningServices --expand "resourceTypes/aliases" --query "resourceTypes[].aliases[].name"
179179
```
180180

181-
To discover the allowed values for a specific alias, visit the [Azure Machine Learning REST API](/rest/api/azureml/) reference.
181+
Find allowed values for a specific alias in the [Azure Machine Learning REST API](/rest/api/azureml/) reference.
182182

183-
For a tutorial (not Azure Machine Learning specific) on how to create custom policies, visit [Create a custom policy definition](/azure/governance/policy/tutorials/create-custom-policy-definition).
183+
For a general tutorial on creating custom policies, see [Create a custom policy definition](/azure/governance/policy/tutorials/create-custom-policy-definition).
184184

185-
### Example: Block serverless spark compute jobs
185+
### Example: Deny serverless Spark compute jobs
186186

187187
```json
188188
{
@@ -210,14 +210,14 @@ For a tutorial (not Azure Machine Learning specific) on how to create custom pol
210210
}
211211
```
212212

213-
### Example: Configure no public IP for managed computes
213+
### Example: Deny public IPs for managed computes
214214

215215
```json
216216
{
217217
"properties": {
218218
"displayName": "Deny compute instance and compute cluster creation with public IP",
219219
"description": "Deny compute instance and compute cluster creation with public IP",
220-
"mode": "all",
220+
"mode": "All",
221221
"parameters": {
222222
"effectType": {
223223
"type": "string",
@@ -266,5 +266,5 @@ For a tutorial (not Azure Machine Learning specific) on how to create custom pol
266266

267267
* [Azure Policy documentation](/azure/governance/policy/overview)
268268
* [Working with security policies with Microsoft Defender for Cloud](/azure/security-center/tutorial-security-policy)
269-
* The [Cloud Adoption Framework scenario for data management and analytics](/azure/cloud-adoption-framework/scenarios/data-management/) outlines considerations in running data and analytics workloads in the cloud
270-
* [Learn how to use policy to integrate Azure Private Link with Azure Private DNS zones](/azure/cloud-adoption-framework/ready/azure-best-practices/private-link-and-dns-integration-at-scale)
269+
* The [Cloud Adoption Framework scenario for data management and analytics](/azure/cloud-adoption-framework/scenarios/data-management/) outlines considerations for running data and analytics workloads in the cloud.
270+
* [Use policy to integrate Azure Private Link with Azure Private DNS zones](/azure/cloud-adoption-framework/ready/azure-best-practices/private-link-and-dns-integration-at-scale)

0 commit comments

Comments
 (0)