Skip to content

Commit f751c58

Browse files
committed
feat: images
1 parent 697fa9b commit f751c58

File tree

4 files changed

+15
-6
lines changed

4 files changed

+15
-6
lines changed

articles/ai-foundry/model-inference/how-to/configure-deployment-policies.md

Lines changed: 15 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -32,6 +32,8 @@ Follow these steps to create and assign an example custom policy to allow specif
3232

3333
2. From the left side of the Azure Policy Dashboard, select **Authoring**, **Definitions**, and then select **+ Policy definition** from the top of the page.
3434

35+
:::image type="content" source="../media/configure-deployment-policies/create-new-policy.png" alt-text="An screenshot showing how to create a new policy definition in Azure Policies." lightbox="../media/configure-deployment-policies/create-new-policy.png":::
36+
3537
3. In the **Policy Definition** form, use the following values:
3638

3739
- **Definition location**: Select the subscription or management group where you want to store the policy definition.
@@ -97,18 +99,20 @@ Follow these steps to create and assign an example custom policy to allow specif
9799

98100
8. Optionally, select the **Non-compliance messages** tab at the top of the page and set a custom message for noncompliance.
99101

100-
9. Select **Review + create** tab and verify that the policy assignment is correct. When ready, select **Create** to assign the policy.
102+
9. Select **Review + create** tab and verify that the policy assignment is correct. When ready, select **Create** to assign the policy.
101103

102104
10. Notify your developers that the policy is in place. They receive an error message if they try to deploy a model that isn't in the list of allowed models.
103105

104106

105107
# [Enforce specific deployment types](#tab/deployments)
106108

107-
The following policy allow you to control which types of deployments are allowed in the Azure AI Services or Azure OpenAI Resources. For example, you may want to prevent them from creating deployments that result in data processed in a different region. Follow these steps to create a policy that denies creating Global processing deployment types.
109+
The following policy allows you to control which types of deployments are allowed in the Azure AI Services or Azure OpenAI Resources. For example, you may want to prevent them from creating deployments that result in data processed in a different region. Follow these steps to create a policy that denies creating Global processing deployment types.
108110

109111
1. From the [Azure portal](https://portal.azure.com), select **Policy** from the left side of the page. You can also search for **Policy** in the search bar at the top of the page.
110112

111113
2. From the left side of the Azure Policy Dashboard, select **Authoring**, **Definitions**, and then select **+ Policy definition** from the top of the page.
114+
115+
:::image type="content" source="../media/configure-deployment-policies/create-new-policy.png" alt-text="An screenshot showing how to create a new policy definition in Azure Policies." lightbox="../media/configure-deployment-policies/create-new-policy.png":::
112116

113117
3. In the **Policy Definition** form, use the following values:
114118

@@ -152,13 +156,15 @@ The following policy allow you to control which types of deployments are allowed
152156
- **Assignment name**: Enter a unique name for the assignment.
153157
- **Policy enforcement**: Make sure that the **Policy enforcement** field is set to **Enabled**. If it isn't enabled, the policy isn't enforced.
154158

155-
Select **Next** at the bottom of the page, or the **Parameters** tab at the top of the page.
159+
:::image type="content" source="../media/configure-deployment-policies/assign-policy-scope.png" alt-text="An screenshot showing to assign the created policy definition to a given scope." lightbox="../media/configure-deployment-policies/assign-policy-scope.png":::
160+
161+
7. Select **Next** at the bottom of the page, or the **Parameters** tab at the top of the page.
156162

157-
7. Optionally, select the **Non-compliance messages** tab at the top of the page and set a custom message for noncompliance.
163+
8. Optionally, select the **Non-compliance messages** tab at the top of the page and set a custom message for noncompliance.
158164

159-
8. Select **Review + create** tab and verify that the policy assignment is correct. When ready, select **Create** to assign the policy.
165+
9. Select **Review + create** tab and verify that the policy assignment is correct. When ready, select **Create** to assign the policy.
160166

161-
9. Notify your developers that the policy is in place. They receive an error message if they try to deploy a model that isn't in the list of allowed models.
167+
10. Notify your developers that the policy is in place. They receive an error message if they try to deploy a model that isn't in the list of allowed models.
162168

163169
---
164170

@@ -171,8 +177,11 @@ To verify that the policy is assigned, navigate to **Policy** in the Azure porta
171177
To monitor compliance with the policy, follow these steps:
172178

173179
1. From the [Azure portal](https://portal.azure.com), select **Policy** from the left side of the page. You can also search for **Policy** in the search bar at the top of the page.
180+
174181
1. From the left side of the Azure Policy Dashboard, select **Compliance**. Each policy assignment is listed with the compliance status. To view more details, select the policy assignment.
175182

183+
:::image type="content" source="../media/configure-deployment-policies/policy-compliance.png" alt-text="An screenshot showing an example of a policy compliance report." lightbox="../media/configure-deployment-policies/policy-compliance.png":::
184+
176185
## Update the policy assignment
177186

178187
To update an existing policy assignment with new models, follow these steps:
709 KB
Loading
1.13 MB
Loading
90.8 KB
Loading

0 commit comments

Comments
 (0)