You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/governance/policy/concepts/effects.md
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,12 +25,12 @@ These effects are currently supported in a policy definition:
25
25
26
26
## Interchanging effects
27
27
28
-
Sometimes multiple effects can be valid for a given policy definition. Parameters are often used to specify allowed effect values so that a single definition can be more versatile. However, it is important to note that not all effects are interchangeable. Resource properties and logic in the policy rule can determine whether a cerain effect is considered valid to the policy definition. For example, policy definitions with effect **AuditIfNotExists** require additional details in the policy rule which are not required for policies with effect **Audit**. The effects also behave differently. **Audit** policies will assess a resource's compliance based on its own properties, while **AuditIfNotExists** policies will assess a resource's compliance based on a child or extension resource's properties.
28
+
Sometimes multiple effects can be valid for a given policy definition. Parameters are often used to specify allowed effect values so that a single definition can be more versatile. However, it's important to note that not all effects are interchangeable. Resource properties and logic in the policy rule can determine whether a certain effect is considered valid to the policy definition. For example, policy definitions with effect **AuditIfNotExists** require additional details in the policy rule that aren't required for policies with effect **Audit**. The effects also behave differently. **Audit** policies will assess a resource's compliance based on its own properties, while **AuditIfNotExists** policies will assess a resource's compliance based on a child or extension resource's properties.
29
29
30
-
The following is general guidance around interchangeable effects:
30
+
Below is some general guidance around interchangeable effects:
31
31
-**Audit**, **Deny**, and either **Modify** or **Append** are often interchangeable.
32
32
-**AuditIfNotExists** and **DeployIfNotExists** are often interchangeable.
33
-
-**Manual**is not interchangeable.
33
+
-**Manual**isn't interchangeable.
34
34
-**Disabled** is interchangeable with any effect.
35
35
36
36
## Order of evaluation
@@ -162,7 +162,7 @@ definitions as `constraintTemplate` is deprecated.
162
162
template. See
163
163
[Create policy definition from constraint template](../how-to/extension-for-vscode.md) to
Copy file name to clipboardExpand all lines: articles/governance/policy/concepts/policy-applicability.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ author: timwarner-msft
8
8
---
9
9
# What is applicability in Azure Policy?
10
10
11
-
When a policy definition is assigned to a scope, Azure Policy determines which resources in that scope should be considered for compliance evaluation. A resource will only be assessed for compliance if it is considered **applicable** to the given policy assignment.
11
+
When a policy definition is assigned to a scope, Azure Policy determines which resources in that scope should be considered for compliance evaluation. A resource will only be assessed for compliance if it's considered **applicable** to the given policy assignment.
12
12
13
13
Applicability is determined by several factors:
14
14
-**Conditions** in the `if` block of the [policy rule](../concepts/definition-structure.md#policy-rule).
@@ -21,7 +21,7 @@ Condition(s) in the `if` block of the policy rule are evaluated for applicabilit
21
21
> [!NOTE]
22
22
> Applicability is different from compliance, and the logic used to determine each is different. If a resource is **applicable** that means it is relevant to the policy. If a resource is **compliant** that means it adheres to the policy. Sometimes only certain conditions from the policy rule impact applicability, while all conditions of the policy rule impact compliance state.
23
23
24
-
## Applicability logic for resource manager modes
24
+
## Applicability logic for Resource Manager modes
25
25
26
26
### Append, Audit, Manual, Modify and Deny policy effects
27
27
@@ -31,21 +31,21 @@ Following are special cases to the previously described applicability logic:
31
31
32
32
|Scenario |Result |
33
33
|---------|---------|
34
-
|Any invalid aliases in the `if` conditions |The policy is not applicable |
34
+
|Any invalid aliases in the `if` conditions |The policy isn't applicable |
35
35
|When the `if` conditions consist of only `kind` conditions |The policy is applicable to all resources |
36
36
|When the `if` conditions consist of only `name` conditions |The policy is applicable to all resources |
37
37
|When the `if` conditions consist of only `type` and `kind` or `type` and `name` conditions |Only type conditions are considered when deciding applicability |
38
-
|When any conditions (including deployment parameters) include a `location` condition |Will not be applicable to subscriptions |
38
+
|When any conditions (including deployment parameters) include a `location` condition |Won't be applicable to subscriptions |
39
39
40
40
### AuditIfNotExists and DeployIfNotExists policy effects
41
41
42
-
The applicability of `AuditIfNotExists` and `DeployIfNotExists` policies is based off the entire `if` condition of the policy rule. When the `if` evaluates to false, the policy is not applicable.
42
+
The applicability of `AuditIfNotExists` and `DeployIfNotExists` policies is based off the entire `if` condition of the policy rule. When the `if` evaluates to false, the policy isn't applicable.
43
43
44
44
## Applicability logic for resource provider modes
45
45
46
46
### Microsoft.Kubernetes.Data
47
47
48
-
The applicability of `Microsoft.Kubernetes.Data` policies is based off the entire `if` condition of the policy rule. When the `if` evaluates to false, the policy is not applicable.
48
+
The applicability of `Microsoft.Kubernetes.Data` policies is based off the entire `if` condition of the policy rule. When the `if` evaluates to false, the policy isn't applicable.
Copy file name to clipboardExpand all lines: articles/governance/policy/how-to/get-compliance-data.md
+15-16Lines changed: 15 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,8 +10,8 @@ ms.author: timwarner
10
10
11
11
One of the largest benefits of Azure Policy is the insight and controls it provides over resources
12
12
in a subscription or [management group](../../management-groups/overview.md) of subscriptions. This
13
-
control can be exercised in many different ways, such as preventing resources being created in the
14
-
wrong location, enforcing common and consistent tag usage, or auditing existing resources for
13
+
control can be used to prevent resources from being created in the
14
+
wrong location, enforce common and consistent tag usage, or audit existing resources for
15
15
appropriate configurations and settings. In all cases, data is generated by Azure Policy to enable
16
16
you to understand the compliance state of your environment.
17
17
@@ -40,10 +40,9 @@ operations of the Azure Policy Insights REST API, see
40
40
Evaluations of assigned policies and initiatives happen as the result of various events:
41
41
42
42
- A policy or initiative is newly assigned to a scope. It takes around five minutes for the assignment
43
-
to be applied to the defined scope. Once it's applied, the evaluation cycle begins for resources
44
-
within that scope against the newly assigned policy or initiative and depending on the effects
45
-
used by the policy or initiative, resources are marked as compliant, non-compliant, or exempt. A
46
-
large policy or initiative evaluated against a large scope of resources can take time. As such,
43
+
to be applied to the defined scope, then the evaluation cycle begins for applicable resources against the newly assigned policy or initiative. Depending on the effects
44
+
used, resources are marked as compliant, non-compliant, exempt, or unknown. A
45
+
large policy or initiative evaluated against a large scope of resources can take time, so
47
46
there's no pre-defined expectation of when the evaluation cycle completes. Once it completes,
48
47
updated compliance results are available in the portal and SDKs.
49
48
@@ -96,7 +95,7 @@ to trigger an on-demand evaluation scan from your
on one or multiple resources, resource groups, or subscriptions, and gate the workflow based on the
98
97
compliance state of resources. You can also configure the workflow to run at a scheduled time so
99
-
that you get the latest compliance status at a convenient time. Optionally, this GitHub Actions can
98
+
that you get the latest compliance status at a convenient time. Optionally, GitHub Actions can
100
99
generate a report on the compliance state of scanned resources for further analysis or for
101
100
archiving.
102
101
@@ -249,7 +248,7 @@ Azure Policy supports the following compliance states:
249
248
250
249
### Compliant and non-compliant states
251
250
252
-
In an assignment, a resource is **non-compliant** if it is applicable to the policy assignment and does not adhere to conditions in the policy rule. The following table shows how different policy effects work with the condition evaluation for the resulting compliance state:
251
+
In an assignment, a resource is **non-compliant** if it's applicable to the policy assignment and doesn't adhere to conditions in the policy rule. The following table shows how different policy effects work with the condition evaluation for the resulting compliance state:
253
252
254
253
| Resource State | Effect | Policy Evaluation | Compliance State |
255
254
| --- | --- | --- | --- |
@@ -274,7 +273,7 @@ For example, assume that you have a resource group - ContsoRG, with some storage
274
273
275
274
In this example, you need to be wary of security risks. Now that you've created a policy assignment,
276
275
it's evaluated for all included and non-exempt storage accounts in the ContosoRG resource group. It
277
-
audits the three non-compliant storage accounts, consequently changing their states to
276
+
audits the three non-compliant storage accounts, changing their states to
278
277
**Non-compliant.**
279
278
280
279
:::image type="complex" source="../media/getting-compliance-data/resource-group03.png" alt-text="Diagram of storage account compliance in the Contoso R G resource group." border="false":::
@@ -302,7 +301,7 @@ Besides **Compliant** and **Non-compliant**, policies and resources have four ot
302
301
Azure Policy relies on several factors to determine whether a resource is considered [applicable](../concepts/policy-applicability.md), then to determine its compliance state.
303
302
304
303
The compliance percentage is determined by dividing **Compliant**, **Exempt**, and **Unknown** resources by _total
305
-
resources_. _Total resources_ is defined as the sum of the **Compliant**, **Non-compliant**,
304
+
resources_. _Total resources_ include **Compliant**, **Non-compliant**,
306
305
**Exempt**, and **Conflicting** resources. The overall compliance numbers are the sum of distinct
307
306
resources that are **Compliant**, **Exempt**, and **Unknown** divided by the sum of all distinct resources. In the
308
307
image below, there are 20 distinct resources that are applicable and only one is **Non-compliant**.
@@ -315,7 +314,7 @@ The overall resource compliance is 95% (19 out of 20).
315
314
> pages in portal are different for enabled initiatives. For more information, see
There are several ways to view aggregated compliance results:
321
320
@@ -335,7 +334,7 @@ So how is the aggregate compliance state determined if multiple resources or pol
335
334
336
335
This means that if there are both non-compliant and compliant states, the rolled up aggregate would be non-compliant, and so on. Let's look at an example.
337
336
338
-
Assume an initiative contains 10 policies, and a resource is exempt from one policy but compliant to the remaining nine. Because a compliant state has a higher rank than an exempted state, the resource would register as compliant in the rolled-up summary of the initiative. So, a resource will only show as exempt for the entire initiative if it is exempt from, or has unknown compliance to, every other single applicable policy in that initiative. On the other extreme, if the resource is non-compliant to at least one applicable policy in the initiative, it will have an overall compliance state of non-compliant, regardless of the remaining applicable policies.
337
+
Assume an initiative contains 10 policies, and a resource is exempt from one policy but compliant to the remaining nine. Because a compliant state has a higher rank than an exempted state, the resource would register as compliant in the rolled-up summary of the initiative. So, a resource will only show as exempt for the entire initiative if it's exempt from, or has unknown compliance to, every other single applicable policy in that initiative. On the other extreme, if the resource is non-compliant to at least one applicable policy in the initiative, it will have an overall compliance state of non-compliant, regardless of the remaining applicable policies.
339
338
340
339
## Portal
341
340
@@ -374,7 +373,7 @@ history.
374
373
Back on the resource compliance page, select and hold (or right-click) on the row of the event you
375
374
would like to gather more details on and select **Show activity logs**. The activity log page opens
376
375
and is pre-filtered to the search showing details for the assignment and the events. The activity
377
-
log provides additional context and information about those events.
376
+
log provides more context and information about those events.
378
377
379
378
:::image type="content" source="../media/getting-compliance-data/compliance-activitylog.png" alt-text="Screenshot of the Activity Log for Azure Policy activities and evaluations." border="false":::
380
379
@@ -392,7 +391,7 @@ Use ARMClient or a similar tool to handle authentication to Azure for the REST A
392
391
393
392
### Summarize results
394
393
395
-
With the REST API, summarization can be performed by container, definition, or assignment. Here is
394
+
With the REST API, summarization can be performed by container, definition, or assignment. Here's
396
395
an example of summarization at the subscription level using Azure Policy Insight's [Summarize For
0 commit comments