You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
All built-in policies for Guest Configuration are included in an initiative to group the definitions
132
-
for use in assignments. The built-in initiative named _\[Preview\]: Audit Password security settings
129
+
for use in assignments. The built-in initiative named _\[Preview\]: Audit Password security
133
130
inside Linux and Windows machines_ contains 18 policies. There are six **DeployIfNotExists** and
134
131
**AuditIfNotExists** pairs for Windows and three pairs for Linux. The
135
132
[policy definition](definition-structure.md#policy-rule) logic validates that only the target
136
133
operating system is evaluated.
137
134
138
135
#### Auditing operating system settings following industry baselines
139
136
140
-
One of the initiatives available in Azure Policy provides the ability to audit operating system
141
-
settings inside virtual machines following a "baseline" from Microsoft. The definition,
137
+
One initiative in Azure Policy provides the ability to audit operating system
138
+
settings following a "baseline". The definition,
142
139
_\[Preview\]: Audit Windows VMs that do not match Azure security baseline settings_ includes a
143
-
complete set of audit rules based on settings from Active Directory Group Policy.
140
+
set of rules based on Active Directory Group Policy.
144
141
145
-
Most of the settings are available as parameters. This functionality allows you to customize what is
146
-
audited to align the policy with your organizational requirements or to map the policy to
142
+
Most of the settings are available as parameters. Parameters allow you to customize what is
143
+
audited. Align the policy with your requirements or map the policy to
147
144
third-party information such as industry regulatory standards.
148
145
149
-
Some parameters support an integer value range. For example, the Maximum Password Age parameter can
150
-
be set using a range operator to give flexibility to machine owners. You could audit that the
151
-
effective Group Policy setting requiring users to change their passwords should be no more than 70
152
-
days, but shouldn't be less than one day. As described in the info-bubble for the parameter, to make
153
-
this business policy the effective audit value, set the value to "1,70".
146
+
Some parameters support an integer value range. For example, the Maximum Password Age setting could audit the
147
+
effective Group Policy setting. A "1,70" range would confirm that users are required to change their passwords at least every 70
148
+
days, but no less than one day.
154
149
155
-
If you assign the policy using an Azure Resource Manager deployment template, you can use a
156
-
parameters file to manage these settings from source control. Using a tool such as Git to manage
157
-
changes to Audit policies with comments at each check-in documents evidence as to why an assignment
158
-
should be an exception to the expected value.
150
+
If you assign the policy using an Azure Resource Manager deployment template, use a parameters file to manage exceptions. Check in the files to a version control system such as Git. Comments about file changes provide evidence why an assignment
151
+
is an exception to the expected value.
159
152
160
153
#### Applying configurations using Guest Configuration
161
154
@@ -197,9 +190,7 @@ If that isn't successful, collecting client logs can help diagnose issues.
197
190
198
191
#### Windows
199
192
200
-
To use the Azure VM Run Command capability to capture information from log files in Windows
201
-
machines, the following example PowerShell script can be helpful. For more information, see
202
-
[Run PowerShell scripts in your Windows VM with Run Command](../../../virtual-machines/windows/run-command.md).
193
+
Capture information from log files using [Azure VM Run Command](../../../virtual-machines/windows/run-command.md), the following example PowerShell script can be helpful.
0 commit comments