Skip to content

Commit 12691f9

Browse files
authored
Merge pull request #110819 from mgreenegit/mgreenegit-style-0
resolve most acro style issues
2 parents b722161 + a223293 commit 12691f9

File tree

1 file changed

+19
-29
lines changed

1 file changed

+19
-29
lines changed

articles/governance/policy/concepts/guest-configuration.md

Lines changed: 19 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ applicable policy assignment and the corresponding configuration definition.
2626
### Limits set on the extension
2727

2828
To limit the extension from impacting applications running inside the machine, the Guest
29-
Configuration isn't allowed to exceed more than 5% of CPU utilization. This limitation exists for
29+
Configuration isn't allowed to exceed more than 5% of CPU. This limitation exists for
3030
both built-in and custom definitions.
3131

3232
## Register Guest Configuration resource provider
@@ -78,8 +78,7 @@ Windows Server Nano Server isn't supported in any version.
7878
## Guest Configuration Extension network requirements
7979

8080
To communicate with the Guest Configuration resource provider in Azure, machines require outbound
81-
access to Azure datacenters on port **443**. If you're using a private virtual network in Azure that
82-
doesn't allow outbound traffic, configure exceptions with [Network Security
81+
access to Azure datacenters on port **443**. If a network in Azure doesn't allow outbound traffic, configure exceptions with [Network Security
8382
Group](../../../virtual-network/manage-network-security-group.md#create-a-security-rule) rules.
8483
The [service tag](../../../virtual-network/service-tags-overview.md)
8584
"GuestAndHybridManagement" can be used to reference the Guest Configuration service.
@@ -97,9 +96,7 @@ enable a system assigned managed identity, if one doesn't exist.
9796
## Guest Configuration definition requirements
9897

9998
Each audit run by Guest Configuration requires two policy definitions, a **DeployIfNotExists**
100-
definition and an **AuditIfNotExists** definition. The **DeployIfNotExists** definition is used to
101-
prepare the machine with the Guest Configuration agent and other components to support the
102-
[validation tools](#validation-tools).
99+
definition and an **AuditIfNotExists** definition.
103100

104101
The **DeployIfNotExists** policy definition validates and corrects the following items:
105102

@@ -114,7 +111,7 @@ If the **DeployIfNotExists** assignment is Non-compliant, a [remediation
114111
task](../how-to/remediate-resources.md#create-a-remediation-task) can be used.
115112

116113
Once the **DeployIfNotExists** assignment is Compliant, the **AuditIfNotExists** policy assignment
117-
uses the local validation tools to determine if the configuration assignment is Compliant or
114+
determines if the guest assignment is Compliant or
118115
Non-compliant. The validation tool provides the results to the Guest Configuration client. The
119116
client forwards the results to the Guest Extension, which makes them available through the Guest
120117
Configuration resource provider.
@@ -129,33 +126,29 @@ data](../how-to/get-compliance-data.md).
129126
> resources as status.
130127
131128
All built-in policies for Guest Configuration are included in an initiative to group the definitions
132-
for use in assignments. The built-in initiative named _\[Preview\]: Audit Password security settings
129+
for use in assignments. The built-in initiative named _\[Preview\]: Audit Password security
133130
inside Linux and Windows machines_ contains 18 policies. There are six **DeployIfNotExists** and
134131
**AuditIfNotExists** pairs for Windows and three pairs for Linux. The
135132
[policy definition](definition-structure.md#policy-rule) logic validates that only the target
136133
operating system is evaluated.
137134

138135
#### Auditing operating system settings following industry baselines
139136

140-
One of the initiatives available in Azure Policy provides the ability to audit operating system
141-
settings inside virtual machines following a "baseline" from Microsoft. The definition,
137+
One initiative in Azure Policy provides the ability to audit operating system
138+
settings following a "baseline". The definition,
142139
_\[Preview\]: Audit Windows VMs that do not match Azure security baseline settings_ includes a
143-
complete set of audit rules based on settings from Active Directory Group Policy.
140+
set of rules based on Active Directory Group Policy.
144141

145-
Most of the settings are available as parameters. This functionality allows you to customize what is
146-
audited to align the policy with your organizational requirements or to map the policy to
142+
Most of the settings are available as parameters. Parameters allow you to customize what is
143+
audited. Align the policy with your requirements or map the policy to
147144
third-party information such as industry regulatory standards.
148145

149-
Some parameters support an integer value range. For example, the Maximum Password Age parameter can
150-
be set using a range operator to give flexibility to machine owners. You could audit that the
151-
effective Group Policy setting requiring users to change their passwords should be no more than 70
152-
days, but shouldn't be less than one day. As described in the info-bubble for the parameter, to make
153-
this business policy the effective audit value, set the value to "1,70".
146+
Some parameters support an integer value range. For example, the Maximum Password Age setting could audit the
147+
effective Group Policy setting. A "1,70" range would confirm that users are required to change their passwords at least every 70
148+
days, but no less than one day.
154149

155-
If you assign the policy using an Azure Resource Manager deployment template, you can use a
156-
parameters file to manage these settings from source control. Using a tool such as Git to manage
157-
changes to Audit policies with comments at each check-in documents evidence as to why an assignment
158-
should be an exception to the expected value.
150+
If you assign the policy using an Azure Resource Manager deployment template, use a parameters file to manage exceptions. Check in the files to a version control system such as Git. Comments about file changes provide evidence why an assignment
151+
is an exception to the expected value.
159152

160153
#### Applying configurations using Guest Configuration
161154

@@ -197,9 +190,7 @@ If that isn't successful, collecting client logs can help diagnose issues.
197190

198191
#### Windows
199192

200-
To use the Azure VM Run Command capability to capture information from log files in Windows
201-
machines, the following example PowerShell script can be helpful. For more information, see
202-
[Run PowerShell scripts in your Windows VM with Run Command](../../../virtual-machines/windows/run-command.md).
193+
Capture information from log files using [Azure VM Run Command](../../../virtual-machines/windows/run-command.md), the following example PowerShell script can be helpful.
203194

204195
```powershell
205196
$linesToIncludeBeforeMatch = 0
@@ -210,9 +201,8 @@ Select-String -Path $logPath -pattern 'DSCEngine','DSCManagedEngine' -CaseSensit
210201

211202
#### Linux
212203

213-
To use the Azure VM Run Command capability to capture information from log files in Linux machines,
214-
the following example Bash script can be helpful. For more information, see
215-
[Run shell scripts in your Linux VM with Run Command](../../../virtual-machines/linux/run-command.md)
204+
Capture information from log files using [Azure VM Run Command](../../../virtual-machines/linux/run-command.md),
205+
the following example Bash script can be helpful.
216206

217207
```Bash
218208
linesToIncludeBeforeMatch=0
@@ -223,7 +213,7 @@ egrep -B $linesToIncludeBeforeMatch -A $linesToIncludeAfterMatch 'DSCEngine|DSCM
223213

224214
## Guest Configuration samples
225215

226-
Source for the Policy Guest Configuration built-in initiatives are available in the following
216+
Guest Configuration built-in policy samples are available in the following
227217
locations:
228218

229219
- [Built-in policy definitions - Guest Configuration](../samples/built-in-policies.md#guest-configuration)

0 commit comments

Comments
 (0)