Skip to content

Commit 1aebdb4

Browse files
authored
Merge pull request #112138 from DCtheGeek/dmc-policy-fixaliasrefs
Fixing Policy terminology
2 parents 8e43017 + 6f3e925 commit 1aebdb4

File tree

10 files changed

+14
-14
lines changed

10 files changed

+14
-14
lines changed

articles/azure-cache-for-redis/security-baseline.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -860,7 +860,7 @@ https://docs.microsoft.com/azure/role-based-access-control/conditional-access-az
860860

861861
Only secure connections to your Redis Cache should be enabled
862862

863-
How to view available Azure Policy Aliases:
863+
How to view available Azure Policy aliases:
864864
https://docs.microsoft.com/powershell/module/az.resources/get-azpolicyalias?view=azps-3.3.0
865865

866866
How to configure and manage Azure Policy:

articles/batch/security-baseline.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -879,7 +879,7 @@ Benchmark is intended for web applications running on Azure App Service or IaaS
879879

880880
**Guidance**: Use Azure Policy aliases in the "Microsoft.Batch" namespace to create custom policies to audit or enforce the configuration of your Azure Batch accounts and pools.
881881

882-
How to view available Azure Policy Aliases:
882+
How to view available Azure Policy aliases:
883883

884884
https://docs.microsoft.com/powershell/module/az.resources/get-azpolicyalias?view=azps-3.3.0
885885

@@ -901,7 +901,7 @@ https://docs.microsoft.com/azure/governance/policy/tutorials/create-and-manage
901901

902902
### 7.3: Maintain Secure Configurations for all Azure Resources
903903

904-
**Guidance**: Use Azure policy [deny] and [deploy if not exist] to enforce secure settings for the Azure resources related to your Batch account and pools (such as virtual networks, subnets, Azure Firewalls, Azure Storage Accounts, etc.). You may use Azure Policy Aliases from the following namespaces to create custom policies:
904+
**Guidance**: Use Azure policy [deny] and [deploy if not exist] to enforce secure settings for the Azure resources related to your Batch account and pools (such as virtual networks, subnets, Azure Firewalls, Azure Storage Accounts, etc.). You may use Azure Policy aliases from the following namespaces to create custom policies:
905905

906906
- Microsoft.Batch
907907

@@ -989,7 +989,7 @@ https://docs.microsoft.com/azure/governance/policy/tutorials/create-and-manage
989989

990990
- Diagnostic logs in Batch accounts should be enabled
991991

992-
How to view available Azure Policy Aliases: https://docs.microsoft.com/powershell/module/az.resources/get-azpolicyalias?view=azps-3.3.0
992+
How to view available Azure Policy aliases: https://docs.microsoft.com/powershell/module/az.resources/get-azpolicyalias?view=azps-3.3.0
993993

994994
How to configure and manage Azure Policy: https://docs.microsoft.com/azure/governance/policy/tutorials/create-and-manage
995995

articles/cosmos-db/security-baseline.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -788,7 +788,7 @@ How to configure Conditional Access to block access to Azure Resource Manager: h
788788

789789
- Cosmos DB should use a virtual network service endpoint
790790

791-
How to view available Azure Policy Aliases: https://docs.microsoft.com/powershell/module/az.resources/get-azpolicyalias?view=azps-3.3.0
791+
How to view available Azure Policy aliases: https://docs.microsoft.com/powershell/module/az.resources/get-azpolicyalias?view=azps-3.3.0
792792

793793
How to configure and manage Azure Policy: https://docs.microsoft.com/azure/governance/policy/tutorials/create-and-manage
794794

articles/event-hubs/security-baseline.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -776,7 +776,7 @@ How to configure Conditional Access to block access to Azure Resource Manager: h
776776

777777
Azure Built-in Policy for Event Hubs namespace:​ https://docs.microsoft.com/azure/governance/policy/samples/built-in-policies#event-hub
778778

779-
How to view available Azure Policy Aliases: https://docs.microsoft.com/powershell/module/az.resources/get-azpolicyalias?view=azps-3.3.0
779+
How to view available Azure Policy aliases: https://docs.microsoft.com/powershell/module/az.resources/get-azpolicyalias?view=azps-3.3.0
780780

781781
How to configure and manage Azure Policy: https://docs.microsoft.com/azure/governance/policy/tutorials/create-and-manage
782782

articles/hdinsight/security-baseline.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -140,7 +140,7 @@ https://docs.microsoft.com/azure/virtual-network/security-overview#service-tags
140140

141141
You may also use Azure Blueprints to simplify large scale Azure deployments by packaging key environment artifacts, such as Azure Resource Manager templates, RBAC controls, and policies, in a single blueprint definition. Easily apply the blueprint to new subscriptions and environments, and fine-tune control and management through versioning.
142142

143-
How to view available Azure Policy Aliases:
143+
How to view available Azure Policy aliases:
144144

145145
https://docs.microsoft.com/powershell/module/az.resources/get-azpolicyalias?view=azps-3.3.0
146146

@@ -939,7 +939,7 @@ How to configure Conditional Access to block access to Azure Resource Manager: h
939939

940940
**Guidance**: Use Azure Policy aliases in the "Microsoft.HDInsight" namespace to create custom policies to audit or enforce the network configuration of your HDInsight cluster.
941941

942-
How to view available Azure Policy Aliases:
942+
How to view available Azure Policy aliases:
943943

944944
https://docs.microsoft.com/powershell/module/az.resources/get-azpolicyalias?view=azps-3.3.0
945945

@@ -1033,7 +1033,7 @@ https://docs.microsoft.com/azure/governance/policy/tutorials/create-and-manage
10331033

10341034
**Guidance**: Use Azure Policy aliases in the "Microsoft.HDInsight" namespace to create custom policies to audit or enforce the configuration of your HDInsight cluster.
10351035

1036-
How to view available Azure Policy Aliases:
1036+
How to view available Azure Policy aliases:
10371037

10381038
https://docs.microsoft.com/powershell/module/az.resources/get-azpolicyalias?view=azps-3.3.0
10391039

articles/key-vault/general/security-baseline.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -880,7 +880,7 @@ Deploy Diagnostic Settings for Key Vault to Event Hub
880880

881881
Use recommendations from Azure Security Center as a secure configuration baseline for your Azure Key Vault instances.
882882

883-
How to view available Azure Policy Aliases:
883+
How to view available Azure Policy aliases:
884884

885885
https://docs.microsoft.com/powershell/module/az.resources/get-azpolicyalias?view=azps-3.3.0
886886

articles/mariadb/security-baseline.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -780,7 +780,7 @@ How to configure Conditional Access to block access to Azure Resource Manager: h
780780

781781
- Geo-redundant backup should be enabled for Azure Database for MariaDB
782782

783-
How to view available Azure Policy Aliases: https://docs.microsoft.com/powershell/module/az.resources/get-azpolicyalias?view=azps-3.3.0
783+
How to view available Azure Policy aliases: https://docs.microsoft.com/powershell/module/az.resources/get-azpolicyalias?view=azps-3.3.0
784784

785785
How to configure and manage Azure Policy: https://docs.microsoft.com/azure/governance/policy/tutorials/create-and-manage
786786

articles/mysql/security-baseline.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -793,7 +793,7 @@ How to configure Conditional Access to block access to Azure Resource Manager: h
793793

794794
Enforce SSL connection should be enabled for MySQL database servers
795795

796-
How to view available Azure Policy Aliases: https://docs.microsoft.com/powershell/module/az.resources/get-azpolicyalias?view=azps-3.3.0
796+
How to view available Azure Policy aliases: https://docs.microsoft.com/powershell/module/az.resources/get-azpolicyalias?view=azps-3.3.0
797797

798798
How to configure and manage Azure Policy: https://docs.microsoft.com/azure/governance/policy/tutorials/create-and-manage
799799

articles/postgresql/security-baseline.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -794,7 +794,7 @@ How to configure Conditional Access to block access to Azure Resource Manager: h
794794

795795
- Log connections should be enabled for PostgreSQL database servers
796796

797-
How to view available Azure Policy Aliases: https://docs.microsoft.com/powershell/module/az.resources/get-azpolicyalias?view=azps-3.3.0
797+
How to view available Azure Policy aliases: https://docs.microsoft.com/powershell/module/az.resources/get-azpolicyalias?view=azps-3.3.0
798798

799799
How to configure and manage Azure Policy: https://docs.microsoft.com/azure/governance/policy/tutorials/create-and-manage
800800

articles/security/benchmarks/security-control-secure-configuration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ Also, Azure Resource Manager has the ability to export the template in JavaScrip
2626

2727
You may also use recommendations from Azure Security Center as a secure configuration baseline for your Azure resources.
2828

29-
- [How to view available Azure Policy Aliases](https://docs.microsoft.com/powershell/module/az.resources/get-azpolicyalias?view=azps-3.3.0)
29+
- [How to view available Azure Policy aliases](https://docs.microsoft.com/powershell/module/az.resources/get-azpolicyalias?view=azps-3.3.0)
3030

3131
- [Tutorial: Create and manage policies to enforce compliance](https://docs.microsoft.com/azure/governance/policy/tutorials/create-and-manage)
3232

0 commit comments

Comments
 (0)