Skip to content

Commit 1df3524

Browse files
Merge pull request #273463 from davidsmatlak/ds-update-policy-effect-basics-20240425
Edit Azure Policy effect and fixes typos
2 parents 2ca0a85 + 80960b9 commit 1df3524

File tree

2 files changed

+7
-7
lines changed

2 files changed

+7
-7
lines changed

articles/governance/policy/concepts/definition-structure-policy-rule.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,17 @@
11
---
22
title: Details of the policy definition structure policy rules
33
description: Describes how policy definition policy rules are used to establish conventions for Azure resources in your organization.
4-
ms.date: 04/01/2024
4+
ms.date: 04/25/2024
55
ms.topic: conceptual
66
---
77

88
# Azure Policy definition structure policy rule
99

1010
The policy rule consists of `if` and `then` blocks. In the `if` block, you define one or more conditions that specify when the policy is enforced. You can apply logical operators to these conditions to precisely define the scenario for a policy.
1111

12-
For complete details on each effect, order of evaluation, properties, and examples, see [Understanding Azure Policy Effects](effects.md).
12+
For complete details on each effect, order of evaluation, properties, and examples, see [Azure Policy definitions effect basics](effect-basics.md).
1313

14-
In the `then` block, you define the effect that happens when the `if conditions are fulfilled.
14+
In the `then` block, you define the effect that happens when the `if` conditions are fulfilled.
1515

1616
```json
1717
{

articles/governance/policy/concepts/effect-basics.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
---
22
title: Azure Policy definitions effect basics
33
description: Azure Policy definitions effect basics determine how compliance is managed and reported.
4-
ms.date: 04/08/2024
4+
ms.date: 04/25/2024
55
ms.topic: conceptual
66
---
77

88
# Azure Policy definitions effect basics
99

10-
Each policy definition in Azure Policy has a single `effect`. That `effect` determines what happens when the policy rule is evaluated to match. The effects behave differently if they are for a new resource, an updated resource, or an existing resource.
10+
Each policy definition in Azure Policy has a single `effect` in its `policyRule`. That `effect` determines what happens when the policy rule is evaluated to match. The effects behave differently if they are for a new resource, an updated resource, or an existing resource.
1111

1212
The following are the supported Azure Policy definition effects:
1313

@@ -25,13 +25,13 @@ The following are the supported Azure Policy definition effects:
2525

2626
## Interchanging effects
2727

28-
Sometimes multiple effects can be valid for a given policy definition. Parameters are often used to specify allowed effect values so that a single definition can be more versatile. However, it's important to note that not all effects are interchangeable. Resource properties and logic in the policy rule can determine whether a certain effect is considered valid to the policy definition. For example, policy definitions with effect `auditIfNotExists` require other details in the policy rule that aren't required for policies with effect `audit`. The effects also behave differently. `audit` policies assess a resource's compliance based on its own properties, while `auditIfNotExists policies assess a resource's compliance based on a child or extension resource's properties.
28+
Sometimes multiple effects can be valid for a given policy definition. Parameters are often used to specify allowed effect values (`allowedValues`) so that a single definition can be more versatile during assignment. However, it's important to note that not all effects are interchangeable. Resource properties and logic in the policy rule can determine whether a certain effect is considered valid to the policy definition. For example, policy definitions with effect `auditIfNotExists` require other details in the policy rule that aren't required for policies with effect `audit`. The effects also behave differently. `audit` policies assess a resource's compliance based on its own properties, while `auditIfNotExists` policies assess a resource's compliance based on a child or extension resource's properties.
2929

3030
The following list is some general guidance around interchangeable effects:
3131

3232
- `audit`, `deny`, and either `modify` or `append` are often interchangeable.
3333
- `auditIfNotExists` and `deployIfNotExists` are often interchangeable.
34-
- `Manual` isn't interchangeable.
34+
- `manual` isn't interchangeable.
3535
- `disabled` is interchangeable with any effect.
3636

3737
## Order of evaluation

0 commit comments

Comments
 (0)