You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
"description": "Enable or disable the execution of the policy"
166
-
},
167
-
"allowedValues": [
168
-
"Audit",
169
-
"Deny",
170
-
"Disabled"
171
-
],
172
-
"defaultValue": "Audit"
173
-
}
174
-
}
175
-
}
176
-
```
177
-
1. Select **Save**
178
-
1. Select **Assign**
122
+
- Define the scope of the policy by choosing the subscription and resource group over which the policy will be enforced. Select by clicking the three-dot button at on **Scope** field.
123
+
- Select the name of the policy definition: "[[Preview]: Azure Key Vault should use RBAC permission model](https://portal.azure.com/#view/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F12d4fa5e-1f9f-4c21-97a9-b99b3c6611b5)"
124
+
- Go to the **Parameters** tab at the top of the page and define the desired effect of the policy (Audit, Deny, or Disabled).
125
+
1. Fill out any additional fields. Navigate the tabs clicking on **Previous** and **Next** buttons at the bottom of the page.
179
126
1. Select **Review + create**
180
127
1. Select **Create**
181
128
182
-
Once a new policy is assigned, it can take up to 24 hours to complete the scan. After the scan is completed, you can see compliance results like below.
129
+
Once the built-in policy is assigned, it can take up to 24 hours to complete the scan. After the scan is completed, you can see compliance results like below.
0 commit comments