1
1
---
2
- title : Understand how to audit the contents of a virtual machine
3
- description : Learn how Azure Policy uses Guest Configuration to audit settings inside an Azure virtual machine.
2
+ title : Understand how to audit the contents of a machine
3
+ description : Learn how Azure Policy uses Guest Configuration to audit settings inside an Azure machine.
4
4
author : DCtheGeek
5
5
ms.author : dacoulte
6
6
ms.date : 03/18/2019
@@ -12,7 +12,7 @@ ms.custom: seodec18
12
12
# Understand Azure Policy's Guest Configuration
13
13
14
14
In addition to auditing and [ remediating] ( ../how-to/remediate-resources.md ) Azure resources, Azure
15
- Policy can audit settings inside a virtual machine. The validation is performed by the Guest
15
+ Policy can audit settings inside a machine. The validation is performed by the Guest
16
16
Configuration extension and client. The extension, through the client, validates settings such as
17
17
the configuration of the operating system, application configuration or presence, environment
18
18
settings, and more.
@@ -24,7 +24,7 @@ It is not yet possible to apply configurations.
24
24
25
25
## Extension and client
26
26
27
- To audit settings inside a virtual machine, a [ virtual machine
27
+ To audit settings inside a machine, a [ virtual machine
28
28
extension] ( ../../../virtual-machines/extensions/overview.md ) is enabled. The extension downloads
29
29
applicable policy assignment and the corresponding configuration definition.
30
30
@@ -67,7 +67,7 @@ Register-AzResourceProvider -ProviderNamespace 'Microsoft.GuestConfiguration'
67
67
68
68
## Validation tools
69
69
70
- Inside the virtual machine, the Guest Configuration client uses local tools to run the audit.
70
+ Inside the machine, the Guest Configuration client uses local tools to run the audit.
71
71
72
72
The following table shows a list of the local tools used on each supported operating system:
73
73
@@ -85,7 +85,7 @@ trigger](../how-to/get-compliance-data.md#evaluation-triggers) occurs, the state
85
85
written to the Guest Configuration resource provider. This causes Azure Policy to evaluate the Azure
86
86
Resource Manager properties. An on-demand Azure Policy evaluation retrieves the latest value from
87
87
the Guest Configuration resource provider. However, it doesn't trigger a new audit of the
88
- configuration within the virtual machine.
88
+ configuration within the machine.
89
89
90
90
## Supported client types
91
91
@@ -112,7 +112,7 @@ Windows Server Nano Server is not supported in any version.
112
112
113
113
## Guest Configuration Extension network requirements
114
114
115
- To communicate with the Guest Configuration resource provider in Azure, virtual machines require
115
+ To communicate with the Guest Configuration resource provider in Azure, machines require
116
116
outbound access to Azure datacenters on port ** 443** . If you're using a private virtual network in
117
117
Azure and don't allow outbound traffic, exceptions must be configured using [ Network Security
118
118
Group] ( ../../../virtual-network/manage-network-security-group.md#create-a-security-rule ) rules. At
@@ -137,14 +137,14 @@ outbound access to the IPs in the regions where your VMs are deployed.
137
137
138
138
Each audit run by Guest Configuration requires two policy definitions, a ** DeployIfNotExists**
139
139
definition and an ** AuditIfNotExists** definition. The ** DeployIfNotExists** definition is used to prepare the
140
- virtual machine with the Guest Configuration agent and other components to support the [ validation
140
+ machine with the Guest Configuration agent and other components to support the [ validation
141
141
tools] ( #validation-tools ) .
142
142
143
143
The ** DeployIfNotExists** policy definition validates and corrects the following items:
144
144
145
- - Validate the virtual machine has been assigned a configuration to evaluate. If no assignment is
146
- currently present, get the assignment and prepare the virtual machine by:
147
- - Authenticating to the virtual machine using a [ managed identity] ( ../../../active-directory/managed-identities-azure-resources/overview.md )
145
+ - Validate the machine has been assigned a configuration to evaluate. If no assignment is
146
+ currently present, get the assignment and prepare the machine by:
147
+ - Authenticating to the machine using a [ managed identity] ( ../../../active-directory/managed-identities-azure-resources/overview.md )
148
148
- Installing the latest version of the ** Microsoft.GuestConfiguration** extension
149
149
- Installing [ validation tools] ( #validation-tools ) and dependencies, if needed
150
150
@@ -167,15 +167,15 @@ data](../how-to/getting-compliance-data.md).
167
167
168
168
All built-in policies for Guest Configuration are included in an initiative to group the definitions
169
169
for use in assignments. The built-in initiative named * [ Preview] : Audit Password security settings
170
- inside Linux and Windows virtual machines* contains 18 policies. There are six ** DeployIfNotExists**
170
+ inside Linux and Windows machines* contains 18 policies. There are six ** DeployIfNotExists**
171
171
and ** AuditIfNotExists** pairs for Windows and three pairs for Linux. In each case, the logic inside the
172
172
definition validates only the target operating system is evaluated based on the [ policy rule] ( definition-structure.md#policy-rule )
173
173
definition.
174
174
175
175
### Multiple assignments
176
176
177
177
Guest Configuration policies currently only support assigning the same Guest Assignment once
178
- per virtual machine, even if the Policy assignment uses different parameters.
178
+ per machine, even if the Policy assignment uses different parameters.
179
179
180
180
## Client log files
181
181
0 commit comments