Skip to content

Commit 3eb989f

Browse files
committed
Clarify remediation scope and updating initiatives
1 parent 80a5ae7 commit 3eb989f

File tree

2 files changed

+13
-6
lines changed

2 files changed

+13
-6
lines changed

articles/governance/policy/concepts/definition-structure.md

Lines changed: 9 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Details of the policy definition structure
33
description: Describes how policy definitions are used to establish conventions for Azure resources in your organization.
4-
ms.date: 11/26/2019
4+
ms.date: 02/26/2020
55
ms.topic: conceptual
66
---
77
# Azure Policy definition structure
@@ -852,6 +852,10 @@ management because you work with a group as a single item. For example, you can
852852
tagging policy definitions into a single initiative. Rather than assigning each policy individually,
853853
you apply the initiative.
854854

855+
> [!NOTE]
856+
> Once an initiative is assigned, initative level parameters can't be altered. Due to this, the
857+
> recommendation is to set a **defaultValue** when defining the parameter.
858+
855859
The following example illustrates how to create an initiative for handling two tags: `costCenter`
856860
and `productName`. It uses two built-in policies to apply the default tag value.
857861

@@ -866,13 +870,15 @@ and `productName`. It uses two built-in policies to apply the default tag value.
866870
"type": "String",
867871
"metadata": {
868872
"description": "required value for Cost Center tag"
869-
}
873+
},
874+
"defaultValue": "DefaultCostCenter"
870875
},
871876
"productNameValue": {
872877
"type": "String",
873878
"metadata": {
874879
"description": "required value for product Name tag"
875-
}
880+
},
881+
"defaultValue": "DefaultProduct"
876882
}
877883
},
878884
"policyDefinitions": [{

articles/governance/policy/how-to/remediate-resources.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,16 +1,17 @@
11
---
22
title: Remediate non-compliant resources
33
description: This guide walks you through the remediation of resources that are non-compliant to policies in Azure Policy.
4-
ms.date: 09/09/2019
4+
ms.date: 02/26/2020
55
ms.topic: how-to
66
---
77
# Remediate non-compliant resources with Azure Policy
88

99
Resources that are non-compliant to a **deployIfNotExists** or **modify** policy can be put into a
1010
compliant state through **Remediation**. Remediation is accomplished by instructing Azure Policy to
1111
run the **deployIfNotExists** effect or the tag **operations** of the assigned policy on your
12-
existing resources. This article shows the steps needed to understand and accomplish remediation
13-
with Azure Policy.
12+
existing resources, whether that assignment is to a management group, a subscription, a resource
13+
group, or an individual resource. This article shows the steps needed to understand and accomplish
14+
remediation with Azure Policy.
1415

1516
## How remediation security works
1617

0 commit comments

Comments
 (0)