@@ -10,7 +10,7 @@ The first step in understanding compliance in Azure is to identify the status of
10
10
This quickstart steps you through the process of creating a policy assignment to identify virtual
11
11
machines that aren't using managed disks.
12
12
13
- At the end of this process, you'll successfully identify virtual machines that aren't using managed
13
+ At the end of this process, you identify virtual machines that aren't using managed
14
14
disks. They're _ non-compliant_ with the policy assignment.
15
15
16
16
REST API is used to create and manage Azure resources. This guide uses REST API to create a policy
@@ -22,12 +22,8 @@ assignment and to identify non-compliant resources in your Azure environment.
22
22
account before you begin.
23
23
24
24
- If you haven't already, install [ ARMClient] ( https://github.com/projectkudu/ARMClient ) . It's a tool
25
- that sends HTTP requests to Azure Resource Manager-based REST APIs. You can also use the "Try It"
26
- feature in REST documentation or tooling like PowerShell's
27
- [ Invoke-RestMethod] ( /powershell/module/microsoft.powershell.utility/invoke-restmethod ) or
28
- [ Postman] ( https://www.postman.com ) .
29
-
30
- [ !INCLUDE [ cloud-shell-try-it.md] ( ../../../includes/cloud-shell-try-it.md )]
25
+ that sends HTTP requests to Azure Resource Manager-based REST APIs. You can also use tooling like PowerShell's
26
+ [ Invoke-RestMethod] ( /powershell/module/microsoft.powershell.utility/invoke-restmethod ) .
31
27
32
28
## Create a policy assignment
33
29
@@ -63,29 +59,29 @@ Run the following command to create a policy assignment:
63
59
The preceding endpoint and request body uses the following information:
64
60
65
61
REST API URI:
66
- - **Scope** - A scope determines what resources or grouping of resources the policy assignment gets
62
+ - **Scope** - A scope determines which resources or group of resources the policy assignment gets
67
63
enforced on. It could range from a management group to an individual resource. Be sure to replace
68
64
`{scope}` with one of the following patterns:
69
65
- Management group: `/providers/Microsoft.Management/managementGroups/{managementGroup}`
70
66
- Subscription: `/subscriptions/{subscriptionId}`
71
67
- Resource group: `/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}`
72
68
- Resource: `/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/{resourceProviderNamespace}/[{parentResourcePath}/]{resourceType}/{resourceName}`
73
- - **Name** - The actual name of the assignment. For this example, _audit-vm-manageddisks_ was used.
69
+ - **Name** - The name of the assignment. For this example, _audit-vm-manageddisks_ was used.
74
70
75
71
Request Body:
76
72
- **DisplayName** - Display name for the policy assignment. In this case, you're using _Audit VMs
77
73
without managed disks Assignment_.
78
74
- **Description** - A deeper explanation of what the policy does or why it's assigned to this scope.
79
75
- **policyDefinitionId** - The policy definition ID, based on which you're using to create the
80
- assignment. In this case, it's the ID of policy definition _Audit VMs that do not use managed
76
+ assignment. In this case, it's the ID of policy definition _Audit VMs that don't use managed
81
77
disks_.
82
78
- **nonComplianceMessages** - Set the message seen when a resource is denied due to non-compliance
83
79
or evaluated to be non-compliant. For more information, see
84
80
[assignment non-compliance messages](./concepts/assignment-structure.md#non-compliance-messages).
85
81
86
82
## Identify non-compliant resources
87
83
88
- To view the resources that aren't compliant under this new assignment, run the following command to
84
+ To view the non-compliant resources that aren't compliant under this new assignment, run the following command to
89
85
get the resource IDs of the non-compliant resources that are output into a JSON file:
90
86
91
87
```http
@@ -118,8 +114,7 @@ Your results resemble the following example:
118
114
}
119
115
```
120
116
121
- The results are comparable to what you'd typically see listed under ** Non-compliant resources** in
122
- the Azure portal view.
117
+ The results are comparable to what you'd typically see listed under ** Non-compliant resources** in the Azure portal view.
123
118
124
119
## Clean up resources
125
120
@@ -133,11 +128,9 @@ Replace `{scope}` with the scope you used when you first created the policy assi
133
128
134
129
## Next steps
135
130
136
- In this quickstart, you assigned a policy definition to identify non-compliant resources in your
137
- Azure environment.
131
+ In this quickstart, you assigned a policy definition to identify non-compliant resources in your Azure environment.
138
132
139
- To learn more about assigning policies to validate that new resources are compliant, continue to the
140
- tutorial for:
133
+ To learn more about assigning policies to validate that new resources are compliant, continue to the tutorial for:
141
134
142
135
> [ !div class="nextstepaction"]
143
136
> [ Creating and managing policies] ( ./tutorials/create-and-manage.md )
0 commit comments