Skip to content

Commit 44087be

Browse files
committed
acrolinx
1 parent 7fb860f commit 44087be

File tree

1 file changed

+11
-11
lines changed

1 file changed

+11
-11
lines changed

articles/network-watcher/nsg-flow-logs-policy-portal.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -14,9 +14,9 @@ ms.custom: engagement-fy23
1414

1515
# Deploy and manage NSG flow logs using Azure Policy
1616

17-
Azure Policy helps to enforce organizational standards and to assess compliance at scale. Common use cases for Azure Policy include implementing governance for resource consistency, regulatory compliance, security, cost, and management. In this article, we will use two built-in policies available for NSG Flow Logs to manage your flow logs setup. The first policy flags any NSGs without flow logs enabled. The second policy automatically deploys Flow logs for NSGs without Flow logs enabled.
17+
Azure Policy helps to enforce organizational standards and to assess compliance at scale. Common use cases for Azure Policy include implementing governance for resource consistency, regulatory compliance, security, cost, and management. In this article, we'll use two built-in policies available for NSG Flow Logs to manage your flow logs setup. The first policy flags any NSGs without flow logs enabled. The second policy automatically deploys Flow logs for NSGs without Flow logs enabled.
1818

19-
If you are creating an Azure Policy definition for the first time, you can read through:
19+
If you're creating an Azure Policy definition for the first time, you can read through:
2020
- [Azure Policy overview](../governance/policy/overview.md)
2121
- [Tutorial for creating an Azure Policy assignment](../governance/policy/assign-policy-portal.md#create-a-policy-assignment).
2222

@@ -32,11 +32,11 @@ Navigate to the Azure Policy page by searching for Policy in the top search bar
3232

3333
![Assignments Tab](./media/network-watcher-builtin-policy/2_assignments-tab.png)
3434

35-
3. Click on **Assign Policy** button
35+
3. Select **Assign Policy** button
3636

3737
![Assign Policy Button](./media/network-watcher-builtin-policy/3_assign-policy-button.png)
3838

39-
4. Click the three dots menu under "Policy Definitions" to see available policies
39+
4. Select the three dots menu under "Policy Definitions" to see available policies
4040

4141
5. Use the Type filter and choose "Built-in". Then search for "Flow log"
4242

@@ -54,7 +54,7 @@ There are separate instructions for each policy below.
5454

5555
### How the policy works
5656

57-
The policy checks all existing ARM objects of type “Microsoft.Network/networkSecurityGroups”, that is it looks at all NSGs in a given scope, and checks for the existence of linked Flow logs via the Flow Logs property of the NSG. If the property does not exist, the NSG is flagged.
57+
The policy checks all existing ARM objects of type “Microsoft.Network/networkSecurityGroups”, that is it looks at all NSGs in a given scope, and checks for the existence of linked Flow logs via the Flow Logs property of the NSG. If the property doesn't exist, the NSG is flagged.
5858

5959
If you want to see the full definition of the policy, you can visit the [Definitions tab](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyMenuBlade/Definitions) and search for "Flow logs" to find the policy
6060

@@ -66,9 +66,9 @@ If you want to see the full definition of the policy, you can visit the [Definit
6666
- Policy Definition: Should be chosen as shown in the "Locate the policies" section.
6767
- AssignmentName: Choose a descriptive name
6868

69-
2. Click on "Review + Create" to review your assignment
69+
2. Select "Review + Create" to review your assignment
7070

71-
The policy does not require any parameters. As you are assigning an audit policy, you do not need to fill in the details in the "Remediation" tab.
71+
The policy doesn't require any parameters. As you're assigning an audit policy, you don't need to fill in the details in the "Remediation" tab.
7272

7373
![Audit Policy Review](./media/network-watcher-builtin-policy/5_1_audit-policy-review.png)
7474

@@ -83,7 +83,7 @@ You should see something similar to the following screenshot once your policy ru
8383

8484
### Policy Structure
8585

86-
The policy checks all existing ARM objects of type “Microsoft.Network/networkSecurityGroups”, that is it looks at all NSGs in a given scope, and checks for the existence of linked Flow logs via the Flow Logs property of the NSG. If the property does not exist, the policy deploys a Flow log.
86+
The policy checks all existing ARM objects of type “Microsoft.Network/networkSecurityGroups”, that is it looks at all NSGs in a given scope, and checks for the existence of linked Flow logs via the Flow Logs property of the NSG. If the property doesn't exist, the policy deploys a Flow log.
8787

8888
If you want to see the full definition of the policy, you can visit the [Definitions tab](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyMenuBlade/Definitions) and search for "Flow logs" to find the policy.
8989

@@ -100,7 +100,7 @@ If you want to see the full definition of the policy, you can visit the [Definit
100100
The Network Watcher service is a regional service. These parameters allow the policy action of deploying flow logs to be executed.
101101
- NSG Region: Azure regions at which the policy is targeted
102102
- Storage ID: Full resource ID of the storage account. Note: This storage account should be in the same region as the NSG.
103-
- Network Watchers RG: Name of the resource group containing your Network Watcher resource. If you have not renamed it, you can enter `NetworkWatcherRG` which is the default.
103+
- Network Watchers RG: Name of the resource group containing your Network Watcher resource. If you haven't renamed it, you can enter `NetworkWatcherRG` which is the default.
104104
- Network Watcher name: Name of the regional network watcher service. Format: NetworkWatcher_RegionName. Example: NetworkWatcher_centralus. See the full list.
105105

106106
![DINE Policy parameters](./media/network-watcher-builtin-policy/5_2_1_dine-policy-details-alt.png)
@@ -110,11 +110,11 @@ The Network Watcher service is a regional service. These parameters allow the po
110110
- Check mark on **Create Remediation task** if you want the policy to affect existing resources
111111
- **Create a Managed Identity** should be already checked
112112
- Select the same location as previous for your Managed Identity
113-
- You will need Contributor or Owner permission to use this policy. If you have these permissions, you should not see any errors.
113+
- You'll need Contributor or Owner permission to use this policy. If you have these permissions, you shouldn't see any errors.
114114

115115
![DINE Policy remediation](./media/network-watcher-builtin-policy/5_2_2_dine-remediation.png)
116116

117-
4. Click on "Review + Create" to review your assignment
117+
4. Select "Review + Create" to review your assignment
118118
You should see something similar to the following screenshot.
119119

120120
![DINE Policy review](./media/network-watcher-builtin-policy/5_2_3_dine-review.png)

0 commit comments

Comments
 (0)