Skip to content

Commit 48fde63

Browse files
committed
Address Anna's comments
1 parent ccf0434 commit 48fde63

File tree

3 files changed

+3
-3
lines changed

3 files changed

+3
-3
lines changed

articles/governance/policy/concepts/effects.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -476,7 +476,7 @@ Policy will evaluate resources that support location and tags against `DenyActio
476476
#### Cascade deletion
477477
Cascade deletion occurs when deleting of a parent resource is implicitly deletes all its child resources. Policy won't block removal of child resources when a delete action targets the parent resources. For example, `Microsoft.Insights/diagnosticSettings` is a child resource of `Microsoft.Storage/storageaccounts`. If a `denyAction` policy targets `Microsoft.Insights/diagnosticSettings`, a delete call to the diagnostic setting (child) will fail, but a delete to the storage account (parent) will implicitly delete the diagnostic setting (child).
478478

479-
[!INCLUDE [policy-denyAction](../../../../includes/azure-policy-denyAction.md)]
479+
[!INCLUDE [policy-denyAction](../../../../includes/azure-policy-deny-action.md)]
480480

481481
### DenyAction properties
482482

articles/governance/policy/overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -96,7 +96,7 @@ on Channel 9.
9696
### Azure Policy and Azure RBAC
9797

9898
There are a few key differences between Azure Policy and Azure role-based access control (Azure
99-
RBAC). Azure Policy evaluates state by examining properties on resources that are represented in Resource Manager and properties of some Resource Providers. Azure Policy ensures that resource state is compliant to your business rules without concern for who made the change or who has permission to make a change. Azure Policy through DenyAction effect can also block certian actions on resources. Some Azure Policy resources, such as [policy definitions](#policy-definition), [initiative definitions](#initiative-definition), and [assignments](#assignments), are visible to all users. This design enables transparency to all users and services for what policy rules are set
99+
RBAC). Azure Policy evaluates state by examining properties on resources that are represented in Resource Manager and properties of some Resource Providers. Azure Policy ensures that resource state is compliant to your business rules without concern for who made the change or who has permission to make a change. Azure Policy through DenyAction effect can also block certain actions on resources. Some Azure Policy resources, such as [policy definitions](#policy-definition), [initiative definitions](#initiative-definition), and [assignments](#assignments), are visible to all users. This design enables transparency to all users and services for what policy rules are set
100100
in their environment.
101101

102102
Azure RBAC focuses on managing user
@@ -170,7 +170,7 @@ settings and objects. To find out more, see
170170

171171
Here are a few pointers and tips to keep in mind:
172172

173-
- Start with an `audit` or `auditIfNotExist` effect instead of a enforcement (`deny`, `modify`, `deployIfNotExist`) effect to track impact of your policy definition on the resources in your environment. If you have scripts already in place to autoscale yourapplications, setting an enforcement effect may hinder such automation tasks already in place.
173+
- Start with an `audit` or `auditIfNotExist` effect instead of an enforcement (`deny`, `modify`, `deployIfNotExist`) effect to track impact of your policy definition on the resources in your environment. If you have scripts already in place to autoscale your applications, setting an enforcement effect may hinder such automation tasks already in place.
174174

175175
- Consider organizational hierarchies when creating definitions and assignments. We recommend
176176
creating definitions at higher levels such as the management group or subscription level. Then,
File renamed without changes.

0 commit comments

Comments
 (0)