You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/governance/policy/assign-policy-portal.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -48,7 +48,7 @@ In this quickstart, you create a policy assignment with a built-in policy defini
48
48
49
49
| Tab name | Options |
50
50
| ---- | ---- |
51
-
|**Advanced**| Includes options for [resource selectors](./concepts/assignment-structure.md#resource-selectors-preview) and [overrides](./concepts/assignment-structure.md#overrides-preview). |
51
+
|**Advanced**| Includes options for [resource selectors](./concepts/assignment-structure.md#resource-selectors) and [overrides](./concepts/assignment-structure.md#overrides). |
52
52
|**Parameters**| If the policy definition you selected on the **Basics** tab included parameters, they're configured on **Parameters** tab. This example doesn't use parameters. |
53
53
|**Remediation**| You can create a managed identity. For this example, **Create a Managed Identity** is unchecked. <br><br> This box _must_ be checked when a policy or initiative includes a policy with either the [deployIfNotExists](./concepts/effects.md#deployifnotexists) or [modify](./concepts/effects.md#modify) effect. For more information, go to [managed identities](../../active-directory/managed-identities-azure-resources/overview.md) and [how remediation access control works](./how-to/remediate-resources.md#how-remediation-access-control-works). |
@@ -77,7 +77,7 @@ characters and **description** a maximum length of _512_ characters.
77
77
78
78
The optional `metadata` property stores information about the policy assignment. Customers can
79
79
define any properties and values useful to their organization in `metadata`. However, there are some
80
-
_common_ properties used by Azure Policy. Each `metadata` property has a limit of 1024 characters.
80
+
_common_ properties used by Azure Policy. Each `metadata` property has a limit of 1,024 characters.
81
81
82
82
### Common metadata properties
83
83
@@ -128,13 +128,15 @@ _common_ properties used by Azure Policy. Each `metadata` property has a limit o
128
128
```
129
129
130
130
131
-
## Resource selectors (preview)
131
+
## Resource selectors
132
132
133
-
The optional **resourceSelectors** property facilitates safe deployment practices (SDP) by enabling you to gradually roll
134
-
out policy assignments based on factors like resource location, resource type, or whether a resource has a location. When resource selectors are used, Azure Policy will only evaluate resources that are applicable to the specifications made in the resource selectors. Resource selectors can also be leveraged to narrow down the scope of [exemptions](exemption-structure.md) in the same way.
133
+
The optional `resourceSelectors` property facilitates safe deployment practices (SDP) by enabling
134
+
you to gradually roll out policy assignments based on factors like resource location, resource type,
135
+
or whether a resource has a location. When resource selectors are used, Azure Policy will only
136
+
evaluate resources that are applicable to the specifications made in the resource selectors.
137
+
Resource selectors can also be used to narrow down the scope of [exemptions](exemption-structure.md) in the same way.
135
138
136
-
In the following example scenario, the new policy assignment will be evaluated only if the resource's location is
137
-
either **East US** or **West US**.
139
+
In the following example scenario, the new policy assignment is evaluated only if the resource's location is either **East US** or **West US**.
138
140
139
141
```json
140
142
{
@@ -160,8 +162,7 @@ either **East US** or **West US**.
160
162
}
161
163
```
162
164
163
-
When you're ready to expand the evaluation scope for your policy, you just have to modify the assignment. The following example
164
-
shows our policy assignment with two additional Azure regions added to the **SDPRegions** selector. Note, in this example, _SDP_ means to _Safe Deployment Practice_:
165
+
When you're ready to expand the evaluation scope for your policy, you just have to modify the assignment. The following example shows our policy assignment with two more Azure regions added to the **SDPRegions** selector. Note, in this example, _SDP_ means to _Safe Deployment Practice_:
165
166
166
167
```json
167
168
{
@@ -192,28 +193,27 @@ Resource selectors have the following properties:
192
193
193
194
-`selectors`: (Optional) The property used to determine which subset of resources applicable to the policy assignment should be evaluated for compliance.
194
195
195
-
-`kind`: The property of a selector that describes what characteristic will narrow down the set of evaluated resources. Each kind can only be used once in a single resource selector. Allowed values are:
196
+
-`kind`: The property of a selector that describes which characteristic narrows down the set of evaluated resources. Each kind can only be used once in a single resource selector. Allowed values are:
196
197
197
-
-`resourceLocation`: This is used to select resources based on their type. Cannot be used in the same resource selector as `resourceWithoutLocation`.
198
+
-`resourceLocation`: This property is used to select resources based on their type. Can't be used in the same resource selector as `resourceWithoutLocation`.
198
199
199
-
-`resourceType`: This is used to select resources based on their type.
200
+
-`resourceType`: This property is used to select resources based on their type.
200
201
201
-
-`resourceWithoutLocation`: This is used to select resources at the subscription level which do not have a location. Currently only supports `subscriptionLevelResources`. Cannot be used in the same resource selector as `resourceLocation`.
202
+
-`resourceWithoutLocation`: This property is used to select resources at the subscription level that don't have a location. Currently only supports `subscriptionLevelResources`. Can't be used in the same resource selector as `resourceLocation`.
202
203
203
-
-`in`: The list of allowed values for the specified `kind`. Cannot be used with `notIn`. Can contain up to 50 values.
204
+
-`in`: The list of allowed values for the specified `kind`. Can't be used with `notIn`. Can contain up to 50 values.
205
+
206
+
-`notIn`: The list of not-allowed values for the specified `kind`. Can't be used with `in`. Can contain up to 50 values.
204
207
205
-
-`notIn`: The list of not-allowed values for the specified `kind`. Cannot be used with `in`. Can contain up to 50 values.
206
-
207
208
A **resource selector** can contain multiple **selectors**. To be applicable to a resource selector, a resource must meet requirements specified by all its selectors. Further, up to 10 **resource selectors** can be specified in a single assignment. In-scope resources are evaluated when they satisfy any one of these resource selectors.
208
209
209
-
## Overrides (preview)
210
+
## Overrides
210
211
211
-
The optional **overrides** property allows you to change the effect of a policy definition without modifying
212
-
the underlying policy definition or using a parameterized effect in the policy definition.
212
+
The optional `overrides` property allows you to change the effect of a policy definition without modifying the underlying policy definition or using a parameterized effect in the policy definition.
213
213
214
214
The most common use case for overrides is policy initiatives with a large number of associated policy definitions. In this situation, managing multiple policy effects can consume significant administrative effort, especially when the effect needs to be updated from time to time. Overrides can be used to simultaneously update the effects of multiple policy definitions within an initiative.
215
215
216
-
Let's take a look at an example. Imagine you have a policy initiative named _CostManagement_ that includes a custom policy definition with `policyDefinitionReferenceId`_corpVMSizePolicy_ and a single effect of `audit`. Suppose you want to assign the _CostManagement_ initiative, but do not yet want to see compliance reported for this policy. This policy's 'audit' effect can be replaced by 'disabled' through an override on the initiative assignment, as shown below:
216
+
Let's take a look at an example. Imagine you have a policy initiative named _CostManagement_ that includes a custom policy definition with `policyDefinitionReferenceId`_corpVMSizePolicy_ and a single effect of `audit`. Suppose you want to assign the _CostManagement_ initiative, but don't yet want to see compliance reported for this policy. This policy's 'audit' effect can be replaced by 'disabled' through an override on the initiative assignment, as shown in the following sample:
217
217
218
218
```json
219
219
{
@@ -242,19 +242,19 @@ Let's take a look at an example. Imagine you have a policy initiative named _Cos
242
242
Overrides have the following properties:
243
243
-`kind`: The property the assignment will override. The supported kind is `policyEffect`.
244
244
245
-
-`value`: The new value which will override the existing value. The supported values are [effects](effects.md).
245
+
-`value`: The new value that overrides the existing value. The supported values are [effects](effects.md).
246
246
247
247
-`selectors`: (Optional) The property used to determine what scope of the policy assignment should take on the override.
248
248
249
249
-`kind`: The property of a selector that describes what characteristic will narrow down the scope of the override. Allowed value for `kind: policyEffect` is:
250
250
251
251
-`policyDefinitionReferenceId`: This specifies which policy definitions within an initiative assignment should take on the effect override.
252
252
253
-
-`in`: The list of allowed values for the specified `kind`. Cannot be used with `notIn`. Can contain up to 50 values.
253
+
-`in`: The list of allowed values for the specified `kind`. Can't be used with `notIn`. Can contain up to 50 values.
254
254
255
-
-`notIn`: The list of not-allowed values for the specified `kind`. Cannot be used with `in`. Can contain up to 50 values.
255
+
-`notIn`: The list of not-allowed values for the specified `kind`. Can't be used with `in`. Can contain up to 50 values.
256
256
257
-
Note that one override can be used to replace the effect of many policies by specifying multiple values in the policyDefinitionReferenceId array. A single override can be used for up to 50 policyDefinitionReferenceIds, and a single policy assignment can contain up to 10 overrides, evaluated in the order in which they are specified. Before the assignment is created, the effect chosen in the override is validated against the policy rule and parameter allowed value list (in cases where the effect is [parameterized](definition-structure.md#parameters)).
257
+
Note that one override can be used to replace the effect of many policies by specifying multiple values in the policyDefinitionReferenceId array. A single override can be used for up to 50 policyDefinitionReferenceIds, and a single policy assignment can contain up to 10 overrides, evaluated in the order in which they're specified. Before the assignment is created, the effect chosen in the override is validated against the policy rule and parameter allowed value list (in cases where the effect is [parameterized](definition-structure.md#parameters)).
258
258
259
259
## Enforcement mode
260
260
@@ -295,7 +295,7 @@ after creation of the initial assignment.
295
295
296
296
This field must be the full path name of either a policy definition or an initiative definition.
297
297
`policyDefinitionId` is a string and not an array. The latest content of the assigned policy
298
-
definition or initiative will be retrieved each time the policy assignment is evaluated. It's
298
+
definition or initiative is retrieved each time the policy assignment is evaluated. It's
299
299
recommended that if multiple policies are often assigned together, to use an
@@ -360,7 +360,7 @@ reducing the duplication and complexity of policy definitions while providing fl
360
360
361
361
## Identity
362
362
363
-
For policy assignments with effect set to **deployIfNotExist** or **modify**, it is required to have an identity property to do remediation on non-compliant resources. When using identity, the user must also specify a location for the assignment.
363
+
For policy assignments with effect set to **deployIfNotExist** or **modify**, it's required to have an identity property to do remediation on non-compliant resources. When using identity, the user must also specify a location for the assignment.
364
364
365
365
> [!NOTE]
366
366
> A single policy assignment can be associated with only one system- or user-assigned managed identity. However, that identity can be assigned more than one role if necessary.
Copy file name to clipboardExpand all lines: articles/governance/policy/concepts/evaluate-impact.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -63,7 +63,7 @@ resources before full implementation of the new policy. This cleanup can be done
63
63
a [remediation task](../how-to/remediate-resources.md) if the policy definition effect is
64
64
_DeployIfNotExists_ or _Modify_.
65
65
66
-
Policy definitions with a _DeployIfNotExist_ should leverage the [Azure Resource Manager template what if](../../../azure-resource-manager/templates/deploy-what-if.md) to validate and test the changes that happen when deploying the ARM template.
66
+
Policy definitions with a _DeployIfNotExist_ should leverage the [Azure Resource Manager template what if](../../../azure-resource-manager/templates/deploy-what-if.md) to validate and test the changes that happen when deploying the ARM template.
67
67
68
68
## Audit new or updated resources
69
69
@@ -90,7 +90,7 @@ existing resources.
90
90
After completing validation of your new policy definition with both existing resources and new or
91
91
updated resource requests, you begin the process of implementing the policy. It's recommended to
92
92
create the policy assignment for the new policy definition to a subset of all resources first, such
93
-
as a resource group. You can further filter by resource type or location using the [`resourceSelectors`](./assignment-structure.md#resource-selectors-preview) property within the policy assignment.After validating initial deployment, extend the scope of the policy to broader as a resource group. After validating initial deployment, expand the impact of the policy by adjusting the resourceSelector filters to target more locations or resource types, or by removing the assignment and replacing it with a new one at broader scopes like subscriptions and management groups. Continue this gradual rollout until it's assigned to the full scope of resources intended to be covered by your new policy definition.
93
+
as a resource group. You can further filter by resource type or location using the [`resourceSelectors`](./assignment-structure.md#resource-selectors) property within the policy assignment.After validating initial deployment, extend the scope of the policy to broader as a resource group. After validating initial deployment, expand the impact of the policy by adjusting the resourceSelector filters to target more locations or resource types, or by removing the assignment and replacing it with a new one at broader scopes like subscriptions and management groups. Continue this gradual rollout until it's assigned to the full scope of resources intended to be covered by your new policy definition.
94
94
95
95
During rollout, if resources are located that should be exempt from your new policy definition,
0 commit comments