Skip to content

Commit 522b31f

Browse files
Merge pull request #223484 from ElazarK/WI58556-naming-restrictions
adding naming restrictions and fixing page
2 parents 942ff25 + 68b1f51 commit 522b31f

File tree

2 files changed

+23
-13
lines changed

2 files changed

+23
-13
lines changed

articles/defender-for-cloud/custom-security-policies.md

Lines changed: 23 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Create custom Azure security policies in Microsoft Defender for Cloud
33
description: Azure custom policy definitions monitored by Microsoft Defender for Cloud.
44
ms.topic: how-to
55
ms.custom: ignite-2022
6-
ms.date: 07/20/2022
6+
ms.date: 01/22/2023
77
zone_pivot_groups: manage-asc-initiatives
88
---
99

@@ -35,26 +35,36 @@ You can view your custom initiatives organized by controls, similar to the contr
3535

3636
:::image type="content" source="media/custom-security-policies/accessing-security-policy-page.png" alt-text="Screenshot of accessing the security policy page in Microsoft Defender for Cloud." lightbox="media/custom-security-policies/accessing-security-policy-page.png":::
3737

38-
1. In the Add custom initiatives page, review the list of custom policies already created in your organization.
38+
1. Review the list of custom policies already created in your organization, and select **Add** to assign a policy to your subscription.
3939

40-
- If you see one you want to assign to your subscription, select **Add**.
41-
- If there isn't an initiative in the list that meets your needs, create a new custom initiative:
40+
If there isn't an initiative in the list that meets your needs, you can create one.
4241

43-
1. Select **Create new**.
44-
1. Enter the definition's location and name.
45-
1. Select the policies to include and select **Add**.
46-
1. Enter any desired parameters.
47-
1. Select **Save**.
48-
1. In the Add custom initiatives page, select refresh. Your new initiative will be available.
49-
1. Select **Add** and assign it to your subscription.
42+
**To create a new custom initiative**:
43+
44+
1. Select **Create new**.
45+
46+
1. Enter the definition's location and custom name.
47+
48+
> [!NOTE]
49+
> Custom initiatives shouldn't have the same name as other initiatives (custom or built-in). If you create a custom initiative with the the same name, it will cause a conflict in the information displayed in the dashboard.
50+
51+
1. Select the policies to include and select **Add**.
52+
53+
1. Enter any desired parameters.
54+
55+
1. Select **Save**.
56+
57+
1. In the Add custom initiatives page, select refresh. Your new initiative will be available.
58+
59+
1. Select **Add** and assign it to your subscription.
5060

5161
![Create or add a policy.](media/custom-security-policies/create-or-add-custom-policy.png)
5262

5363

5464
> [!NOTE]
5565
> Creating new initiatives requires subscription owner credentials. For more information about Azure roles, see [Permissions in Microsoft Defender for Cloud](permissions.md).
5666
57-
Your new initiative takes effect and you can see the impact in the following two ways:
67+
Your new initiative takes effect and you can see the results in the following two ways:
5868

5969
* From the Defender for Cloud menu, select **Regulatory compliance**. The compliance dashboard opens to show your new custom initiative alongside the built-in initiatives.
6070

@@ -250,7 +260,7 @@ The metadata should be added to the policy definition for a policy that is part
250260
},
251261
```
252262

253-
Below is an example of a custom policy including the metadata/securityCenter property:
263+
Here's another example of a custom policy including the metadata/securityCenter property:
254264

255265
```json
256266
{
-1.67 KB
Loading

0 commit comments

Comments
 (0)