You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/governance/policy/assign-policy-rest-api.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,7 +23,7 @@ This guide uses REST API to create a policy assignment and to identify non-compl
23
23
24
24
## Review the REST API syntax
25
25
26
-
There are two elements to run REST API commands: the REST API URI and the request body. For information, go to [Policy Assignments - Create](/rest/api/policy/policy-assignments/create).
26
+
There are two elements to run REST API commands: the REST API URI and the request body. For information, go to [Policy Assignments - Create](/rest/api/policyauthorization/policy-assignments/create).
27
27
28
28
The following example shows the REST API URI syntax to create a policy definition.
29
29
@@ -105,7 +105,7 @@ az rest --method put --uri https://management.azure.com/subscriptions/{subscript
105
105
106
106
In PowerShell, the backtick (``` ` ```) is needed to escape the `at sign` (`@`) to specify a filename. In a Bash shell like Git Bash, omit the backtick.
107
107
108
-
For information, go to [Policy Assignments - Create](/rest/api/policy/policy-assignments/create).
108
+
For information, go to [Policy Assignments - Create](/rest/api/policyauthorization/policy-assignments/create).
109
109
110
110
## Identify non-compliant resources
111
111
@@ -168,7 +168,7 @@ Your results resemble the following example:
168
168
}
169
169
```
170
170
171
-
For more information, go to [Policy States - List Query Results For Resource Group](/rest/api/policy/policy-states/list-query-results-for-resource-group).
171
+
For more information, go to [Policy States - List Query Results For Resource Group](/rest/api/policyinsights/policy-states/list-query-results-for-resource-group).
172
172
173
173
## Clean up resources
174
174
@@ -188,7 +188,7 @@ az rest --method get --uri https://management.azure.com/subscriptions/{subscript
188
188
The policy assignment 'audit-vm-managed-disks' is not found.
189
189
```
190
190
191
-
For more information, go to [Policy Assignments - Delete](/rest/api/policy/policy-assignments/delete) and [Policy Assignments - Get](/rest/api/policy/policy-assignments/get).
191
+
For more information, go to [Policy Assignments - Delete](/rest/api/policyauthorization/policy-assignments/delete) and [Policy Assignments - Get](/rest/api/policyauthorization/policy-assignments/get).
Copy file name to clipboardExpand all lines: articles/governance/policy/concepts/attestation-structure.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ ms.topic: conceptual
10
10
Attestations are used by Azure Policy to set compliance states of resources or scopes targeted by [manual policies](effect-manual.md). They also allow users to provide more metadata or link to evidence that accompanies the attested compliance state.
11
11
12
12
> [!NOTE]
13
-
> Attestations can be created and managed only through Azure Policy [Azure Resource Manager (ARM) API](/rest/api/policy/attestations), [PowerShell](/powershell/module/az.policyinsights) or [Azure CLI](/cli/azure/policy/attestation).
13
+
> Attestations can be created and managed only through Azure Policy [Azure Resource Manager (ARM) API](/rest/api/policyinsights/attestations), [PowerShell](/powershell/module/az.policyinsights) or [Azure CLI](/cli/azure/policy/attestation).
Copy file name to clipboardExpand all lines: articles/governance/policy/concepts/initiative-definition-structure.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -113,7 +113,7 @@ there are some _common_ properties used by Azure Policy and in built-ins.
113
113
### Common metadata properties
114
114
115
115
-`version` (string): Tracks details about the version of the contents of a policy initiative
116
-
definition. For built-ins, this metadata version follows the version property of the built-in. It's recommended to use the version property over this metadata version.
116
+
definition. For built-ins, this metadata version follows the version property of the built-in. It's recommended to use the version property over this metadata version.
117
117
-`category` (string): Determines under which category in the Azure portal the policy definition is
118
118
displayed.
119
119
@@ -126,19 +126,19 @@ there are some _common_ properties used by Azure Policy and in built-ins.
126
126
as _deprecated_.
127
127
128
128
## Version (preview)
129
-
Built-in policy initiatives can host multiple versions with the same `definitionID`. If no version number is specified, all experiences will show the latest version of the definition. To see a specific version of a built-in, it must be specified in API, SDK or UI. To reference a specific version of a definition within an assignment, see [definition version within assignment](../concepts/assignment-structure.md#policy-definition-id-and-version-preview)
129
+
Built-in policy initiatives can host multiple versions with the same `definitionID`. If no version number is specified, all experiences will show the latest version of the definition. To see a specific version of a built-in, it must be specified in API, SDK or UI. To reference a specific version of a definition within an assignment, see [definition version within assignment](../concepts/assignment-structure.md#policy-definition-id-and-version-preview)
130
130
131
-
The Azure Policy service uses `version`, `preview`, and `deprecated` properties to convey the level of change to a built-in policy definition or initiative and state. The format of `version` is: `{Major}.{Minor}.{Patch}`. Specific states, such as _deprecated_ or _preview_, are appended to the `version` property or in another property as a **boolean** as shown in the common metadata properties.
131
+
The Azure Policy service uses `version`, `preview`, and `deprecated` properties to convey the level of change to a built-in policy definition or initiative and state. The format of `version` is: `{Major}.{Minor}.{Patch}`. Specific states, such as _deprecated_ or _preview_, are appended to the `version` property or in another property as a **boolean** as shown in the common metadata properties.
132
132
133
-
- Major Version (example: 2.0.0): introduce breaking changes such as major rule logic changes, removing parameters, adding an enforcement effect by default.
134
-
- Minor Version (example: 2.1.0): introduce changes such as minor rule logic changes, adding new parameter allowed values, change to role definitionIds, adding or removing definitions within an initiative.
133
+
- Major Version (example: 2.0.0): introduce breaking changes such as major rule logic changes, removing parameters, adding an enforcement effect by default.
134
+
- Minor Version (example: 2.1.0): introduce changes such as minor rule logic changes, adding new parameter allowed values, change to role definitionIds, adding or removing definitions within an initiative.
135
135
- Patch Version (example: 2.1.4): introduce string or metadata changes and break glass security scenarios (rare).
136
136
137
137
Built-in initiatives are versioned, and specific versions of built-in policy definitions can be referenced within built-in or custom initiatives as well. For more information, see [reference definition and versions](#policy-definition-properties).
138
138
139
139
> While in preview, when creating an initiative through the portal, you will not be able to specify versions for built-in policy definition references. All built-in policy references in custom initiatives created through the portal will instead default to the latest version of the policy definition.
> To learn more about what it means for a policy to be _deprecated_ or in _preview_, see [Preview and deprecated policies](https://github.com/Azure/azure-policy/blob/master/built-in-policies/README.md#preview-and-deprecated-policies).
@@ -349,7 +349,7 @@ This information is:
349
349
- Displayed in the Azure portal on the overview of a **control** on a Regulatory Compliance
350
350
initiative.
351
351
- Available via REST API. See the `Microsoft.PolicyInsights` resource provider and the
- Available via Azure CLI. See the [az policy metadata](/cli/azure/policy/metadata) command.
354
354
355
355
> [!IMPORTANT]
@@ -377,7 +377,7 @@ Below is an example of the **policyMetadata** object. This example metadata belo
377
377
"category": "Access Control",
378
378
"title": "Access Control Policy and Procedures",
379
379
"owner": "Shared",
380
-
"description": "**The organization:** \na. Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]: \n1. An access control policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and \n2. Procedures to facilitate the implementation of the access control policy and associated access controls; and \n
380
+
"description": "**The organization:** \na. Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]: \n1. An access control policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and \n2. Procedures to facilitate the implementation of the access control policy and associated access controls; and \n
381
381
\nb. Reviews and updates the current: \n1. Access control policy [Assignment: organization-defined frequency]; and \n2. Access control procedures [Assignment: organization-defined frequency].",
382
382
"requirements": "**a.** The customer is responsible for developing, documenting, and disseminating access control policies and procedures. The customer access control policies and procedures address access to all customer-deployed resources and customer system access (e.g., access to customer-deployed virtual machines, access to customer-built applications). \n**b.** The customer is responsible for reviewing and updating access control policies and procedures in accordance with FedRAMP requirements.",
POST https://management.azure.com/subscriptions/{subscriptionId}/providers/Microsoft.PolicyInsights/policyStates/latest/summarize?api-version=2019-10-01
@@ -417,7 +417,7 @@ Your results resemble the following example:
417
417
```
418
418
419
419
For more information about querying policy events, see the
0 commit comments