Skip to content

Commit 7776e75

Browse files
Merge pull request #239640 from halkazwini/nw-ta-policy3
tweak
2 parents c6e0c6b + 3fa3163 commit 7776e75

File tree

1 file changed

+14
-13
lines changed

1 file changed

+14
-13
lines changed

articles/network-watcher/traffic-analytics-policy-portal.md

Lines changed: 14 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
22
title: Manage traffic analytics using Azure Policy
33
titleSuffix: Azure Network Watcher
4-
description: Learn how to use Azure built-in policies to manage the deployment of Azure Network Watcher traffic analytics.
4+
description: Learn how to use Azure Policy built-in policies to audit Azure Network Watcher NSG flow logs and manage the deployment of traffic analytics.
55
services: network-watcher
66
author: halkazwini
77
ms.service: network-watcher
88
ms.topic: how-to
9-
ms.date: 05/10/2023
9+
ms.date: 05/30/2023
1010
ms.author: halkazwini
1111
ms.custom: template-how-to, engagement-fy23
1212
---
@@ -19,9 +19,9 @@ In this article, you learn how to use three built-in policies available for [Azu
1919

2020
## Audit flow logs using a built-in policy
2121

22-
**Network Watcher flow logs should have traffic analytics enabled** policy audits all existing Azure Resource Manager objects of type `Microsoft.Network/networkWatchers/flowLogs` and checks if traffic analytics is enabled via the `networkWatcherFlowAnalyticsConfiguration.enabled` property of the flow logs resource. It flags the flow logs resource that has the property set to false.
22+
The **Network Watcher flow logs should have traffic analytics enabled** policy audits all existing flow logs by auditing Azure Resource Manager objects of type `Microsoft.Network/networkWatchers/flowLogs` and checks if traffic analytics is enabled via the `networkWatcherFlowAnalyticsConfiguration.enabled` property of the flow logs resource. This policy then flags the flow logs resource that has the property set to false.
2323

24-
To assign policy and audit your flow logs, follow these steps:
24+
To audit your flow logs by using the built-in policy:
2525

2626
1. Sign in to the [Azure portal](https://portal.azure.com).
2727

@@ -45,14 +45,14 @@ To assign policy and audit your flow logs, follow these steps:
4545

4646
1. Select **Review + create** and then **Create**.
4747

48-
:::image type="content" source="./media/traffic-analytics-policy-portal/assign-audit-policy.png" alt-text="Screenshot of Basics tab to assign an audit policy in the Azure portal.":::
48+
:::image type="content" source="./media/traffic-analytics-policy-portal/assign-audit-policy.png" alt-text="Screenshot of the Basics tab to assign an audit policy in the Azure portal.":::
4949

5050
> [!NOTE]
5151
> This policy doesn't require any parameters. It also doesn't contain any role definitions so you don't need create role assignments for the managed identity in the **Remediation** tab.
5252
5353
1. Select **Compliance**. Search for the name of your assignment and then select it.
5454

55-
:::image type="content" source="./media/traffic-analytics-policy-portal/audit-policy-compliance.png" alt-text="Screenshot of Compliance page showing the audit policy in the Azure portal." lightbox="./media/traffic-analytics-policy-portal/audit-policy-compliance.png":::
55+
:::image type="content" source="./media/traffic-analytics-policy-portal/audit-policy-compliance.png" alt-text="Screenshot of the Compliance page showing the audit policy in the Azure portal." lightbox="./media/traffic-analytics-policy-portal/audit-policy-compliance.png":::
5656

5757
1. **Resource compliance** lists all non-compliant flow logs.
5858

@@ -79,23 +79,23 @@ To assign any of the *deployIfNotExists* two policies, follow these steps:
7979

8080
:::image type="content" source="./media/traffic-analytics-policy-portal/azure-portal.png" alt-text="Screenshot of searching for policy in the Azure portal." lightbox="./media/traffic-analytics-policy-portal/azure-portal.png":::
8181

82-
1. Select **Assignments**, then select on **Assign Policy**.
82+
1. Select **Assignments**, and then select on **Assign policy**.
8383

8484
:::image type="content" source="./media/traffic-analytics-policy-portal/assign-policy.png" alt-text="Screenshot of selecting Assign policy button in the Azure portal.":::
8585

86-
1. Select the ellipsis **...** next to **Scope** to choose your Azure subscription that has the flow logs that you want the policy to audit. You can also choose the resource group that has the flow logs. After you made your selections, select **Select** button.
86+
1. Select the ellipsis **...** next to **Scope** to choose your Azure subscription that has the flow logs that you want the policy to audit. You can also choose the resource group that has the flow logs. After you make your selections, choose the **Select** button.
8787

8888
:::image type="content" source="./media/traffic-analytics-policy-portal/policy-scope.png" alt-text="Screenshot of selecting the scope of the policy in the Azure portal." lightbox="./media/traffic-analytics-policy-portal/policy-scope.png":::
8989

90-
1. Select the ellipsis **...** next to **Policy definition** to choose the built-in policy that you want to assign. Enter *traffic analytics* in the search box, and select **Built-in** filter. From the search results, select **Configure network security groups to use specific workspace, storage account and flow log retention policy for traffic analytics** and then select **Add**.
90+
1. Select the ellipsis **...** next to **Policy definition** to choose the built-in policy that you want to assign. Enter *traffic analytics* in the search box, and select the **Built-in** filter. From the search results, select **Configure network security groups to use specific workspace, storage account and flow log retention policy for traffic analytics** and then select **Add**.
9191

9292
:::image type="content" source="./media/traffic-analytics-policy-portal/deploy-policy.png" alt-text="Screenshot of selecting a deployIfNotExists policy in the Azure portal." lightbox="./media/traffic-analytics-policy-portal/deploy-policy.png":::
9393

9494
1. Enter a name in **Assignment name** and your name in **Assigned by**.
9595

9696
:::image type="content" source="./media/traffic-analytics-policy-portal/assign-deploy-policy-basics.png" alt-text="Screenshot of the Basics tab of assigning a deploy policy in the Azure portal." lightbox="./media/traffic-analytics-policy-portal/assign-deploy-policy-basics.png":::
9797

98-
1. Select **Next** button twice or select **Parameters** tab. Enter or select the following values:
98+
1. Select **Next** button twice, or select the **Parameters** tab. Then, enter or select the following values:
9999

100100
| Setting | Value |
101101
| --- | --- |
@@ -137,7 +137,7 @@ To assign any of the *deployIfNotExists* two policies, follow these steps:
137137

138138
:::image type="content" source="./media/traffic-analytics-policy-portal/deploy-policy-compliance.png" alt-text="Screenshot of Compliance page showing the deploy policy in the Azure portal." lightbox="./media/traffic-analytics-policy-portal/deploy-policy-compliance.png":::
139139

140-
1. **Resource compliance** lists all non-compliant flow logs.
140+
1. Select **Resource compliance** to get a list of all non-compliant flow logs.
141141

142142
:::image type="content" source="./media/traffic-analytics-policy-portal/deploy-policy-compliance-details.png" alt-text="Screenshot showing details of the deploy policy in the Azure portal." lightbox="./media/traffic-analytics-policy-portal/deploy-policy-compliance-details.png":::
143143

@@ -149,5 +149,6 @@ In such scenario, the managed identity must be manually granted access. Go to th
149149

150150
## Next steps
151151

152-
- Learn about [NSG flow logs built-in policies](./nsg-flow-logs-policy-portal.md)
153-
- Learn more about [traffic analytics](./traffic-analytics.md)
152+
- Learn about [NSG flow logs built-in policies](./nsg-flow-logs-policy-portal.md).
153+
- Learn more about [traffic analytics](./traffic-analytics.md).
154+
- Learn how to use an Azure Resource Manager (ARM) template to deploy flow logs and traffic analytics, see [Configure NSG flow logs using an Azure Resource Manager template](./quickstart-configure-network-security-group-flow-logs-from-arm-template.md).

0 commit comments

Comments
 (0)