Skip to content

Commit 7798b65

Browse files
committed
freshness review for Web PubSub how-to monitor Azure Policy
1 parent 3f1e560 commit 7798b65

File tree

1 file changed

+21
-16
lines changed

1 file changed

+21
-16
lines changed

articles/azure-web-pubsub/howto-monitor-azure-policy.md

Lines changed: 21 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -11,23 +11,27 @@ ms.author: jixin
1111

1212
# Audit compliance of Azure Web PubSub Service resources using Azure Policy
1313

14-
[Azure Policy](../governance/policy/overview.md) is a service in Azure that you use to create, assign, and manage policies. These policies enforce different rules and effects over your resources, so those resources stay compliant with your corporate standards and service level agreements.
14+
[Azure Policy](../governance/policy/overview.md) is a free service in Azure to create, assign, and manage policies that enforce rules and effects to ensure your resources stay compliant with your corporate standards and service level agreements. Use these policies to audit Web PubSub resources for compliance.
1515

16-
This article introduces built-in policies for Azure Web PubSub Service. Use these policies to audit new and existing Web PubSub resources for compliance.
17-
18-
There are no charges for using Azure Policy.
16+
This article describes the built-in policies for Azure Web PubSub Service.
1917

2018
## Built-in policy definitions
2119

22-
The following built-in policy definitions are specific to Azure Web PubSub Service:
20+
21+
The following table contains an index of Azure Policy built-in policy definitions for Azure Web PubSub. For Azure Policy built-ins for other services, see [Azure Policy built-in definitions](https://learn.microsoft.com/en-us/azure/governance/policy/samples/built-in-policies).
22+
23+
The name of each built-in policy definition links to the policy definition in the Azure portal. Use the link in the Version column to view the source on the [Azure Policy GitHub repo](https://github.com/Azure/azure-policy).
2324

2425
[!INCLUDE [azure-policy-reference-policies-web-pubsub](../../includes/policy/reference/bycat/policies-web-pubsub.md)]
2526

2627
## Assign policy definitions
2728

28-
* Assign policy definitions using the [Azure portal](../governance/policy/assign-policy-portal.md), [Azure CLI](../governance/policy/assign-policy-azurecli.md), a [Resource Manager template](../governance/policy/assign-policy-template.md), or the Azure Policy SDKs.
29-
* Scope a policy assignment to a resource group, a subscription, or an [Azure management group](../governance/management-groups/overview.md). Web PubSub policy assignments apply to existing and new Web PubSub resources within the scope.
30-
* Enable or disable [policy enforcement](../governance/policy/concepts/assignment-structure.md#enforcement-mode) at any time.
29+
When assigning a policy definition:
30+
31+
* You can assign policy definitions using the [Azure portal](../governance/policy/assign-policy-portal.md), [Azure CLI](../governance/policy/assign-policy-azurecli.md), a [Resource Manager template](../governance/policy/assign-policy-template.md), or the Azure Policy SDKs.
32+
* Policy assignments can be scoped to a resource group, a subscription, or an [Azure management group](../governance/management-groups/overview.md).
33+
* You can enable or disable [policy enforcement](../governance/policy/concepts/assignment-structure.md#enforcement-mode) at any time.
34+
* Web PubSub policy assignments apply to existing and new Web PubSub resources within the scope.
3135

3236
> [!NOTE]
3337
> After you assign or update a policy, it takes some time for the assignment to be applied to resources in the defined scope. See information about [policy evaluation triggers](../governance/policy/how-to/get-compliance-data.md#evaluation-triggers).
@@ -40,36 +44,37 @@ When a resource is non-compliant, there are many possible reasons. To determine
4044

4145
### Policy compliance in the portal:
4246

43-
1. Select **All services**, and search for **Policy**.
47+
1. Open the Azure portal and search for **Policy**.
48+
1. Select **Policy**.
4449
1. Select **Compliance**.
45-
1. Use the filters to limit compliance states or to search for policies
46-
50+
1. Use the filters to display by **Scope**, **Type** or **Compliance state**. Use search list by name or
51+
ID.
4752
[ ![Policy compliance in portal](./media/howto-monitor-azure-policy/azure-policy-compliance.png) ](./media/howto-monitor-azure-policy/azure-policy-compliance.png#lightbox)
48-
2. Select a policy to review aggregate compliance details and events. If desired, then select a specific Web PubSub for resource compliance.
53+
1. Select a policy to review aggregate compliance details and events. If desired, then select a specific Web PubSub for resource compliance.
4954

5055
### Policy compliance in the Azure CLI
5156

52-
You can also use the Azure CLI to get compliance data. For example, use the [az policy assignment list](/cli/azure/policy/assignment#az-policy-assignment-list) command in the CLI to get the policy IDs of the Azure Web PubSub Service policies that are applied:
57+
You can use the Azure CLI to get compliance data. Use the [az policy assignment list](/cli/azure/policy/assignment#az-policy-assignment-list) command to get the policy IDs of the Azure Web PubSub Service policies that are applied:
5358

5459
```azurecli
5560
az policy assignment list --query "[?contains(displayName,'Web PubSub')].{name:displayName, ID:id}" --output table
5661
```
5762

58-
Sample output:
63+
Example output:
5964

6065
```
6166
Name ID
6267
------------------------------------------------------------------------------------- --------------------------------------------------------------------------------------------------------------------------------
6368
[Preview]: Azure Web PubSub Service should use private links /subscriptions/<subscriptionId>/resourceGroups/<resourceGroup>/providers/Microsoft.Authorization/policyAssignments/<assignmentId>
6469
```
6570

66-
Then run [az policy state list](/cli/azure/policy/state#az-policy-state-list) to return the JSON-formatted compliance state for all resources under a specific resource group:
71+
Run the [az policy state list](/cli/azure/policy/state#az-policy-state-list) command to return the JSON-formatted compliance state for all resources under a specific resource group:
6772

6873
```azurecli
6974
az policy state list --g <resourceGroup>
7075
```
7176

72-
Or run [az policy state list](/cli/azure/policy/state#az-policy-state-list) to return the JSON-formatted compliance state of a specific Web PubSub resource:
77+
Run the [az policy state list](/cli/azure/policy/state#az-policy-state-list) command to return the JSON-formatted compliance state of a specific Web PubSub resource:
7378

7479
```azurecli
7580
az policy state list \

0 commit comments

Comments
 (0)