Skip to content

Commit 79192e1

Browse files
committed
update definition links
1 parent 265e026 commit 79192e1

21 files changed

+57
-57
lines changed

articles/governance/policy/concepts/definition-structure-policy-rule.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -633,7 +633,7 @@ The following functions are only available in policy rules:
633633
- `field(fieldName)`
634634
- `fieldName`: [Required] string - Name of the [field](./definition-structure-policy-rule.md#fields) to retrieve
635635
- Returns the value of that field from the resource that is being evaluated by the If condition.
636-
- `field` is primarily used with `auditIfNotExists` and `deployIfNotExists` to reference fields on the resource that are being evaluated. An example of this use can be seen in the [DeployIfNotExists example](effect-deploy-if-not-exists.md-example).
636+
- `field` is primarily used with `auditIfNotExists` and `deployIfNotExists` to reference fields on the resource that are being evaluated. An example of this use can be seen in the [DeployIfNotExists example](effect-deploy-if-not-exists.md#deployifnotexists-example).
637637

638638
- `requestContext().apiVersion`
639639
- Returns the API version of the request that triggered policy evaluation (example: `2021-09-01`). This value is the API version that was used in the PUT/PATCH request for evaluations on resource creation/update. The latest API version is always used during compliance evaluation on existing resources.

articles/governance/policy/concepts/effect-add-to-network-group.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.topic: conceptual
77

88
# Azure Policy definitions addToNetworkGroup effect
99

10-
The `addToNetworkGroup` effect is used in Azure Virtual Network Manager to define dynamic network group membership. This effect is specific to `Microsoft.Network.Data` [policy mode](./definition-structure.md#resource-provider-modes) definitions only.
10+
The `addToNetworkGroup` effect is used in Azure Virtual Network Manager to define dynamic network group membership. This effect is specific to `Microsoft.Network.Data` [policy mode](./definition-structure-basics.md#resource-provider-modes) definitions only.
1111

1212
With network groups, your policy definition includes your conditional expression for matching virtual networks meeting your criteria, and specifies the destination network group where any matching resources are placed. The `addToNetworkGroup` effect is used to place resources in the destination network group.
1313

articles/governance/policy/concepts/effect-basics.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ The following list is some general guidance around interchangeable effects:
3636

3737
## Order of evaluation
3838

39-
Azure Policy's first evaluation is for requests to create or update a resource. Azure Policy creates a list of all assignments that apply to the resource and then evaluates the resource against each definition. For a [Resource Manager mode](./definition-structure.md#resource-manager-modes), Azure Policy processes several of the effects before handing the request to the appropriate Resource Provider. This order prevents unnecessary processing by a Resource Provider when a resource doesn't meet the designed governance controls of Azure Policy. With a [Resource Provider mode](./definition-structure.md#resource-provider-modes), the Resource Provider manages the evaluation and outcome and reports the results back to Azure Policy.
39+
Azure Policy's first evaluation is for requests to create or update a resource. Azure Policy creates a list of all assignments that apply to the resource and then evaluates the resource against each definition. For a [Resource Manager mode](./definition-structure-basics.md#resource-manager-modes), Azure Policy processes several of the effects before handing the request to the appropriate Resource Provider. This order prevents unnecessary processing by a Resource Provider when a resource doesn't meet the designed governance controls of Azure Policy. With a [Resource Provider mode](./definition-structure-basics.md#resource-provider-modes), the Resource Provider manages the evaluation and outcome and reports the results back to Azure Policy.
4040

4141
- `disabled` is checked first to determine whether the policy rule should be evaluated.
4242
- `append` and `modify` are then evaluated. Since either could alter the request, a change made might prevent an audit or deny effect from triggering. These effects are only available with a Resource Manager mode.

articles/governance/policy/concepts/effect-deny-action.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ The `details` property of the `denyAction` effect has all the subproperties that
3838
- Supported action names are: `delete`.
3939
- `cascadeBehaviors` (optional)
4040
- An _object_ that defines which behavior is followed when a resource is implicitly deleted when a resource group is removed.
41-
- Only supported in policy definitions with [mode](./definition-structure.md#resource-manager-modes) set to `indexed`.
41+
- Only supported in policy definitions with [mode](./definition-structure-basics.md#resource-manager-modes) set to `indexed`.
4242
- Allowed values are `allow` or `deny`.
4343
- Default value is `deny`.
4444

articles/governance/policy/concepts/effect-modify.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -7,13 +7,13 @@ ms.topic: conceptual
77

88
# Azure Policy definitions modify effect
99

10-
The `modify` effect is used to add, update, or remove properties or tags on a subscription or resource during creation or update. Existing non-compliant resources can also be remediated with a [remediation task](../how-to/remediate-resources.md). Policy assignments with effect set as Modify require a [managed identity](../how-to/remediate-resources.md) to do remediation. A common example using `modify` effect is updating tags on resources such as 'costCenter'.
10+
The `modify` effect is used to add, update, or remove properties or tags on a subscription or resource during creation or update. Existing non-compliant resources can also be remediated with a [remediation task](../how-to/remediate-resources.md). Policy assignments with effect set as Modify require a [managed identity](../how-to/remediate-resources.md) to do remediation. A common example using `modify` effect is updating tags on resources such as 'costCenter'.
1111

1212
There are some nuances in modification behavior for resource properties. Learn more about scenarios when modification is [skipped](#skipped-modification).
1313

1414
A single `modify` rule can have any number of operations. Supported operations are:
1515

16-
- _Add_, _replace_, or _remove_ resource tags. Only tags can be removed. For tags, a Modify policy should have [mode](./definition-structure.md#resource-manager-modes) set to `indexed` unless the target resource is a resource group.
16+
- _Add_, _replace_, or _remove_ resource tags. Only tags can be removed. For tags, a Modify policy should have [mode](./definition-structure-basics.md#resource-manager-modes) set to `indexed` unless the target resource is a resource group.
1717
- _Add_ or _replace_ the value of managed identity type (`identity.type`) of virtual machines and Virtual Machine Scale Sets. You can only modify the `identity.type` for virtual machines or Virtual Machine Scale Sets.
1818
- _Add_ or _replace_ the values of certain aliases.
1919
- Use `Get-AzPolicyAlias | Select-Object -ExpandProperty 'Aliases' | Where-Object { $_.DefaultMetadata.Attributes -eq 'Modifiable' }` in Azure PowerShell **4.6.0** or higher to get a list of aliases that can be used with `modify`.
@@ -26,7 +26,7 @@ A single `modify` rule can have any number of operations. Supported operations a
2626
2727
## Modify evaluation
2828

29-
Modify evaluates before the request gets processed by a Resource Provider during the creation or updating of a resource. The `modify` operations are applied to the request content when the `if` condition of the policy rule is met. Each `modify` operation can specify a condition that determines when it's applied.
29+
Modify evaluates before the request gets processed by a Resource Provider during the creation or updating of a resource. The `modify` operations are applied to the request content when the `if` condition of the policy rule is met. Each `modify` operation can specify a condition that determines when it's applied.
3030

3131
When an alias is specified, more checks are performed to ensure that the `modify` operation doesn't change the request content in a way that causes the resource provider to reject it:
3232

@@ -55,7 +55,7 @@ Modification of resource properties depends on the API request and the updated r
5555

5656
Imagine you apply a policy that modifies tags on a virtual machine (VM). Every time the VM is updated, such as during resizing or disk changes, the tags are updated accordingly regardless of the contents of the VM payload. This is because tags are independent of the VM properties.
5757

58-
However, if you apply a policy that modifies properties on a VM, modification is dependent on the resource payload. If you attempt to modify properties that are not included in the update payload, the modification will not take place. For instance, this can happen when patching the `assessmentMode` property of a VM (alias `Microsoft.Compute/virtualMachines/osProfile.windowsConfiguration.patchSettings.assessmentMode`). The property is "nested", so if its parent properties are not included in the request, this omission is assumed to be intentional and modification is skipped. For modification to take place, the resource payload should contain this context.
58+
However, if you apply a policy that modifies properties on a VM, modification is dependent on the resource payload. If you attempt to modify properties that are not included in the update payload, the modification will not take place. For instance, this can happen when patching the `assessmentMode` property of a VM (alias `Microsoft.Compute/virtualMachines/osProfile.windowsConfiguration.patchSettings.assessmentMode`). The property is "nested", so if its parent properties are not included in the request, this omission is assumed to be intentional and modification is skipped. For modification to take place, the resource payload should contain this context.
5959

6060
## Modify properties
6161

@@ -75,7 +75,7 @@ The `details` property of the `modify` effect has all the subproperties that def
7575
- An array of all tag operations to be completed on matching resources.
7676
- Properties:
7777
- `operation` (required)
78-
- Defines what action to take on a matching resource. Options are: `addOrReplace`, `Add`, and `Remove`.
78+
- Defines what action to take on a matching resource. Options are: `addOrReplace`, `Add`, and `Remove`.
7979
- `Add` behaves similar to the [append](./effect-append.md) effect.
8080
- `Remove` is only supported for resource tags.
8181
- `field` (required)
@@ -84,7 +84,7 @@ The `details` property of the `modify` effect has all the subproperties that def
8484
- The value to set the tag to.
8585
- This property is required if `operation` is _addOrReplace_ or _Add_.
8686
- `condition` (optional)
87-
- A string containing an Azure Policy language expression with [Policy functions](./definition-structure.md#policy-functions) that evaluates to _true_ or _false_.
87+
- A string containing an Azure Policy language expression with [Policy functions](./definition-structure-policy-rule.md#policy-functions) that evaluates to _true_ or _false_.
8888
- Doesn't support the following Policy functions: `field()`, `resourceGroup()`,
8989
`subscription()`.
9090

@@ -202,4 +202,4 @@ Example 3: Ensure that a storage account doesn't allow blob public access, the `
202202
- Understand how to [programmatically create policies](../how-to/programmatically-create.md).
203203
- Learn how to [get compliance data](../how-to/get-compliance-data.md).
204204
- Learn how to [remediate non-compliant resources](../how-to/remediate-resources.md).
205-
- Review [Azure management groups](../../management-groups/overview.md).
205+
- Review [Azure management groups](../../management-groups/overview.md).

articles/governance/policy/concepts/effect-mutate.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.topic: conceptual
77

88
# Azure Policy definitions mutate (preview) effect
99

10-
Mutation is used in Azure Policy for Kubernetes to remediate Azure Kubernetes Service (AKS) cluster components, like pods. This effect is specific to _Microsoft.Kubernetes.Data_ [policy mode](./definition-structure.md#resource-provider-modes) definitions only.
10+
Mutation is used in Azure Policy for Kubernetes to remediate Azure Kubernetes Service (AKS) cluster components, like pods. This effect is specific to _Microsoft.Kubernetes.Data_ [policy mode](./definition-structure-basics.md#resource-provider-modes) definitions only.
1111

1212
To learn more, go to [Understand Azure Policy for Kubernetes clusters](./policy-for-kubernetes.md).
1313

articles/governance/policy/concepts/exemption-structure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.topic: conceptual
77

88
# Azure Policy exemption structure
99

10-
The Azure Policy exemptions feature is used to _exempt_ a resource hierarchy or an individual resource from evaluation of initiatives or definitions. Resources that are _exempt_ count toward overall compliance, but can't be evaluated or have a temporary waiver. For more information, see [Understand applicability in Azure Policy](./policy-applicability.md). Azure Policy exemptions also work with the following [Resource Manager modes](./definition-structure.md#resource-manager-modes): `Microsoft.Kubernetes.Data`, `Microsoft.KeyVault.Data`, and `Microsoft.Network.Data`.
10+
The Azure Policy exemptions feature is used to _exempt_ a resource hierarchy or an individual resource from evaluation of initiatives or definitions. Resources that are _exempt_ count toward overall compliance, but can't be evaluated or have a temporary waiver. For more information, see [Understand applicability in Azure Policy](./policy-applicability.md). Azure Policy exemptions also work with the following [Resource Manager modes](./definition-structure-basics.md#resource-manager-modes): `Microsoft.Kubernetes.Data`, `Microsoft.KeyVault.Data`, and `Microsoft.Network.Data`.
1111

1212
You use JavaScript Object Notation (JSON) to create a policy exemption. The policy exemption contains elements for:
1313

articles/governance/policy/concepts/initiative-definition-structure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -390,7 +390,7 @@ Below is an example of the **policyMetadata** object. This example metadata belo
390390

391391
## Next steps
392392

393-
- See the [definition structure](./definition-structure.md)
393+
- See the [definition structure](./definition-structure-basics.md)
394394
- Review examples at [Azure Policy samples](../samples/index.md).
395395
- Review [Understanding policy effects](effect-basics.md).
396396
- Understand how to [programmatically create policies](../how-to/programmatically-create.md).

articles/governance/policy/concepts/policy-as-code.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ before it's too late and they're attempting to deploy in production.
2929

3030
Before getting into the details of Azure Policy as Code workflow, it's important to understand some fundamental concepts, like how to author policy definitions and initiative definitions, and how to leverage exemptions on assignments of those definitions:
3131

32-
- [Policy definition](./definition-structure.md)
32+
- [Policy definition](./definition-structure-basics.md)
3333
- [Initiative definition](./initiative-definition-structure.md)
3434
- [Policy exemption](./exemption-structure.md)
3535

@@ -221,7 +221,7 @@ supports scripted steps and automation based on triggers.
221221

222222
## Next steps
223223

224-
- Learn about the [policy definition structure](./definition-structure.md).
224+
- Learn about the [policy definition structure](./definition-structure-basics.md).
225225
- Learn about the [policy assignment structure](./assignment-structure.md).
226226
- Understand how to [programmatically create policies](../how-to/programmatically-create.md).
227227
- Learn how to [get compliance data](../how-to/get-compliance-data.md).

articles/governance/policy/concepts/regulatory-compliance.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ Regulatory Compliance in Azure Policy provides built-in initiative definitions t
1111
**controls** and **compliance domains** based on responsibility (_Customer_, _Microsoft_, _Shared_).
1212
For Microsoft-responsible controls, we provide additional details of our audit results based on
1313
third-party attestation and our implementation details to achieve that compliance.
14-
Microsoft-responsible controls are of `policyType` [static](./definition-structure.md#policy-type).
14+
Microsoft-responsible controls are of `policyType` [static](./definition-structure-basics.md#policy-type).
1515

1616
> [!NOTE]
1717
> Regulatory Compliance is a Preview feature. For updated built-ins, the initiatives
@@ -60,7 +60,7 @@ compliance** tab provides a granular view of each resource that's evaluated by a
6060
the currently viewed **control**.
6161

6262
> [!NOTE]
63-
> An evaluation type of **Microsoft managed** is for a [static](./definition-structure.md#policy-type) policy definition `policyType`.
63+
> An evaluation type of **Microsoft managed** is for a [static](./definition-structure-basics.md#policy-type) policy definition `policyType`.
6464
6565
:::image type="content" source="../media/regulatory-compliance/regulatory-compliance-policies.png" alt-text="Screenshot of the Regulatory Compliance details for the Boundary Protection control of the NIST SP 800-53 R4 built-in definition.":::
6666

0 commit comments

Comments
 (0)