Skip to content

Commit 9010ea1

Browse files
committed
fixed link
1 parent 0848999 commit 9010ea1

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/lighthouse/how-to/policy-at-scale.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ Search-AzGraph -Query "Resources | where type =~ 'Microsoft.Storage/storageAccou
3131

3232
## Deploy a policy across multiple customer tenants
3333

34-
The example below shows how to use an [Azure Resource Manager template](https://raw.githubusercontent.com/Azure/Azure-Lighthouse-samples/master/Azure-Delegated-Resource-Management/templates/policy-enforce-https-storage/enforceHttpsStorage.json) to deploy a policy definition and policy assignment across delegated subscriptions in multiple customer tenants. This policy definition requires all storage accounts to use HTTPS traffic, preventing the creation of any new storage accounts that don’t comply and marking existing storage accounts without the setting as non-compliant.
34+
The example below shows how to use an [Azure Resource Manager template](https://github.com/Azure/Azure-Lighthouse-samples/blob/master/Azure-Delegated-Resource-Management/templates/policy-enforce-https-storage/enforceHttpsStorage.json) to deploy a policy definition and policy assignment across delegated subscriptions in multiple customer tenants. This policy definition requires all storage accounts to use HTTPS traffic, preventing the creation of any new storage accounts that don’t comply and marking existing storage accounts without the setting as non-compliant.
3535

3636
```powershell
3737
Write-Output "In total, there are $($ManagedSubscriptions.Count) delegated customer subscriptions to be managed"

0 commit comments

Comments
 (0)