You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
All built-in policies for Guest Configuration are included in an initiative to group the definitions
151
-
for use in assignments. The built-in initiative named _\[Preview\]: Audit Password security settings
148
+
for use in assignments. The built-in initiative named _\[Preview\]: Audit Password security
152
149
inside Linux and Windows machines_ contains 18 policies. There are six **DeployIfNotExists** and
153
150
**AuditIfNotExists** pairs for Windows and three pairs for Linux. The
154
151
[policy definition](definition-structure.md#policy-rule) logic validates that only the target
155
152
operating system is evaluated.
156
153
157
154
#### Auditing operating system settings following industry baselines
158
155
159
-
One of the initiatives available in Azure Policy provides the ability to audit operating system
160
-
settings inside virtual machines following a "baseline" from Microsoft. The definition,
156
+
One initiative in Azure Policy provides the ability to audit operating system
157
+
settings following a "baseline". The definition,
161
158
_\[Preview\]: Audit Windows VMs that do not match Azure security baseline settings_ includes a
162
-
complete set of audit rules based on settings from Active Directory Group Policy.
159
+
set of rules based on Active Directory Group Policy.
163
160
164
-
Most of the settings are available as parameters. This functionality allows you to customize what is
165
-
audited to align the policy with your organizational requirements or to map the policy to
161
+
Most of the settings are available as parameters. Parameters allow you to customize what is
162
+
audited. Align the policy with your requirements or map the policy to
166
163
third-party information such as industry regulatory standards.
167
164
168
-
Some parameters support an integer value range. For example, the Maximum Password Age parameter can
169
-
be set using a range operator to give flexibility to machine owners. You could audit that the
170
-
effective Group Policy setting requiring users to change their passwords should be no more than 70
171
-
days, but shouldn't be less than one day. As described in the info-bubble for the parameter, to make
172
-
this business policy the effective audit value, set the value to "1,70".
165
+
Some parameters support an integer value range. For example, the Maximum Password Age setting could audit the
166
+
effective Group Policy setting. A "1,70" range would confirm that users are required to change their passwords at least every 70
167
+
days, but no less than one day.
173
168
174
-
If you assign the policy using an Azure Resource Manager deployment template, you can use a
175
-
parameters file to manage these settings from source control. Using a tool such as Git to manage
176
-
changes to Audit policies with comments at each check-in documents evidence as to why an assignment
177
-
should be an exception to the expected value.
169
+
If you assign the policy using an Azure Resource Manager deployment template, use a parameters file to manage exceptions. Check in the files to a version control system such as Git. Comments about file changes provide evidence why an assignment
170
+
is an exception to the expected value.
178
171
179
172
#### Applying configurations using Guest Configuration
180
173
@@ -224,9 +217,7 @@ If that isn't successful, collecting client logs can help diagnose issues.
224
217
225
218
#### Windows
226
219
227
-
To use the Azure VM Run Command capability to capture information from log files in Windows
228
-
machines, the following example PowerShell script can be helpful. For more information, see
229
-
[Run PowerShell scripts in your Windows VM with Run Command](../../../virtual-machines/windows/run-command.md).
220
+
Capture information from log files using [Azure VM Run Command](../../../virtual-machines/windows/run-command.md), the following example PowerShell script can be helpful.
0 commit comments