Skip to content

Commit b5f79a0

Browse files
committed
Add details about initiative parameters
1 parent 24cd589 commit b5f79a0

File tree

2 files changed

+39
-28
lines changed

2 files changed

+39
-28
lines changed

articles/azure-policy/create-manage-policy.md

Lines changed: 39 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Use Azure Policy to enforce standards, meet regulatory compliance a
44
services: azure-policy
55
author: DCtheGeek
66
ms.author: dacoulte
7-
ms.date: 07/13/2018
7+
ms.date: 08/22/2018
88
ms.topic: tutorial
99
ms.service: azure-policy
1010
ms.custom: mvc
@@ -30,26 +30,26 @@ The first step in enforcing compliance with Azure Policy is to assign a policy d
3030

3131
![Search for policy](media/create-manage-policy/search-policy.png)
3232

33-
2. Select **Assignments** on the left side of the Azure Policy page. An assignment is a policy that has been assigned to take place within a specific scope.
34-
3. Select **Assign Policy** from the top of the **Policy - Assignments** page.
33+
1. Select **Assignments** on the left side of the Azure Policy page. An assignment is a policy that has been assigned to take place within a specific scope.
34+
1. Select **Assign Policy** from the top of the **Policy - Assignments** page.
3535

3636
![Assign a policy definition](media/create-manage-policy/select-assign-policy.png)
3737

38-
4. On the **Assign Policy** page, select the **Scope** by clicking the ellipsis and selecting a subscription (required) and resource group (optional). A scope determines what resources or grouping of resources the policy assignment gets enforced on. Then click **Select** at the bottom of the **Scope** page.
38+
1. On the **Assign Policy** page, select the **Scope** by clicking the ellipsis and selecting a subscription (required) and resource group (optional). A scope determines what resources or grouping of resources the policy assignment gets enforced on. Then click **Select** at the bottom of the **Scope** page.
3939

4040
This example uses the **Contoso Subscription**. Your subscription will differ.
4141

42-
5. If you wanted to exclude one or more resource groups (if you only scoped a subscription) or specific resources within a resource group (either scoping case), you could configure **Exclusions** from the policy assignment. Leave it blank for now.
42+
1. If you wanted to exclude one or more resource groups (if you only scoped a subscription) or specific resources within a resource group (either scoping case), you could configure **Exclusions** from the policy assignment. Leave it blank for now.
4343

44-
6. Select the **Policy definition** ellipsis to open the list of available definitions. You can filter the policy definition **Type** to *Built-in* to view all and read their descriptions.
44+
1. Select the **Policy definition** ellipsis to open the list of available definitions. You can filter the policy definition **Type** to *Built-in* to view all and read their descriptions.
4545

46-
7. Select **Require SQL Server version 12.0**. If you cannot find it right away, type **require sql server** into the search box and then press ENTER or click out of the search box. Click **Select** at the bottom of the **Available Definitions** page once you have found and selected the policy definition.
46+
1. Select **Require SQL Server version 12.0**. If you cannot find it right away, type **require sql server** into the search box and then press ENTER or click out of the search box. Click **Select** at the bottom of the **Available Definitions** page once you have found and selected the policy definition.
4747

4848
![Locate a policy](media/create-manage-policy/select-available-definition.png)
4949

50-
8. The **Assignment name** is automatically populated with the policy name you selected, but you can change it. For this example, leave *Require SQL Server version 12.0*. You can also add an optional **Description**. The description provides details about this policy assignment.
50+
1. The **Assignment name** is automatically populated with the policy name you selected, but you can change it. For this example, leave *Require SQL Server version 12.0*. You can also add an optional **Description**. The description provides details about this policy assignment.
5151

52-
9. Click **Assign**.
52+
1. Click **Assign**.
5353

5454
## Implement a new custom policy
5555

@@ -59,8 +59,8 @@ Now that you've assigned a built-in policy definition, you can do more with Azur
5959

6060
![Definition under authoring](media/create-manage-policy/definition-under-authoring.png)
6161

62-
2. Select **+ Policy definition** at the top of the page. This opens to the **Policy definition** page.
63-
3. Enter the following:
62+
1. Select **+ Policy definition** at the top of the page. This opens to the **Policy definition** page.
63+
1. Enter the following:
6464

6565
- The management group or subscription in which the policy definition is saved. Select by using the ellipsis on **Definition location**.
6666

@@ -102,7 +102,7 @@ Now that you've assigned a built-in policy definition, you can do more with Azur
102102

103103
To view more Azure policy samples, see [Templates for Azure Policy](json-samples.md).
104104

105-
4. Select **Save**.
105+
1. Select **Save**.
106106

107107
## Create a policy definition with REST API
108108

@@ -241,7 +241,7 @@ Get-AzureRmPolicyDefinition
241241

242242
It returns all available policy definitions, including built-in policies. Each policy is returned in the following format:
243243

244-
```
244+
```output
245245
Name : e56962a6-4747-49cd-b67b-bf8b01975c4c
246246
ResourceId : /providers/Microsoft.Authorization/policyDefinitions/e56962a6-4747-49cd-b67b-bf8b01975c4c
247247
ResourceName : e56962a6-4747-49cd-b67b-bf8b01975c4c
@@ -321,19 +321,19 @@ With an initiative definition, you can group several policy definitions to achie
321321

322322
![Select definitions](media/create-manage-policy/select-definitions.png)
323323

324-
2. Select **+ Initiative Definition** at the top of the page to open the **Initiative definition** page.
324+
1. Select **+ Initiative Definition** at the top of the page to open the **Initiative definition** page.
325325

326326
![Initiative definition](media/create-manage-policy/initiative-definition.png)
327327

328-
3. Use the **Definition location** ellipsis to select a subscription to store the definition.
328+
1. Use the **Definition location** ellipsis to select a management group or subscription to store the definition.
329329

330-
4. Enter the **Name** and **Description** of the initiative.
330+
1. Enter the **Name** and **Description** of the initiative.
331331

332332
This example will ensure that resources are in compliance with policy definitions about getting secure. So, the name of the initiative would be **Get Secure** and the description would be: **This initiative has been created to handle all policy definitions associated with securing resources**.
333333

334-
5. For **Category**, choose from existing options or create a new category.
334+
1. For **Category**, choose from existing options or create a new category.
335335

336-
6. Browse through the list of **Available Definitions** (right half of **Initiative definition** page) and select the policy definition(s) you would like to add to this initiative. For the **Get secure** initiative, add the following built-in policy definitions by clicking the **+** next to the policy definition information or clicking a policy definition row and then the **+ Add** option in the details page:
336+
1. Browse through the list of **Available Definitions** (right half of **Initiative definition** page) and select the policy definition(s) you would like to add to this initiative. For the **Get secure** initiative, add the following built-in policy definitions by clicking the **+** next to the policy definition information or clicking a policy definition row and then the **+ Add** option in the details page:
337337
- Require SQL Server version 12.0
338338
- [Preview]: Monitor unprotected web applications in Security Center.
339339
- [Preview]: Monitor permissive network across in Security Center.
@@ -344,28 +344,39 @@ With an initiative definition, you can group several policy definitions to achie
344344

345345
![Initiative definitions](media/create-manage-policy/initiative-definition-2.png)
346346

347-
7. Click **Save**.
347+
1. If a policy definition being added to the initiative has parameters, they are shown under the policy name in the **POLICIES AND PARAMETERS** area. The _value_ can be set to either 'Set value' (hard coded for all assignments of this initiative) or 'Use Initiative Parameter' (set during each initiative assignment). If 'Set value' is selected, the drown-down to the right of _Values_ allows entering or selecting the desired value(s). If 'Use Initiative Parameter' is selected, a new **Initiative parameters** section is displayed and the _parameter name_ will match the _value_ of the policy parameter name. The allowed values on this initiative parameter can further restrict what may be set during initiative assignment.
348+
349+
![Initiative definition parameters](media/create-manage-policy/initiative-definition-3.png)
350+
351+
> [!NOTE]
352+
> In the case of some `strongType` parameters, the list of values cannot be automatically
353+
> determined. In these cases, an ellipsis will appear to the right of the parameter row. Clicking
354+
> it will open the 'Parameter scope (<parameter name>>)' page. On this page, select the
355+
> subscription to use for providing the value options. This page has no impact on scope for
356+
> compliance of the initiative.
357+
358+
1. Click **Save**.
348359

349360
### Assign an initiative definition
350361

351362
1. Select **Definitions** under **AUTHORING** in the left side of the Azure Policy page.
352-
2. Locate the **Get Secure** initiative definition you previously created and select it.
353-
3. Select **Assign** at the top of the page to open to the **Get Secure: Assign Initiative** page.
363+
1. Locate the **Get Secure** initiative definition you previously created and select it.
364+
1. Select **Assign** at the top of the page to open to the **Get Secure: Assign Initiative** page.
354365

355366
![Assign a definition](media/create-manage-policy/assign-definition.png)
356367

357368
Alternatively, you can right-click on the selected row or left-click on the ellipsis at the end of the row for a contextual menu. Then select **Assign**.
358369

359370
![Right-click a row](media/create-manage-policy/select-right-click.png)
360371

361-
4. Fill out the **Get Secure: Assign Initiative** page by entering the following example information. You can use your own information.
372+
1. Fill out the **Get Secure: Assign Initiative** page by entering the following example information. You can use your own information.
362373

363374
- Scope: The subscription you saved the initiative to will be the default. You can change scope to assign the initiative to a resource group within the subscription save location.
364375
- Exclusions: Configure any resources within the scope to prevent the initiative assignment from being applied to them.
365376
- Initiative definition and Assignment name: Get Secure (pre-populated as name of initiative being assigned).
366377
- Description: This initiative assignment is tailored to enforce this group of policy definitions.
367378

368-
5. Click **Assign**.
379+
1. Click **Assign**.
369380

370381
## Exempt a non-compliant or denied resource using Exclusion
371382

@@ -386,15 +397,15 @@ In this example, Trent Baker, one of Contoso's Sr. Virtualization specialists, w
386397
### Update assignment with exclusion
387398

388399
1. Select **Assignments** under **AUTHORING** in the left side of the Azure Policy page.
389-
2. Browse through all policy assignments and open the *Require SQL Server version 12.0* assignment.
390-
3. Set the **Exclusion** by clicking the ellipsis and selecting the resource group to exclude, *SQLServers_Excluded* in this example.
400+
1. Browse through all policy assignments and open the *Require SQL Server version 12.0* assignment.
401+
1. Set the **Exclusion** by clicking the ellipsis and selecting the resource group to exclude, *SQLServers_Excluded* in this example.
391402

392403
![Request exclusion](media/create-manage-policy/request-exclusion.png)
393404

394405
> [!NOTE]
395406
> Depending on the policy and its effect, the exclusion could also be granted to specific resources within a resource group inside the scope of the assignment. As a **Deny** effect was used in this tutorial, it would not make sense to set the exclusion on a specific resource that already exists.
396407
397-
4. Click **Select** and then click **Save**.
408+
1. Click **Select** and then click **Save**.
398409

399410
In this section, you resolved the denial of the attempt to create a prohibited version of SQL server by creating an exclusion on a single resource group.
400411

@@ -403,8 +414,8 @@ In this section, you resolved the denial of the attempt to create a prohibited v
403414
If you are done working with resources from this tutorial, use the following steps to delete any of the assignments or definitions created above:
404415

405416
1. Select **Definitions** (or **Assignments** if you are trying to delete an assignment) under **AUTHORING** in the left side of the Azure Policy page.
406-
2. Search for the new initiative or policy definition (or assignment) you want to remove.
407-
3. Right-click the row or select the ellipses at the end of the definition (or assignment), and select **Delete definition** (or **Delete assignment**).
417+
1. Search for the new initiative or policy definition (or assignment) you want to remove.
418+
1. Right-click the row or select the ellipses at the end of the definition (or assignment), and select **Delete definition** (or **Delete assignment**).
408419

409420
## Next steps
410421

21.6 KB
Loading

0 commit comments

Comments
 (0)