Skip to content

Commit b85d523

Browse files
committed
Converting image format
1 parent a79dc29 commit b85d523

File tree

9 files changed

+48
-49
lines changed

9 files changed

+48
-49
lines changed

articles/governance/policy/assign-policy-template.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -75,7 +75,7 @@ Some additional resources:
7575
Select **Compliance** in the left side of the page. Then locate the **Audit VMs that do not use
7676
managed disks** policy assignment you created.
7777

78-
![Policy compliance overview page](./media/assign-policy-template/policy-compliance.png)
78+
:::image type="content" source="./media/assign-policy-template/policy-compliance.png" alt-text="Policy compliance overview page" border="false":::
7979

8080
If there are any existing resources that aren't compliant with this new assignment, they appear
8181
under **Non-compliant resources**.
@@ -93,7 +93,7 @@ To remove the assignment created, follow these steps:
9393
1. Right-click the **Audit VMs that do not use managed disks** policy assignment and select **Delete
9494
assignment**.
9595

96-
![Delete an assignment from the compliance overview page](./media/assign-policy-template/delete-assignment.png)
96+
:::image type="content" source="./media/assign-policy-template/delete-assignment.png" alt-text="Delete an assignment from the compliance overview page" border="false":::
9797

9898
## Next steps
9999

articles/governance/policy/concepts/definition-structure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -764,7 +764,7 @@ Policy, use one of the following methods:
764764
Use the [Azure Policy extension for Visual Studio Code](../how-to/extension-for-vscode.md) to view
765765
and discover aliases for resource properties.
766766

767-
![Azure Policy extension for Visual Studio Code](../media/extension-for-vscode/extension-hover-shows-property-alias.png)
767+
:::image type="content" source="../media/extension-for-vscode/extension-hover-shows-property-alias.png" alt-text="Azure Policy extension for Visual Studio Code" border="false":::
768768

769769
- Azure Resource Graph
770770

articles/governance/policy/concepts/policy-as-code.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ before it's too late and they're attempting to deploy in production.
3131

3232
The recommended general workflow of Policy as Code looks like this diagram:
3333

34-
![Policy as Code workflow overview](../media/policy-as-code/policy-as-code-workflow.png)
34+
:::image type="content" source="../media/policy-as-code/policy-as-code-workflow.png" alt-text="Policy as Code workflow overview" border="false":::
3535

3636
### Create and update policy definitions
3737

articles/governance/policy/concepts/rego-for-aks.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -42,11 +42,11 @@ preview, follow these steps in either the Azure portal or with Azure CLI:
4242
1. Launch the Azure Policy service in the Azure portal by clicking **All services**, then
4343
searching for and selecting **Policy**.
4444

45-
![Search for Policy in All Services](../media/rego-for-aks/search-policy.png)
45+
:::image type="content" source="../media/rego-for-aks/search-policy.png" alt-text="Search for Policy in All Services" border="false":::
4646

4747
1. Select **Join Preview** on the left side of the Azure Policy page.
4848

49-
![Join the Policy for AKS preview](../media/rego-for-aks/join-aks-preview.png)
49+
:::image type="content" source="../media/rego-for-aks/join-aks-preview.png" alt-text="Join the Policy for AKS preview" border="false":::
5050

5151
1. Select the row of the subscription you want added to the preview.
5252

@@ -144,11 +144,11 @@ manage.
144144

145145
1. Select **Policies (preview)** on the left side of the Kubernetes service page.
146146

147-
![Policies from the AKS cluster](../media/rego-for-aks/policies-preview-from-aks-cluster.png)
147+
:::image type="content" source="../media/rego-for-aks/policies-preview-from-aks-cluster.png" alt-text="Policies from the AKS cluster" border="false":::
148148

149149
1. In the main page, select the **Enable add-on** button.
150150

151-
![Enable the Azure Policy for AKS add-on](../media/rego-for-aks/enable-policy-add-on.png)
151+
:::image type="content" source="../media/rego-for-aks/enable-policy-add-on.png" alt-text="Enable the Azure Policy for AKS add-on" border="false":::
152152

153153
> [!NOTE]
154154
> If the **Enable add-on** button is grayed out, the subscription has not yet been added to the
@@ -252,11 +252,11 @@ To remove the Azure Policy Add-on from your AKS cluster, use either the Azure po
252252

253253
1. Select **Policies (preview)** on the left side of the Kubernetes service page.
254254

255-
![Policies from the AKS cluster](../media/rego-for-aks/policies-preview-from-aks-cluster.png)
255+
:::image type="content" source="../media/rego-for-aks/policies-preview-from-aks-cluster.png" alt-text="Policies from the AKS cluster" border="false":::
256256

257257
1. In the main page, select the **Disable add-on** button.
258258

259-
![Disable the Azure Policy for AKS add-on](../media/rego-for-aks/disable-policy-add-on.png)
259+
:::image type="content" source="../media/rego-for-aks/disable-policy-add-on.png" alt-text="Disable the Azure Policy for AKS add-on" border="false":::
260260

261261
- Azure CLI
262262

articles/governance/policy/how-to/determine-non-compliance.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -43,14 +43,14 @@ To view the compliance details, follow these steps:
4343
the ellipsis of a resource in a **compliance state** that is _Non-compliant_. Then select **View
4444
compliance details**.
4545

46-
![View compliance details option](../media/determine-non-compliance/view-compliance-details.png)
46+
:::image type="content" source="../media/determine-non-compliance/view-compliance-details.png" alt-text="View compliance details option" border="false":::
4747

4848
1. The **Compliance details** pane displays information from the latest evaluation of the resource
4949
to the current policy assignment. In this example, the field **Microsoft.Sql/servers/version** is
5050
found to be _12.0_ while the policy definition expected _14.0_. If the resource is non-compliant
5151
for multiple reasons, each is listed on this pane.
5252

53-
![Compliance details pane and reasons for non-compliance](../media/determine-non-compliance/compliance-details-pane.png)
53+
:::image type="content" source="../media/determine-non-compliance/compliance-details-pane.png" alt-text="Compliance details pane and reasons for non-compliance" border="false":::
5454

5555
For an **auditIfNotExists** or **deployIfNotExists** policy definition, the details include the
5656
**details.type** property and any optional properties. For a list, see [auditIfNotExists
@@ -83,7 +83,7 @@ To view the compliance details, follow these steps:
8383
}
8484
```
8585

86-
![Compliance details pane - *ifNotExists](../media/determine-non-compliance/compliance-details-pane-existence.png)
86+
:::image type="content" source="../media/determine-non-compliance/compliance-details-pane-existence.png" alt-text="Compliance details pane - *ifNotExists" border="false":::
8787

8888
> [!NOTE]
8989
> To protect data, when a property value is a _secret_ the current value displays asterisks.
@@ -123,10 +123,10 @@ The following matrix maps each possible _reason_ to the responsible
123123

124124
## Compliance details for Guest Configuration
125125

126-
For _auditIfNotExists_ policies in the _Guest Configuration_ category, there could be multiple settings
127-
evaluated inside the VM and you'll need to view per-setting details. For example, if you're auditing
128-
for a list of password policies and only one of them has status _Non-compliant_, you'll need to
129-
know which specific password policies are out of compliance and why.
126+
For _auditIfNotExists_ policies in the _Guest Configuration_ category, there could be multiple
127+
settings evaluated inside the VM and you'll need to view per-setting details. For example, if you're
128+
auditing for a list of password policies and only one of them has status _Non-compliant_, you'll
129+
need to know which specific password policies are out of compliance and why.
130130

131131
You also might not have access to sign in to the VM directly but you need to report on why the VM is
132132
_Non-compliant_.
@@ -137,15 +137,15 @@ Begin by following the same steps in the section above for viewing policy compli
137137

138138
In the **Compliance details** pane view click the link **Last evaluated resource**.
139139

140-
![View auditIfNotExists definition details](../media/determine-non-compliance/guestconfig-auditifnotexists-compliance.png)
140+
:::image type="content" source="../media/determine-non-compliance/guestconfig-auditifnotexists-compliance.png" alt-text="View auditIfNotExists definition details" border="false":::
141141

142142
The **Guest Assignment** page displays all available compliance details. Each row in the view
143143
represents an evaluation that was performed inside the machine. In the **Reason** column, a
144144
phrase describing why the Guest Assignment is _Non-compliant_ is shown. For example, if you're
145145
auditing password policies, the **Reason** column would display text including
146146
the current value for each setting.
147147

148-
![View compliance details](../media/determine-non-compliance/guestconfig-compliance-details.png)
148+
:::image type="content" source="../media/determine-non-compliance/guestconfig-compliance-details.png" alt-text="View compliance details" border="false":::
149149

150150
### Azure PowerShell
151151

@@ -234,12 +234,12 @@ triggered when the Resource Manager properties are added, removed, or altered.
234234
1. Select the **Change History (preview)** tab on the **Resource Compliance** page. A list of
235235
detected changes, if any exist, are displayed.
236236

237-
![Azure Policy Change History tab on Resource Compliance page](../media/determine-non-compliance/change-history-tab.png)
237+
:::image type="content" source="../media/determine-non-compliance/change-history-tab.png" alt-text="Azure Policy Change History tab on Resource Compliance page" border="false":::
238238

239239
1. Select one of the detected changes. The _visual diff_ for the resource is presented on the
240240
**Change history** page.
241241

242-
![Azure Policy Change History Visual Diff on Change history page](../media/determine-non-compliance/change-history-visual-diff.png)
242+
:::image type="content" source="../media/determine-non-compliance/change-history-visual-diff.png" alt-text="Azure Policy Change History Visual Diff on Change history page" border="false":::
243243

244244
The _visual diff_ aides in identifying changes to a resource. The changes detected may not be
245245
related to the current compliance state of the resource.

articles/governance/policy/how-to/extension-for-vscode.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ For a national cloud user, follow these steps to set the Azure environment first
5353

5454
1. Select the nation cloud from the list:
5555

56-
![Set default Azure cloud sign in for Visual Studio Code](../media/extension-for-vscode/set-default-azure-cloud-sign-in.png)
56+
:::image type="content" source="../media/extension-for-vscode/set-default-azure-cloud-sign-in.png" alt-text="Set default Azure cloud sign in for Visual Studio Code" border="false":::
5757

5858
## Connect to an Azure account
5959

@@ -66,13 +66,13 @@ to connect to Azure from Visual Studio Code:
6666

6767
From the Azure Policy extension, select **Sign in to Azure**.
6868

69-
![Azure cloud sign in for Visual Studio Code from Azure Policy extension](../media/extension-for-vscode/azure-cloud-sign-in-policy-extension.png)
69+
:::image type="content" source="../media/extension-for-vscode/azure-cloud-sign-in-policy-extension.png" alt-text="Azure cloud sign in for Visual Studio Code from Azure Policy extension" border="false":::
7070

7171
- Command Palette
7272

7373
From the menu bar, go to **View** > **Command Palette**, and enter **Azure: Sign In**.
7474

75-
![Azure cloud sign in for Visual Studio Code from Command Palette](../media/extension-for-vscode/azure-cloud-sign-in-command-palette.png)
75+
:::image type="content" source="../media/extension-for-vscode/azure-cloud-sign-in-command-palette.png" alt-text="Azure cloud sign in for Visual Studio Code from Command Palette" border="false":::
7676

7777
1. Follow the sign in instructions to sign in to Azure. After you're connected, your Azure account
7878
name is shown on the status bar at the bottom of the Visual Studio Code window.
@@ -150,7 +150,7 @@ Azure Policy alias if one exists. In this example, the resource is a
150150
**properties.storageProfile.imageReference.offer** property is hovered over. Hovering shows the
151151
matching aliases.
152152

153-
![Azure Policy extension hover shows Resource Manager property alias](../media/extension-for-vscode/extension-hover-shows-property-alias.png)
153+
:::image type="content" source="../media/extension-for-vscode/extension-hover-shows-property-alias.png" alt-text="Azure Policy extension hover shows Resource Manager property alias" border="false":::
154154

155155
## Search for and view policies and assignments
156156

articles/governance/policy/how-to/get-compliance-data.md

Lines changed: 16 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -128,13 +128,13 @@ condition triggers evaluation of the existence condition for the related resourc
128128
For example, assume that you have a resource group – ContsoRG, with some storage accounts
129129
(highlighted in red) that are exposed to public networks.
130130

131-
![Storage accounts exposed to public networks](../media/getting-compliance-data/resource-group01.png)
131+
:::image type="content" source="../media/getting-compliance-data/resource-group01.png" alt-text="Storage accounts exposed to public networks" border="false":::
132132

133133
In this example, you need to be wary of security risks. Now that you've created a policy assignment,
134134
it's evaluated for all storage accounts in the ContosoRG resource group. It audits the three
135135
non-compliant storage accounts, consequently changing their states to **Non-compliant.**
136136

137-
![Audited non-compliant storage accounts](../media/getting-compliance-data/resource-group03.png)
137+
:::image type="content" source="../media/getting-compliance-data/resource-group03.png" alt-text="Audited non-compliant storage accounts" border="false":::
138138

139139
Besides **Compliant** and **Non-compliant**, policies and resources have three other states:
140140

@@ -156,7 +156,7 @@ divided by the sum of all distinct resources. In the image below, there are 20 d
156156
that are applicable and only one is **Non-compliant**. The overall resource compliance is 95% (19
157157
out of 20).
158158

159-
![Example of policy compliance from Compliance page](../media/getting-compliance-data/simple-compliance.png)
159+
:::image type="content" source="../media/getting-compliance-data/simple-compliance.png" alt-text="Example of policy compliance from Compliance page" border="false":::
160160

161161
## Portal
162162

@@ -167,14 +167,14 @@ and count per assignment, it contains a chart showing compliance over the last s
167167
**Compliance** page contains much of this same information (except the chart), but provide
168168
additional filtering and sorting options.
169169

170-
![Example of Azure Policy Compliance page](../media/getting-compliance-data/compliance-page.png)
170+
:::image type="content" source="../media/getting-compliance-data/compliance-page.png" alt-text="Example of Azure Policy Compliance page" border="false":::
171171

172172
Since a policy or initiative can be assigned to different scopes, the table includes the scope for
173173
each assignment and the type of definition that was assigned. The number of non-compliant resources
174174
and non-compliant policies for each assignment are also provided. Clicking on a policy or initiative
175175
in the table provides a deeper look at the compliance for that particular assignment.
176176

177-
![Example of Azure Policy Compliance Details page](../media/getting-compliance-data/compliance-details.png)
177+
:::image type="content" source="../media/getting-compliance-data/compliance-details.png" alt-text="Example of Azure Policy Compliance Details page" border="false":::
178178

179179
The list of resources on the **Resource compliance** tab shows the evaluation status of existing
180180
resources for the current assignment. The tab defaults to **Non-compliant**, but can be filtered.
@@ -184,29 +184,28 @@ the **Events** tab.
184184
> [!NOTE]
185185
> For an AKS Engine policy, the resource shown is the resource group.
186186
187-
![Example of Azure Policy Compliance events](../media/getting-compliance-data/compliance-events.png)
187+
:::image type="content" source="../media/getting-compliance-data/compliance-events.png" alt-text="Example of Azure Policy Compliance events" border="false":::
188188

189189
For [Resource Provider mode](../concepts/definition-structure.md#resource-provider-modes) resources,
190190
on the **Resource compliance** tab, selecting the resource or right-clicking on the row and
191191
selecting **View compliance details** opens the component compliance details. This page also offers
192192
tabs to see the policies that are assigned to this resource, events, component events, and change
193193
history.
194194

195-
![Example of Azure Policy Component compliance details](../media/getting-compliance-data/compliance-components.png)
195+
:::image type="content" source="../media/getting-compliance-data/compliance-components.png" alt-text="Example of Azure Policy Component compliance details" border="false":::
196196

197197
Back on the resource compliance page, right-click on the row of the event you would like to gather
198198
more details on and select **Show activity logs**. The activity log page opens and is pre-filtered
199199
to the search showing details for the assignment and the events. The activity log provides
200200
additional context and information about those events.
201201

202-
![Example of Azure Policy Compliance Activity Log](../media/getting-compliance-data/compliance-activitylog.png)
202+
:::image type="content" source="../media/getting-compliance-data/compliance-activitylog.png" alt-text="Example of Azure Policy Compliance Activity Log" border="false":::
203203

204204
### Understand non-compliance
205205

206-
<a name="change-history-preview"></a>
207-
208206
When a resources is determined to be **non-compliant**, there are many possible reasons. To
209-
determine the reason a resource is **non-compliant** or to find the change responsible, see [Determine non-compliance](./determine-non-compliance.md).
207+
determine the reason a resource is **non-compliant** or to find the change responsible, see
208+
[Determine non-compliance](./determine-non-compliance.md).
210209

211210
## Command line
212211

@@ -485,13 +484,13 @@ Trent Baker
485484
## Azure Monitor logs
486485

487486
If you have a [Log Analytics workspace](../../../log-analytics/log-analytics-overview.md) with
488-
`AzureActivity` from the [Activity Log Analytics solution](../../../azure-monitor/platform/activity-log-collect.md) tied to your subscription, you
489-
can also view non-compliance results from the evaluation cycle using simple Kusto queries and the
490-
`AzureActivity` table. With details in Azure Monitor logs, alerts can be configured to watch for
491-
non-compliance.
492-
487+
`AzureActivity` from the
488+
[Activity Log Analytics solution](../../../azure-monitor/platform/activity-log-collect.md) tied to
489+
your subscription, you can also view non-compliance results from the evaluation cycle using simple
490+
Kusto queries and the `AzureActivity` table. With details in Azure Monitor logs, alerts can be
491+
configured to watch for non-compliance.
493492

494-
![Azure Policy Compliance using Azure Monitor logs](../media/getting-compliance-data/compliance-loganalytics.png)
493+
:::image type="content" source="../media/getting-compliance-data/compliance-loganalytics.png" alt-text="Azure Policy Compliance using Azure Monitor logs" border="false":::
495494

496495
## Next steps
497496

0 commit comments

Comments
 (0)