Skip to content

Commit bd21660

Browse files
authored
Merge pull request #104111 from MicrosoftDocs/release-policy-samples
Release policy samples
2 parents 5c6d22a + bde0be2 commit bd21660

File tree

126 files changed

+1646
-4890
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

126 files changed

+1646
-4890
lines changed

.openpublishing.redirection.json

Lines changed: 347 additions & 102 deletions
Large diffs are not rendered by default.

articles/azure-government/compliance/compliance-tic.md

Lines changed: 1 addition & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -204,19 +204,7 @@ Azure Policy is targeted at the subscription level. The service provides a centr
204204
- Enforce compliance
205205
- Manage exceptions
206206

207-
Along with many built-in definitions, administrators can define their own custom definitions by using simple JSON templates. Microsoft recommends the prioritization of auditing over enforcement, where possible.
208-
209-
The following sample policies can be used for TIC compliance scenarios:
210-
211-
|Policy |Sample scenario |Template |
212-
|---------|---------|---------|
213-
|Enforce user-defined route table. | Ensure that the default route on all virtual networks points to an approved virtual network gateway for routing to on-premises. | Get started with this [template](../../governance/policy/samples/no-user-defined-route-table.md). |
214-
|Audit if Network Watcher isn't enabled for a region. | Ensure that Network Watcher is enabled for all used regions. | Get started with this [template](../../governance/policy/samples/network-watcher-not-enabled.md). |
215-
|NSG x on every subnet. | Ensure that an NSG (or a set of approved NSGs) with internet traffic blocked is applied to all subnets in every virtual network. | Get started with this [template](../../governance/policy/samples/nsg-on-subnet.md). |
216-
|NSG x on every NIC. | Ensure that an NSG with internet traffic blocked is applied to all NICs on all virtual machines. | Get started with this [template](../../governance/policy/samples/nsg-on-nic.md). |
217-
|Use an approved virtual network for virtual machine network interfaces. | Ensure that all NICs are on an approved virtual network. | Get started with this [template](../../governance/policy/samples/use-approved-vnet-vm-nics.md). |
218-
|Allowed locations. | Ensure that all resources are deployed to regions with compliant virtual networks and Network Watcher configuration. | Get started with this [template](../../governance/policy/samples/allowed-locations.md). |
219-
|Not allowed resource types, such as **PublicIPs**. | Prohibit the deployment of resource types that don't have a compliance plan. Use this policy to prohibit the deployment of public IP address resources. While NSG rules can be used to effectively block inbound internet traffic, preventing the use of public IPs further reduces the attack surface. | Get started with this [template](../../governance/policy/samples/not-allowed-resource-types.md). |
207+
Along with many [built-in policy definitions](../../governance/policy/samples/built-in-policies.md), administrators can define their own custom definitions by using simple JSON templates. Microsoft recommends the prioritization of auditing over enforcement, where possible.
220208

221209
### Network Watcher traffic analytics
222210

articles/azure-resource-manager/management/tag-resources.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ To apply tags to resources, the user must have write access to that resource typ
3737

3838
You can use [Azure Policy](../../governance/policy/overview.md) to enforce tagging rules and conventions. By creating a policy, you avoid the scenario of resources being deployed to your subscription that don't comply with the expected tags for your organization. Instead of manually applying tags or searching for resources that aren't compliant, you can create a policy that automatically applies the needed tags during deployment. Tags can also now be applied to existing resources with the new [Modify](../../governance/policy/concepts/effects.md#modify) effect and a [remediation task](../../governance/policy/how-to/remediate-resources.md). The following section shows example policies for tags.
3939

40-
[!INCLUDE [Tag policies](../../../includes/azure-policy-samples-general-tags.md)]
40+
[!INCLUDE [Tag policies](../../../includes/azure-policy-samples-policies-tags.md)]
4141

4242
## PowerShell
4343

articles/governance/policy/concepts/definition-structure.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -315,8 +315,7 @@ When using the **match** and **notMatch** conditions, provide `#` to match a dig
315315
letter, `.` to match any character, and any other character to match that actual character. While,
316316
**match** and **notMatch** are case-sensitive, all other conditions that evaluate a _stringValue_
317317
are case-insensitive. Case-insensitive alternatives are available in **matchInsensitively** and
318-
**notMatchInsensitively**. For examples, see
319-
[Allow several name patterns](../samples/allow-multiple-name-patterns.md).
318+
**notMatchInsensitively**.
320319

321320
In an **\[\*\] alias** array field value, each element in the array is evaluated individually with
322321
logical **and** between elements. For more information, see [Evaluating the \[\*\]
@@ -336,7 +335,7 @@ The following fields are supported:
336335
- `kind`
337336
- `type`
338337
- `location`
339-
- Use **global** for resources that are location agnostic. For an example, see [Samples - Allowed locations](../samples/allowed-locations.md).
338+
- Use **global** for resources that are location agnostic.
340339
- `identity.type`
341340
- Returns the type of [managed identity](../../../active-directory/managed-identities-azure-resources/overview.md)
342341
enabled on the resource.

articles/governance/policy/concepts/guest-configuration.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -250,10 +250,11 @@ egrep -B $linesToIncludeBeforeMatch -A $linesToIncludeAfterMatch 'DSCEngine|DSCM
250250

251251
## Guest Configuration samples
252252

253-
Samples for Policy Guest Configuration are available in the following locations:
253+
Source for the Policy Guest Configuration built-in initiatives are available in the following
254+
locations:
254255

255-
- [Samples index - Guest Configuration](../samples/index.md#guest-configuration)
256-
- [Azure Policy samples GitHub repo](https://github.com/Azure/azure-policy/tree/master/samples/GuestConfiguration)
256+
- [Built-in initiatives - Guest Configuration](../samples/built-in-initiatives.md#guest-configuration)
257+
- [Azure Policy samples GitHub repo](https://github.com/Azure/azure-policy/tree/master/built-in-policies/policySetDefinitions/Guest Configuration)
257258

258259
## Next steps
259260

articles/governance/policy/how-to/guest-configuration-create.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -496,9 +496,9 @@ A good reference for creating GPG keys to use with Linux machines is provided by
496496
GitHub, [Generating a new GPG key](https://help.github.com/en/articles/generating-a-new-gpg-key).
497497

498498
After your content is published, append a tag with name `GuestConfigPolicyCertificateValidation` and
499-
value `enabled` to all virtual machines where code signing should be required. This tag can be
500-
delivered at scale using Azure Policy. See the [Apply tag and its default value](../samples/apply-tag-default-value.md)
501-
sample. Once this tag is in place, the policy definition generated using the
499+
value `enabled` to all virtual machines where code signing should be required. See the
500+
[Tag samples](../samples/built-in-policies.md#tags) for how tags can be delivered at scale using
501+
Azure Policy. Once this tag is in place, the policy definition generated using the
502502
`New-GuestConfigurationPolicy` cmdlet enables the requirement through the Guest Configuration
503503
extension.
504504

articles/governance/policy/samples/allow-certain-vm-image.md

Lines changed: 0 additions & 62 deletions
This file was deleted.

articles/governance/policy/samples/allow-custom-vm-image.md

Lines changed: 0 additions & 62 deletions
This file was deleted.

articles/governance/policy/samples/allow-multiple-name-patterns.md

Lines changed: 0 additions & 62 deletions
This file was deleted.

0 commit comments

Comments
 (0)