Skip to content

Commit c061009

Browse files
authored
Merge pull request #86966 from mgreenegit/patch-6
preparing for hybrid
2 parents d6eea2b + 3658425 commit c061009

File tree

1 file changed

+13
-13
lines changed

1 file changed

+13
-13
lines changed

articles/governance/policy/concepts/guest-configuration.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Understand how to audit the contents of a virtual machine
3-
description: Learn how Azure Policy uses Guest Configuration to audit settings inside an Azure virtual machine.
2+
title: Understand how to audit the contents of a machine
3+
description: Learn how Azure Policy uses Guest Configuration to audit settings inside an Azure machine.
44
author: DCtheGeek
55
ms.author: dacoulte
66
ms.date: 03/18/2019
@@ -12,7 +12,7 @@ ms.custom: seodec18
1212
# Understand Azure Policy's Guest Configuration
1313

1414
In addition to auditing and [remediating](../how-to/remediate-resources.md) Azure resources, Azure
15-
Policy can audit settings inside a virtual machine. The validation is performed by the Guest
15+
Policy can audit settings inside a machine. The validation is performed by the Guest
1616
Configuration extension and client. The extension, through the client, validates settings such as
1717
the configuration of the operating system, application configuration or presence, environment
1818
settings, and more.
@@ -24,7 +24,7 @@ It is not yet possible to apply configurations.
2424

2525
## Extension and client
2626

27-
To audit settings inside a virtual machine, a [virtual machine
27+
To audit settings inside a machine, a [virtual machine
2828
extension](../../../virtual-machines/extensions/overview.md) is enabled. The extension downloads
2929
applicable policy assignment and the corresponding configuration definition.
3030

@@ -67,7 +67,7 @@ Register-AzResourceProvider -ProviderNamespace 'Microsoft.GuestConfiguration'
6767

6868
## Validation tools
6969

70-
Inside the virtual machine, the Guest Configuration client uses local tools to run the audit.
70+
Inside the machine, the Guest Configuration client uses local tools to run the audit.
7171

7272
The following table shows a list of the local tools used on each supported operating system:
7373

@@ -85,7 +85,7 @@ trigger](../how-to/get-compliance-data.md#evaluation-triggers) occurs, the state
8585
written to the Guest Configuration resource provider. This causes Azure Policy to evaluate the Azure
8686
Resource Manager properties. An on-demand Azure Policy evaluation retrieves the latest value from
8787
the Guest Configuration resource provider. However, it doesn't trigger a new audit of the
88-
configuration within the virtual machine.
88+
configuration within the machine.
8989

9090
## Supported client types
9191

@@ -112,7 +112,7 @@ Windows Server Nano Server is not supported in any version.
112112

113113
## Guest Configuration Extension network requirements
114114

115-
To communicate with the Guest Configuration resource provider in Azure, virtual machines require
115+
To communicate with the Guest Configuration resource provider in Azure, machines require
116116
outbound access to Azure datacenters on port **443**. If you're using a private virtual network in
117117
Azure and don't allow outbound traffic, exceptions must be configured using [Network Security
118118
Group](../../../virtual-network/manage-network-security-group.md#create-a-security-rule) rules. At
@@ -137,14 +137,14 @@ outbound access to the IPs in the regions where your VMs are deployed.
137137

138138
Each audit run by Guest Configuration requires two policy definitions, a **DeployIfNotExists**
139139
definition and an **AuditIfNotExists** definition. The **DeployIfNotExists** definition is used to prepare the
140-
virtual machine with the Guest Configuration agent and other components to support the [validation
140+
machine with the Guest Configuration agent and other components to support the [validation
141141
tools](#validation-tools).
142142

143143
The **DeployIfNotExists** policy definition validates and corrects the following items:
144144

145-
- Validate the virtual machine has been assigned a configuration to evaluate. If no assignment is
146-
currently present, get the assignment and prepare the virtual machine by:
147-
- Authenticating to the virtual machine using a [managed identity](../../../active-directory/managed-identities-azure-resources/overview.md)
145+
- Validate the machine has been assigned a configuration to evaluate. If no assignment is
146+
currently present, get the assignment and prepare the machine by:
147+
- Authenticating to the machine using a [managed identity](../../../active-directory/managed-identities-azure-resources/overview.md)
148148
- Installing the latest version of the **Microsoft.GuestConfiguration** extension
149149
- Installing [validation tools](#validation-tools) and dependencies, if needed
150150

@@ -167,15 +167,15 @@ data](../how-to/getting-compliance-data.md).
167167
168168
All built-in policies for Guest Configuration are included in an initiative to group the definitions
169169
for use in assignments. The built-in initiative named *[Preview]: Audit Password security settings
170-
inside Linux and Windows virtual machines* contains 18 policies. There are six **DeployIfNotExists**
170+
inside Linux and Windows machines* contains 18 policies. There are six **DeployIfNotExists**
171171
and **AuditIfNotExists** pairs for Windows and three pairs for Linux. In each case, the logic inside the
172172
definition validates only the target operating system is evaluated based on the [policy rule](definition-structure.md#policy-rule)
173173
definition.
174174

175175
### Multiple assignments
176176

177177
Guest Configuration policies currently only support assigning the same Guest Assignment once
178-
per virtual machine, even if the Policy assignment uses different parameters.
178+
per machine, even if the Policy assignment uses different parameters.
179179

180180
## Client log files
181181

0 commit comments

Comments
 (0)