You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
- An empty or missing value causes policy evaluation to include all namespaces, except those
392
+
- An empty or missing value causes policy evaluation to include all namespaces, except the ones
393
393
defined in _excludedNamespaces_.
394
394
-**excludedNamespaces** (required)
395
395
- An _array_ of
@@ -455,25 +455,23 @@ location of the Constraint template to use in Kubernetes to limit the allowed co
455
455
```
456
456
## DenyAction (preview)
457
457
458
-
`DenyAction` is used to block request based on intended action to resources. The only supported action today is `DELETE`. This effect will help prevent any accidential deletion of critical resources.
458
+
`DenyAction` is used to block requests on intended action to resources. The only supported action today is `DELETE`. This effect will help prevent any accidental deletion of critical resources.
459
459
460
460
### DenyAction evaluation
461
461
462
-
When submitting a request to a matched resource in a Resource Manager mode, `denyAction` prevents the request
463
-
from succeeding. The request is returned as a `403 (Forbidden)`. In the
464
-
portal, the Forbidden can be viewed as a status on the deployment that was prevented by the policy
462
+
When a request call with an applicable action name and targeted scope is submitted, `denyAction` prevents the request from succeeding. The request is returned as a `403 (Forbidden)`. In the portal, the Forbidden can be viewed as a status on the deployment that was prevented by the policy
465
463
assignment.
466
464
467
465
`Microsoft.Authorization/policyAssignments`, `Microsoft.Authorization/denyAssignments`, `Microsoft.Blueprint/blueprintAssignments`, `Microsoft.Resources/deploymentStacks`, and `Microsoft.Authorization/locks` are all exempt from DenyAction enforcement to prevent lockout scenarios.
468
466
469
467
**Subscription deletion**
470
-
Policy will not block removal of resources that happens during a subscription deletion.
468
+
Policy won't block removal of resources that happens during a subscription deletion.
471
469
472
470
**Resource group deletion**
473
-
Policy will evaluate resources that support location and tags against `DenyAction` policies during a resource group deletion. Only policies that have the `cascadeBehaviors` set to `deny` in the policy rule will block a resource group deletion. Policy will not block removal of resources that do not support location and tags nor any policy with `mode:all`.
471
+
Policy will evaluate resources that support location and tags against `DenyAction` policies during a resource group deletion. Only policies that have the `cascadeBehaviors` set to `deny` in the policy rule will block a resource group deletion. Policy won't block removal of resources that don't support location and tags nor any policy with `mode:all`.
474
472
475
473
**Cascade Deletion**
476
-
Cascade Deletion ocurs when deleting of a parent resources is implicately deletes all its child resources. Policy will not block removal of child resources when an deletion action targets the parent resources. For example, `Microsoft.Insights/diagnosticSettings` is a child resource of `Microsoft.Storage/storageaccounts`. If a `denyAction` policy targets `Microsoft.Insights/diagnosticSettings`, a delete call to the diagnostic setting (child) will fail, but a delete to the storage account (parent) will implictely delete the diagnostic setting (child).
474
+
Cascade Deletion occurs when deleting of a parent resource is implicitly deletes all its child resources. Policy won't block removal of child resources when a delete action targets the parent resources. For example, `Microsoft.Insights/diagnosticSettings` is a child resource of `Microsoft.Storage/storageaccounts`. If a `denyAction` policy targets `Microsoft.Insights/diagnosticSettings`, a delete call to the diagnostic setting (child) will fail, but a delete to the storage account (parent) will implicitly delete the diagnostic setting (child).
@@ -491,7 +489,7 @@ The **details** property of the DenyAction effect has all the subproperties that
491
489
- Default value is `deny`.
492
490
493
491
### DenyAction example
494
-
Example: Deny deletion of database accounts where tag environment equals prod.
492
+
Example: Deny any delete calls targeting database accounts that have a tag environment that equals prod. Since cascade behavior is set to deny, block any DELETE call that targets a resource group with an applicable database account.
495
493
496
494
```json
497
495
{
@@ -689,7 +687,7 @@ logs, and the policy effect don't occur. For more information, see
689
687
690
688
## Manual (preview)
691
689
692
-
The new `manual` (preview) effect enables you to self-attest the compliance of resources or scopes. Unlike other policy definitions that actively scan for evaluation, the Manual effect allows for manual changes to the compliance state. To change the compliance of a resource or scope targeted by a manual policy, you'll need to create an [attestation](attestation-structure.md). The [best practice](attestation-structure.md#best-practices) is to design manual policies that target the scope which defines the boundary of resources whose compliance need attesting.
690
+
The new `manual` (preview) effect enables you to self-attest the compliance of resources or scopes. Unlike other policy definitions that actively scan for evaluation, the Manual effect allows for manual changes to the compliance state. To change the compliance of a resource or scope targeted by a manual policy, you'll need to create an [attestation](attestation-structure.md). The [best practice](attestation-structure.md#best-practices) is to design manual policies that target the scope that defines the boundary of resources whose compliance need attesting.
693
691
694
692
> [!NOTE]
695
693
> During Public Preview, support for manual policy is available through various Microsoft Defender
Copy file name to clipboardExpand all lines: articles/governance/policy/concepts/evaluate-impact.md
+2-3Lines changed: 2 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.topic: conceptual
6
6
---
7
7
# Evaluate the impact of a new Azure Policy definition
8
8
9
-
Azure Policy is a powerful tool for managing your Azure resources to business standards and to meet
9
+
Azure Policy is a powerful tool for managing your Azure resources to meet business standards
10
10
compliance needs. When people, processes, or pipelines create or update resources, Azure Policy
11
11
reviews the request. When the policy definition effect is [Modify](./effects.md#modify),
12
12
[Append](./effects.md#deny), or [DeployIfNotExists](./effects.md#deployifnotexists), Policy alters
@@ -109,8 +109,7 @@ setup appropriate
109
109
[Azure Monitor alerts and notifications](../../../azure-monitor/alerts/alerts-overview.md) for
110
110
when non-compliant devices are identified. It's also recommended to evaluate the policy definition
111
111
and related assignments on a scheduled basis to validate the policy definition is meeting business
112
-
policy and compliance needs. Policies should be removed if no longer needed. Policies also need
113
-
updating from time to time as the underlying Azure resources evolve and add new properties and
112
+
policy and compliance needs. Policies should be removed if no longer needed. Policies also need to update from time to time as the underlying Azure resources evolve and add new properties and
Copy file name to clipboardExpand all lines: includes/azure-policy-denyAction.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.date: 11/28/2022
8
8
ms.author: kenieva
9
9
---
10
10
11
-
This table describes if a resource will be protected from deletion given the resource applicable to the assigned denyAction policy and the targeted scope of the DELETE call. In the conetext of this table, an indexed is a resource that supports tags and locations. Non-indexed is a resource that does not support tags or locations. For more information on indexed and non-indexed resourxe, please reference [definition modes](../articles/governance/policy/concepts/definition-structure.md). Child resources are resources that exist only within the context of another resource. For example, an virtual machines extension resource is a child of the virtual machine, whom is the parent resource.
11
+
This table describes if a resource will be protected from deletion given the resource applicable to the assigned denyAction policy and the targeted scope of the DELETE call. In the context of this table, an indexed is a resource that supports tags and locations. Non-indexed is a resource that doesn't support tags or locations. For more information on indexed and non-indexed resources, reference [definition modes](../articles/governance/policy/concepts/definition-structure.md). Child resources are resources that exist only within the context of another resource. For example, a virtual machines extension resource is a child of the virtual machine, whom is the parent resource.
12
12
13
13
| Resource applicable to DenyAction definition | Delete call targeted scope | Action taken |
0 commit comments