Skip to content

Commit e43d3eb

Browse files
authored
Merge pull request #115292 from DCtheGeek/dmc-policy-freshness
Freshness review and Acrolinx updates
2 parents fb72259 + 94cedea commit e43d3eb

9 files changed

+133
-117
lines changed

articles/governance/policy/assign-policy-powershell.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: "Quickstart: New policy assignment with PowerShell"
33
description: In this quickstart, you use Azure PowerShell to create an Azure Policy assignment to identify non-compliant resources.
4-
ms.date: 11/25/2019
4+
ms.date: 05/20/2020
55
ms.topic: quickstart
66
---
77
# Quickstart: Create a policy assignment to identify non-compliant resources using Azure PowerShell
@@ -45,10 +45,10 @@ definition. This policy definition identifies virtual machines not using managed
4545
Run the following commands to create a new policy assignment:
4646

4747
```azurepowershell-interactive
48-
# Get a reference to the resource group that will be the scope of the assignment
48+
# Get a reference to the resource group that is the scope of the assignment
4949
$rg = Get-AzResourceGroup -Name '<resourceGroupName>'
5050
51-
# Get a reference to the built-in policy definition that will be assigned
51+
# Get a reference to the built-in policy definition to assign
5252
$definition = Get-AzPolicyDefinition | Where-Object { $_.Properties.DisplayName -eq 'Audit VMs that do not use managed disks' }
5353
5454
# Create the policy assignment with the built-in definition against your resource group

articles/governance/policy/concepts/evaluate-impact.md

Lines changed: 17 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,16 +1,17 @@
11
---
22
title: Evaluate the impact of a new Azure Policy definition
33
description: Understand the process to follow when introducing a new policy definition into your Azure environment.
4-
ms.date: 09/23/2019
4+
ms.date: 05/20/2020
55
ms.topic: conceptual
66
---
77
# Evaluate the impact of a new Azure Policy definition
88

99
Azure Policy is a powerful tool for managing your Azure resources to business standards and to meet
1010
compliance needs. When people, processes, or pipelines create or update resources, Azure Policy
11-
reviews the request. When the policy definition effect is [Append](./effects.md#deny) or [DeployIfNotExists](./effects.md#deployifnotexists),
12-
Policy alters the request or adds to it. When the policy definition effect is [Audit](./effects.md#audit)
13-
or [AuditIfNotExists](./effects.md#auditifnotexists), Policy causes an Activity log entry to be
11+
reviews the request. When the policy definition effect is [Append](./effects.md#deny) or
12+
[DeployIfNotExists](./effects.md#deployifnotexists), Policy alters the request or adds to it. When
13+
the policy definition effect is [Audit](./effects.md#audit) or
14+
[AuditIfNotExists](./effects.md#auditifnotexists), Policy causes an Activity log entry to be
1415
created. And when the policy definition effect is [Deny](./effects.md#deny), Policy stops the
1516
creation or alteration of the request.
1617

@@ -45,9 +46,10 @@ and the properties you need to evaluate for compliance as possible.
4546
## Audit existing resources
4647

4748
Before looking to manage new or updated resources with your new policy definition, it's best to see
48-
how it evaluates a limited subset of existing resources, such as a test resource group. Use the [enforcement mode](./assignment-structure.md#enforcement-mode)
49-
_Disabled_ (DoNotEnforce) on your policy assignment to prevent the [effect](./effects.md) from
50-
triggering or activity log entries from being created.
49+
how it evaluates a limited subset of existing resources, such as a test resource group. Use the
50+
[enforcement mode](./assignment-structure.md#enforcement-mode) _Disabled_ (DoNotEnforce) on your
51+
policy assignment to prevent the [effect](./effects.md) from triggering or activity log entries from
52+
being created.
5153

5254
This step gives you a chance to evaluate the compliance results of the new policy on existing
5355
resources without impacting work flow. Check that no compliant resources are marked as non-compliant
@@ -102,12 +104,14 @@ security and compliance organizations to ensure there are no gaps in coverage.
102104

103105
## Monitor your policy and compliance
104106

105-
Implementing and assigning your policy definition isn't the final step. Continuously monitor the [compliance](../how-to/get-compliance-data.md)
106-
level of resources to your new policy definition and setup appropriate [Azure Monitor alerts and notifications](../../../azure-monitor/platform/alerts-overview.md)
107-
for when non-compliant devices are identified. It's also recommended to evaluate the policy
108-
definition and related assignments on a scheduled basis to validate the policy definition is meeting
109-
business policy and compliance needs. Policies should be removed if no longer needed. Policies also
110-
need updating from time to time as the underlying Azure resources evolve and add new properties and
107+
Implementing and assigning your policy definition isn't the final step. Continuously monitor the
108+
[compliance](../how-to/get-compliance-data.md) level of resources to your new policy definition and
109+
setup appropriate
110+
[Azure Monitor alerts and notifications](../../../azure-monitor/platform/alerts-overview.md) for
111+
when non-compliant devices are identified. It's also recommended to evaluate the policy definition
112+
and related assignments on a scheduled basis to validate the policy definition is meeting business
113+
policy and compliance needs. Policies should be removed if no longer needed. Policies also need
114+
updating from time to time as the underlying Azure resources evolve and add new properties and
111115
capabilities.
112116

113117
## Next steps

0 commit comments

Comments
 (0)