Skip to content

Latest commit

ย 

History

History
ย 
ย 

policies

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 

Custom Policy Definition Library

Compile time: 09/30/2022 15:20:06 UTC Example custom definitions located in the local library

Categories

Definitions

Automation

Title Description
Name onboard_to_automation_dsc_linux
DisplayName Onboard Azure VM and Arc connected Linux machines to Azure Automation DSC
Description Deploys the DSC extension to onboard Linux nodes to Azure Automation DSC. Assigns a configuration.
Version 2.0.0
Effect [parameters('effect')]

๐Ÿงฎ ~ Parameters

Name Description Default Value Allowed Values
effect Enable or disable the execution of the policy DeployIfNotExists DeployIfNotExists Disabled
automationAccountId Automation Account Id. If this account is outside of the scope of the assignment you must manually grant 'Contributor' permissions (or similar) on the Automation account to the policy assignment's principal ID.
nxNodeConfigurationName Specifies the node configuration in the Automation account to assign to the node. NOTE: will auto-suffix '.localhost'.
nodeConfigurationMode Specifies the mode for LCM. Valid options include ApplyOnly, ApplyandMonitor, and ApplyandAutoCorrect. The default value is ApplyAndAutoCorrect. ApplyAndAutoCorrect ApplyAndAutoCorrect applyAndMonitor ApplyOnly
listOfImageIdToInclude_linux Example value: '/subscriptions//resourceGroups/YourResourceGroup/providers/Microsoft.Compute/images/ContosoStdImage'


Title Description
Name onboard_to_automation_dsc_windows
DisplayName Onboard Azure VM and Arc connected Windows machines to Azure Automation DSC
Description Deploys the DSC extension to onboard Windows nodes to Azure Automation DSC. Assigns a configuration.
Version 2.0.0
Effect [parameters('effect')]

๐Ÿงฎ ~ Parameters

Name Description Default Value Allowed Values
effect Enable or disable the execution of the policy DeployIfNotExists DeployIfNotExists Disabled
automationAccountId Automation Account Id. If this account is outside of the scope of the assignment you must manually grant 'Contributor' permissions (or similar) on the Automation account to the policy assignment's principal ID.
nodeConfigurationName Specifies the node configuration in the Automation account to assign to the node. NOTE: will auto-suffix '.localhost'.
nodeConfigurationMode Specifies the mode for LCM. Valid options include ApplyOnly, ApplyandMonitor, and ApplyandAutoCorrect. The default value is ApplyAndAutoCorrect. ApplyAndAutoCorrect ApplyAndAutoCorrect applyAndMonitor ApplyOnly
listOfImageIdToInclude_windows Example value: '/subscriptions//resourceGroups/YourResourceGroup/providers/Microsoft.Compute/images/ContosoStdImage'



Compute

Title Description
Name deploy_linux_lad_vm_agent
DisplayName
Description
Version
Effect [parameters('effect')]

๐Ÿงฎ ~ Parameters

Name Description Default Value Allowed Values
effect Enable or disable the execution of the policy DeployIfNotExists DeployIfNotExists Disabled
diagnosticsStorageAccountName The Storage Account Id to send diagnostic logs
diagnosticsStorageAccountSas The Storage Account SAS Token to send diagnostic logs
listOfImageIdToInclude_linux Example value: '/subscriptions//resourceGroups/YourResourceGroup/providers/Microsoft.Compute/images/ContosoStdImage'


Title Description
Name deploy_linux_lad_vmss_agent
DisplayName
Description
Version
Effect [parameters('effect')]

๐Ÿงฎ ~ Parameters

Name Description Default Value Allowed Values
effect Enable or disable the execution of the policy DeployIfNotExists DeployIfNotExists Disabled
diagnosticsStorageAccountName The Storage Account Id to send diagnostic logs
diagnosticsStorageAccountSas The Storage Account SAS Token to send diagnostic logs
eventHubUrl The EventHub Url to stream diagnostic logs to. e.g. https://myeventhub-ns.servicebus.windows.net/diageventhub
eventHubSASToken The Event Hub Shared Access Token
listOfImageIdToInclude_linux Example value: '/subscriptions//resourceGroups/YourResourceGroup/providers/Microsoft.Compute/images/ContosoStdImage'


Title Description
Name deploy_linux_log_analytics_vm_agent
DisplayName
Description
Version
Effect [parameters('effect')]

๐Ÿงฎ ~ Parameters

Name Description Default Value Allowed Values
effect Enable or disable the execution of the policy DeployIfNotExists DeployIfNotExists Disabled
workspaceId Specify the Log Analytics Workspace Id the agent should be connected to. If this workspace is outside of the scope of the assignment you must manually grant 'Log Analytics Contributor' permissions (or similar) to the policy assignment's principal ID.
listOfImageIdToInclude_linux Example value: '/subscriptions//resourceGroups/YourResourceGroup/providers/Microsoft.Compute/images/ContosoStdImage'


Title Description
Name deploy_linux_log_analytics_vmss_agent
DisplayName
Description
Version
Effect [parameters('effect')]

๐Ÿงฎ ~ Parameters

Name Description Default Value Allowed Values
effect Enable or disable the execution of the policy DeployIfNotExists DeployIfNotExists Disabled
workspaceId Specify the Log Analytics Workspace Id the agent should be connected to. If this workspace is outside of the scope of the assignment you must manually grant 'Log Analytics Contributor' permissions (or similar) to the policy assignment's principal ID.
listOfImageIdToInclude_linux Example value: '/subscriptions//resourceGroups/YourResourceGroup/providers/Microsoft.Compute/images/ContosoStdImage'


Title Description
Name deploy_windows_log_analytics_vm_agent
DisplayName
Description
Version
Effect [parameters('effect')]

๐Ÿงฎ ~ Parameters

Name Description Default Value Allowed Values
effect Enable or disable the execution of the policy DeployIfNotExists DeployIfNotExists Disabled
workspaceId Specify the Log Analytics Workspace Id the agent should be connected to. If this workspace is outside of the scope of the assignment you must manually grant 'Log Analytics Contributor' permissions (or similar) to the policy assignment's principal ID.
listOfImageIdToInclude_windows Example value: '/subscriptions//resourceGroups/YourResourceGroup/providers/Microsoft.Compute/images/ContosoStdImage'


Title Description
Name deploy_windows_log_analytics_vmss_agent
DisplayName
Description
Version
Effect [parameters('effect')]

๐Ÿงฎ ~ Parameters

Name Description Default Value Allowed Values
effect Enable or disable the execution of the policy DeployIfNotExists DeployIfNotExists Disabled
workspaceId Specify the Log Analytics Workspace Id the agent should be connected to. If this workspace is outside of the scope of the assignment you must manually grant 'Log Analytics Contributor' permissions (or similar) to the policy assignment's principal ID.
listOfImageIdToInclude_windows Example value: '/subscriptions//resourceGroups/YourResourceGroup/providers/Microsoft.Compute/images/ContosoStdImage'


Title Description
Name deploy_windows_wad_vm_agent
DisplayName
Description
Version
Effect [parameters('effect')]

๐Ÿงฎ ~ Parameters

Name Description Default Value Allowed Values
effect Enable or disable the execution of the policy DeployIfNotExists DeployIfNotExists Disabled
diagnosticsStorageAccountName The Storage Account Id to send diagnostic logs
diagnosticsStorageAccountId The Storage Account Id to send diagnostic logs
eventHubSharedAccessKeyId The Event Hub Shared Access Key Key Resource Id.
eventHubSharedAccessKeyName The Event Hub Shared Access Key Name. Defaults to the Root Key RootManageSharedAccessKey
eventHubUrl The EventHub Url to stream diagnostic logs to. e.g. https://myeventhub-ns.servicebus.windows.net/diageventhub
listOfImageIdToInclude_windows Example value: '/subscriptions//resourceGroups/YourResourceGroup/providers/Microsoft.Compute/images/ContosoStdImage'


Title Description
Name deploy_windows_wad_vmss_agent
DisplayName
Description
Version
Effect [parameters('effect')]

๐Ÿงฎ ~ Parameters

Name Description Default Value Allowed Values
effect Enable or disable the execution of the policy DeployIfNotExists DeployIfNotExists Disabled
diagnosticsStorageAccountName The Storage Account Id to send diagnostic logs
diagnosticsStorageAccountId The Storage Account Id to send diagnostic logs
eventHubSharedAccessKeyId The Event Hub Shared Access Key Key Resource Id.
eventHubSharedAccessKeyName The Event Hub Shared Access Key Name. Defaults to the Root Key RootManageSharedAccessKey
eventHubUrl The EventHub Url to stream diagnostic logs to. e.g. https://myeventhub-ns.servicebus.windows.net/diageventhub
listOfImageIdToInclude_windows Example value: '/subscriptions//resourceGroups/YourResourceGroup/providers/Microsoft.Compute/images/ContosoStdImage'


Title Description
Name preview_deploy_linux_azure_monitor_vm_agent
DisplayName
Description
Version
Effect deployIfNotExists

๐Ÿงฎ ~ Parameters

Name Description Default Value Allowed Values
effect Enable or disable the execution of the policy DeployIfNotExists DeployIfNotExists Disabled
listOfImageIdToInclude_linux Example value: '/subscriptions//resourceGroups/YourResourceGroup/providers/Microsoft.Compute/images/ContosoStdImage'


Title Description
Name preview_deploy_windows_azure_monitor_vm_agent
DisplayName
Description
Version
Effect [parameters('effect')]

๐Ÿงฎ ~ Parameters

Name Description Default Value Allowed Values
effect Enable or disable the execution of the policy DeployIfNotExists DeployIfNotExists Disabled
listOfImageIdToInclude_windows Example value: '/subscriptions//resourceGroups/YourResourceGroup/providers/Microsoft.Compute/images/ContosoStdImage'



General

Title Description
Name deny_resources_types
DisplayName
Description
Version
Effect [parameters('effect')]

๐Ÿงฎ ~ Parameters

Name Description Default Value Allowed Values
listOfResourceTypesNotAllowed The list of resource types that cannot be deployed.
effect The effect determines what happens when the policy rule is evaluated to match Audit Audit Deny Disabled


Title Description
Name whitelist_regions
DisplayName
Description
Version
Effect [parameters('effect')]

๐Ÿงฎ ~ Parameters

Name Description Default Value Allowed Values
listOfRegionsAllowed The list of regions where resources can be deployed. UK South UK West
effect The effect determines what happens when the policy rule is evaluated to match Audit Audit Deny Disabled


Title Description
Name whitelist_resources
DisplayName
Description
Version
Effect [parameters('effect')]

๐Ÿงฎ ~ Parameters

Name Description Default Value Allowed Values
listOfResourceTypesAllowed The list of resource types that can be deployed.
effect The effect determines what happens when the policy rule is evaluated to match Audit Audit Deny Disabled



Guest Configuration

Title Description
Name Add_System_Identity_When_User
DisplayName Add system-assigned managed identity when User-Assigned is present to enable Guest Configuration assignments on VMs
Description This policy adds a system-assigned managed identity to virtual machines hosted in Azure that are supported by Guest Configuration and have at least one user-assigned identity but do not have a system-assigned managed identity. A system-assigned managed identity is a prerequisite for all Guest Configuration assignments and must be added to machines before using any Guest Configuration policy definitions. For more information on Guest Configuration, visit https://aka.ms/gcpol.
Version 1.0.0
Effect modify

๐Ÿงฎ ~ Parameters

Name Description Default Value Allowed Values
listOfImageIdToInclude_windows Example value: '/subscriptions//resourceGroups/YourResourceGroup/providers/Microsoft.Compute/images/ContosoStdImage'
listOfImageIdToInclude_linux Example value: '/subscriptions//resourceGroups/YourResourceGroup/providers/Microsoft.Compute/images/ContosoStdImage'


Title Description
Name CGC_nxLAMPServer
DisplayName nxLAMPServer
Description VM Custom Guest Configuration: nxLAMPServer
Version 1.0.0
Effect deployIfNotExists

๐Ÿงฎ ~ Parameters

Name Description Default Value Allowed Values
IncludeArcMachines By selecting this option, you agree to be charged monthly per Arc connected machine. False True False


Title Description
Name CGC_SecurityBaselineConfigurationWS2016
DisplayName SecurityBaselineConfigurationWS2016
Description VM Custom Guest Configuration: SecurityBaselineConfigurationWS2016
Version 1.0.0
Effect deployIfNotExists

๐Ÿงฎ ~ Parameters

Name Description Default Value Allowed Values
IncludeArcMachines By selecting this option, you agree to be charged monthly per Arc connected machine. False True False


Title Description
Name CGC_WindowsIISServerConfig
DisplayName WindowsIISServerConfig
Description VM Custom Guest Configuration: WindowsIISServerConfig
Version 1.0.0
Effect deployIfNotExists

๐Ÿงฎ ~ Parameters

Name Description Default Value Allowed Values
IncludeArcMachines By selecting this option, you agree to be charged monthly per Arc connected machine. False True False


Title Description
Name Deploy_the_Linux_Guest_Configuration_extension
DisplayName Deploy the Linux Guest Configuration extension to enable Guest Configuration assignments on Linux VMs
Description This policy deploys the Linux Guest Configuration extension to Linux virtual machines hosted in Azure that are supported by Guest Configuration. The Linux Guest Configuration extension is a prerequisite for all Linux Guest Configuration assignments and must be deployed to machines before using any Linux Guest Configuration policy definition. For more information on Guest Configuration, visit https://aka.ms/gcpol.
Version 1.0.1
Effect deployIfNotExists

๐Ÿงฎ ~ Parameters

Name Description Default Value Allowed Values
listOfImageIdToInclude_linux Example value: '/subscriptions//resourceGroups/YourResourceGroup/providers/Microsoft.Compute/images/ContosoStdImage'


Title Description
Name Deploy_the_Windows_Guest_Configuration_extension
DisplayName Deploy the Windows Guest Configuration extension to enable Guest Configuration assignments on Windows VMs
Description This policy deploys the Windows Guest Configuration extension to Windows virtual machines hosted in Azure that are supported by Guest Configuration. The Windows Guest Configuration extension is a prerequisite for all Windows Guest Configuration assignments and must be deployed to machines before using any Windows Guest Configuration policy definition. For more information on Guest Configuration, visit https://aka.ms/gcpol.
Version 1.0.1
Effect deployIfNotExists

๐Ÿงฎ ~ Parameters

Name Description Default Value Allowed Values
listOfImageIdToInclude_windows Example value: '/subscriptions//resourceGroups/YourResourceGroup/providers/Microsoft.Compute/images/ContosoStdImage'


Title Description
Name Add_System_Identity_When_None
DisplayName Add system-assigned managed identity when none present to enable Guest Configuration assignments on virtual machines
Description This policy adds a system-assigned managed identity to virtual machines hosted in Azure that are supported by Guest Configuration but do not have any managed identities. A system-assigned managed identity is a prerequisite for all Guest Configuration assignments and must be added to machines before using any Guest Configuration policy definitions. For more information on Guest Configuration, visit https://aka.ms/gcpol.
Version 1.0.0
Effect modify

๐Ÿงฎ ~ Parameters

Name Description Default Value Allowed Values
listOfImageIdToInclude_windows Example value: '/subscriptions//resourceGroups/YourResourceGroup/providers/Microsoft.Compute/images/ContosoStdImage'
listOfImageIdToInclude_linux Example value: '/subscriptions//resourceGroups/YourResourceGroup/providers/Microsoft.Compute/images/ContosoStdImage'



Monitoring

Title Description
Name deploy_public_ip_diagnostic_setting
DisplayName Deploy Diagnostic Settings for Public IPs to a Log Analytics workspace
Description Deploys the diagnostic settings for Public IPs to stream to a regional Log Analytics workspace when any Public IP which is missing this diagnostic settings is created or updated.
Version
Effect [parameters('effect')]

๐Ÿงฎ ~ Parameters

Name Description Default Value Allowed Values
effect Enable or disable the execution of the policy DeployIfNotExists AuditIfNotExists DeployIfNotExists Disabled
profileName The diagnostic settings profile name setbypolicy_Diagnostics
workspaceId Select Log Analytics workspace from dropdown list. If this workspace is outside of the scope of the assignment you must manually grant 'Log Analytics Contributor' permissions (or similar) to the policy assignment's principal ID.
storageAccountId The Storage Account Resource Id to send activity logs
eventHubAuthorizationRuleId The Event Hub authorization rule Id for Azure Diagnostics. The authorization rule needs to be at Event Hub namespace level. e.g. /subscriptions/{subscription Id}/resourceGroups/{resource group}/providers/Microsoft.EventHub/namespaces/{Event Hub namespace}/authorizationrules/{authorization rule}
eventHubName The EventHub name to stream activity logs to
metricsEnabled Enable Metrics - True or False True True False
logsEnabled Enable Logs - True or False True True False


Title Description
Name deploy_storage_account_diagnostic_setting
DisplayName Deploy Diagnostic Settings for Azure Storage, including blobs, files, tables, and queues to a Log Analytics workspace
Description Deploys the diagnostic settings for Azure Storage, including blobs, files, tables, and queues to stream to a regional Log Analytics workspace when any Azure Storage which is missing this diagnostic settings is created or updated.
Version
Effect [parameters('effect')]

๐Ÿงฎ ~ Parameters

Name Description Default Value Allowed Values
effect Enable or disable the execution of the policy DeployIfNotExists AuditIfNotExists DeployIfNotExists Disabled
profileName The diagnostic settings profile name setbypolicy_Diagnostics
workspaceId Select Log Analytics workspace from dropdown list. If this workspace is outside of the scope of the assignment you must manually grant 'Log Analytics Contributor' permissions (or similar) to the policy assignment's principal ID.
storageAccountId The Storage Account Resource Id to send activity logs
eventHubAuthorizationRuleId The Event Hub authorization rule Id for Azure Diagnostics. The authorization rule needs to be at Event Hub namespace level. e.g. /subscriptions/{subscription Id}/resourceGroups/{resource group}/providers/Microsoft.EventHub/namespaces/{Event Hub namespace}/authorizationrules/{authorization rule}
eventHubName The EventHub name to stream activity logs to
metricsEnabled Whether to enable metrics stream to the Log Analytics workspace - True or False False True False
logsEnabled Enable Logs - True or False True True False


Title Description
Name deploy_subscription_diagnostic_setting
DisplayName Deploy Diagnostic Settings for Subscriptions to a Log Analytics workspace
Description Deploys the diagnostic settings for Subscriptions to stream to a regional Log Analytics workspace when any Subscription which is missing this diagnostic settings is created or updated.
Version
Effect [parameters('effect')]

๐Ÿงฎ ~ Parameters

Name Description Default Value Allowed Values
effect Enable or disable the execution of the policy DeployIfNotExists DeployIfNotExists AuditIfNotExists Disabled
profileName The diagnostic settings profile name setbypolicy_Diagnostics
workspaceId Select Log Analytics workspace from dropdown list. If this workspace is outside of the scope of the assignment you must manually grant 'Log Analytics Contributor' permissions (or similar) to the policy assignment's principal ID.
storageAccountId The Storage Account Resource Id to send activity logs
eventHubAuthorizationRuleId The Event Hub authorization rule Id for Azure Diagnostics. The authorization rule needs to be at Event Hub namespace level. e.g. /subscriptions/{subscription Id}/resourceGroups/{resource group}/providers/Microsoft.EventHub/namespaces/{Event Hub namespace}/authorizationrules/{authorization rule}
eventHubName The EventHub name to stream activity logs to
logsEnabled Enable Logs - True or False True True False


Title Description
Name deploy_virtual_machine_diagnostic_setting
DisplayName Deploy Diagnostic Settings for Virtual Machines to a Log Analytics workspace
Description Deploys the diagnostic settings for Virtual Machines to stream to a regional Log Analytics workspace when any Virtual Machine which is missing this diagnostic settings is created or updated.
Version
Effect [parameters('effect')]

๐Ÿงฎ ~ Parameters

Name Description Default Value Allowed Values
effect Enable or disable the execution of the policy DeployIfNotExists AuditIfNotExists DeployIfNotExists Disabled
profileName The diagnostic settings profile name setbypolicy_Diagnostics
workspaceId Select Log Analytics workspace from dropdown list. If this workspace is outside of the scope of the assignment you must manually grant 'Log Analytics Contributor' permissions (or similar) to the policy assignment's principal ID.
storageAccountId The Storage Account Resource Id to send activity logs
eventHubAuthorizationRuleId The Event Hub authorization rule Id for Azure Diagnostics. The authorization rule needs to be at Event Hub namespace level. e.g. /subscriptions/{subscription Id}/resourceGroups/{resource group}/providers/Microsoft.EventHub/namespaces/{Event Hub namespace}/authorizationrules/{authorization rule}
eventHubName The EventHub name to stream activity logs to
metricsEnabled Whether to enable metrics stream to the Log Analytics workspace - True or False False True False
logsEnabled Whether to enable logs stream to the Log Analytics workspace - True or False True True False


Title Description
Name deploy_vnet_diagnostic_setting
DisplayName Deploy Diagnostic Settings for Virtual Networks to a Log Analytics workspace
Description Deploys the diagnostic settings for Virtual Networks to stream to a regional Log Analytics workspace when any Virtual Network which is missing this diagnostic settings is created or updated.
Version
Effect [parameters('effect')]

๐Ÿงฎ ~ Parameters

Name Description Default Value Allowed Values
effect Enable or disable the execution of the policy DeployIfNotExists AuditIfNotExists DeployIfNotExists Disabled
profileName The diagnostic settings profile name setbypolicy_Diagnostics
workspaceId Select Log Analytics workspace from dropdown list. If this workspace is outside of the scope of the assignment you must manually grant 'Log Analytics Contributor' permissions (or similar) to the policy assignment's principal ID.
storageAccountId The Storage Account Resource Id to send activity logs
eventHubAuthorizationRuleId The Event Hub authorization rule Id for Azure Diagnostics. The authorization rule needs to be at Event Hub namespace level. e.g. /subscriptions/{subscription Id}/resourceGroups/{resource group}/providers/Microsoft.EventHub/namespaces/{Event Hub namespace}/authorizationrules/{authorization rule}
eventHubName The EventHub name to stream activity logs to
metricsEnabled Whether to enable metrics stream to the Log Analytics workspace - True or False False True False
logsEnabled Whether to enable logs stream to the Log Analytics workspace - True or False True True False


Title Description
Name deploy_vnet_gateway_diagnostic_setting
DisplayName Deploy Diagnostic Settings for Virtual Network Gateways to a Log Analytics workspace
Description Deploys the diagnostic settings for Virtual Network Gateways to stream to a regional Log Analytics workspace when any Virtual Network Gateway which is missing this diagnostic settings is created or updated.
Version
Effect [parameters('effect')]

๐Ÿงฎ ~ Parameters

Name Description Default Value Allowed Values
effect Enable or disable the execution of the policy DeployIfNotExists AuditIfNotExists DeployIfNotExists Disabled
profileName The diagnostic settings profile name setbypolicy_Diagnostics
workspaceId Select Log Analytics workspace from dropdown list. If this workspace is outside of the scope of the assignment you must manually grant 'Log Analytics Contributor' permissions (or similar) to the policy assignment's principal ID.
storageAccountId The Storage Account Resource Id to send activity logs
eventHubAuthorizationRuleId The Event Hub authorization rule Id for Azure Diagnostics. The authorization rule needs to be at Event Hub namespace level. e.g. /subscriptions/{subscription Id}/resourceGroups/{resource group}/providers/Microsoft.EventHub/namespaces/{Event Hub namespace}/authorizationrules/{authorization rule}
eventHubName The EventHub name to stream activity logs to
metricsEnabled Whether to enable metrics stream to the Log Analytics workspace - True or False False True False
logsEnabled Whether to enable logs stream to the Log Analytics workspace - True or False True True False


Title Description
Name deploy_network_security_group_diagnostic_setting
DisplayName Deploy Diagnostic Settings for Network Security Groups to a Log Analytics workspace
Description Deploys the diagnostic settings for Network Security Groups to stream to a regional Log Analytics workspace when any Network Security Group which is missing this diagnostic settings is created or updated.
Version
Effect [parameters('effect')]

๐Ÿงฎ ~ Parameters

Name Description Default Value Allowed Values
effect Enable or disable the execution of the policy DeployIfNotExists AuditIfNotExists DeployIfNotExists Disabled
profileName The diagnostic settings profile name setbypolicy_Diagnostics
workspaceId Select Log Analytics workspace from dropdown list. If this workspace is outside of the scope of the assignment you must manually grant 'Log Analytics Contributor' permissions (or similar) to the policy assignment's principal ID.
storageAccountId The Storage Account Resource Id to send activity logs
eventHubAuthorizationRuleId The Event Hub authorization rule Id for Azure Diagnostics. The authorization rule needs to be at Event Hub namespace level. e.g. /subscriptions/{subscription Id}/resourceGroups/{resource group}/providers/Microsoft.EventHub/namespaces/{Event Hub namespace}/authorizationrules/{authorization rule}
eventHubName The EventHub name to stream activity logs to
logsEnabled Enable Logs - True or False True True False


Title Description
Name deploy_network_interface_diagnostic_setting
DisplayName Deploy Diagnostic Settings for Network Interfaces to a Log Analytics workspace
Description Deploys the diagnostic settings for Network Interfaces to stream to a regional Log Analytics workspace when any Network Interface which is missing this diagnostic settings is created or updated.
Version
Effect [parameters('effect')]

๐Ÿงฎ ~ Parameters

Name Description Default Value Allowed Values
effect Enable or disable the execution of the policy DeployIfNotExists AuditIfNotExists DeployIfNotExists Disabled
profileName The diagnostic settings profile name setbypolicy_Diagnostics
workspaceId Select Log Analytics workspace from dropdown list. If this workspace is outside of the scope of the assignment you must manually grant 'Log Analytics Contributor' permissions (or similar) to the policy assignment's principal ID.
storageAccountId The Storage Account Resource Id to send activity logs
eventHubAuthorizationRuleId The Event Hub authorization rule Id for Azure Diagnostics. The authorization rule needs to be at Event Hub namespace level. e.g. /subscriptions/{subscription Id}/resourceGroups/{resource group}/providers/Microsoft.EventHub/namespaces/{Event Hub namespace}/authorizationrules/{authorization rule}
eventHubName The EventHub name to stream activity logs to
metricsEnabled Enable Metrics - True or False True True False


Title Description
Name deploy_keyvault_diagnostic_setting
DisplayName Deploy Diagnostic Settings for KeyVaults to a Log Analytics workspace
Description Deploys the diagnostic settings for KeyVaults to stream to a regional Log Analytics workspace when any KeyVault which is missing this diagnostic settings is created or updated.
Version
Effect [parameters('effect')]

๐Ÿงฎ ~ Parameters

Name Description Default Value Allowed Values
effect Enable or disable the execution of the policy DeployIfNotExists AuditIfNotExists DeployIfNotExists Disabled
profileName The diagnostic settings profile name setbypolicy_Diagnostics
workspaceId Select Log Analytics workspace from dropdown list. If this workspace is outside of the scope of the assignment you must manually grant 'Log Analytics Contributor' permissions (or similar) to the policy assignment's principal ID.
storageAccountId The Storage Account Resource Id to send activity logs
eventHubAuthorizationRuleId The Event Hub authorization rule Id for Azure Diagnostics. The authorization rule needs to be at Event Hub namespace level. e.g. /subscriptions/{subscription Id}/resourceGroups/{resource group}/providers/Microsoft.EventHub/namespaces/{Event Hub namespace}/authorizationrules/{authorization rule}
eventHubName The EventHub name to stream activity logs to
metricsEnabled Whether to enable metrics stream to the Log Analytics workspace - True or False False True False
logsEnabled Whether to enable logs stream to the Log Analytics workspace - True or False True True False


Title Description
Name deploy_loadbalancer_diagnostic_setting
DisplayName Deploy Diagnostic Settings for Load Balancers to a Log Analytics workspace
Description Deploys the diagnostic settings for Load Balancers to stream to a regional Log Analytics workspace when any Load Balancer which is missing this diagnostic settings is created or updated.
Version
Effect [parameters('effect')]

๐Ÿงฎ ~ Parameters

Name Description Default Value Allowed Values
effect Enable or disable the execution of the policy DeployIfNotExists AuditIfNotExists AuditIfNotExists DeployIfNotExists Disabled
profileName The diagnostic settings profile name setbypolicy_Diagnostics
workspaceId Select Log Analytics workspace from dropdown list. If this workspace is outside of the scope of the assignment you must manually grant 'Log Analytics Contributor' permissions (or similar) to the policy assignment's principal ID.
storageAccountId The Storage Account Resource Id to send activity logs
eventHubAuthorizationRuleId The Event Hub authorization rule Id for Azure Diagnostics. The authorization rule needs to be at Event Hub namespace level. e.g. /subscriptions/{subscription Id}/resourceGroups/{resource group}/providers/Microsoft.EventHub/namespaces/{Event Hub namespace}/authorizationrules/{authorization rule}
eventHubName The EventHub name to stream activity logs to
metricsEnabled Whether to enable metrics stream to the Log Analytics workspace - True or False False True False
logsEnabled Whether to enable logs stream to the Log Analytics workspace - True or False True True False


Title Description
Name audit_log_analytics_workspace_retention
DisplayName
Description
Version
Effect [parameters('effect')]

๐Ÿงฎ ~ Parameters

Name Description Default Value Allowed Values
effect Enable or disable the execution of the policy AuditIfNotExists AuditIfNotExists Disabled
workspaceRetentionDays Log Analytics Workspace should be retained for the specified amount of days. Defaults to 15 months 456


Title Description
Name audit_subscription_diagnostic_setting_should_exist
DisplayName
Description
Version
Effect [parameters('effect')]

๐Ÿงฎ ~ Parameters

Name Description Default Value Allowed Values
effect Enable or disable the execution of the policy AuditIfNotExists AuditIfNotExists Disabled


Title Description
Name deploy_application_gateway_diagnostic_setting
DisplayName Deploy Diagnostic Settings for Application Gateways to a Log Analytics workspace
Description Deploys the diagnostic settings for Application Gateways to stream to a regional Log Analytics workspace when any Application Gateway which is missing this diagnostic settings is created or updated.
Version
Effect [parameters('effect')]

๐Ÿงฎ ~ Parameters

Name Description Default Value Allowed Values
effect Enable or disable the execution of the policy DeployIfNotExists AuditIfNotExists DeployIfNotExists Disabled
profileName The diagnostic settings profile name setbypolicy_Diagnostics
workspaceId Select Log Analytics workspace from dropdown list. If this workspace is outside of the scope of the assignment you must manually grant 'Log Analytics Contributor' permissions (or similar) to the policy assignment's principal ID.
storageAccountId The Storage Account Resource Id to send activity logs
eventHubAuthorizationRuleId The Event Hub authorization rule Id for Azure Diagnostics. The authorization rule needs to be at Event Hub namespace level. e.g. /subscriptions/{subscription Id}/resourceGroups/{resource group}/providers/Microsoft.EventHub/namespaces/{Event Hub namespace}/authorizationrules/{authorization rule}
eventHubName The EventHub name to stream activity logs to
metricsEnabled Whether to enable metrics stream to the Log Analytics workspace - True or False False True False
logsEnabled Whether to enable logs stream to the Log Analytics workspace - True or False True True False


Title Description
Name deploy_eventhub_diagnostic_setting
DisplayName Deploy Diagnostic Settings for Event Hubs to a Log Analytics workspace
Description Deploys the diagnostic settings for Event Hubs to stream to a regional Log Analytics workspace when any Event Hub which is missing this diagnostic settings is created or updated.
Version
Effect [parameters('effect')]

๐Ÿงฎ ~ Parameters

Name Description Default Value Allowed Values
effect Enable or disable the execution of the policy DeployIfNotExists AuditIfNotExists DeployIfNotExists Disabled
profileName The diagnostic settings profile name setbypolicy_Diagnostics
workspaceId Select Log Analytics workspace from dropdown list. If this workspace is outside of the scope of the assignment you must manually grant 'Log Analytics Contributor' permissions (or similar) to the policy assignment's principal ID.
storageAccountId The Storage Account Resource Id to send activity logs
eventHubAuthorizationRuleId The Event Hub authorization rule Id for Azure Diagnostics. The authorization rule needs to be at Event Hub namespace level. e.g. /subscriptions/{subscription Id}/resourceGroups/{resource group}/providers/Microsoft.EventHub/namespaces/{Event Hub namespace}/authorizationrules/{authorization rule}
eventHubName The EventHub name to stream activity logs to
metricsEnabled Whether to enable metrics stream to the Log Analytics workspace - True or False False True False
logsEnabled Whether to enable logs stream to the Log Analytics workspace - True or False True True False


Title Description
Name deploy_expressroute_connection_diagnostic_setting
DisplayName Deploy Diagnostic Settings for ExpressRoute Connections to a Log Analytics workspace
Description Deploys the diagnostic settings for ExpressRoute Connections to stream to a regional Log Analytics workspace when any ExpressRoute Connection which is missing this diagnostic settings is created or updated.
Version
Effect [parameters('effect')]

๐Ÿงฎ ~ Parameters

Name Description Default Value Allowed Values
effect Enable or disable the execution of the policy DeployIfNotExists AuditIfNotExists DeployIfNotExists Disabled
profileName The diagnostic settings profile name setbypolicy_Diagnostics
workspaceId Select Log Analytics workspace from dropdown list. If this workspace is outside of the scope of the assignment you must manually grant 'Log Analytics Contributor' permissions (or similar) to the policy assignment's principal ID.
storageAccountId The Storage Account Resource Id to send activity logs
eventHubAuthorizationRuleId The Event Hub authorization rule Id for Azure Diagnostics. The authorization rule needs to be at Event Hub namespace level. e.g. /subscriptions/{subscription Id}/resourceGroups/{resource group}/providers/Microsoft.EventHub/namespaces/{Event Hub namespace}/authorizationrules/{authorization rule}
eventHubName The EventHub name to stream activity logs to
metricsEnabled Enable Metrics - True or False True True False
logsEnabled Enable Logs - True or False True True False


Title Description
Name deploy_expressroute_diagnostic_setting
DisplayName Deploy Diagnostic Settings for ExpressRoutes to a Log Analytics workspace
Description Deploys the diagnostic settings for ExpressRoutes to stream to a regional Log Analytics workspace when any ExpressRoute which is missing this diagnostic settings is created or updated.
Version
Effect [parameters('effect')]

๐Ÿงฎ ~ Parameters

Name Description Default Value Allowed Values
effect Enable or disable the execution of the policy DeployIfNotExists AuditIfNotExists DeployIfNotExists Disabled
profileName The diagnostic settings profile name setbypolicy_Diagnostics
workspaceId Select Log Analytics workspace from dropdown list. If this workspace is outside of the scope of the assignment you must manually grant 'Log Analytics Contributor' permissions (or similar) to the policy assignment's principal ID.
storageAccountId The Storage Account Resource Id to send activity logs
eventHubAuthorizationRuleId The Event Hub authorization rule Id for Azure Diagnostics. The authorization rule needs to be at Event Hub namespace level. e.g. /subscriptions/{subscription Id}/resourceGroups/{resource group}/providers/Microsoft.EventHub/namespaces/{Event Hub namespace}/authorizationrules/{authorization rule}
eventHubName The EventHub name to stream activity logs to
metricsEnabled Enable Metrics - True or False True True False
logsEnabled Enable Logs - True or False True True False


Title Description
Name deploy_firewall_diagnostic_setting
DisplayName Deploy Diagnostic Settings for Firewalls to a Log Analytics workspace
Description Deploys the diagnostic settings for Firewalls to stream to a regional Log Analytics workspace when any Firewall which is missing this diagnostic settings is created or updated.
Version
Effect [parameters('effect')]

๐Ÿงฎ ~ Parameters

Name Description Default Value Allowed Values
effect Enable or disable the execution of the policy DeployIfNotExists AuditIfNotExists DeployIfNotExists Disabled
profileName The diagnostic settings profile name setbypolicy_Diagnostics
workspaceId Select Log Analytics workspace from dropdown list. If this workspace is outside of the scope of the assignment you must manually grant 'Log Analytics Contributor' permissions (or similar) to the policy assignment's principal ID.
storageAccountId The Storage Account Resource Id to send activity logs
eventHubAuthorizationRuleId The Event Hub authorization rule Id for Azure Diagnostics. The authorization rule needs to be at Event Hub namespace level. e.g. /subscriptions/{subscription Id}/resourceGroups/{resource group}/providers/Microsoft.EventHub/namespaces/{Event Hub namespace}/authorizationrules/{authorization rule}
eventHubName The EventHub name to stream activity logs to
metricsEnabled Whether to enable metrics stream to the Log Analytics workspace - True or False False True False
logsEnabled Whether to enable logs stream to the Log Analytics workspace - True or False True True False



Network

Title Description
Name create_nsg_rule_append
DisplayName
Description
Version
Effect [parameters('effect')]

๐Ÿงฎ ~ Parameters

Name Description Default Value Allowed Values
name
protocol TCP UDP ICMP *
access Allow Deny
priority
direction Inbound Outbound
sourcePortRanges
destinationPortRanges
sourceAddressPrefixes
destinationAddressPrefixes
effect The effect determines what happens when the policy rule is evaluated to match Append Append Disabled


Title Description
Name deny_nat_rules_firewalls
DisplayName
Description
Version
Effect [parameters('effect')]

๐Ÿงฎ ~ Parameters

Name Description Default Value Allowed Values
effect The effect determines what happens when the policy rule is evaluated to match Deny Audit Deny Disabled


Title Description
Name deny_nic_on_unapproved_vnet
DisplayName
Description
Version
Effect [parameters('effect')]

๐Ÿงฎ ~ Parameters

Name Description Default Value Allowed Values
effect The effect determines what happens when the policy rule is evaluated to match Deny Audit Deny Disabled
virtualNetworkId Resource Id of the virtual network. Example: /subscriptions/YourSubscriptionId/resourceGroups/YourResourceGroupName/providers/Microsoft.Network/virtualNetworks/Name


Title Description
Name deny_nic_public_ip_on_specific_subnets
DisplayName
Description
Version
Effect [parameters('effect')]

๐Ÿงฎ ~ Parameters

Name Description Default Value Allowed Values
deniedSuffix NICs attached to a subnet containing this suffix will be unable to attach a Public IP
effect The effect determines what happens when the policy rule is evaluated to match Deny Audit Deny Disabled


Title Description
Name deny_nic_public_ip
DisplayName
Description
Version
Effect [parameters('effect')]

๐Ÿงฎ ~ Parameters

Name Description Default Value Allowed Values
effect The effect determines what happens when the policy rule is evaluated to match Deny Audit Deny Disabled


Title Description
Name deny_nsg_outbound_allow_all
DisplayName
Description
Version
Effect [parameters('effect')]

๐Ÿงฎ ~ Parameters

Name Description Default Value Allowed Values
effect The effect determines what happens when the policy rule is evaluated to match Deny Audit Deny Disabled


Title Description
Name deny_nsgs_with_rules_with_source_inbound_any
DisplayName
Description
Version
Effect [parameters('effect')]

๐Ÿงฎ ~ Parameters

Name Description Default Value Allowed Values
effect The effect determines what happens when the policy rule is evaluated to match Deny Audit Deny Disabled


Title Description
Name deny_pip_if_not_associated_authorised_resource
DisplayName
Description
Version
Effect [parameters('effect')]

๐Ÿงฎ ~ Parameters

Name Description Default Value Allowed Values
effect The effect determines what happens when the policy rule is evaluated to match Deny Audit Deny Disabled


Title Description
Name deny_unapproved_udr
DisplayName
Description
Version
Effect [parameters('effect')]

๐Ÿงฎ ~ Parameters

Name Description Default Value Allowed Values
allowedHops A list of the permitted 'next hops' for a UDR
effect The effect determines what happens when the policy rule is evaluated to match Audit Audit Deny Disabled


Title Description
Name require_nsg_on_vnet
DisplayName
Description
Version
Effect [parameters('effect')]

๐Ÿงฎ ~ Parameters

Name Description Default Value Allowed Values
allowedRanges Provide the list of approved IP ranges for NSGs
effect The effect determines what happens when the policy rule is evaluated to match Audit Audit Deny Disabled


Title Description
Name restrict_vnet_peering
DisplayName
Description
Version
Effect [parameters('effect')]

๐Ÿงฎ ~ Parameters

Name Description Default Value Allowed Values
trustedVnetIds Trusted vNet IDs
effect The effect determines what happens when the policy rule is evaluated to match Audit Audit Deny Disabled


Title Description
Name deny_unapproved_udr_hop_type
DisplayName
Description
Version
Effect [parameters('effect')]

๐Ÿงฎ ~ Parameters

Name Description Default Value Allowed Values
allowedHopType1 A permitted hop type for a UDR
allowedHopType2 A permitted hop type for a UDR
allowedHopType3 A permitted hop type for a UDR
effect The effect determines what happens when the policy rule is evaluated to match Audit Audit Deny Disabled



Security Center

Title Description
Name auto_enroll_subscriptions
DisplayName Enroll Subscriptions to Azure Security Center
Description Enroll Subscriptions to Azure Security Center Standard Pricing Tier, Note: the new Containers Plan will be replacing Container Registries and Kubernetes
Version
Effect [parameters('effect')]

๐Ÿงฎ ~ Parameters

Name Description Default Value Allowed Values
effect Enable or disable the execution of the policy DeployIfNotExists DeployIfNotExists AuditIfNotExists Disabled
pricingTier ASC Pricing Tier Standard Free Standard


Title Description
Name auto_provision_log_analytics_agent_custom_workspace
DisplayName Auto Provision Subscriptions to Log Analytics Custom to Workspace
Description Enable Security Center's auto provisioning of the Log Analytics agent on your subscriptions with custom workspace
Version
Effect [parameters('effect')]

๐Ÿงฎ ~ Parameters

Name Description Default Value Allowed Values
effect Enable or disable the execution of the policy DeployIfNotExists DeployIfNotExists AuditIfNotExists Disabled
workspaceId Auto provision the Log Analytics agent on your subscriptions to monitor and collect security data using a custom workspace.


Title Description
Name auto_set_contact_details
DisplayName Set Security Center contact email address and phone number on Subscriptions
Description Automatically set the security contact email address and phone number should they be blank on the subscription
Version
Effect [parameters('effect')]

๐Ÿงฎ ~ Parameters

Name Description Default Value Allowed Values
effect Enable or disable the execution of the policy DeployIfNotExists DeployIfNotExists AuditIfNotExists Disabled
securityContactsEmail The email of the Security Center Contact.
securityContactsPhone The phone number of the Security Center Contact.


Title Description
Name enable_vulnerability_vm_assessments
DisplayName Enable Security Center VM Vulnerability Assessments
Description Enable Security Center VM Vulnerability Assessments
Version
Effect [parameters('effect')]

๐Ÿงฎ ~ Parameters

Name Description Default Value Allowed Values
effect Enable or disable the execution of the policy DeployIfNotExists DeployIfNotExists AuditIfNotExists Disabled


Title Description
Name export_asc_alerts_and_recommendations_to_eventhub
DisplayName Export ASC alerts and recommendations to eventhub
Description Enable Export to Event Hub for Azure Security Center alerts and recommendations
Version
Effect [parameters('effect')]

๐Ÿงฎ ~ Parameters

Name Description Default Value Allowed Values
effect Enable or disable the execution of the policy DeployIfNotExists DeployIfNotExists AuditIfNotExists Disabled
resourceGroupName The resource group name where the export to Event Hub configuration is created. If you enter a name for a resource group that doesn't exist, it'll be created in the subscription. Note that each resource group can only have one export to Event Hub configured. policy-export-asc-alerts
resourceGroupLocation The location where the resource group and the export to Event Hub configuration are created. uksouth uksouth ukwest
exportedDataTypes The data types to be exported. Example: Security recommendations;Security alerts;Secure scores;Secure score controls; Security recommendations Security alerts Overall secure score Secure score controls Security recommendations Security alerts Overall secure score Secure score controls
recommendationNames Applicable only for export of security recommendations. To export all recommendations, leave this empty. To export specific recommendations, enter a list of recommendation IDs separated by semicolons (';'). Recommendation IDs are available through the Assessments API (https://docs.microsoft.com/rest/api/securitycenter/assessments), or Azure Resource Graph Explorer (https://portal.azure.com/#blade/HubsExtension/ArgQueryBlade), choose securityresources and microsoft.security/assessments.
recommendationSeverities Applicable only for export of security recommendations. Determines recommendation severities. Example: High;Medium;Low; High Medium Low High Medium Low
isSecurityFindingsEnabled Security findings are results from vulnerability assessment solutions, and can be thought of as 'sub' recommendations grouped into a 'parent' recommendation. True True False
secureScoreControlsNames Applicable only for export of secure score controls. To export all secure score controls, leave this empty. To export specific secure score controls, enter a list of secure score controls IDs separated by semicolons (';'). Secure score controls IDs are available through the Secure score controls API (https://docs.microsoft.com/rest/api/securitycenter/securescorecontrols), or Azure Resource Graph Explorer (https://portal.azure.com/#blade/HubsExtension/ArgQueryBlade), choose securityresources and microsoft.security/securescores/securescorecontrols.
alertSeverities Applicable only for export of security alerts. Determines alert severities. Example: High;Medium;Low; High Medium Low High Medium Low
eventHubDetails The Event Hub details of where the data should be exported to: Subscription, Event Hub Namespace, Event Hub, and Authorizations rules with 'Send' claim. If you do not already have an event hub, visit Event Hubs to create one (https://portal.azure.com/#blade/HubsExtension/BrowseResource/resourceType/Microsoft.EventHub%2Fnamespaces).


Title Description
Name export_asc_alerts_and_recommendations_to_log_analytics
DisplayName Export ASC alerts and recommendations to Log Analytics
Description Enable Export to Log Analytics Workspace for Azure Security Center alerts and recommendations
Version
Effect [parameters('effect')]

๐Ÿงฎ ~ Parameters

Name Description Default Value Allowed Values
effect Enable or disable the execution of the policy DeployIfNotExists DeployIfNotExists AuditIfNotExists Disabled
resourceGroupName The resource group name where the export to Log Analytics configuration is created. If you enter a name for a resource group that doesn't exist, it'll be created in the subscription. Note that each resource group can only have one export to Log Analytics configured. policy-export-asc-alerts
resourceGroupLocation The location where the resource group and the export to Log Analytics configuration are created. uksouth uksouth ukwest
exportedDataTypes The data types to be exported. Example: Security recommendations;Security alerts;Secure scores;Secure score controls; Security recommendations Security alerts Overall secure score Secure score controls Security recommendations Security alerts Overall secure score Secure score controls
recommendationNames Applicable only for export of security recommendations. To export all recommendations, leave this empty. To export specific recommendations, enter a list of recommendation IDs separated by semicolons (';'). Recommendation IDs are available through the Assessments API (https://docs.microsoft.com/rest/api/securitycenter/assessments), or Azure Resource Graph Explorer (https://portal.azure.com/#blade/HubsExtension/ArgQueryBlade), choose securityresources and microsoft.security/assessments.
recommendationSeverities Applicable only for export of security recommendations. Determines recommendation severities. Example: High;Medium;Low; High Medium Low High Medium Low
isSecurityFindingsEnabled Security findings are results from vulnerability assessment solutions, and can be thought of as 'sub' recommendations grouped into a 'parent' recommendation. True True False
secureScoreControlsNames Applicable only for export of secure score controls. To export all secure score controls, leave this empty. To export specific secure score controls, enter a list of secure score controls IDs separated by semicolons (';'). Secure score controls IDs are available through the Secure score controls API (https://docs.microsoft.com/rest/api/securitycenter/securescorecontrols), or Azure Resource Graph Explorer (https://portal.azure.com/#blade/HubsExtension/ArgQueryBlade), choose securityresources and microsoft.security/securescores/securescorecontrols.
alertSeverities Applicable only for export of security alerts. Determines alert severities. Example: High;Medium;Low; High Medium Low High Medium Low
workspaceId Auto provision the Log Analytics agent on your subscriptions to monitor and collect security data using a custom workspace.



Storage

Title Description
Name storage_enforce_https
DisplayName
Description
Version
Effect [parameters('effect')]

๐Ÿงฎ ~ Parameters

Name Description Default Value Allowed Values
effect The effect determines what happens when the policy rule is evaluated to match Deny Audit Deny Disabled


Title Description
Name storage_enforce_minimum_tls1_2
DisplayName
Description
Version
Effect [parameters('effect')]

๐Ÿงฎ ~ Parameters

Name Description Default Value Allowed Values
effect The effect determines what happens when the policy rule is evaluated to match Deny Audit Deny Disabled



Tags

Title Description
Name add_replace_resource_group_tag_key_modify
DisplayName
Description
Version
Effect [parameters('effect')]

๐Ÿงฎ ~ Parameters

Name Description Default Value Allowed Values
effect The effect determines what happens when the policy rule is evaluated to match Modify Modify Disabled


Title Description
Name inherit_resource_group_tags_append
DisplayName
Description
Version
Effect [parameters('effect')]

๐Ÿงฎ ~ Parameters

Name Description Default Value Allowed Values
tagName Name of the tag, such as 'environment'
effect The effect determines what happens when the policy rule is evaluated to match Append Append Disabled


Title Description
Name inherit_resource_group_tags_modify
DisplayName
Description
Version
Effect [parameters('effect')]

๐Ÿงฎ ~ Parameters

Name Description Default Value Allowed Values
tagName Name of the tag, such as 'environment'
effect The effect determines what happens when the policy rule is evaluated to match Modify Modify Disabled


Title Description
Name require_resource_group_tags
DisplayName
Description
Version
Effect [parameters('effect')]

๐Ÿงฎ ~ Parameters

Name Description Default Value Allowed Values
tagName Name of the tag, such as 'environment'
effect The effect determines what happens when the policy rule is evaluated to match Audit Audit Deny Disabled