lz policy effects across environments - oWretch/policy GitHub Wiki

Azure Policy effects

Auto-generated Policy effect documentation across environments 'Platform', 'Landing Zones', 'Production', 'Decommissioned', 'Management', 'Corp', 'Connectivity', 'Sandbox', 'Identity' sorted by Policy category and Policy display name.

Environment Category Platform

Scopes

  • managementGroups: Platform

Assignment: Enforce recommended guardrails for MySQL.

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-platform/providers/Microsoft.Authorization/policyAssignments/Enforce-GR-MySQL
Policy Set Enforce recommended guardrails for MySQL
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Enforce-Guardrails-MySQL
Type Custom
Category MySQL
Description This policy initiative is a group of policies that ensures MySQL is compliant per regulated Landing Zones.

Assignment: Enforce recommended guardrails for API Management

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-platform/providers/Microsoft.Authorization/policyAssignments/Enforce-GR-APIM
Policy Set Enforce recommended guardrails for API Management
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Enforce-Guardrails-APIM
Type Custom
Category API Management
Description This policy initiative is a group of policies that ensures API Management is compliant per regulated Landing Zones.

Assignment: Enforce recommended guardrails for Container Registry

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-platform/providers/Microsoft.Authorization/policyAssignments/Enforce-GR-ContReg
Policy Set Enforce recommended guardrails for Container Registry
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Enforce-Guardrails-ContainerRegistry
Type Custom
Category Container Registry
Description This policy initiative is a group of policies that ensures Container Apps is compliant per regulated Landing Zones.

Assignment: Enforce recommended guardrails for PostgreSQL.

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-platform/providers/Microsoft.Authorization/policyAssignments/Enforce-GR-PostgreSQL
Policy Set Enforce recommended guardrails for PostgreSQL
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Enforce-Guardrails-PostgreSQL
Type Custom
Category PostgreSQL
Description This policy initiative is a group of policies that ensures PostgreSQL is compliant per regulated Landing Zones.

Assignment: Enforce recommended guardrails for Key Vault Supplementary

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-platform/providers/Microsoft.Authorization/policyAssignments/Enforce-GR-KeyVaultSup
Policy Set Enforce additional recommended guardrails for Key Vault
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Enforce-Guardrails-KeyVault-Sup
Type Custom
Category Key Vault
Description This policy initiative is a group of policies that ensures Key Vault is compliant per regulated Landing Zones.

Assignment: Deploy Azure Monitor Baseline Alerts for Recovery Services

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-platform/providers/Microsoft.Authorization/policyAssignments/Deploy-AMBA-RecoverySvc
Policy Set Deploy Azure Monitor Baseline Alerts for Recovery Services
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Alerting-RecoveryServices
Type Custom
Category Monitoring
Description This initiative deploys Azure Monitor Baseline Alerts to monitor Recovery Services such as Azure Backup, and Azure Site Recovery.

Assignment: Enforce recommended guardrails for Data Explorer

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-platform/providers/Microsoft.Authorization/policyAssignments/Enforce-GR-DataExpl
Policy Set Enforce recommended guardrails for Data Explorer
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Enforce-Guardrails-DataExplorer
Type Custom
Category Azure Data Explorer
Description This policy initiative is a group of policies that ensures Data Explorer is compliant per regulated Landing Zones.

Assignment: Enable Azure Monitor for Virtual Machine Scale Sets

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-platform/providers/Microsoft.Authorization/policyAssignments/Deploy-VMSS-Monitoring
Policy Set Enable Azure Monitor for VMSS with Azure Monitoring Agent(AMA)
Policy Set Id /providers/Microsoft.Authorization/policySetDefinitions/f5bf694c-cca7-4033-b883-3a23327d5485
Type BuiltIn
Category Monitoring
Description Enable Azure Monitor for the virtual machines scale set (VMSS) with AMA.

Assignment: Enforce recommended guardrails for Event Grid

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-platform/providers/Microsoft.Authorization/policyAssignments/Enforce-GR-EventGrid
Policy Set Enforce recommended guardrails for Event Grid
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Enforce-Guardrails-EventGrid
Type Custom
Category Event Grid
Description This policy initiative is a group of policies that ensures Event Grid is compliant per regulated Landing Zones.

Assignment: Enforce recommended guardrails for Machine Learning.

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-platform/providers/Microsoft.Authorization/policyAssignments/Enforce-GR-MachLearn
Policy Set Enforce recommended guardrails for Machine Learning
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Enforce-Guardrails-MachineLearning
Type Custom
Category Machine Learning
Description This policy initiative is a group of policies that ensures Machine Learning is compliant per regulated Landing Zones.

Assignment: Enforce recommended guardrails for Service Bus.

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-platform/providers/Microsoft.Authorization/policyAssignments/Enforce-GR-ServiceBus
Policy Set Enforce recommended guardrails for Service Bus
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Enforce-Guardrails-ServiceBus
Type Custom
Category Service Bus
Description This policy initiative is a group of policies that ensures Service Bus is compliant per regulated Landing Zones.

Assignment: Enforce recommended guardrails for Storage.

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-platform/providers/Microsoft.Authorization/policyAssignments/Enforce-GR-Storage
Policy Set Enforce recommended guardrails for Storage Account
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Enforce-Guardrails-Storage
Type Custom
Category Storage
Description This policy initiative is a group of policies that ensures Storage is compliant per regulated Landing Zones.

Assignment: Enforce recommended guardrails for Compute

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-platform/providers/Microsoft.Authorization/policyAssignments/Enforce-GR-Compute
Policy Set Enforce recommended guardrails for Compute
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Enforce-Guardrails-Compute
Type Custom
Category Compute
Description This policy initiative is a group of policies that ensures Compute is compliant per regulated Landing Zones.

Assignment: Deploy Azure Monitor Baseline Alerts for Virtual Machines

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-platform/providers/Microsoft.Authorization/policyAssignments/Deploy-AMBA-VM
Policy Set Deploy Azure Monitor Baseline Alerts for Virtual Machines
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Alerting-VM
Type Custom
Category Monitoring
Description This initiative deploys Azure Monitor Baseline Alerts to monitor Azure Virtual Machines.

Assignment: Enforce recommended guardrails for Container Apps

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-platform/providers/Microsoft.Authorization/policyAssignments/Enforce-GR-ContApps
Policy Set Enforce recommended guardrails for Container Apps
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Enforce-Guardrails-ContainerApps
Type Custom
Category Container Apps
Description This policy initiative is a group of policies that ensures Container Apps is compliant per regulated Landing Zones.

Assignment: Configure SQL VMs and Arc-enabled SQL Servers to install Microsoft Defender for SQL and AMA with a user-defined LA workspace

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-platform/providers/Microsoft.Authorization/policyAssignments/Deploy-MDFC-SQL-AMA-PLT
Policy Set Configure SQL VMs and Arc-enabled SQL Servers to install Microsoft Defender for SQL and AMA with a user-defined LA workspace
Policy Set Id /providers/Microsoft.Authorization/policySetDefinitions/de01d381-bae9-4670-8870-786f89f49e26
Type BuiltIn
Category Security Center
Description Microsoft Defender for SQL collects events from the agents and uses them to provide security alerts and tailored hardening tasks (recommendations). Creates a resource group and a Data Collection Rule in the same region as the user-defined Log Analytics workspace.

Assignment: Subnets should be private

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-platform/providers/Microsoft.Authorization/policyAssignments/Enforce-Snet-Private-PLT
Policy Subnets should be private
Policy Definition Id /providers/Microsoft.Authorization/policyDefinitions/7bca8353-aa3b-429b-904a-9229c4385837
Type BuiltIn
Category Network
Description Ensure your subnets are secure by default by preventing default outbound access. For more information go to https://aka.ms/defaultoutboundaccessretirement

Assignment: Do not allow deletion of the User Assigned Managed Identity used by AMA

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-platform/providers/Microsoft.Authorization/policyAssignments/DenyAction-DeleteUAMIAMA
Policy Do not allow deletion of specified resource and resource type
Policy Definition Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policyDefinitions/DenyAction-DeleteResources
Type Custom
Category General
Description This policy enables you to specify the resource and resource type that your organization can protect from accidentals deletion by blocking delete calls using the deny action effect.

Assignment: Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines.

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-platform/providers/Microsoft.Authorization/policyAssignments/Enable-AUM-Updates-PLT
Policy Set Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Deploy-AUM-CheckUpdates
Type Custom
Category Security Center
Description Configure auto-assessment (every 24 hours) for OS updates. You can control the scope of assignment according to machine subscription, resource group, location or tag. Learn more about this for Windows: https://aka.ms/computevm-windowspatchassessmentmode, for Linux: https://aka.ms/computevm-linuxpatchassessmentmode.

Assignment: Enforce enhanced recovery and backup policies

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-platform/providers/Microsoft.Authorization/policyAssignments/Enforce-ASR-PLT
Policy Set Enforce enhanced recovery and backup policies
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Enforce-Backup
Type Custom
Category Backup
Description Enforce enhanced recovery and backup policies on assigned scopes.

Assignment: Enforce recommended guardrails for Kubernetes.

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-platform/providers/Microsoft.Authorization/policyAssignments/Enforce-GR-Kubernetes
Policy Set Enforce recommended guardrails for Kubernetes
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Enforce-Guardrails-Kubernetes
Type Custom
Category Kubernetes
Description This policy initiative is a group of policies that ensures Kubernetes is compliant per regulated Landing Zones.

Assignment: Deploy Azure Monitor Baseline Alerts for Key Management

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-platform/providers/Microsoft.Authorization/policyAssignments/Deploy-AMBA-KeyMgmt
Policy Set Deploy Azure Monitor Baseline Alerts for Key Management
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Alerting-KeyManagement
Type Custom
Category Monitoring
Description This initiative deploys Azure Monitor Baseline Alerts to monitor Key Management Services such as Azure Key Vault, and Managed HSM.

Assignment: Enable Azure Monitor for VMs

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-platform/providers/Microsoft.Authorization/policyAssignments/Deploy-VM-Monitoring
Policy Set Enable Azure Monitor for VMs with Azure Monitoring Agent(AMA)
Policy Set Id /providers/Microsoft.Authorization/policySetDefinitions/924bfe3a-762f-40e7-86dd-5c8b95eb09e6
Type BuiltIn
Category Monitoring
Description Enable Azure Monitor for the virtual machines (VMs) with AMA.

Assignment: Enforce recommended guardrails for Synapse.

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-platform/providers/Microsoft.Authorization/policyAssignments/Enforce-GR-Synapse
Policy Set Enforce recommended guardrails for Synapse workspaces
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Enforce-Guardrails-Synapse
Type Custom
Category Synapse
Description This policy initiative is a group of policies that ensures Synapse workspaces is compliant per regulated Landing Zones.

Assignment: Enable ChangeTracking and Inventory for Arc-enabled virtual machines

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-platform/providers/Microsoft.Authorization/policyAssignments/Deploy-vmArc-ChangeTrack
Policy Set Enable ChangeTracking and Inventory for Arc-enabled virtual machines
Policy Set Id /providers/Microsoft.Authorization/policySetDefinitions/53448c70-089b-4f52-8f38-89196d7f2de1
Type BuiltIn
Category ChangeTrackingAndInventory
Description Enable ChangeTracking and Inventory for Arc-enabled virtual machines. Takes Data Collection Rule ID as parameter and asks for an option to input applicable locations.

Assignment: Enforce recommended guardrails for SQL.

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-platform/providers/Microsoft.Authorization/policyAssignments/Enforce-GR-SQL
Policy Set Enforce recommended guardrails for SQL and SQL Managed Instance
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Enforce-Guardrails-SQL
Type Custom
Category SQL
Description This policy initiative is a group of policies that ensures SQL and SQL Managed Instance is compliant per regulated Landing Zones.

Assignment: Enforce recommended guardrails for Bot Service

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-platform/providers/Microsoft.Authorization/policyAssignments/Enforce-GR-BotService
Policy Set Enforce recommended guardrails for Bot Service
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Enforce-Guardrails-BotService
Type Custom
Category Bot Service
Description This policy initiative is a group of policies that ensures Bot Service is compliant per regulated Landing Zones.

Assignment: Enforce recommended guardrails for Network and Networking services.

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-platform/providers/Microsoft.Authorization/policyAssignments/Enforce-GR-Network
Policy Set Enforce recommended guardrails for Network and Networking services
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Enforce-Guardrails-Network
Type Custom
Category Network
Description This policy initiative is a group of policies that ensures Network and Networking services are compliant per regulated Landing Zones.

Assignment: Enable ChangeTracking and Inventory for virtual machine scale sets

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-platform/providers/Microsoft.Authorization/policyAssignments/Deploy-VMSS-ChangeTrack
Policy Set [Preview]: Enable ChangeTracking and Inventory for virtual machine scale sets
Policy Set Id /providers/Microsoft.Authorization/policySetDefinitions/c4a70814-96be-461c-889f-2b27429120dc
Type BuiltIn
Category ChangeTrackingAndInventory
Description Enable ChangeTracking and Inventory for virtual machine scale sets. Takes Data Collection Rule ID as parameter and asks for an option to input applicable locations and user-assigned identity for Azure Monitor Agent.

Assignment: Enforce recommended guardrails for Cosmos DB

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-platform/providers/Microsoft.Authorization/policyAssignments/Enforce-GR-CosmosDb
Policy Set Enforce recommended guardrails for Cosmos DB
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Enforce-Guardrails-CosmosDb
Type Custom
Category Cosmos DB
Description This policy initiative is a group of policies that ensures Cosmos DB is compliant per regulated Landing Zones.

Assignment: Enable Azure Monitor for Hybrid Virtual Machines

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-platform/providers/Microsoft.Authorization/policyAssignments/Deploy-vmHybr-Monitoring
Policy Set Enable Azure Monitor for Hybrid VMs with AMA
Policy Set Id /providers/Microsoft.Authorization/policySetDefinitions/2b00397d-c309-49c4-aa5a-f0b2c5bc6321
Type BuiltIn
Category Monitoring
Description Enable Azure Monitor for the hybrid virtual machines with AMA.

Assignment: Enforce recommended guardrails for Virtual Desktop.

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-platform/providers/Microsoft.Authorization/policyAssignments/Enforce-GR-VirtualDesk
Policy Set Enforce recommended guardrails for Virtual Desktop
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Enforce-Guardrails-VirtualDesktop
Type Custom
Category Desktop Virtualization
Description This policy initiative is a group of policies that ensures Virtual Desktop is compliant per regulated Landing Zones.

Assignment: Enforce recommended guardrails for Azure Key Vault

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-platform/providers/Microsoft.Authorization/policyAssignments/Enforce-GR-KeyVault-PLT
Policy Set Enforce recommended guardrails for Azure Key Vault
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Enforce-Guardrails-KeyVault
Type Custom
Category Key Vault
Description Enforce recommended guardrails for Azure Key Vault.

Assignment: Enforce recommended guardrails for OpenAI.

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-platform/providers/Microsoft.Authorization/policyAssignments/Enforce-GR-OpenAI
Policy Set Enforce recommended guardrails for Open AI (Cognitive Service)
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Enforce-Guardrails-OpenAI
Type Custom
Category Cognitive Services
Description This policy initiative is a group of policies that ensures Open AI (Cognitive Service) is compliant per regulated Landing Zones.

Assignment: Enforce recommended guardrails for Customer Managed Keys

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-platform/providers/Microsoft.Authorization/policyAssignments/Enforce-Encrypt-CMK
Policy Set Deny or Audit resources without Encryption with a customer-managed key (CMK)
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Enforce-Encryption-CMK
Type Custom
Category Encryption
Description Deny or Audit resources without Encryption with a customer-managed key (CMK)

Assignment: Enforce recommended guardrails for App Services

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-platform/providers/Microsoft.Authorization/policyAssignments/Enforce-GR-AppServices
Policy Set Enforce recommended guardrails for App Service
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Enforce-Guardrails-AppServices
Type Custom
Category App Service
Description This policy initiative is a group of policies that ensures App Service is compliant per regulated Landing Zones.

Assignment: Enforce recommended guardrails for Data Factory

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-platform/providers/Microsoft.Authorization/policyAssignments/Enforce-GR-DataFactory
Policy Set Enforce recommended guardrails for Data Factory
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Enforce-Guardrails-DataFactory
Type Custom
Category Data Factory
Description This policy initiative is a group of policies that ensures Data Factory is compliant per regulated Landing Zones.

Assignment: Deploy Azure Monitor Baseline Alerts for Storage

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-platform/providers/Microsoft.Authorization/policyAssignments/Deploy-AMBA-Storage
Policy Set Deploy Azure Monitor Baseline Alerts for Storage
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Alerting-Storage
Type Custom
Category Monitoring
Description This initiative deploys Azure Monitor Baseline Alerts to monitor Storage Services such as Storage accounts.

Assignment: Enforce recommended guardrails for Cognitive Services

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-platform/providers/Microsoft.Authorization/policyAssignments/Enforce-GR-CogServ
Policy Set Enforce recommended guardrails for Cognitive Services
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Enforce-Guardrails-CognitiveServices
Type Custom
Category Cognitive Services
Description This policy initiative is a group of policies that ensures Cognitive Services is compliant per regulated Landing Zones.

Assignment: Enable ChangeTracking and Inventory for virtual machines

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-platform/providers/Microsoft.Authorization/policyAssignments/Deploy-VM-ChangeTrack
Policy Set Enable ChangeTracking and Inventory for virtual machines
Policy Set Id /providers/Microsoft.Authorization/policySetDefinitions/92a36f05-ebc9-4bba-9128-b47ad2ea3354
Type BuiltIn
Category ChangeTrackingAndInventory
Description Enable ChangeTracking and Inventory for virtual machines. Takes Data Collection Rule ID as parameter and asks for an option to input applicable locations and user-assigned identity for Azure Monitor Agent.

Assignment: Enforce recommended guardrails for Event Hub

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-platform/providers/Microsoft.Authorization/policyAssignments/Enforce-GR-EventHub
Policy Set Enforce recommended guardrails for Event Hub
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Enforce-Guardrails-EventHub
Type Custom
Category Event Hub
Description This policy initiative is a group of policies that ensures Event Hub is compliant per regulated Landing Zones.

Assignment: Enforce recommended guardrails for Container Instances

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-platform/providers/Microsoft.Authorization/policyAssignments/Enforce-GR-ContInst
Policy Set Enforce recommended guardrails for Container Instance
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Enforce-Guardrails-ContainerInstance
Type Custom
Category Container Instances
Description This policy initiative is a group of policies that ensures Container Apps is compliant per regulated Landing Zones.

Assignment: Enforce recommended guardrails for Automation Accounts

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-platform/providers/Microsoft.Authorization/policyAssignments/Enforce-GR-Automation
Policy Set Enforce recommended guardrails for Automation Account
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Enforce-Guardrails-Automation
Type Custom
Category Automation
Description This policy initiative is a group of policies that ensures Automation Account is compliant per regulated Landing Zones.

Assignment: Deploy Azure Monitor Baseline Alerts for Web

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-platform/providers/Microsoft.Authorization/policyAssignments/Deploy-AMBA-Web
Policy Set Deploy Azure Monitor Baseline Alerts for Web
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Alerting-Web
Type Custom
Category Monitoring
Description This initiative deploys Azure Monitor Baseline Alerts to monitor Web Services such as App Services.

Environment Category Landing Zones

Scopes

  • managementGroups: Landing Zones

Assignment: Enforce recommended guardrails for App Services

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-landingzones/providers/Microsoft.Authorization/policyAssignments/Enforce-GR-AppServices
Policy Set Enforce recommended guardrails for App Service
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Enforce-Guardrails-AppServices
Type Custom
Category App Service
Description This policy initiative is a group of policies that ensures App Service is compliant per regulated Landing Zones.

Assignment: Network interfaces should disable IP forwarding

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-landingzones/providers/Microsoft.Authorization/policyAssignments/Deny-IP-forwarding
Policy Network interfaces should disable IP forwarding
Policy Definition Id /providers/Microsoft.Authorization/policyDefinitions/88c0b9da-ce96-4b03-9635-f29a937e2900
Type BuiltIn
Category Network
Description This policy denies the network interfaces which enabled IP forwarding. The setting of IP forwarding disables Azure's check of the source and destination for a network interface. This should be reviewed by the network security team.

Assignment: Deploy Threat Detection on SQL servers

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-landingzones/providers/Microsoft.Authorization/policyAssignments/Deploy-SQL-Threat
Policy Configure Azure Defender to be enabled on SQL servers
Policy Definition Id /providers/Microsoft.Authorization/policyDefinitions/36d49e87-48c4-4f2e-beed-ba4ed02b71f5
Type BuiltIn
Category SQL
Description Enable Azure Defender on your Azure SQL Servers to detect anomalous activities indicating unusual and potentially harmful attempts to access or exploit databases.

Assignment: Enforce recommended guardrails for Container Apps

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-landingzones/providers/Microsoft.Authorization/policyAssignments/Enforce-GR-ContApps
Policy Set Enforce recommended guardrails for Container Apps
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Enforce-Guardrails-ContainerApps
Type Custom
Category Container Apps
Description This policy initiative is a group of policies that ensures Container Apps is compliant per regulated Landing Zones.

Assignment: Enforce recommended guardrails for Key Vault Supplementary

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-landingzones/providers/Microsoft.Authorization/policyAssignments/Enforce-GR-KeyVaultSup
Policy Set Enforce additional recommended guardrails for Key Vault
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Enforce-Guardrails-KeyVault-Sup
Type Custom
Category Key Vault
Description This policy initiative is a group of policies that ensures Key Vault is compliant per regulated Landing Zones.

Assignment: Enforce recommended guardrails for Virtual Desktop.

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-landingzones/providers/Microsoft.Authorization/policyAssignments/Enforce-GR-VirtualDesk
Policy Set Enforce recommended guardrails for Virtual Desktop
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Enforce-Guardrails-VirtualDesktop
Type Custom
Category Desktop Virtualization
Description This policy initiative is a group of policies that ensures Virtual Desktop is compliant per regulated Landing Zones.

Assignment: Management port access from the Internet should be blocked

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-landingzones/providers/Microsoft.Authorization/policyAssignments/Deny-MgmtPorts-Internet
Policy Management port access from the Internet should be blocked
Policy Definition Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policyDefinitions/Deny-MgmtPorts-From-Internet
Type Custom
Category Network
Description This policy denies any network security rule that allows management port access from the Internet, by default blocking SSH/RDP ports.

Assignment: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-landingzones/providers/Microsoft.Authorization/policyAssignments/Enforce-TLS-SSL-H224
Policy Set Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Enforce-EncryptTransit_20240509
Type Custom
Category Encryption
Description Choose either Deploy if not exist and append in combination with audit or Select Deny in the Policy effect. Deny polices shift left. Deploy if not exist and append enforce but can be changed, and because missing existence condition require then the combination of Audit.

Assignment: Enforce recommended guardrails for Compute

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-landingzones/providers/Microsoft.Authorization/policyAssignments/Enforce-GR-Compute
Policy Set Enforce recommended guardrails for Compute
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Enforce-Guardrails-Compute
Type Custom
Category Compute
Description This policy initiative is a group of policies that ensures Compute is compliant per regulated Landing Zones.

Assignment: Enforce recommended guardrails for Network and Networking services.

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-landingzones/providers/Microsoft.Authorization/policyAssignments/Enforce-GR-Network
Policy Set Enforce recommended guardrails for Network and Networking services
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Enforce-Guardrails-Network
Type Custom
Category Network
Description This policy initiative is a group of policies that ensures Network and Networking services are compliant per regulated Landing Zones.

Assignment: Enforce recommended guardrails for Customer Managed Keys

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-landingzones/providers/Microsoft.Authorization/policyAssignments/Enforce-Encrypt-CMK
Policy Set Deny or Audit resources without Encryption with a customer-managed key (CMK)
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Enforce-Encryption-CMK
Type Custom
Category Encryption
Description Deny or Audit resources without Encryption with a customer-managed key (CMK)

Assignment: Deploy Azure Monitor Baseline Alerts for Recovery Services

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-landingzones/providers/Microsoft.Authorization/policyAssignments/Deploy-AMBA-RecoverySvc
Policy Set Deploy Azure Monitor Baseline Alerts for Recovery Services
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Alerting-RecoveryServices
Type Custom
Category Monitoring
Description This initiative deploys Azure Monitor Baseline Alerts to monitor Recovery Services such as Azure Backup, and Azure Site Recovery.

Assignment: Enforce recommended guardrails for Cognitive Services

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-landingzones/providers/Microsoft.Authorization/policyAssignments/Enforce-GR-CogServ
Policy Set Enforce recommended guardrails for Cognitive Services
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Enforce-Guardrails-CognitiveServices
Type Custom
Category Cognitive Services
Description This policy initiative is a group of policies that ensures Cognitive Services is compliant per regulated Landing Zones.

Assignment: Enforce recommended guardrails for Event Hub

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-landingzones/providers/Microsoft.Authorization/policyAssignments/Enforce-GR-EventHub
Policy Set Enforce recommended guardrails for Event Hub
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Enforce-Guardrails-EventHub
Type Custom
Category Event Hub
Description This policy initiative is a group of policies that ensures Event Hub is compliant per regulated Landing Zones.

Assignment: Enforce enhanced recovery and backup policies

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-landingzones/providers/Microsoft.Authorization/policyAssignments/Enforce-ASR-LZ
Policy Set Enforce enhanced recovery and backup policies
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Enforce-Backup
Type Custom
Category Backup
Description Enforce enhanced recovery and backup policies on assigned scopes.

Assignment: Enforce recommended guardrails for Data Factory

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-landingzones/providers/Microsoft.Authorization/policyAssignments/Enforce-GR-DataFactory
Policy Set Enforce recommended guardrails for Data Factory
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Enforce-Guardrails-DataFactory
Type Custom
Category Data Factory
Description This policy initiative is a group of policies that ensures Data Factory is compliant per regulated Landing Zones.

Assignment: Enforce recommended guardrails for Synapse.

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-landingzones/providers/Microsoft.Authorization/policyAssignments/Enforce-GR-Synapse
Policy Set Enforce recommended guardrails for Synapse workspaces
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Enforce-Guardrails-Synapse
Type Custom
Category Synapse
Description This policy initiative is a group of policies that ensures Synapse workspaces is compliant per regulated Landing Zones.

Assignment: Enforce recommended guardrails for SQL.

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-landingzones/providers/Microsoft.Authorization/policyAssignments/Enforce-GR-SQL
Policy Set Enforce recommended guardrails for SQL and SQL Managed Instance
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Enforce-Guardrails-SQL
Type Custom
Category SQL
Description This policy initiative is a group of policies that ensures SQL and SQL Managed Instance is compliant per regulated Landing Zones.

Assignment: Deploy Azure Monitor Baseline Alerts for Web

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-landingzones/providers/Microsoft.Authorization/policyAssignments/Deploy-AMBA-Web
Policy Set Deploy Azure Monitor Baseline Alerts for Web
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Alerting-Web
Type Custom
Category Monitoring
Description This initiative deploys Azure Monitor Baseline Alerts to monitor Web Services such as App Services.

Assignment: Enforce recommended guardrails for Storage.

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-landingzones/providers/Microsoft.Authorization/policyAssignments/Enforce-GR-Storage
Policy Set Enforce recommended guardrails for Storage Account
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Enforce-Guardrails-Storage
Type Custom
Category Storage
Description This policy initiative is a group of policies that ensures Storage is compliant per regulated Landing Zones.

Assignment: Enforce recommended guardrails for Machine Learning.

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-landingzones/providers/Microsoft.Authorization/policyAssignments/Enforce-GR-MachLearn
Policy Set Enforce recommended guardrails for Machine Learning
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Enforce-Guardrails-MachineLearning
Type Custom
Category Machine Learning
Description This policy initiative is a group of policies that ensures Machine Learning is compliant per regulated Landing Zones.

Assignment: Deploy TDE on SQL servers

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-landingzones/providers/Microsoft.Authorization/policyAssignments/Deploy-SQL-TDE
Policy Deploy SQL DB transparent data encryption
Policy Definition Id /providers/Microsoft.Authorization/policyDefinitions/86a912f6-9a06-4e26-b447-11b16ba8659f
Type BuiltIn
Category SQL
Description Enables transparent data encryption on SQL databases

Assignment: Kubernetes cluster should not allow privileged containers

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-landingzones/providers/Microsoft.Authorization/policyAssignments/Deny-Privileged-AKS
Policy Kubernetes cluster should not allow privileged containers
Policy Definition Id /providers/Microsoft.Authorization/policyDefinitions/95edb821-ddaf-4404-9732-666045e056b4
Type BuiltIn
Category Kubernetes
Description Do not allow privileged containers creation in a Kubernetes cluster. This recommendation is part of CIS 5.2.1 which is intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc.

Assignment: Enforce recommended guardrails for Cosmos DB

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-landingzones/providers/Microsoft.Authorization/policyAssignments/Enforce-GR-CosmosDb
Policy Set Enforce recommended guardrails for Cosmos DB
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Enforce-Guardrails-CosmosDb
Type Custom
Category Cosmos DB
Description This policy initiative is a group of policies that ensures Cosmos DB is compliant per regulated Landing Zones.

Assignment: Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines.

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-landingzones/providers/Microsoft.Authorization/policyAssignments/Enable-AUM-Updates-LZ
Policy Set Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Deploy-AUM-CheckUpdates
Type Custom
Category Security Center
Description Configure auto-assessment (every 24 hours) for OS updates. You can control the scope of assignment according to machine subscription, resource group, location or tag. Learn more about this for Windows: https://aka.ms/computevm-windowspatchassessmentmode, for Linux: https://aka.ms/computevm-linuxpatchassessmentmode.

Assignment: Configure backup on virtual machines without a given tag to a new recovery services vault with a default policy

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-landingzones/providers/Microsoft.Authorization/policyAssignments/Deploy-VM-Backup
Policy Configure backup on virtual machines without a given tag to a new recovery services vault with a default policy
Policy Definition Id /providers/Microsoft.Authorization/policyDefinitions/98d0b9f8-fd90-49c9-88e2-d3baf3b0dd86
Type BuiltIn
Category Backup
Description Enforce backup for all virtual machines by deploying a recovery services vault in the same location and resource group as the virtual machine. Doing this is useful when different application teams in your organization are allocated separate resource groups and need to manage their own backups and restores. You can optionally exclude virtual machines containing a specified tag to control the scope of assignment. See https://aka.ms/AzureVMAppCentricBackupExcludeTag.

Assignment: Enable Azure Monitor for Hybrid Virtual Machines

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-landingzones/providers/Microsoft.Authorization/policyAssignments/Deploy-vmHybr-Monitoring
Policy Set Enable Azure Monitor for Hybrid VMs with AMA
Policy Set Id /providers/Microsoft.Authorization/policySetDefinitions/2b00397d-c309-49c4-aa5a-f0b2c5bc6321
Type BuiltIn
Category Monitoring
Description Enable Azure Monitor for the hybrid virtual machines with AMA.

Assignment: Deploy Azure Monitor Baseline Alerts for Key Management

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-landingzones/providers/Microsoft.Authorization/policyAssignments/Deploy-AMBA-KeyMgmt
Policy Set Deploy Azure Monitor Baseline Alerts for Key Management
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Alerting-KeyManagement
Type Custom
Category Monitoring
Description This initiative deploys Azure Monitor Baseline Alerts to monitor Key Management Services such as Azure Key Vault, and Managed HSM.

Assignment: Enforce recommended guardrails for Bot Service

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-landingzones/providers/Microsoft.Authorization/policyAssignments/Enforce-GR-BotService
Policy Set Enforce recommended guardrails for Bot Service
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Enforce-Guardrails-BotService
Type Custom
Category Bot Service
Description This policy initiative is a group of policies that ensures Bot Service is compliant per regulated Landing Zones.

Assignment: Enforce recommended guardrails for MySQL.

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-landingzones/providers/Microsoft.Authorization/policyAssignments/Enforce-GR-MySQL
Policy Set Enforce recommended guardrails for MySQL
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Enforce-Guardrails-MySQL
Type Custom
Category MySQL
Description This policy initiative is a group of policies that ensures MySQL is compliant per regulated Landing Zones.

Assignment: Deploy Azure Monitor Baseline Alerts for Virtual Machines

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-landingzones/providers/Microsoft.Authorization/policyAssignments/Deploy-AMBA-VM
Policy Set Deploy Azure Monitor Baseline Alerts for Virtual Machines
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Alerting-VM
Type Custom
Category Monitoring
Description This initiative deploys Azure Monitor Baseline Alerts to monitor Azure Virtual Machines.

Assignment: Configure SQL servers to have auditing enabled to Log Analytics workspace

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-landingzones/providers/Microsoft.Authorization/policyAssignments/Deploy-AzSqlDb-Auditing
Policy Configure SQL servers to have auditing enabled to Log Analytics workspace
Policy Definition Id /providers/Microsoft.Authorization/policyDefinitions/25da7dfb-0666-4a15-a8f5-402127efd8bb
Type BuiltIn
Category SQL
Description To ensure the operations performed against your SQL assets are captured, SQL servers should have auditing enabled. If auditing is not enabled, this policy will configure auditing events to flow to the specified Log Analytics workspace.

Assignment: Enforce recommended guardrails for PostgreSQL.

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-landingzones/providers/Microsoft.Authorization/policyAssignments/Enforce-GR-PostgreSQL
Policy Set Enforce recommended guardrails for PostgreSQL
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Enforce-Guardrails-PostgreSQL
Type Custom
Category PostgreSQL
Description This policy initiative is a group of policies that ensures PostgreSQL is compliant per regulated Landing Zones.

Assignment: Deploy Azure Monitor Baseline Alerts for Load Balancing

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-landingzones/providers/Microsoft.Authorization/policyAssignments/Deploy-AMBA-LoadBalance
Policy Set Deploy Azure Monitor Baseline Alerts for Load Balancing
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Alerting-LoadBalancing
Type Custom
Category Monitoring
Description This initiative deploys Azure Monitor Baseline Alerts to monitor Load Balancing Services such as Load Balancer, Application Gateway, Traffic Manager, and Azure Front Door.

Assignment: Enable Azure Monitor for VMs

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-landingzones/providers/Microsoft.Authorization/policyAssignments/Deploy-VM-Monitoring
Policy Set Enable Azure Monitor for VMs with Azure Monitoring Agent(AMA)
Policy Set Id /providers/Microsoft.Authorization/policySetDefinitions/924bfe3a-762f-40e7-86dd-5c8b95eb09e6
Type BuiltIn
Category Monitoring
Description Enable Azure Monitor for the virtual machines (VMs) with AMA.

Assignment: Enforce recommended guardrails for Container Instances

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-landingzones/providers/Microsoft.Authorization/policyAssignments/Enforce-GR-ContInst
Policy Set Enforce recommended guardrails for Container Instance
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Enforce-Guardrails-ContainerInstance
Type Custom
Category Container Instances
Description This policy initiative is a group of policies that ensures Container Apps is compliant per regulated Landing Zones.

Assignment: Enable ChangeTracking and Inventory for Arc-enabled virtual machines

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-landingzones/providers/Microsoft.Authorization/policyAssignments/Deploy-vmArc-ChangeTrack
Policy Set Enable ChangeTracking and Inventory for Arc-enabled virtual machines
Policy Set Id /providers/Microsoft.Authorization/policySetDefinitions/53448c70-089b-4f52-8f38-89196d7f2de1
Type BuiltIn
Category ChangeTrackingAndInventory
Description Enable ChangeTracking and Inventory for Arc-enabled virtual machines. Takes Data Collection Rule ID as parameter and asks for an option to input applicable locations.

Assignment: Enable ChangeTracking and Inventory for virtual machine scale sets

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-landingzones/providers/Microsoft.Authorization/policyAssignments/Deploy-VMSS-ChangeTrack
Policy Set [Preview]: Enable ChangeTracking and Inventory for virtual machine scale sets
Policy Set Id /providers/Microsoft.Authorization/policySetDefinitions/c4a70814-96be-461c-889f-2b27429120dc
Type BuiltIn
Category ChangeTrackingAndInventory
Description Enable ChangeTracking and Inventory for virtual machine scale sets. Takes Data Collection Rule ID as parameter and asks for an option to input applicable locations and user-assigned identity for Azure Monitor Agent.

Assignment: Deploy Azure Monitor Baseline Alerts for Hybrid VMs

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-landingzones/providers/Microsoft.Authorization/policyAssignments/Deploy-AMBA-HybridVM
Policy Set Deploy Azure Monitor Baseline Alerts for Hybrid VMs
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Alerting-HybridVM
Type Custom
Category Monitoring
Description This initiative deploys Azure Monitor Baseline Alerts to monitor Azure Arc-enabled Servers.

Assignment: Enforce recommended guardrails for API Management

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-landingzones/providers/Microsoft.Authorization/policyAssignments/Enforce-GR-APIM
Policy Set Enforce recommended guardrails for API Management
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Enforce-Guardrails-APIM
Type Custom
Category API Management
Description This policy initiative is a group of policies that ensures API Management is compliant per regulated Landing Zones.

Assignment: Subnets should have a Network Security Group

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-landingzones/providers/Microsoft.Authorization/policyAssignments/Deny-Subnet-Without-Nsg
Policy Subnets should have a Network Security Group
Policy Definition Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policyDefinitions/Deny-Subnet-Without-Nsg
Type Custom
Category Network
Description This policy denies the creation of a subnet without a Network Security Group. NSG help to protect traffic across subnet-level.

Assignment: Kubernetes clusters should not allow container privilege escalation

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-landingzones/providers/Microsoft.Authorization/policyAssignments/Deny-Priv-Esc-AKS
Policy Kubernetes clusters should not allow container privilege escalation
Policy Definition Id /providers/Microsoft.Authorization/policyDefinitions/1c6e92c9-99f0-4e55-9cf2-0c234dc48f99
Type BuiltIn
Category Kubernetes
Description Do not allow containers to run with privilege escalation to root in a Kubernetes cluster. This recommendation is part of CIS 5.2.5 which is intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc.

Assignment: Web Application Firewall (WAF) should be enabled for Application Gateway

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-landingzones/providers/Microsoft.Authorization/policyAssignments/Audit-AppGW-WAF
Policy Web Application Firewall (WAF) should be enabled for Application Gateway
Policy Definition Id /providers/Microsoft.Authorization/policyDefinitions/564feb30-bf6a-4854-b4bb-0d2d2d1e6c66
Type BuiltIn
Category Network
Description Deploy Azure Web Application Firewall (WAF) in front of public facing web applications for additional inspection of incoming traffic. Web Application Firewall (WAF) provides centralized protection of your web applications from common exploits and vulnerabilities such as SQL injections, Cross-Site Scripting, local and remote file executions. You can also restrict access to your web applications by countries, IP address ranges, and other http(s) parameters via custom rules.

Assignment: Enforce recommended guardrails for OpenAI.

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-landingzones/providers/Microsoft.Authorization/policyAssignments/Enforce-GR-OpenAI
Policy Set Enforce recommended guardrails for Open AI (Cognitive Service)
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Enforce-Guardrails-OpenAI
Type Custom
Category Cognitive Services
Description This policy initiative is a group of policies that ensures Open AI (Cognitive Service) is compliant per regulated Landing Zones.

Assignment: Kubernetes clusters should be accessible only over HTTPS

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-landingzones/providers/Microsoft.Authorization/policyAssignments/Enforce-AKS-HTTPS
Policy Kubernetes clusters should be accessible only over HTTPS
Policy Definition Id /providers/Microsoft.Authorization/policyDefinitions/1a5b4dca-0b6f-4cf5-907c-56316bc1bf3d
Type BuiltIn
Category Kubernetes
Description Use of HTTPS ensures authentication and protects data in transit from network layer eavesdropping attacks. This capability is currently generally available for Kubernetes Service (AKS), and in preview for Azure Arc enabled Kubernetes. For more info, visit https://aka.ms/kubepolicydoc

Assignment: Configure SQL VMs and Arc-enabled SQL Servers to install Microsoft Defender for SQL and AMA with a user-defined LA workspace

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-landingzones/providers/Microsoft.Authorization/policyAssignments/Deploy-MDFC-SQL-AMA-LZ
Policy Set Configure SQL VMs and Arc-enabled SQL Servers to install Microsoft Defender for SQL and AMA with a user-defined LA workspace
Policy Set Id /providers/Microsoft.Authorization/policySetDefinitions/de01d381-bae9-4670-8870-786f89f49e26
Type BuiltIn
Category Security Center
Description Microsoft Defender for SQL collects events from the agents and uses them to provide security alerts and tailored hardening tasks (recommendations). Creates a resource group and a Data Collection Rule in the same region as the user-defined Log Analytics workspace.

Assignment: Enable ChangeTracking and Inventory for virtual machines

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-landingzones/providers/Microsoft.Authorization/policyAssignments/Deploy-VM-ChangeTrack
Policy Set Enable ChangeTracking and Inventory for virtual machines
Policy Set Id /providers/Microsoft.Authorization/policySetDefinitions/92a36f05-ebc9-4bba-9128-b47ad2ea3354
Type BuiltIn
Category ChangeTrackingAndInventory
Description Enable ChangeTracking and Inventory for virtual machines. Takes Data Collection Rule ID as parameter and asks for an option to input applicable locations and user-assigned identity for Azure Monitor Agent.

Assignment: Enforce recommended guardrails for Container Registry

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-landingzones/providers/Microsoft.Authorization/policyAssignments/Enforce-GR-ContReg
Policy Set Enforce recommended guardrails for Container Registry
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Enforce-Guardrails-ContainerRegistry
Type Custom
Category Container Registry
Description This policy initiative is a group of policies that ensures Container Apps is compliant per regulated Landing Zones.

Assignment: Deploy Azure Monitor Baseline Alerts for Changes in Network Routing and Security

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-landingzones/providers/Microsoft.Authorization/policyAssignments/Deploy-AMBA-NetworkChang
Policy Set Deploy Azure Monitor Baseline Alerts for Changes in Network Routing and Security
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Alerting-NetworkChanges
Type Custom
Category Monitoring
Description This initiative implements Azure Monitor Baseline Alerts to monitor alterations in Network Routing and Security, such as modifications to Route Tables and the removal of Network Security Groups.

Assignment: Enable Azure Monitor for Virtual Machine Scale Sets

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-landingzones/providers/Microsoft.Authorization/policyAssignments/Deploy-VMSS-Monitoring
Policy Set Enable Azure Monitor for VMSS with Azure Monitoring Agent(AMA)
Policy Set Id /providers/Microsoft.Authorization/policySetDefinitions/f5bf694c-cca7-4033-b883-3a23327d5485
Type BuiltIn
Category Monitoring
Description Enable Azure Monitor for the virtual machines scale set (VMSS) with AMA.

Assignment: Enforce recommended guardrails for Event Grid

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-landingzones/providers/Microsoft.Authorization/policyAssignments/Enforce-GR-EventGrid
Policy Set Enforce recommended guardrails for Event Grid
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Enforce-Guardrails-EventGrid
Type Custom
Category Event Grid
Description This policy initiative is a group of policies that ensures Event Grid is compliant per regulated Landing Zones.

Assignment: Subnets should be private

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-landingzones/providers/Microsoft.Authorization/policyAssignments/Enforce-Snet-Private-LZ
Policy Subnets should be private
Policy Definition Id /providers/Microsoft.Authorization/policyDefinitions/7bca8353-aa3b-429b-904a-9229c4385837
Type BuiltIn
Category Network
Description Ensure your subnets are secure by default by preventing default outbound access. For more information go to https://aka.ms/defaultoutboundaccessretirement

Assignment: Enforce recommended guardrails for Kubernetes.

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-landingzones/providers/Microsoft.Authorization/policyAssignments/Enforce-GR-Kubernetes
Policy Set Enforce recommended guardrails for Kubernetes
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Enforce-Guardrails-Kubernetes
Type Custom
Category Kubernetes
Description This policy initiative is a group of policies that ensures Kubernetes is compliant per regulated Landing Zones.

Assignment: Enforce recommended guardrails for Automation Accounts

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-landingzones/providers/Microsoft.Authorization/policyAssignments/Enforce-GR-Automation
Policy Set Enforce recommended guardrails for Automation Account
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Enforce-Guardrails-Automation
Type Custom
Category Automation
Description This policy initiative is a group of policies that ensures Automation Account is compliant per regulated Landing Zones.

Assignment: Secure transfer to storage accounts should be enabled

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-landingzones/providers/Microsoft.Authorization/policyAssignments/Deny-Storage-http
Policy Secure transfer to storage accounts should be enabled
Policy Definition Id /providers/Microsoft.Authorization/policyDefinitions/404c3081-a854-4457-ae30-26a93ef643f9
Type BuiltIn
Category Storage
Description Audit requirement of Secure transfer in your storage account. Secure transfer is an option that forces your storage account to accept requests only from secure connections (HTTPS). Use of HTTPS ensures authentication between the server and the service and protects data in transit from network layer attacks such as man-in-the-middle, eavesdropping, and session-hijacking

Assignment: Enforce recommended guardrails for Azure Key Vault

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-landingzones/providers/Microsoft.Authorization/policyAssignments/Enforce-GR-KeyVault-LZ
Policy Set Enforce recommended guardrails for Azure Key Vault
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Enforce-Guardrails-KeyVault
Type Custom
Category Key Vault
Description Enforce recommended guardrails for Azure Key Vault.

Assignment: Enforce recommended guardrails for Data Explorer

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-landingzones/providers/Microsoft.Authorization/policyAssignments/Enforce-GR-DataExpl
Policy Set Enforce recommended guardrails for Data Explorer
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Enforce-Guardrails-DataExplorer
Type Custom
Category Azure Data Explorer
Description This policy initiative is a group of policies that ensures Data Explorer is compliant per regulated Landing Zones.

Assignment: Enforce recommended guardrails for Service Bus.

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-landingzones/providers/Microsoft.Authorization/policyAssignments/Enforce-GR-ServiceBus
Policy Set Enforce recommended guardrails for Service Bus
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Enforce-Guardrails-ServiceBus
Type Custom
Category Service Bus
Description This policy initiative is a group of policies that ensures Service Bus is compliant per regulated Landing Zones.

Assignment: Virtual networks should be protected by Azure DDoS Network Protection

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-landingzones/providers/Microsoft.Authorization/policyAssignments/Enable-DDoS-VNET-LZ
Policy Virtual networks should be protected by Azure DDoS Protection
Policy Definition Id /providers/Microsoft.Authorization/policyDefinitions/94de2ad3-e0c1-4caf-ad78-5d47bbc83d3d
Type BuiltIn
Category Network
Description Protect your virtual networks against volumetric and protocol attacks with Azure DDoS Protection. For more information, visit https://aka.ms/ddosprotectiondocs.

Assignment: Deploy Azure Monitor Baseline Alerts for Storage

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-landingzones/providers/Microsoft.Authorization/policyAssignments/Deploy-AMBA-Storage
Policy Set Deploy Azure Monitor Baseline Alerts for Storage
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Alerting-Storage
Type Custom
Category Monitoring
Description This initiative deploys Azure Monitor Baseline Alerts to monitor Storage Services such as Storage accounts.

Environment Category Production

Scopes

  • managementGroups: Soli Deo Gloria

Assignment: Resource Group and Resource locations should match

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policyAssignments/Audit-ResourceRGLocation
Policy Audit resource location matches resource group location
Policy Definition Id /providers/Microsoft.Authorization/policyDefinitions/0a914e76-4921-4c19-b460-a2d36003525a
Type BuiltIn
Category General
Description Audit that the resource location matches its resource group location

Assignment: Enable allLogs category group resource logging for supported resources to Log Analytics

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policyAssignments/Deploy-Diag-Logs
Policy Set Enable allLogs category group resource logging for supported resources to Log Analytics
Policy Set Id /providers/Microsoft.Authorization/policySetDefinitions/0884adba-2312-4468-abeb-5422caed1038
Type BuiltIn
Category Monitoring
Description Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This initiative deploys diagnostic setting using the allLogs category group to route logs to an Event Hub for all supported resources

Assignment: Unused resources driving cost should be avoided

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policyAssignments/Audit-UnusedResources
Policy Set Unused resources driving cost should be avoided
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Audit-UnusedResourcesCostOptimization
Type Custom
Category Cost Optimization
Description Optimize cost by detecting unused but chargeable resources. Leverage this Azure Policy Initiative as a cost control tool to reveal orphaned resources that are contributing cost.

Assignment: Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policyAssignments/Deploy-MDEndpointsAMA
Policy Set Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud
Policy Set Id /providers/Microsoft.Authorization/policySetDefinitions/77b391e3-2d5d-40c3-83bf-65c846b3c6a3
Type BuiltIn
Category Security Center
Description Configure the multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud (WDATP, WDATP_EXCLUDE_LINUX_PUBLIC_PREVIEW, WDATP_UNIFIED_SOLUTION etc.). See: https://learn.microsoft.com/azure/defender-for-cloud/integration-defender-for-endpoint for more information.

Assignment: Enforce Azure Compute Security Baseline compliance auditing

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policyAssignments/Enforce-ACSB
Policy Set Enforce Azure Compute Security Benchmark compliance auditing
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Enforce-ACSB
Type Custom
Category Guest Configuration
Description Enforce Azure Compute Security Benchmark compliance auditing for Windows and Linux virtual machines.

Assignment: Resources should be Zone Resilient

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policyAssignments/Audit-ZoneResiliency
Policy Set [Preview]: Resources should be Zone Resilient
Policy Set Id /providers/Microsoft.Authorization/policySetDefinitions/130fb88f-0fc9-4678-bfe1-31022d71c7d5
Type BuiltIn
Category Resilience
Description Some resource types can be deployed Zone Redundant (e.g. SQL Databases); some can be deploy Zone Aligned (e.g. Virtual Machines); and some can be deployed either Zone Aligned or Zone Redundant (e.g. Virtual Machine Scale Sets). Being zone aligned does not guarantee resilience, but it is the foundation on which a resilient solution can be built (e.g. three Virtual Machine Scale Sets zone aligned to three different zones in the same region with a load balancer). See https://aka.ms/AZResilience for more info.

Assignment: Configure Azure Activity logs to stream to specified Log Analytics workspace

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policyAssignments/Deploy-AzActivity-Log
Policy Configure Azure Activity logs to stream to specified Log Analytics workspace
Policy Definition Id /providers/Microsoft.Authorization/policyDefinitions/2465583e-4e78-4c15-b6be-a36cbc7c8b0f
Type BuiltIn
Category Monitoring
Description Deploys the diagnostic settings for Azure Activity to stream subscriptions audit logs to a Log Analytics workspace to monitor subscription-level events

Assignment: Deny virtual machines and virtual machine scale sets that do not use managed disk

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policyAssignments/Deny-UnmanagedDisk
Policy Audit VMs that do not use managed disks
Policy Definition Id /providers/Microsoft.Authorization/policyDefinitions/06a78e20-9358-41c9-923c-fb736d382a4d
Type BuiltIn
Category Compute
Description This policy audits VMs that do not use managed disks

Assignment: Configure Advanced Threat Protection to be enabled on open-source relational databases

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policyAssignments/Deploy-MDFC-OssDb
Policy Set Configure Advanced Threat Protection to be enabled on open-source relational databases
Policy Set Id /providers/Microsoft.Authorization/policySetDefinitions/e77fc0b3-f7e9-4c58-bc13-cb753ed8e46e
Type BuiltIn
Category Security Center
Description Enable Advanced Threat Protection on your non-Basic tier open-source relational databases to detect anomalous activities indicating unusual and potentially harmful attempts to access or exploit databases. See https://aka.ms/AzDforOpenSourceDBsDocu.

Assignment: [Preview]: Deploy Microsoft Defender for Endpoint agent

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policyAssignments/Deploy-MDEndpoints
Policy Set [Preview]: Deploy Microsoft Defender for Endpoint agent
Policy Set Id /providers/Microsoft.Authorization/policySetDefinitions/e20d08c5-6d64-656d-6465-ce9e37fd0ebc
Type BuiltIn
Category Security Center
Description Deploy Microsoft Defender for Endpoint agent on applicable images.

Assignment: Microsoft Cloud Security Benchmark

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policyAssignments/Deploy-ASC-Monitoring
Policy Set Microsoft cloud security benchmark
Policy Set Id /providers/Microsoft.Authorization/policySetDefinitions/1f3afdf9-d0c9-4c3d-847f-89da613e70a8
Type BuiltIn
Category Security Center
Description The Microsoft cloud security benchmark initiative represents the policies and controls implementing security recommendations defined in Microsoft cloud security benchmark, see https://aka.ms/azsecbm. This also serves as the Microsoft Defender for Cloud default policy initiative. You can directly assign this initiative, or manage its policies and compliance results within Microsoft Defender for Cloud.

Assignment: Deny the deployment of classic resources

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policyAssignments/Deny-Classic-Resources
Policy Not allowed resource types
Policy Definition Id /providers/Microsoft.Authorization/policyDefinitions/6c112d4e-5bc7-47ae-a041-ea2d9dccd749
Type BuiltIn
Category General
Description Restrict which resource types can be deployed in your environment. Limiting resource types can reduce the complexity and attack surface of your environment while also helping to manage costs. Compliance results are only shown for non-compliant resources.

Assignment: Deploy Microsoft Defender for Cloud configuration

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policyAssignments/Deploy-MDFC-Config-H224
Policy Set Deploy Microsoft Defender for Cloud configuration
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Deploy-MDFC-Config_20240319
Type Custom
Category Security Center
Description Deploy Microsoft Defender for Cloud configuration

Assignment: Audit virtual machines for Trusted Launch support

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policyAssignments/Audit-TrustedLaunch
Policy Set Audit virtual machines for Trusted Launch support
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Audit-TrustedLaunch
Type Custom
Category Trusted Launch
Description Trusted Launch improves security of a Virtual Machine which requires VM SKU, OS Disk & OS Image to support it (Gen 2). To learn more about Trusted Launch, visit https://aka.ms/trustedlaunch.

Assignment: Configure Azure Defender to be enabled on SQL Servers and SQL Managed Instances

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policyAssignments/Deploy-MDFC-SqlAtp
Policy Set Configure Azure Defender to be enabled on SQL Servers and SQL Managed Instances
Policy Set Id /providers/Microsoft.Authorization/policySetDefinitions/9cb3cc7a-b39b-4b82-bc89-e5a5d9ff7b97
Type BuiltIn
Category Security Center
Description Enable Azure Defender on your SQL Servers and SQL Managed Instances to detect anomalous activities indicating unusual and potentially harmful attempts to access or exploit databases.

Assignment: Deploy Azure Monitor Baseline Alerts - Notification Assets

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policyAssignments/Deploy-AMBA-Notification
Policy Set Deploy Azure Monitor Baseline Alerts - Notification Assets
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Notification-Assets
Type Custom
Category Monitoring
Description This initiative deploys Notification Assets for Azure Monitor Baseline Alerts. This includes the setup of an Alert Processing Rule and an Action Group to manage notifications and actions, along with a Notification Suppression Rule to manage alert notifications, as well as a Notification Suppression Rule to control alert notifications.

Assignment: Deploy Azure Monitor Baseline Alerts for Service Health

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policyAssignments/Deploy-AMBA-SvcHealth
Policy Set Deploy Azure Monitor Baseline Alerts for Service Health
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Alerting-ServiceHealth
Type Custom
Category Monitoring
Description This initiative deploys Azure Monitor Baseline Alerts to monitor Service Health Events such as Service issues, Planned maintenance, Health advisories, Security advisories, and Resource health.

Environment Category Decommissioned

Scopes

  • managementGroups: Decommissioned

Assignment: Enforce ALZ Decommissioned Guardrails

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-decommissioned/providers/Microsoft.Authorization/policyAssignments/Enforce-ALZ-Decomm
Policy Set Enforce policies in the Decommissioned Landing Zone
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Enforce-ALZ-Decomm
Type Custom
Category Decommissioned
Description Enforce policies in the Decommissioned Landing Zone.

Environment Category Management

Scopes

  • managementGroups: Management

Assignment: Configure Log Analytics workspace and automation account to centralize logs and monitoring

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-management/providers/Microsoft.Authorization/policyAssignments/Deploy-Log-Analytics
Policy Configure Log Analytics workspace and automation account to centralize logs and monitoring
Policy Definition Id /providers/Microsoft.Authorization/policyDefinitions/8e3e61b3-0b32-22d5-4edf-55f87fdb5955
Type BuiltIn
Category Monitoring
Description Deploy resource group containing Log Analytics workspace and linked automation account to centralize logs and monitoring. The automation account is aprerequisite for solutions like Updates and Change Tracking.

Assignment: Deploy Azure Monitor Baseline Alerts for Management

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-management/providers/Microsoft.Authorization/policyAssignments/Deploy-AMBA-Management
Policy Set Deploy Azure Monitor Baseline Alerts for Management
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Alerting-Management
Type Custom
Category Monitoring
Description Initiative to deploy AMBA alerts relevant to the ALZ Management management group

Environment Category Corp

Scopes

  • managementGroups: Corp

Assignment: Audit Private Link Private DNS Zone resources

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-corp/providers/Microsoft.Authorization/policyAssignments/Audit-PeDnsZones
Policy Audit or Deny the creation of Private Link Private DNS Zones
Policy Definition Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policyDefinitions/Audit-PrivateLinkDnsZones
Type Custom
Category Network
Description This policy audits or denies, depending on assignment effect, the creation of a Private Link Private DNS Zones in the current scope, used in combination with policies that create centralized private DNS in connectivity subscription

Assignment: Deny the deployment of vWAN/ER/VPN gateway resources

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-corp/providers/Microsoft.Authorization/policyAssignments/Deny-HybridNetworking
Policy Not allowed resource types
Policy Definition Id /providers/Microsoft.Authorization/policyDefinitions/6c112d4e-5bc7-47ae-a041-ea2d9dccd749
Type BuiltIn
Category General
Description Restrict which resource types can be deployed in your environment. Limiting resource types can reduce the complexity and attack surface of your environment while also helping to manage costs. Compliance results are only shown for non-compliant resources.

Assignment: Deny network interfaces having a public IP associated

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-corp/providers/Microsoft.Authorization/policyAssignments/Deny-Public-IP-On-NIC
Policy Network interfaces should not have public IPs
Policy Definition Id /providers/Microsoft.Authorization/policyDefinitions/83a86a26-fd1f-447c-b59d-e51f44264114
Type BuiltIn
Category Network
Description This policy denies the network interfaces which are configured with any public IP. Public IP addresses allow internet resources to communicate inbound to Azure resources, and Azure resources to communicate outbound to the internet. This should be reviewed by the network security team.

Assignment: Configure Azure PaaS services to use private DNS zones

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-corp/providers/Microsoft.Authorization/policyAssignments/Deploy-Private-DNS-Zones
Policy Set Configure Azure PaaS services to use private DNS zones
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Deploy-Private-DNS-Zones
Type Custom
Category Network
Description This policy initiative is a group of policies that ensures private endpoints to Azure PaaS services are integrated with Azure Private DNS zones

Assignment: Public network access should be disabled for PaaS services

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-corp/providers/Microsoft.Authorization/policyAssignments/Deny-Public-Endpoints
Policy Set Public network access should be disabled for PaaS services
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Deny-PublicPaaSEndpoints
Type Custom
Category Network
Description This policy initiative is a group of policies that prevents creation of Azure PaaS services with exposed public endpoints

Environment Category Connectivity

Scopes

  • managementGroups: Connectivity

Assignment: Deploy Azure Monitor Baseline Alerts for Connectivity

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-connectivity/providers/Microsoft.Authorization/policyAssignments/Deploy-AMBA-Connectivity
Policy Set Deploy Azure Monitor Baseline Alerts for Connectivity
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Alerting-Connectivity
Type Custom
Category Monitoring
Description This initiative deploys Azure Monitor Baseline Alerts to monitor Network components such as Azure Firewalls, ExpressRoute, VPN, and Private DNS Zones.

Assignment: Virtual networks should be protected by Azure DDoS Network Protection

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-connectivity/providers/Microsoft.Authorization/policyAssignments/Enable-DDoS-VNET-Con
Policy Virtual networks should be protected by Azure DDoS Protection
Policy Definition Id /providers/Microsoft.Authorization/policyDefinitions/94de2ad3-e0c1-4caf-ad78-5d47bbc83d3d
Type BuiltIn
Category Network
Description Protect your virtual networks against volumetric and protocol attacks with Azure DDoS Protection. For more information, visit https://aka.ms/ddosprotectiondocs.

Environment Category Sandbox

Scopes

  • managementGroups: Sandbox

Assignment: Enforce ALZ Sandbox Guardrails

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-sandbox/providers/Microsoft.Authorization/policyAssignments/Enforce-ALZ-Sandbox
Policy Set Enforce policies in the Sandbox Landing Zone
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Enforce-ALZ-Sandbox
Type Custom
Category Sandbox
Description Enforce policies in the Sandbox Landing Zone.

Environment Category Identity

Scopes

  • managementGroups: Identity

Assignment: Deploy Azure Monitor Baseline Alerts for Identity

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-identity/providers/Microsoft.Authorization/policyAssignments/Deploy-AMBA-Identity
Policy Set Deploy Azure Monitor Baseline Alerts for Identity
Policy Set Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policySetDefinitions/Alerting-Identity
Type Custom
Category Monitoring
Description Initiative to deploy AMBA alerts relevant to the ALZ Identity management group

Assignment: Configure backup on virtual machines without a given tag to a new recovery services vault with a default policy

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-identity/providers/Microsoft.Authorization/policyAssignments/Deploy-VM-Backup
Policy Configure backup on virtual machines without a given tag to a new recovery services vault with a default policy
Policy Definition Id /providers/Microsoft.Authorization/policyDefinitions/98d0b9f8-fd90-49c9-88e2-d3baf3b0dd86
Type BuiltIn
Category Backup
Description Enforce backup for all virtual machines by deploying a recovery services vault in the same location and resource group as the virtual machine. Doing this is useful when different application teams in your organization are allocated separate resource groups and need to manage their own backups and restores. You can optionally exclude virtual machines containing a specified tag to control the scope of assignment. See https://aka.ms/AzureVMAppCentricBackupExcludeTag.

Assignment: Subnets should have a Network Security Group

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-identity/providers/Microsoft.Authorization/policyAssignments/Deny-Subnet-Without-Nsg
Policy Subnets should have a Network Security Group
Policy Definition Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policyDefinitions/Deny-Subnet-Without-Nsg
Type Custom
Category Network
Description This policy denies the creation of a subnet without a Network Security Group. NSG help to protect traffic across subnet-level.

Assignment: Management port access from the Internet should be blocked

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-identity/providers/Microsoft.Authorization/policyAssignments/Deny-MgmtPorts-Internet
Policy Management port access from the Internet should be blocked
Policy Definition Id /providers/Microsoft.Management/managementGroups/sdg/providers/Microsoft.Authorization/policyDefinitions/Deny-MgmtPorts-From-Internet
Type Custom
Category Network
Description This policy denies any network security rule that allows management port access from the Internet, by default blocking SSH/RDP ports.

Assignment: Deny the creation of public IP

Property Value
Assignment Id /providers/Microsoft.Management/managementGroups/sdg-identity/providers/Microsoft.Authorization/policyAssignments/Deny-Public-IP
Policy Not allowed resource types
Policy Definition Id /providers/Microsoft.Authorization/policyDefinitions/6c112d4e-5bc7-47ae-a041-ea2d9dccd749
Type BuiltIn
Category General
Description Restrict which resource types can be deployed in your environment. Limiting resource types can reduce the complexity and attack surface of your environment while also helping to manage costs. Compliance results are only shown for non-compliant resources.

Policy Effects by Policy

Category Policy Platform Landing Zones Production Decommissioned Management Corp Connectivity Sandbox Identity
API for FHIR Azure API for FHIR should use a customer-managed key to encrypt data at rest
Use a customer-managed key to control the encryption at rest of the data stored in Azure API for FHIR when this is a regulatory or compliance requirement. Customer-managed keys also deliver double encryption by adding a second layer of encryption on top of the default one done with service-managed keys.
audit
disabled
audit
disabled
API Management API Management APIs should use only encrypted protocols
To ensure security of data in transit, APIs should be available only through encrypted protocols, like HTTPS or WSS. Avoid using unsecured protocols, such as HTTP or WS.
Deny
Disabled
Audit
Deny
Disabled
Audit
Audit
Deny
Disabled
API Management API Management calls to API backends should be authenticated
Calls from API Management to backends should use some form of authentication, whether via certificates or credentials. Does not apply to Service Fabric backends.
Deny
Disabled
Audit
Deny
Disabled
Audit
Audit
Deny
Disabled
API Management API Management calls to API backends should not bypass certificate thumbprint or name validation
To improve the API security, API Management should validate the backend server certificate for all API calls. Enable SSL certificate thumbprint and name validation.
Deny
Disabled
Audit
Deny
Disabled
Audit
Audit
Deny
Disabled
API Management API Management direct management endpoint should not be enabled
The direct management REST API in Azure API Management bypasses Azure Resource Manager role-based access control, authorization, and throttling mechanisms, thus increasing the vulnerability of your service.
Deny
Disabled
Audit
Deny
Disabled
Audit
Audit
Deny
Disabled
API Management API Management minimum API version should be set to 2019-12-01 or higher
To prevent service secrets from being shared with read-only users, the minimum API version should be set to 2019-12-01 or higher.
Deny
Disabled
Audit
Deny
Disabled
Audit
Audit
Deny
Disabled
API Management API Management secret named values should be stored in Azure Key Vault
Named values are a collection of name and value pairs in each API Management service. Secret values can be stored either as encrypted text in API Management (custom secrets) or by referencing secrets in Azure Key Vault. To improve security of API Management and secrets, reference secret named values from Azure Key Vault. Azure Key Vault supports granular access management and secret rotation policies.
Deny
Disabled
Audit
Deny
Disabled
Audit
Audit
Deny
Disabled
API Management API Management service should use a SKU that supports virtual networks
With supported SKUs of API Management, deploying service into a virtual network unlocks advanced API Management networking and security features which provides you greater control over your network security configuration. Learn more at: https://aka.ms/apimvnet.
Deny
Disabled
Audit
Deny
Disabled
Audit
API Management API Management services should use a virtual network
Azure Virtual Network deployment provides enhanced security, isolation and allows you to place your API Management service in a non-internet routable network that you control access to. These networks can then be connected to your on-premises networks using various VPN technologies, which enables access to your backend services within the network and/or on-premises. The developer portal and API gateway, can be configured to be accessible either from the Internet or only within the virtual network.
Deny
Disabled
Audit
Deny
Disabled
Audit
Audit
Deny
Disabled
API Management API Management services should use TLS version 1.2
Azure API Management service should use TLS version 1.2
Deny
Disabled
Audit
Deny
Disabled
Audit
API Management API Management should disable public network access to the service configuration endpoints
To improve the security of API Management services, restrict connectivity to service configuration endpoints, like direct access management API, Git configuration management endpoint, or self-hosted gateways configuration endpoint.
AuditIfNotExists
Disabled
AuditIfNotExists
Disabled
API Management API Management subscriptions should not be scoped to all APIs
API Management subscriptions should be scoped to a product or an individual API instead of all APIs, which could result in an excessive data exposure.
Deny
Disabled
Audit
Deny
Disabled
Audit
Audit
Deny
Disabled
API Management Azure API Management platform version should be stv2
Azure API Management stv1 compute platform version will be retired effective 31 August 2024, and these instances should be migrated to stv2 compute platform for continued support. Learn more at https://learn.microsoft.com/azure/api-management/breaking-changes/stv1-platform-retirement-august-2024
Audit
Deny
Disabled
API Management Configure API Management services to disable access to API Management public service configuration endpoints
To improve the security of API Management services, restrict connectivity to service configuration endpoints, like direct access management API, Git configuration management endpoint, or self-hosted gateways configuration endpoint.
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
App Configuration App Configuration should disable public network access
Disabling public network access improves security by ensuring that the resource isn't exposed on the public internet. You can limit exposure of your resources by creating private endpoints instead. Learn more at: https://aka.ms/appconfig/private-endpoint.
Deny
Disabled
Audit
App Configuration App Configuration should use private link
Azure Private Link lets you connect your virtual network to Azure services without a public IP address at the source or destination. The private link platform handles the connectivity between the consumer and services over the Azure backbone network. By mapping private endpoints to your app configuration instances instead of the entire service, you'll also be protected against data leakage risks. Learn more at: https://aka.ms/appconfig/private-endpoint.
AuditIfNotExists
Disabled
App Configuration Configure private DNS zones for private endpoints connected to App Configuration
Use private DNS zones to override the DNS resolution for a private endpoint. A private DNS zone can be linked to your virtual network to resolve app configuration instances. Learn more at: https://aka.ms/appconfig/private-endpoint.
DeployIfNotExists
Disabled
App Platform Azure Spring Cloud should use network injection
Azure Spring Cloud instances should use virtual network injection for the following purposes: 1. Isolate Azure Spring Cloud from Internet. 2. Enable Azure Spring Cloud to interact with systems in either on premises data centers or Azure service in other virtual networks. 3. Empower customers to control inbound and outbound network communications for Azure Spring Cloud.
Audit
Deny
Disabled
App Service API App should only be accessible over HTTPS
Use of HTTPS ensures server/service authentication and protects data in transit from network layer eavesdropping attacks.
Audit
Deny
Disabled
App Service App Service app slots should disable public network access
Disabling public network access improves security by ensuring that the App Service is not exposed on the public internet. Creating private endpoints can limit exposure of an App Service. Learn more at: https://aka.ms/app-service-private-endpoint.
Deny
Disabled
Audit
App Service App Service app slots should enable configuration routing to Azure Virtual Network
By default, app configuration such as pulling container images and mounting content storage will not be routed through the regional virtual network integration. Using the API to set routing options to true enables configuration traffic through the Azure Virtual Network. These settings allow features like network security groups and user defined routes to be used, and service endpoints to be private. For more information, visit https://aka.ms/appservice-vnet-configuration-routing.
Deny
Disabled
Audit
Deny
Disabled
Audit
App Service App Service app slots should enable outbound non-RFC 1918 traffic to Azure Virtual Network
By default, if one uses regional Azure Virtual Network (VNET) integration, the app only routes RFC1918 traffic into that respective virtual network. Using the API to set 'vnetRouteAllEnabled' to true enables all outbound traffic into the Azure Virtual Network. This setting allows features like network security groups and user defined routes to be used for all outbound traffic from the App Service app.
Deny
Disabled
Audit
Deny
Disabled
Audit
App Service App Service app slots should only be accessible over HTTPS
Use of HTTPS ensures server/service authentication and protects data in transit from network layer eavesdropping attacks.
Deny
Disabled
Audit
App Service App Service apps should disable public network access
Disabling public network access improves security by ensuring that the App Service is not exposed on the public internet. Creating private endpoints can limit exposure of an App Service. Learn more at: https://aka.ms/app-service-private-endpoint.
Deny
Disabled
Audit
App Service App Service apps should enable configuration routing to Azure Virtual Network
By default, app configuration such as pulling container images and mounting content storage will not be routed through the regional virtual network integration. Using the API to set routing options to true enables configuration traffic through the Azure Virtual Network. These settings allow features like network security groups and user defined routes to be used, and service endpoints to be private. For more information, visit https://aka.ms/appservice-vnet-configuration-routing.
Deny
Disabled
Audit
Deny
Disabled
Audit
App Service App Service apps should enable outbound non-RFC 1918 traffic to Azure Virtual Network
By default, if one uses regional Azure Virtual Network (VNET) integration, the app only routes RFC1918 traffic into that respective virtual network. Using the API to set 'vnetRouteAllEnabled' to true enables all outbound traffic into the Azure Virtual Network. This setting allows features like network security groups and user defined routes to be used for all outbound traffic from the App Service app.
Deny
Disabled
Audit
Deny
Disabled
Audit
App Service App Service apps should have Client Certificates (Incoming client certificates) enabled
Client certificates allow for the app to request a certificate for incoming requests. Only clients that have a valid certificate will be able to reach the app. This policy applies to apps with Http version set to 1.1.
AuditIfNotExists
Disabled
App Service App Service apps should have remote debugging turned off
Remote debugging requires inbound ports to be opened on an App Service app. Remote debugging should be turned off.
AuditIfNotExists
Disabled
App Service App Service apps should have resource logs enabled
Audit enabling of resource logs on the app. This enables you to recreate activity trails for investigation purposes if a security incident occurs or your network is compromised.
AuditIfNotExists
Disabled
App Service App Service apps should not have CORS configured to allow every resource to access your apps
Cross-Origin Resource Sharing (CORS) should not allow all domains to access your app. Allow only required domains to interact with your app.
AuditIfNotExists
Disabled
App Service App Service apps should only be accessible over HTTPS
Use of HTTPS ensures server/service authentication and protects data in transit from network layer eavesdropping attacks.
Deny
Disabled
Audit
Audit
Deny
Disabled
App Service App Service apps should require FTPS only
Enable FTPS enforcement for enhanced security.
AuditIfNotExists
Disabled
App Service App Service apps should use a SKU that supports private link
With supported SKUs, Azure Private Link lets you connect your virtual network to Azure services without a public IP address at the source or destination. The Private Link platform handles the connectivity between the consumer and services over the Azure backbone network. By mapping private endpoints to apps, you can reduce data leakage risks. Learn more about private links at: https://aka.ms/private-link.
Deny
Disabled
Audit
Deny
Disabled
Audit
App Service App Service apps should use managed identity
Use a managed identity for enhanced authentication security
AuditIfNotExists
Disabled
App Service App Service apps should use the latest TLS version
Periodically, newer versions are released for TLS either due to security flaws, include additional functionality, and enhance speed. Upgrade to the latest TLS version for App Service apps to take advantage of security fixes, if any, and/or new functionalities of the latest version.
AuditIfNotExists
Disabled
AuditIfNotExists
Disabled
App Service App Service certificates must be stored in Key Vault
App Service (including Logic apps and Function apps) must use certificates stored in Key Vault
Deny
Disabled
Audit
Deny
Disabled
Audit
App Service App Service Environment apps should not be reachable over public internet
To ensure apps deployed in an App Service Environment are not accessible over public internet, one should deploy App Service Environment with an IP address in virtual network. To set the IP address to a virtual network IP, the App Service Environment must be deployed with an internal load balancer.
Deny
Disabled
Audit
App Service App Service Environment should be provisioned with latest versions
Only allow App Service Environment version 2 or version 3 to be provisioned. Older versions of App Service Environment require manual management of Azure resources and have greater scaling limitations.
Deny
Disabled
Audit
Deny
Disabled
Audit
App Service App Service Environment should have TLS 1.0 and 1.1 disabled
TLS 1.0 and 1.1 are out-of-date protocols that do not support modern cryptographic algorithms. Disabling inbound TLS 1.0 and 1.1 traffic helps secure apps in an App Service Environment.
Deny
Disabled
Audit
App Service AppService append enable https only setting to enforce https setting.
Appends the AppService sites object to ensure that HTTPS only is enabled for server/service authentication and protects data in transit from network layer eavesdropping attacks. Please note Append does not enforce compliance use then deny.
Append
Disabled
App Service AppService append sites with minimum TLS version to enforce.
Append the AppService sites object to ensure that min Tls version is set to required minimum TLS version. Please note Append does not enforce compliance use then deny.
Append
Disabled
App Service Configure App Service app slots to disable local authentication for SCM sites
Disabling local authentication methods for SCM sites improves security by ensuring that App Service slots exclusively require Microsoft Entra identities for authentication. Learn more at: https://aka.ms/app-service-disable-basic-auth.
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
App Service Configure App Service app slots to disable public network access
Disable public network access for your App Services so that it is not accessible over the public internet. This can reduce data leakage risks. Learn more at: https://aka.ms/app-service-private-endpoint.
Modify
Disabled
Modify
Disabled
App Service Configure App Service app slots to turn off remote debugging
Remote debugging requires inbound ports to be opened on an App Service app. Remote debugging should be turned off.
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
App Service Configure App Service app slots to use the latest TLS version
Periodically, newer versions are released for TLS either due to security flaws, include additional functionality, and enhance speed. Upgrade to the latest TLS version for App Service apps to take advantage of security fixes, if any, and/or new functionalities of the latest version.
DeployIfNotExists
Disabled
App Service Configure App Service apps to disable local authentication for FTP deployments
Disabling local authentication methods for FTP deployments improves security by ensuring that App Services exclusively require Microsoft Entra identities for authentication. Learn more at: https://aka.ms/app-service-disable-basic-auth.
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
App Service Configure App Service apps to disable local authentication for SCM sites
Disabling local authentication methods for SCM sites improves security by ensuring that App Services exclusively require Microsoft Entra identities for authentication. Learn more at: https://aka.ms/app-service-disable-basic-auth.
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
App Service Configure App Service apps to disable public network access
Disable public network access for your App Services so that it is not accessible over the public internet. This can reduce data leakage risks. Learn more at: https://aka.ms/app-service-private-endpoint.
Modify
Disabled
Modify
Disabled
App Service Configure App Service apps to only be accessible over HTTPS
Use of HTTPS ensures server/service authentication and protects data in transit from network layer eavesdropping attacks.
Modify
Disabled
Modify
Disabled
App Service Configure App Service apps to turn off remote debugging
Remote debugging requires inbound ports to be opened on an App Service app. Remote debugging should be turned off.
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
App Service Configure App Service apps to use private DNS zones
Use private DNS zones to override the DNS resolution for a private endpoint. A private DNS zone links a virtual network to an App Service. Learn more at: https://docs.microsoft.com/azure/app-service/networking/private-endpoint#dns.
DeployIfNotExists
Disabled
App Service Configure App Service apps to use the latest TLS version
Periodically, newer versions are released for TLS either due to security flaws, include additional functionality, and enhance speed. Upgrade to the latest TLS version for App Service apps to take advantage of security fixes, if any, and/or new functionalities of the latest version.
DeployIfNotExists
Disabled
App Service Configure Function app slots to disable public network access
Disable public network access for your Function apps so that it is not accessible over the public internet. This can reduce data leakage risks. Learn more at: https://aka.ms/app-service-private-endpoint.
Modify
Disabled
Modify
Disabled
App Service Configure Function app slots to only be accessible over HTTPS
Use of HTTPS ensures server/service authentication and protects data in transit from network layer eavesdropping attacks.
Modify
Disabled
Modify
Disabled
App Service Configure Function app slots to turn off remote debugging
Remote debugging requires inbound ports to be opened on a Function app. Remote debugging should be turned off.
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
App Service Configure Function app slots to use the latest TLS version
Periodically, newer versions are released for TLS either due to security flaws, include additional functionality, and enhance speed. Upgrade to the latest TLS version for Function apps to take advantage of security fixes, if any, and/or new functionalities of the latest version.
DeployIfNotExists
Disabled
App Service Configure Function apps to turn off remote debugging
Remote debugging requires inbound ports to be opened on Function apps. Remote debugging should be turned off.
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
App Service Configure Function apps to use the latest TLS version
Periodically, newer versions are released for TLS either due to security flaws, include additional functionality, and enhance speed. Upgrade to the latest TLS version for Function apps to take advantage of security fixes, if any, and/or new functionalities of the latest version.
DeployIfNotExists
Disabled
App Service Function App should only be accessible over HTTPS
Use of HTTPS ensures server/service authentication and protects data in transit from network layer eavesdropping attacks.
Audit
Deny
Disabled
App Service Function app slots should disable public network access
Disabling public network access improves security by ensuring that the Function app is not exposed on the public internet. Creating private endpoints can limit exposure of a Function App. Learn more at: https://aka.ms/app-service-private-endpoint.
Deny
Disabled
Audit
App Service Function app slots should only be accessible over HTTPS
Use of HTTPS ensures server/service authentication and protects data in transit from network layer eavesdropping attacks.
Deny
Disabled
Audit
App Service Function apps should disable public network access
Disabling public network access improves security by ensuring that the Function app is not exposed on the public internet. Creating private endpoints can limit exposure of a Function App. Learn more at: https://aka.ms/app-service-private-endpoint.
Deny
Disabled
Audit
App Service Function apps should have Client Certificates (Incoming client certificates) enabled
Client certificates allow for the app to request a certificate for incoming requests. Only clients that have a valid certificate will be able to reach the app. This policy applies to apps with Http version set to 1.1.
AuditIfNotExists
Disabled
App Service Function apps should have remote debugging turned off
Remote debugging requires inbound ports to be opened on Function apps. Remote debugging should be turned off.
AuditIfNotExists
Disabled
App Service Function apps should not have CORS configured to allow every resource to access your apps
Cross-Origin Resource Sharing (CORS) should not allow all domains to access your Function app. Allow only required domains to interact with your Function app.
AuditIfNotExists
Disabled
App Service Function apps should only be accessible over HTTPS
Use of HTTPS ensures server/service authentication and protects data in transit from network layer eavesdropping attacks.
Deny
Disabled
Audit
Audit
Deny
Disabled
App Service Function apps should require FTPS only
Enable FTPS enforcement for enhanced security.
AuditIfNotExists
Disabled
App Service Function apps should use managed identity
Use a managed identity for enhanced authentication security
AuditIfNotExists
Disabled
App Service Function apps should use the latest TLS version
Periodically, newer versions are released for TLS either due to security flaws, include additional functionality, and enhance speed. Upgrade to the latest TLS version for Function apps to take advantage of security fixes, if any, and/or new functionalities of the latest version.
AuditIfNotExists
Disabled
AuditIfNotExists
Disabled
App Service Web Application should only be accessible over HTTPS
Use of HTTPS ensures server/service authentication and protects data in transit from network layer eavesdropping attacks.
Audit
Deny
Disabled
Automanage Hotpatch should be enabled for Windows Server Azure Edition VMs
Minimize reboots and install updates quickly with hotpatch. Learn more at https://docs.microsoft.com/azure/automanage/automanage-hotpatch
Deny
Disabled
Audit
Deny
Disabled
Audit
Automation Automation Account should have Managed Identity
Use Managed Identities as the recommended method for authenticating with Azure resources from the runbooks. Managed identity for authentication is more secure and eliminates the management overhead associated with using RunAs Account in your runbook code .
Audit
Disabled
Audit
Disabled
Automation Automation account variables should be encrypted
It is important to enable encryption of Automation account variable assets when storing sensitive data
Deny
Disabled
Audit
Deny
Disabled
Audit
Audit
Deny
Disabled
Automation Automation accounts should disable public network access
Disabling public network access improves security by ensuring that the resource isn't exposed on the public internet. You can limit exposure of your Automation account resources by creating private endpoints instead. Learn more at: https://docs.microsoft.com/azure/automation/how-to/private-link-security.
Deny
Disabled
Audit
Automation Azure Automation account should have local authentication method disabled
Disabling local authentication methods improves security by ensuring that Azure Automation accounts exclusively require Azure Active Directory identities for authentication.
Deny
Disabled
Audit
Deny
Disabled
Audit
Automation Azure Automation accounts should use customer-managed keys to encrypt data at rest
Use customer-managed keys to manage the encryption at rest of your Azure Automation Accounts. By default, customer data is encrypted with service-managed keys, but customer-managed keys are commonly required to meet regulatory compliance standards. Customer-managed keys enable the data to be encrypted with an Azure Key Vault key created and owned by you. You have full control and responsibility for the key lifecycle, including rotation and management. Learn more at https://aka.ms/automation-cmk.
Deny
Disabled
Audit
Deny
Disabled
Audit
Automation Configure Azure Automation account to disable local authentication
Disable local authentication methods so that your Azure Automation accounts exclusively require Azure Active Directory identities for authentication.
Modify
Disabled
Modify
Disabled
Automation Configure Azure Automation accounts to disable public network access
Disable public network access for Azure Automation account so that it isn't accessible over the public internet. This configuration helps protect them against data leakage risks. You can limit exposure of the your Automation account resources by creating private endpoints instead. Learn more at: https://aka.ms/privateendpoints.
Modify
Disabled
Modify
Disabled
Automation Configure Azure Automation accounts with private DNS zones
Use private DNS zones to override the DNS resolution for a private endpoint. You need private DNS zone properly configured to connect to Azure Automation account via Azure Private Link. Learn more at: https://aka.ms/privatednszone.
DeployIfNotExists
Disabled
Automation Configure Azure Automation accounts with private DNS zones
Use private DNS zones to override the DNS resolution for a private endpoint. You need private DNS zone properly configured to connect to Azure Automation account via Azure Private Link. Learn more at: https://aka.ms/privatednszone.
DeployIfNotExists
Disabled
Automation Deploy Automation Account TotalJob Alert
Policy to audit/deploy Automation Account TotalJob Alert
deployIfNotExists
disabled
Azure Ai Services Azure AI Services resources should have key access disabled (disable local authentication)
Key access (local authentication) is recommended to be disabled for security. Azure OpenAI Studio, typically used in development/testing, requires key access and will not function if key access is disabled. After disabling, Microsoft Entra ID becomes the only access method, which allows maintaining minimum privilege principle and granular control. Learn more at: https://aka.ms/AI/auth
Deny
Disabled
Audit
Deny
Disabled
Audit
Audit
Deny
Disabled
Azure Ai Services Azure AI Services resources should restrict network access
By restricting network access, you can ensure that only allowed networks can access the service. This can be achieved by configuring network rules so that only applications from allowed networks can access the Azure AI service.
Deny
Disabled
Audit
Deny
Disabled
Audit
Audit
Deny
Disabled
Deny
Disabled
Audit
Azure Ai Services Azure AI Services resources should use Azure Private Link
Azure Private Link lets you connect your virtual network to Azure services without a public IP address at the source or destination. The Private Link platform reduces data leakage risks by handling the connectivity between the consumer and services over the Azure backbone network. Learn more about private links at: https://aka.ms/AzurePrivateLink/Overview
Audit
Disabled
Audit
Disabled
Audit
Disabled
Azure Ai Services Configure Azure AI Services resources to disable local key access (disable local authentication)
Key access (local authentication) is recommended to be disabled for security. Azure OpenAI Studio, typically used in development/testing, requires key access and will not function if key access is disabled. After disabling, Microsoft Entra ID becomes the only access method, which allows maintaining minimum privilege principle and granular control. Learn more at: https://aka.ms/AI/auth
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
Azure Ai Services Configure Azure AI Services resources to disable local key access (disable local authentication)
Key access (local authentication) is recommended to be disabled for security. Azure OpenAI Studio, typically used in development/testing, requires key access and will not function if key access is disabled. After disabling, Microsoft Entra ID becomes the only access method, which allows maintaining minimum privilege principle and granular control. Learn more at: https://aka.ms/AI/auth
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
Azure Ai Services Diagnostic logs in Azure AI services resources should be enabled
Enable logs for Azure AI services resources. This enables you to recreate activity trails for investigation purposes, when a security incident occurs or your network is compromised
AuditIfNotExists
Disabled
AuditIfNotExists
Disabled
AuditIfNotExists
Disabled
Azure Arc Configure Azure Arc Private Link Scopes to use private DNS zones
Use private DNS zones to override the DNS resolution for a private endpoint. A private DNS zone links to your virtual network to resolve to Azure Arc Private Link Scopes. Learn more at: https://aka.ms/arc/privatelink.
DeployIfNotExists
Disabled
Azure Data Explorer Azure Data Explorer encryption at rest should use a customer-managed key
Enabling encryption at rest using a customer-managed key on your Azure Data Explorer cluster provides additional control over the key being used by the encryption at rest. This feature is oftentimes applicable to customers with special compliance requirements and requires a Key Vault to managing the keys.
Deny
Disabled
Audit
Deny
Disabled
Audit
Azure Data Explorer Azure Data Explorer should use a SKU that supports private link
With supported SKUs, Azure Private Link lets you connect your virtual network to Azure services without a public IP address at the source or destination. The Private Link platform handles the connectivity between the consumer and services over the Azure backbone network. By mapping private endpoints to apps, you can reduce data leakage risks. Learn more about private links at: https://aka.ms/private-link.
Deny
Disabled
Audit
Deny
Disabled
Audit
Azure Data Explorer Configure Azure Data Explorer to disable public network access
Disabling the public network access property shuts down public connectivity such that Azure Data Explorer can only be accessed from a private endpoint. This configuration disables the public network access for all Azure Data Explorer clusters .
Modify
Disabled
Modify
Disabled
Azure Data Explorer Disk encryption should be enabled on Azure Data Explorer
Enabling disk encryption helps protect and safeguard your data to meet your organizational security and compliance commitments.
Deny
Disabled
Audit
Deny
Disabled
Audit
Azure Data Explorer Double encryption should be enabled on Azure Data Explorer
Enabling double encryption helps protect and safeguard your data to meet your organizational security and compliance commitments. When double encryption has been enabled, data in the storage account is encrypted twice, once at the service level and once at the infrastructure level, using two different encryption algorithms and two different keys.
Deny
Disabled
Audit
Deny
Disabled
Audit
Azure Data Explorer Public network access on Azure Data Explorer should be disabled
Disabling the public network access property improves security by ensuring Azure Data Explorer can only be accessed from a private endpoint. This configuration denies all logins that match IP or virtual network based firewall rules.
Deny
Disabled
Audit
Azure Databricks Azure Databricks Clusters should disable public IP
Disabling public IP of clusters in Azure Databricks Workspaces improves security by ensuring that the clusters aren't exposed on the public internet. Learn more at: https://learn.microsoft.com/azure/databricks/security/secure-cluster-connectivity.
Audit
Deny
Disabled
Azure Databricks Azure Databricks Workspaces should be in a virtual network
Azure Virtual Networks provide enhanced security and isolation for your Azure Databricks Workspaces, as well as subnets, access control policies, and other features to further restrict access. Learn more at: https://docs.microsoft.com/azure/databricks/administration-guide/cloud-configurations/azure/vnet-inject.
Audit
Deny
Disabled
Azure Databricks Azure Databricks Workspaces should disable public network access
Disabling public network access improves security by ensuring that the resource isn't exposed on the public internet. You can control exposure of your resources by creating private endpoints instead. Learn more at: https://learn.microsoft.com/azure/databricks/administration-guide/cloud-configurations/azure/private-link.
Audit
Deny
Disabled
Azure Databricks Azure Databricks Workspaces should use private link
Azure Private Link lets you connect your virtual networks to Azure services without a public IP address at the source or destination. The Private Link platform handles the connectivity between the consumer and services over the Azure backbone network. By mapping private endpoints to Azure Databricks workspaces, you can reduce data leakage risks. Learn more about private links at: https://aka.ms/adbpe.
Audit
Disabled
Azure Databricks Configure Azure Databricks workspace to use private DNS zones
Use private DNS zones to override the DNS resolution for a private endpoint. A private DNS zone links to your virtual network to resolve to Azure Databricks workspaces. Learn more at: https://aka.ms/adbpe.
DeployIfNotExists
Disabled
Azure Databricks Configure Azure Databricks workspace to use private DNS zones
Use private DNS zones to override the DNS resolution for a private endpoint. A private DNS zone links to your virtual network to resolve to Azure Databricks workspaces. Learn more at: https://aka.ms/adbpe.
DeployIfNotExists
Disabled
Azure Databricks Resource logs in Azure Databricks Workspaces should be enabled
Resource logs enable recreating activity trails to use for investigation purposes when a security incident occurs or when your network is compromised.
AuditIfNotExists
Disabled
Azure Update Manager Configure periodic checking for missing system updates on azure Arc-enabled servers
Configure auto-assessment (every 24 hours) for OS updates on Azure Arc-enabled servers. You can control the scope of assignment according to machine subscription, resource group, location or tag. Learn more about this for Windows: https://aka.ms/computevm-windowspatchassessmentmode, for Linux: https://aka.ms/computevm-linuxpatchassessmentmode.
modify modify
Azure Update Manager Configure periodic checking for missing system updates on azure Arc-enabled servers
Configure auto-assessment (every 24 hours) for OS updates on Azure Arc-enabled servers. You can control the scope of assignment according to machine subscription, resource group, location or tag. Learn more about this for Windows: https://aka.ms/computevm-windowspatchassessmentmode, for Linux: https://aka.ms/computevm-linuxpatchassessmentmode.
modify modify
Azure Update Manager Configure periodic checking for missing system updates on azure virtual machines
Configure auto-assessment (every 24 hours) for OS updates on native Azure virtual machines. You can control the scope of assignment according to machine subscription, resource group, location or tag. Learn more about this for Windows: https://aka.ms/computevm-windowspatchassessmentmode, for Linux: https://aka.ms/computevm-linuxpatchassessmentmode.
modify modify
Azure Update Manager Configure periodic checking for missing system updates on azure virtual machines
Configure auto-assessment (every 24 hours) for OS updates on native Azure virtual machines. You can control the scope of assignment according to machine subscription, resource group, location or tag. Learn more about this for Windows: https://aka.ms/computevm-windowspatchassessmentmode, for Linux: https://aka.ms/computevm-linuxpatchassessmentmode.
modify modify
Azure Update Manager Machines should be configured to periodically check for missing system updates
To ensure periodic assessments for missing system updates are triggered automatically every 24 hours, the AssessmentMode property should be set to 'AutomaticByPlatform'. Learn more about AssessmentMode property for Windows: https://aka.ms/computevm-windowspatchassessmentmode, for Linux: https://aka.ms/computevm-linuxpatchassessmentmode.
Audit
Disabled
Backup [Preview]: Azure Recovery Services vaults should disable public network access
Disabling public network access improves security by ensuring that recovery services vault is not exposed on the public internet. Creating private endpoints can limit exposure of recovery services vault. Learn more at: https://aka.ms/AB-PublicNetworkAccess-Deny.
Deny
Disabled
Audit
Backup [Preview]: Azure Recovery Services vaults should use customer-managed keys for encrypting backup data
Use customer-managed keys to manage the encryption at rest of your backup data. By default, customer data is encrypted with service-managed keys, but customer-managed keys are commonly required to meet regulatory compliance standards. Customer-managed keys enable the data to be encrypted with an Azure Key Vault key created and owned by you. You have full control and responsibility for the key lifecycle, including rotation and management. Learn more at https://aka.ms/AB-CmkEncryption.
Deny
Disabled
Audit
Deny
Disabled
Audit
Backup [Preview]: Configure Recovery Services vaults to use private DNS zones for backup
Use private DNS zones to override the DNS resolution for a private endpoint. A private DNS zone links to your virtual network to resolve to your Recovery Services vault. Learn more at: https://aka.ms/AB-PrivateEndpoints.
DeployIfNotExists
Disabled
Backup [Preview]: Immutability must be enabled for backup vaults
This policy audits if the immutable vaults property is enabled for Backup vaults in the scope. This helps protect your backup data from being deleted before its intended expiry. Learn more at https://aka.ms/AB-ImmutableVaults.
Audit
Disabled
Audit
Disabled
Backup [Preview]: Immutability must be enabled for Recovery Services vaults
This policy audits if the immutable vaults property is enabled for Recovery Services vaults in the scope. This helps protect your backup data from being deleted before its intended expiry. Learn more at https://aka.ms/AB-ImmutableVaults.
Audit
Disabled
Audit
Disabled
Backup [Preview]: Multi-User Authorization (MUA) must be enabled for Backup Vaults.
This policy audits if Multi-User Authorization (MUA) is enabled for Backup Vaults. MUA helps in securing your Backup Vaults by adding an additional layer of protection to critical operations. To learn more, visit https://aka.ms/mua-for-bv.
Audit
Disabled
Audit
Disabled
Backup [Preview]: Multi-User Authorization (MUA) must be enabled for Recovery Services Vaults.
This policy audits if Multi-User Authorization (MUA) is enabled for Recovery Services Vaults. MUA helps in securing your Recovery Services Vaults by adding an additional layer of protection to critical operations. To learn more, visit https://aka.ms/MUAforRSV.
Audit
Disabled
Audit
Disabled
Backup [Preview]: Soft delete must be enabled for Recovery Services Vaults.
This policy audits if soft delete is enabled for Recovery Services Vaults in the scope. Soft delete can help you recover your data even after it has been deleted. Learn more at https://aka.ms/AB-SoftDelete.
Audit
Disabled
Audit
Disabled
Backup [Preview]: Soft delete should be enabled for Backup Vaults
This policy audits if soft delete is enabled for Backup vaults in the scope. Soft delete can help you recover your data after it has been deleted. Learn more at https://aka.ms/AB-SoftDelete
Audit
Disabled
Audit
Disabled
Backup Azure Backup should be enabled for Virtual Machines
Ensure protection of your Azure Virtual Machines by enabling Azure Backup. Azure Backup is a secure and cost effective data protection solution for Azure.
AuditIfNotExists
Disabled
Batch Azure Batch account should use customer-managed keys to encrypt data
Use customer-managed keys to manage the encryption at rest of your Batch account's data. By default, customer data is encrypted with service-managed keys, but customer-managed keys are commonly required to meet regulatory compliance standards. Customer-managed keys enable the data to be encrypted with an Azure Key Vault key created and owned by you. You have full control and responsibility for the key lifecycle, including rotation and management. Learn more at https://aka.ms/Batch-CMK.
Deny
Disabled
Audit
Deny
Disabled
Audit
Batch Deploy - Configure private DNS zones for private endpoints that connect to Batch accounts
Private DNS records allow private connections to private endpoints. Private endpoint connections allow secure communication by enabling private connectivity to Batch accounts without a need for public IP addresses at the source or destination. For more information on private endpoints and DNS zones in Batch, see https://docs.microsoft.com/azure/batch/private-connectivity.
DeployIfNotExists
Disabled
Batch Public network access should be disabled for Batch accounts
Disabling public network access on a Batch account improves security by ensuring your Batch account can only be accessed from a private endpoint. Learn more about disabling public network access at https://docs.microsoft.com/azure/batch/private-connectivity.
Deny
Disabled
Audit
Batch Resource logs in Batch accounts should be enabled
Audit enabling of resource logs. This enables you to recreate activity trails to use for investigation purposes; when a security incident occurs or when your network is compromised
AuditIfNotExists
Disabled
Bot Service Bot Service endpoint should be a valid HTTPS URI
Data can be tampered with during transmission. Protocols exist that provide encryption to address problems of misuse and tampering. To ensure your bots are communicating only over encrypted channels, set the endpoint to a valid HTTPS URI. This ensures the HTTPS protocol is used to encrypt your data in transit and is also often a requirement for compliance with regulatory or industry standards. Please visit: https://docs.microsoft.com/azure/bot-service/bot-builder-security-guidelines.
Deny
Disabled
Audit
Deny
Disabled
Audit
Bot Service Bot Service should be encrypted with a customer-managed key
Azure Bot Service automatically encrypts your resource to protect your data and meet organizational security and compliance commitments. By default, Microsoft-managed encryption keys are used. For greater flexibility in managing keys or controlling access to your subscription, select customer-managed keys, also known as bring your own key (BYOK). Learn more about Azure Bot Service encryption: https://docs.microsoft.com/azure/bot-service/bot-service-encryption.
Deny
Disabled
Audit
Deny
Disabled
Audit
Bot Service Bot Service should have isolated mode enabled
Bots should be set to 'isolated only' mode. This setting configures Bot Service channels that require traffic over the public internet to be disabled.
Deny
Disabled
Audit
Deny
Disabled
Audit
Bot Service Bot Service should have local authentication methods disabled
Disabling local authentication methods improves security by ensuring that a bot uses AAD exclusively for authentication.
Deny
Disabled
Audit
Deny
Disabled
Audit
Bot Service Bot Service should have public network access disabled
Bots should be set to 'isolated only' mode. This setting configures Bot Service channels that require traffic over the public internet to be disabled.
Deny
Disabled
Audit
Bot Service BotService resources should use private link
Azure Private Link lets you connect your virtual network to Azure services without a public IP address at the source or destination. The Private Link platform handles the connectivity between the consumer and services over the Azure backbone network. By mapping private endpoints to your BotService resource, data leakage risks are reduced.
Audit
Disabled
Audit
Disabled
Bot Service Configure BotService resources to use private DNS zones
Use private DNS zones to override the DNS resolution for a private endpoint. A private DNS zone links to your virtual network to resolve to BotService related resources. Learn more at: https://aka.ms/privatednszone.
DeployIfNotExists
Disabled
Cache Azure Cache for Redis Append a specific min TLS version requirement and enforce TLS.
Append a specific min TLS version requirement and enforce SSL on Azure Cache for Redis. Enables secure server to client by enforce minimal Tls Version to secure the connection between your database server and your client applications helps protect against 'man in the middle' attacks by encrypting the data stream between the server and your application. This configuration enforces that SSL is always enabled for accessing your database server.
Append
Disabled
Cache Azure Cache for Redis Append and the enforcement that enableNonSslPort is disabled.
Azure Cache for Redis Append and the enforcement that enableNonSslPort is disabled. Enables secure server to client by enforce minimal Tls Version to secure the connection between your database server and your client applications helps protect against 'man in the middle' attacks by encrypting the data stream between the server and your application. This configuration enforces that SSL is always enabled for accessing your database server.
Append
Disabled
Cache Azure Cache for Redis only secure connections should be enabled
Audit enabling of only connections via SSL to Azure Cache for Redis. Validate both minimum TLS version and enableNonSslPort is disabled. Use of secure connections ensures authentication between the server and the service and protects data in transit from network layer attacks such as man-in-the-middle, eavesdropping, and session-hijacking
Audit
Deny
Disabled
Cache Azure Cache for Redis should disable public network access
Disabling public network access improves security by ensuring that the Azure Cache for Redis isn't exposed on the public internet. You can limit exposure of your Azure Cache for Redis by creating private endpoints instead. Learn more at: https://docs.microsoft.com/azure/azure-cache-for-redis/cache-private-link.
Deny
Disabled
Audit
Cache Azure Cache for Redis should use private link
Private endpoints lets you connect your virtual network to Azure services without a public IP address at the source or destination. By mapping private endpoints to your Azure Cache for Redis instances, data leakage risks are reduced. Learn more at: https://docs.microsoft.com/azure/azure-cache-for-redis/cache-private-link.
AuditIfNotExists
Disabled
Cache Configure Azure Cache for Redis to use private DNS zones
Use private DNS zones to override the DNS resolution for a private endpoint. A private DNS zone can be linked to your virtual network to resolve to Azure Cache for Redis. Learn more at: https://aka.ms/privatednszone.
DeployIfNotExists
Disabled
Cache Only secure connections to your Azure Cache for Redis should be enabled
Audit enabling of only connections via SSL to Azure Cache for Redis. Use of secure connections ensures authentication between the server and the service and protects data in transit from network layer attacks such as man-in-the-middle, eavesdropping, and session-hijacking
Audit
Deny
Disabled
ChangeTrackingAndInventory [Preview]: Configure Linux VMSS to be associated with a Data Collection Rule for ChangeTracking and Inventory
Deploy Association to link Linux virtual machine scale sets to the specified Data Collection Rule to enable ChangeTracking and Inventory. The list of locations and OS images are updated over time as support is increased.
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
ChangeTrackingAndInventory [Preview]: Configure Linux VMSS to install AMA for ChangeTracking and Inventory with user-assigned managed identity
Automate the deployment of Azure Monitor Agent extension on your Linux virtual machine scale sets for enabling ChangeTracking and Inventory. This policy will install the extension and configure it to use the specified user-assigned managed identity if the OS and region are supported, and skip install otherwise. Learn more: https://aka.ms/AMAOverview.
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
ChangeTrackingAndInventory [Preview]: Configure Windows VMSS to be associated with a Data Collection Rule for ChangeTracking and Inventory
Deploy Association to link Windows virtual machine scale sets to specified Data Collection Rule to enable ChangeTracking and Inventory. The list of locations and OS images are updated over time as support is increased.
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
ChangeTrackingAndInventory [Preview]: Configure Windows VMSS to install AMA for ChangeTracking and Inventory with user-assigned managed identity
Automate the deployment of Azure Monitor Agent extension on your Windows virtual machine scale sets for enabling ChangeTracking and Inventory. This policy will install the extension and configure it to use the specified user-assigned managed identity if the OS and region are supported, and skip install otherwise. Learn more: https://aka.ms/AMAOverview.
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
ChangeTrackingAndInventory Configure Linux Arc-enabled machines to be associated with a Data Collection Rule for ChangeTracking and Inventory
Deploy Association to link Linux Arc-enabled machines to specified Data Collection Rule to enable ChangeTracking and Inventory. The list of locations are updated over time as support is increased.
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
ChangeTrackingAndInventory Configure Linux Arc-enabled machines to to install AMA for ChangeTracking and Inventory
Automate the deployment of Azure Monitor Agent extension on your Linux Arc-enabled machines for enabling ChangeTracking and Inventory. This policy will install the extension if the region is supported. Learn more: https://aka.ms/AMAOverview.
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
ChangeTrackingAndInventory Configure Linux Virtual Machines to be associated with a Data Collection Rule for ChangeTracking and Inventory
Deploy Association to link Linux virtual machines to the specified Data Collection Rule to enable ChangeTracking and Inventory. The list of locations and OS images are updated over time as support is increased.
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
ChangeTrackingAndInventory Configure Linux VMs to install AMA for ChangeTracking and Inventory with user-assigned managed identity
Automate the deployment of Azure Monitor Agent extension on your Linux virtual machines for enabling ChangeTracking and Inventory. This policy will install the extension and configure it to use the specified user-assigned managed identity if the OS and region are supported, and skip install otherwise. Learn more: https://aka.ms/AMAOverview.
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
ChangeTrackingAndInventory Configure Windows Arc-enabled machines to be associated with a Data Collection Rule for ChangeTracking and Inventory
Deploy Association to link Windows Arc-enabled machines to specified Data Collection Rule to enable ChangeTracking and Inventory. The list of locations are updated over time as support is increased.
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
ChangeTrackingAndInventory Configure Windows Arc-enabled machines to install AMA for ChangeTracking and Inventory
Automate the deployment of Azure Monitor Agent extension on your Windows Arc-enabled machines for enabling ChangeTracking and Inventory. This policy will install the extension if the OS and region are supported and system-assigned managed identity is enabled, and skip install otherwise. Learn more: https://aka.ms/AMAOverview.
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
ChangeTrackingAndInventory Configure Windows Virtual Machines to be associated with a Data Collection Rule for ChangeTracking and Inventory
Deploy Association to link Windows virtual machines to specified Data Collection Rule to enable ChangeTracking and Inventory. The list of locations and OS images are updated over time as support is increased.
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
ChangeTrackingAndInventory Configure Windows VMs to install AMA for ChangeTracking and Inventory with user-assigned managed identity
Automate the deployment of Azure Monitor Agent extension on your Windows virtual machines for enabling ChangeTracking and Inventory. This policy will install the extension and configure it to use the specified user-assigned managed identity if the OS and region are supported, and skip install otherwise. Learn more: https://aka.ms/AMAOverview.
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
Cognitive Services [Deprecated]: Cognitive Services accounts should disable public network access
To improve the security of Cognitive Services accounts, ensure that it isn't exposed to the public internet and can only be accessed from a private endpoint. Disable the public network access property as described in https://go.microsoft.com/fwlink/?linkid=2129800. This option disables access from any public address space outside the Azure IP range, and denies all logins that match IP or virtual network-based firewall rules. This reduces data leakage risks.
Deny
Disabled
Audit
Cognitive Services [Deprecated]: Cognitive Services should use private link
Azure Private Link lets you connect your virtual networks to Azure services without a public IP address at the source or destination. The Private Link platform handles the connectivity between the consumer and services over the Azure backbone network. By mapping private endpoints to Cognitive Services, you'll reduce the potential for data leakage. Learn more about private links at: https://go.microsoft.com/fwlink/?linkid=2129800.
Audit
Disabled
Cognitive Services Azure AI Services resources should encrypt data at rest with a customer-managed key (CMK)
Using customer-managed keys to encrypt data at rest provides more control over the key lifecycle, including rotation and management. This is particularly relevant for organizations with related compliance requirements. This is not assessed by default and should only be applied when required by compliance or restrictive policy requirements. If not enabled, the data will be encrypted using platform-managed keys. To implement this, update the 'Effect' parameter in the Security Policy for the applicable scope.
Deny
Disabled
Audit
Deny
Disabled
Audit
Disabled
Deny
Audit
Cognitive Services Cognitive Services accounts should use a managed identity
Assigning a managed identity to your Cognitive Service account helps ensure secure authentication. This identity is used by this Cognitive service account to communicate with other Azure services, like Azure Key Vault, in a secure way without you having to manage any credentials.
Deny
Disabled
Audit
Deny
Disabled
Audit
Cognitive Services Cognitive Services accounts should use customer owned storage
Use customer owned storage to control the data stored at rest in Cognitive Services. To learn more about customer owned storage, visit https://aka.ms/cogsvc-cmk.
Deny
Disabled
Audit
Deny
Disabled
Audit
Cognitive Services Configure Cognitive Services accounts to disable local authentication methods
Disable local authentication methods so that your Cognitive Services accounts require Azure Active Directory identities exclusively for authentication. Learn more at: https://aka.ms/cs/auth.
Modify
Disabled
Modify
Disabled
Cognitive Services Configure Cognitive Services accounts to disable public network access
Disable public network access for your Cognitive Services resource so that it's not accessible over the public internet. This can reduce data leakage risks. Learn more at: https://go.microsoft.com/fwlink/?linkid=2129800.
Modify
Disabled
Modify
Disabled
Cognitive Services Configure Cognitive Services accounts to use private DNS zones
Use private DNS zones to override the DNS resolution for a private endpoint. A private DNS zone links to your virtual network to resolve to Cognitive Services accounts. Learn more at: https://go.microsoft.com/fwlink/?linkid=2110097.
DeployIfNotExists
Disabled
Cognitive Services Network ACLs should be restricted for Cognitive Services
Azure Cognitive Services should not allow adding individual IPs or virtual network rules to the service-level firewall. Enable this to restrict inbound network access and enforce the usage of private endpoints.
Deny
Disabled
Audit
Deny
Disabled
Audit
Cognitive Services Outbound network access should be restricted for Cognitive Services
Azure Cognitive Services allow restricting outbound network access. Enable this to limit outbound connectivity for the service.
Deny
Disabled
Audit
Deny
Disabled
Audit
Compute Configure disk access resources to use private DNS zones
Use private DNS zones to override the DNS resolution for a private endpoint. A private DNS zone links to your virtual network to resolve to a managed disk. Learn more at: https://aka.ms/disksprivatelinksdoc.
DeployIfNotExists
Disabled
Compute Deploy Virtual Machine Auto Shutdown Schedule
Deploys an auto shutdown schedule to a virtual machine
deployIfNotExists
Compute Deploy VM CPU Alert
Policy to audit/deploy VM CPU Alert
deployIfNotExists
disabled
deployIfNotExists
disabled
Compute Deploy VM Data Disk Read Latency Alert
Policy to audit/deploy VM dataDiskReadLatency Alert
deployIfNotExists
disabled
deployIfNotExists
disabled
Compute Deploy VM Data Disk Space Alert
Policy to audit/deploy VM data Disk Space Alert
deployIfNotExists
disabled
deployIfNotExists
disabled
Compute Deploy VM Data Disk Write Latency Alert
Policy to audit/deploy VM dataDiskWriteLatency Alert
deployIfNotExists
disabled
deployIfNotExists
disabled
Compute Deploy VM HeartBeat Alert
Policy to audit/deploy VM HeartBeat Alert for all VMs in the subscription
deployIfNotExists
disabled
deployIfNotExists
disabled
Compute Deploy VM Memory Alert
Policy to audit/deploy VM Memory Alert
deployIfNotExists
disabled
deployIfNotExists
disabled
Compute Deploy VM Network Read Alert
Policy to audit/deploy VM Network Read Alert
deployIfNotExists
disabled
deployIfNotExists
disabled
Compute Deploy VM Network Write Alert
Policy to audit/deploy VM Network Out Alert
deployIfNotExists
disabled
deployIfNotExists
disabled
Compute Deploy VM OS Disk Read Latency Alert
Policy to audit/deploy VM OSDiskreadLatency Alert
deployIfNotExists
disabled
deployIfNotExists
disabled
Compute Deploy VM OS Disk Space Alert
Policy to audit/deploy VM OSDiskSpace Alert
deployIfNotExists
disabled
deployIfNotExists
disabled
Compute Deploy VM OS Disk Write Latency Alert
Policy to audit/deploy VM OSDiskwriteLatency Alert
deployIfNotExists
disabled
deployIfNotExists
disabled
Compute Managed disks should be double encrypted with both platform-managed and customer-managed keys
High security sensitive customers who are concerned of the risk associated with any particular encryption algorithm, implementation, or key being compromised can opt for additional layer of encryption using a different encryption algorithm/mode at the infrastructure layer using platform managed encryption keys. The disk encryption sets are required to use double encryption. Learn more at https://aka.ms/disks-doubleEncryption.
Deny
Disabled
Audit
Deny
Disabled
Audit
Compute Managed disks should disable public network access
Disabling public network access improves security by ensuring that a managed disk isn't exposed on the public internet. Creating private endpoints can limit exposure of managed disks. Learn more at: https://aka.ms/disksprivatelinksdoc.
Audit
Disabled
Compute OS and data disks should be encrypted with a customer-managed key
Use customer-managed keys to manage the encryption at rest of the contents of your managed disks. By default, the data is encrypted at rest with platform-managed keys, but customer-managed keys are commonly required to meet regulatory compliance standards. Customer-managed keys enable the data to be encrypted with an Azure Key Vault key created and owned by you. You have full control and responsibility for the key lifecycle, including rotation and management. Learn more at https://aka.ms/disks-cmk.
Deny
Disabled
Audit
Deny
Disabled
Audit
Compute Virtual machines and virtual machine scale sets should have encryption at host enabled
Use encryption at host to get end-to-end encryption for your virtual machine and virtual machine scale set data. Encryption at host enables encryption at rest for your temporary disk and OS/data disk caches. Temporary and ephemeral OS disks are encrypted with platform-managed keys when encryption at host is enabled. OS/data disk caches are encrypted at rest with either customer-managed or platform-managed key, depending on the encryption type selected on the disk. Learn more at https://aka.ms/vm-hbe.
Deny
Disabled
Audit
Deny
Disabled
Audit
Audit
Deny
Disabled
Compute Virtual machines should be migrated to new Azure Resource Manager resources
Use new Azure Resource Manager for your virtual machines to provide security enhancements such as: stronger access control (RBAC), better auditing, Azure Resource Manager based deployment and governance, access to managed identities, access to key vault for secrets, Azure AD-based authentication and support for tags and resource groups for easier security management
Audit
Deny
Disabled
Container Apps Container App environments should use network injection
Container Apps environments should use virtual network injection to: 1.Isolate Container Apps from the public internet 2.Enable network integration with resources on-premises or in other Azure virtual networks 3.Achieve more granular control over network traffic flowing to and from the environment.
Deny
Disabled
Audit
Deny
Disabled
Audit
Container Apps Container Apps environment should disable public network access
Disable public network access to improve security by exposing the Container Apps environment through an internal load balancer. This removes the need for a public IP address and prevents internet access to all Container Apps within the environment.
Deny
Disabled
Audit
Container Apps Container Apps should disable external network access
Disable external network access to your Container Apps by enforcing internal-only ingress. This will ensure inbound communication for Container Apps is limited to callers within the Container Apps environment.
Deny
Disabled
Audit
Container Apps Container Apps should only be accessible over HTTPS
Use of HTTPS ensures server/service authentication and protects data in transit from network layer eavesdropping attacks. Disabling 'allowInsecure' will result in the automatic redirection of requests from HTTP to HTTPS connections for container apps.
Deny
Disabled
Audit
Container Apps Container Apps should only be accessible over HTTPS
Use of HTTPS ensures server/service authentication and protects data in transit from network layer eavesdropping attacks. Disabling 'allowInsecure' will result in the automatic redirection of requests from HTTP to HTTPS connections for container apps.
Deny
Disabled
Audit
Container Apps Managed Identity should be enabled for Container Apps
Enforcing managed identity ensures Container Apps can securely authenticate to any resource that supports Azure AD authentication
Deny
Disabled
Audit
Deny
Disabled
Audit
Container Instance Azure Container Instance container group should deploy into a virtual network
Secure communication between your containers with Azure Virtual Networks. When you specify a virtual network, resources within the virtual network can securely and privately communicate with each other.
Deny
Disabled
Audit
Deny
Disabled
Audit
Container Instance Azure Container Instance container group should use customer-managed key for encryption
Secure your containers with greater flexibility using customer-managed keys. When you specify a customer-managed key, that key is used to protect and control access to the key that encrypts your data. Using customer-managed keys provides additional capabilities to control rotation of the key encryption key or cryptographically erase data.
Deny
Disabled
Audit
Deny
Disabled
Audit
Container Registry Configure container registries to disable anonymous authentication.
Disable anonymous pull for your registry so that data not accessible by unauthenticated user. Disabling local authentication methods like admin user, repository scoped access tokens and anonymous pull improves security by ensuring that container registries exclusively require Azure Active Directory identities for authentication. Learn more at: https://aka.ms/acr/authentication.
Modify
Disabled
Modify
Disabled
Container Registry Configure container registries to disable ARM audience token authentication.
Disable Azure Active Directory ARM audience tokens for authentication to your registry. Only Azure Container Registry (ACR) audience tokens will be used for authentication. This will ensure only tokens meant for usage on the registry can be used for authentication. Disabling ARM audience tokens does not affect admin user's or scoped access tokens' authentication. Learn more at: https://aka.ms/acr/authentication.
Modify
Disabled
Modify
Disabled
Container Registry Configure container registries to disable local admin account.
Disable admin account for your registry so that it is not accessible by local admin. Disabling local authentication methods like admin user, repository scoped access tokens and anonymous pull improves security by ensuring that container registries exclusively require Azure Active Directory identities for authentication. Learn more at: https://aka.ms/acr/authentication.
Modify
Disabled
Modify
Disabled
Container Registry Configure Container registries to disable public network access
Disable public network access for your Container Registry resource so that it's not accessible over the public internet. This can reduce data leakage risks. Learn more at https://aka.ms/acr/portal/public-network and https://aka.ms/acr/private-link.
Modify
Disabled
Modify
Disabled
Container Registry Configure container registries to disable repository scoped access token.
Disable repository scoped access tokens for your registry so that repositories are not accessible by tokens. Disabling local authentication methods like admin user, repository scoped access tokens and anonymous pull improves security by ensuring that container registries exclusively require Azure Active Directory identities for authentication. Learn more at: https://aka.ms/acr/authentication.
Modify
Disabled
Modify
Disabled
Container Registry Configure Container registries to use private DNS zones
Use private DNS zones to override the DNS resolution for a private endpoint. A private DNS zone links to your virtual network to resolve to your Container Registry. Learn more at: https://aka.ms/privatednszone and https://aka.ms/acr/private-link.
DeployIfNotExists
Disabled
Container Registry Container registries should be encrypted with a customer-managed key
Use customer-managed keys to manage the encryption at rest of the contents of your registries. By default, the data is encrypted at rest with service-managed keys, but customer-managed keys are commonly required to meet regulatory compliance standards. Customer-managed keys enable the data to be encrypted with an Azure Key Vault key created and owned by you. You have full control and responsibility for the key lifecycle, including rotation and management. Learn more at https://aka.ms/acr/CMK.
Deny
Disabled
Audit
Deny
Disabled
Audit
Disabled
Deny
Audit
Container Registry Container registries should have anonymous authentication disabled.
Disable anonymous pull for your registry so that data is not accessible by unauthenticated user. Disabling local authentication methods like admin user, repository scoped access tokens and anonymous pull improves security by ensuring that container registries exclusively require Azure Active Directory identities for authentication. Learn more at: https://aka.ms/acr/authentication.
Deny
Disabled
Audit
Deny
Disabled
Audit
Container Registry Container registries should have ARM audience token authentication disabled.
Disable Azure Active Directory ARM audience tokens for authentication to your registry. Only Azure Container Registry (ACR) audience tokens will be used for authentication. This will ensure only tokens meant for usage on the registry can be used for authentication. Disabling ARM audience tokens does not affect admin user's or scoped access tokens' authentication. Learn more at: https://aka.ms/acr/authentication.
Deny
Disabled
Audit
Deny
Disabled
Audit
Container Registry Container registries should have exports disabled
Disabling exports improves security by ensuring data in a registry is accessed solely via the dataplane ('docker pull'). Data cannot be moved out of the registry via 'acr import' or via 'acr transfer'. In order to disable exports, public network access must be disabled. Learn more at: https://aka.ms/acr/export-policy.
Deny
Disabled
Audit
Deny
Disabled
Audit
Container Registry Container registries should have local admin account disabled.
Disable admin account for your registry so that it is not accessible by local admin. Disabling local authentication methods like admin user, repository scoped access tokens and anonymous pull improves security by ensuring that container registries exclusively require Azure Active Directory identities for authentication. Learn more at: https://aka.ms/acr/authentication.
Deny
Disabled
Audit
Deny
Disabled
Audit
Container Registry Container registries should have repository scoped access token disabled.
Disable repository scoped access tokens for your registry so that repositories are not accessible by tokens. Disabling local authentication methods like admin user, repository scoped access tokens and anonymous pull improves security by ensuring that container registries exclusively require Azure Active Directory identities for authentication. Learn more at: https://aka.ms/acr/authentication.
Deny
Disabled
Audit
Deny
Disabled
Audit
Container Registry Container registries should have SKUs that support Private Links
Azure Private Link lets you connect your virtual network to Azure services without a public IP address at the source or destination. The private link platform handles the connectivity between the consumer and services over the Azure backbone network. By mapping private endpoints to your container registries instead of the entire service, data leakage risks are reduced. Learn more at: https://aka.ms/acr/private-link.
Deny
Disabled
Audit
Deny
Disabled
Audit
Container Registry Container registries should not allow unrestricted network access
Azure container registries by default accept connections over the internet from hosts on any network. To protect your registries from potential threats, allow access from only specific private endpoints, public IP addresses or address ranges. If your registry doesn't have network rules configured, it will appear in the unhealthy resources. Learn more about Container Registry network rules here: https://aka.ms/acr/privatelink, https://aka.ms/acr/portal/public-network and https://aka.ms/acr/vnet.
Deny
Disabled
Audit
Deny
Disabled
Audit
Audit
Deny
Disabled
Container Registry Container registries should use private link
Azure Private Link lets you connect your virtual network to Azure services without a public IP address at the source or destination. The private link platform handles the connectivity between the consumer and services over the Azure backbone network.By mapping private endpoints to your container registries instead of the entire service, you'll also be protected against data leakage risks. Learn more at: https://aka.ms/acr/private-link.
Audit
Disabled
Container Registry Public network access should be disabled for Container registries
Disabling public network access improves security by ensuring that container registries are not exposed on the public internet. Creating private endpoints can limit exposure of container registry resources. Learn more at: https://aka.ms/acr/portal/public-network and https://aka.ms/acr/private-link.
Deny
Disabled
Audit
Cosmos DB Azure Cosmos DB accounts should have firewall rules
Firewall rules should be defined on your Azure Cosmos DB accounts to prevent traffic from unauthorized sources. Accounts that have at least one IP rule defined with the virtual network filter enabled are deemed compliant. Accounts disabling public access are also deemed compliant.
Deny
Disabled
Audit
Deny
Disabled
Audit
Audit
Deny
Disabled
Cosmos DB Azure Cosmos DB accounts should use customer-managed keys to encrypt data at rest
Use customer-managed keys to manage the encryption at rest of your Azure Cosmos DB. By default, the data is encrypted at rest with service-managed keys, but customer-managed keys are commonly required to meet regulatory compliance standards. Customer-managed keys enable the data to be encrypted with an Azure Key Vault key created and owned by you. You have full control and responsibility for the key lifecycle, including rotation and management. Learn more at https://aka.ms/cosmosdb-cmk.
deny
disabled
audit
deny
disabled
audit
disabled
deny
audit
Cosmos DB Azure Cosmos DB key based metadata write access should be disabled
This policy enables you to ensure all Azure Cosmos DB accounts disable key based metadata write access.
append append
Cosmos DB Azure Cosmos DB should disable public network access
Disabling public network access improves security by ensuring that your CosmosDB account isn't exposed on the public internet. Creating private endpoints can limit exposure of your CosmosDB account. Learn more at: https://docs.microsoft.com/azure/cosmos-db/how-to-configure-private-endpoints#blocking-public-network-access-during-account-creation.
Audit
Deny
Disabled
Deny
Disabled
Audit
Cosmos DB Configure Cosmos DB database accounts to disable local authentication
Disable local authentication methods so that your Cosmos DB database accounts exclusively require Azure Active Directory identities for authentication. Learn more at: https://docs.microsoft.com/azure/cosmos-db/how-to-setup-rbac#disable-local-auth.
Modify
Disabled
Modify
Disabled
Cosmos DB Configure CosmosDB accounts to disable public network access
Disable public network access for your CosmosDB resource so that it's not accessible over the public internet. This can reduce data leakage risks. Learn more at: https://docs.microsoft.com/azure/cosmos-db/how-to-configure-private-endpoints#blocking-public-network-access-during-account-creation.
Modify
Disabled
Modify
Disabled
Cosmos DB Configure CosmosDB accounts to use private DNS zones
Use private DNS zones to override the DNS resolution for a private endpoint. A private DNS zone links to your virtual network to resolve to CosmosDB account. Learn more at: https://aka.ms/privatednszone.
DeployIfNotExists
Disabled
Cosmos DB Configure CosmosDB accounts to use private DNS zones
Use private DNS zones to override the DNS resolution for a private endpoint. A private DNS zone links to your virtual network to resolve to CosmosDB account. Learn more at: https://aka.ms/privatednszone.
DeployIfNotExists
Disabled
Cosmos DB Configure CosmosDB accounts to use private DNS zones
Use private DNS zones to override the DNS resolution for a private endpoint. A private DNS zone links to your virtual network to resolve to CosmosDB account. Learn more at: https://aka.ms/privatednszone.
DeployIfNotExists
Disabled
Cosmos DB Configure CosmosDB accounts to use private DNS zones
Use private DNS zones to override the DNS resolution for a private endpoint. A private DNS zone links to your virtual network to resolve to CosmosDB account. Learn more at: https://aka.ms/privatednszone.
DeployIfNotExists
Disabled
Cosmos DB Configure CosmosDB accounts to use private DNS zones
Use private DNS zones to override the DNS resolution for a private endpoint. A private DNS zone links to your virtual network to resolve to CosmosDB account. Learn more at: https://aka.ms/privatednszone.
DeployIfNotExists
Disabled
Cosmos DB Cosmos DB database accounts should have local authentication methods disabled
Disabling local authentication methods improves security by ensuring that Cosmos DB database accounts exclusively require Azure Active Directory identities for authentication. Learn more at: https://docs.microsoft.com/azure/cosmos-db/how-to-setup-rbac#disable-local-auth.
Deny
Disabled
Audit
Deny
Disabled
Audit
Audit
Deny
Disabled
Cosmos DB CosmosDB accounts should use private link
Azure Private Link lets you connect your virtual network to Azure services without a public IP address at the source or destination. The Private Link platform handles the connectivity between the consumer and services over the Azure backbone network. By mapping private endpoints to your CosmosDB account, data leakage risks are reduced. Learn more about private links at: https://docs.microsoft.com/azure/cosmos-db/how-to-configure-private-endpoints.
Audit
Disabled
Cosmos DB Deploy Advanced Threat Protection for Cosmos DB Accounts
This policy enables Advanced Threat Protection across Cosmos DB accounts.
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
Cost Optimization Audit AHUB for eligible VMs
Optimize cost by enabling Azure Hybrid Benefit. Leverage this Policy definition as a cost control to reveal Virtual Machines not using AHUB.
Audit
Disabled
Cost Optimization Unused App Service plans driving cost should be avoided
Optimize cost by detecting unused but chargeable resources. Leverage this Policy definition as a cost control to reveal orphaned App Service plans that are driving cost.
Audit
Disabled
Cost Optimization Unused Disks driving cost should be avoided
Optimize cost by detecting unused but chargeable resources. Leverage this Policy definition as a cost control to reveal orphaned Disks that are driving cost.
Audit
Disabled
Cost Optimization Unused Public IP addresses driving cost should be avoided
Optimize cost by detecting unused but chargeable resources. Leverage this Policy definition as a cost control to reveal orphaned Public IP addresses that are driving cost.
Audit
Disabled
Data Box Azure Data Box jobs should use a customer-managed key to encrypt the device unlock password
Use a customer-managed key to control the encryption of the device unlock password for Azure Data Box. Customer-managed keys also help manage access to the device unlock password by the Data Box service in order to prepare the device and copy data in an automated manner. The data on the device itself is already encrypted at rest with Advanced Encryption Standard 256-bit encryption, and the device unlock password is encrypted by default with a Microsoft managed key.
Deny
Disabled
Audit
Deny
Disabled
Audit
Data Factory Azure data factories should be encrypted with a customer-managed key
Use customer-managed keys to manage the encryption at rest of your Azure Data Factory. By default, customer data is encrypted with service-managed keys, but customer-managed keys are commonly required to meet regulatory compliance standards. Customer-managed keys enable the data to be encrypted with an Azure Key Vault key created and owned by you. You have full control and responsibility for the key lifecycle, including rotation and management. Learn more at https://aka.ms/adf-cmk.
Deny
Disabled
Audit
Deny
Disabled
Audit
Data Factory Azure Data Factory linked services should use Key Vault for storing secrets
To ensure secrets (such as connection strings) are managed securely, require users to provide secrets using an Azure Key Vault instead of specifying them inline in linked services.
Deny
Disabled
Audit
Deny
Disabled
Audit
Data Factory Azure Data Factory linked services should use system-assigned managed identity authentication when it is supported
Using system-assigned managed identity when communicating with data stores via linked services avoids the use of less secured credentials such as passwords or connection strings.
Deny
Disabled
Audit
Deny
Disabled
Audit
Data Factory Azure Data Factory should use a Git repository for source control
Configure only your development data factory with Git integration. Changes to test and production should be deployed via CI/CD and should NOT have Git integration. DO NOT apply this policy on your QA / Test / Production data factories.
Deny
Disabled
Audit
Deny
Disabled
Audit
Data Factory Configure Data Factories to disable public network access
Disable public network access for your Data Factory so that it is not accessible over the public internet. This can reduce data leakage risks. Learn more at: https://docs.microsoft.com/azure/data-factory/data-factory-private-link.
Modify
Disabled
Modify
Disabled
Data Factory Configure private DNS zones for private endpoints that connect to Azure Data Factory
Private DNS records allow private connections to private endpoints. Private endpoint connections allow secure communication by enabling private connectivity to your Azure Data Factory without a need for public IP addresses at the source or destination. For more information on private endpoints and DNS zones in Azure Data Factory, see https://docs.microsoft.com/azure/data-factory/data-factory-private-link.
DeployIfNotExists
Disabled
Data Factory Configure private DNS zones for private endpoints that connect to Azure Data Factory
Private DNS records allow private connections to private endpoints. Private endpoint connections allow secure communication by enabling private connectivity to your Azure Data Factory without a need for public IP addresses at the source or destination. For more information on private endpoints and DNS zones in Azure Data Factory, see https://docs.microsoft.com/azure/data-factory/data-factory-private-link.
DeployIfNotExists
Disabled
Data Factory Public network access on Azure Data Factory should be disabled
Disabling the public network access property improves security by ensuring your Azure Data Factory can only be accessed from a private endpoint.
Deny
Disabled
Audit
Data Factory SQL Server Integration Services integration runtimes on Azure Data Factory should be joined to a virtual network
Azure Virtual Network deployment provides enhanced security and isolation for your SQL Server Integration Services integration runtimes on Azure Data Factory, as well as subnets, access control policies, and other features to further restrict access.
Deny
Disabled
Audit
Deny
Disabled
Audit
Data Lake Resource logs in Azure Data Lake Store should be enabled
Audit enabling of resource logs. This enables you to recreate activity trails to use for investigation purposes; when a security incident occurs or when your network is compromised
AuditIfNotExists
Disabled
Data Lake Resource logs in Data Lake Analytics should be enabled
Audit enabling of resource logs. This enables you to recreate activity trails to use for investigation purposes; when a security incident occurs or when your network is compromised
AuditIfNotExists
Disabled
Desktop Virtualization Azure Virtual Desktop hostpools should disable public network access
Disabling public network access improves security and keeps your data safe by ensuring that access to the Azure Virtual Desktop service is not exposed to the public internet. Learn more at: https://aka.ms/avdprivatelink.
Deny
Disabled
Audit
Desktop Virtualization Azure Virtual Desktop workspaces should disable public network access
Disabling public network access for your Azure Virtual Desktop workspace resource prevents the feed from being accessible over the public internet. Allowing only private network access improves security and keeps your data safe. Learn more at: https://aka.ms/avdprivatelink.
Deny
Disabled
Audit
Desktop Virtualization Configure Azure Virtual Desktop hostpool resources to use private DNS zones
Use private DNS zones to override the DNS resolution for a private endpoint. A private DNS zone links to your virtual network to resolve to Azure Virtual Desktop resources. Learn more at: https://aka.ms/privatednszone.
DeployIfNotExists
Disabled
Desktop Virtualization Configure Azure Virtual Desktop hostpools to disable public network access
Disable public network access for session hosts and end users on your Azure Virtual Desktop hostpool resource so that it's not accessible over the public internet. This improves security and keeps your data safe. Learn more at: https://aka.ms/avdprivatelink.
Modify
Disabled
Modify
Disabled
Desktop Virtualization Configure Azure Virtual Desktop workspace resources to use private DNS zones
Use private DNS zones to override the DNS resolution for a private endpoint. A private DNS zone links to your virtual network to resolve to Azure Virtual Desktop resources. Learn more at: https://aka.ms/privatednszone.
DeployIfNotExists
Disabled
Desktop Virtualization Configure Azure Virtual Desktop workspaces to disable public network access
Disable public network access for your Azure Virtual Desktop workspace resource so the feed is not accessible over the public internet. This improves security and keeps your data safe. Learn more at: https://aka.ms/avdprivatelink.
Modify
Disabled
Modify
Disabled
Event Grid Azure Event Grid domains should disable public network access
Disabling public network access improves security by ensuring that the resource isn't exposed on the public internet. You can limit exposure of your resources by creating private endpoints instead. Learn more at: https://aka.ms/privateendpoints.
Deny
Disabled
Audit
Event Grid Azure Event Grid domains should have local authentication methods disabled
Disabling local authentication methods improves security by ensuring that Azure Event Grid domains exclusively require Azure Active Directory identities for authentication. Learn more at: https://aka.ms/aeg-disablelocalauth.
Deny
Disabled
Audit
Deny
Disabled
Audit
Event Grid Azure Event Grid domains should use private link
Azure Private Link lets you connect your virtual network to Azure services without a public IP address at the source or destination. The Private Link platform handles the connectivity between the consumer and services over the Azure backbone network. By mapping private endpoints to your Event Grid domain instead of the entire service, you'll also be protected against data leakage risks. Learn more at: https://aka.ms/privateendpoints.
Audit
Disabled
Event Grid Azure Event Grid partner namespaces should have local authentication methods disabled
Disabling local authentication methods improves security by ensuring that Azure Event Grid partner namespaces exclusively require Azure Active Directory identities for authentication. Learn more at: https://aka.ms/aeg-disablelocalauth.
Deny
Disabled
Audit
Deny
Disabled
Audit
Event Grid Azure Event Grid topics should disable public network access
Disabling public network access improves security by ensuring that the resource isn't exposed on the public internet. You can limit exposure of your resources by creating private endpoints instead. Learn more at: https://aka.ms/privateendpoints.
Deny
Disabled
Audit
Event Grid Azure Event Grid topics should have local authentication methods disabled
Disabling local authentication methods improves security by ensuring that Azure Event Grid topics exclusively require Azure Active Directory identities for authentication. Learn more at: https://aka.ms/aeg-disablelocalauth.
Deny
Disabled
Audit
Deny
Disabled
Audit
Event Grid Azure Event Grid topics should use private link
Azure Private Link lets you connect your virtual network to Azure services without a public IP address at the source or destination. The Private Link platform handles the connectivity between the consumer and services over the Azure backbone network. By mapping private endpoints to your Event Grid topic instead of the entire service, you'll also be protected against data leakage risks. Learn more at: https://aka.ms/privateendpoints.
Audit
Disabled
Event Grid Configure Azure Event Grid domains to disable local authentication
Disable local authentication methods so that your Azure Event Grid domains exclusively require Azure Active Directory identities for authentication. Learn more at: https://aka.ms/aeg-disablelocalauth.
Modify
Disabled
Modify
Disabled
Event Grid Configure Azure Event Grid partner namespaces to disable local authentication
Disable local authentication methods so that your Azure Event Grid partner namespaces exclusively require Azure Active Directory identities for authentication. Learn more at: https://aka.ms/aeg-disablelocalauth.
Modify
Disabled
Modify
Disabled
Event Grid Configure Azure Event Grid topics to disable local authentication
Disable local authentication methods so that your Azure Event Grid topics exclusively require Azure Active Directory identities for authentication. Learn more at: https://aka.ms/aeg-disablelocalauth.
Modify
Disabled
Modify
Disabled
Event Grid Deploy - Configure Azure Event Grid domains to use private DNS zones
Use private DNS zones to override the DNS resolution for a private endpoint. Learn more at: https://aka.ms/privatednszone.
deployIfNotExists
Disabled
Event Grid Deploy - Configure Azure Event Grid topics to use private DNS zones
Use private DNS zones to override the DNS resolution for a private endpoint. Learn more at: https://aka.ms/privatednszone.
deployIfNotExists
Disabled
Event Grid Modify - Configure Azure Event Grid domains to disable public network access
Disable public network access for Azure Event Grid resource so that it isn't accessible over the public internet. This will help protect them against data leakage risks. You can limit exposure of the your resources by creating private endpoints instead. Learn more at: https://aka.ms/privateendpoints.
Modify
Disabled
Modify
Disabled
Event Grid Modify - Configure Azure Event Grid topics to disable public network access
Disable public network access for Azure Event Grid resource so that it isn't accessible over the public internet. This will help protect them against data leakage risks. You can limit exposure of the your resources by creating private endpoints instead. Learn more at: https://aka.ms/privateendpoints.
Modify
Disabled
Modify
Disabled
Event Hub All authorization rules except RootManageSharedAccessKey should be removed from Event Hub namespace
Event Hub clients should not use a namespace level access policy that provides access to all queues and topics in a namespace. To align with the least privilege security model, you should create access policies at the entity level for queues and topics to provide access to only the specific entity
Deny
Disabled
Audit
Deny
Disabled
Audit
Event Hub Azure Event Hub namespaces should have local authentication methods disabled
Disabling local authentication methods improves security by ensuring that Azure Event Hub namespaces exclusively require Microsoft Entra ID identities for authentication. Learn more at: https://aka.ms/disablelocalauth-eh.
Deny
Disabled
Audit
Deny
Disabled
Audit
Event Hub Configure Azure Event Hub namespaces to disable local authentication
Disable local authentication methods so that your Azure Event Hub namespaces exclusively require Microsoft Entra ID identities for authentication. Learn more at: https://aka.ms/disablelocalauth-eh.
Modify
Disabled
Modify
Disabled
Event Hub Configure Event Hub namespaces to use private DNS zones
Use private DNS zones to override the DNS resolution for a private endpoint. A private DNS zone links to your virtual network to resolve to Event Hub namespaces. Learn more at: https://docs.microsoft.com/azure/event-hubs/private-link-service.
DeployIfNotExists
Disabled
Event Hub Event Hub namespaces (Premium) should use a customer-managed key for encryption
Event Hub namespaces (Premium) should use a customer-managed key for encryption.
Deny
Disabled
Audit
Deny
Disabled
Audit
Event Hub Event Hub Namespaces should disable public network access
Azure Event Hub should have public network access disabled. Disabling public network access improves security by ensuring that the resource isn't exposed on the public internet. You can limit exposure of your resources by creating private endpoints instead. Learn more at: https://docs.microsoft.com/azure/event-hubs/private-link-service
Deny
Disabled
Audit
Event Hub Event Hub namespaces should have double encryption enabled
Enabling double encryption helps protect and safeguard your data to meet your organizational security and compliance commitments. When double encryption has been enabled, data in the storage account is encrypted twice, once at the service level and once at the infrastructure level, using two different encryption algorithms and two different keys.
Deny
Disabled
Audit
Deny
Disabled
Audit
Event Hub Event Hub namespaces should use a customer-managed key for encryption
Azure Event Hubs supports the option of encrypting data at rest with either Microsoft-managed keys (default) or customer-managed keys. Choosing to encrypt data using customer-managed keys enables you to assign, rotate, disable, and revoke access to the keys that Event Hub will use to encrypt data in your namespace. Note that Event Hub only supports encryption with customer-managed keys for namespaces in dedicated clusters.
Audit
Disabled
Audit
Disabled
Event Hub Event Hub namespaces should use a valid TLS version
Event Hub namespaces should use a valid TLS version.
Deny
Disabled
Audit
Event Hub Resource logs in Event Hub should be enabled
Audit enabling of resource logs. This enables you to recreate activity trails to use for investigation purposes; when a security incident occurs or when your network is compromised
AuditIfNotExists
Disabled
General Allowed resource types
This policy enables you to specify the resource types that your organization can deploy. Only resource types that support 'tags' and 'location' will be affected by this policy. To restrict all resources please duplicate this policy and change the 'mode' to 'All'.
deny
General Audit usage of custom RBAC roles
Audit built-in roles such as 'Owner, Contributer, Reader' instead of custom RBAC roles, which are error prone. Using custom roles is treated as an exception and requires a rigorous review and threat modeling
Audit
Disabled
General Not allowed resource types
Restrict which resource types can be deployed in your environment. Limiting resource types can reduce the complexity and attack surface of your environment while also helping to manage costs. Compliance results are only shown for non-compliant resources.
Deny
Disabled
Audit
Guest Configuration Add system-assigned managed identity to enable Guest Configuration assignments on virtual machines with no identities
This policy adds a system-assigned managed identity to virtual machines hosted in Azure that are supported by Guest Configuration but do not have any managed identities. A system-assigned managed identity is a prerequisite for all Guest Configuration assignments and must be added to machines before using any Guest Configuration policy definitions. For more information on Guest Configuration, visit https://aka.ms/gcpol.
modify
Guest Configuration Authentication to Linux machines should require SSH keys
Although SSH itself provides an encrypted connection, using passwords with SSH still leaves the VM vulnerable to brute-force attacks. The most secure option for authenticating to an Azure Linux virtual machine over SSH is with a public-private key pair, also known as SSH keys. Learn more: https://docs.microsoft.com/azure/virtual-machines/linux/create-ssh-keys-detailed.
AuditIfNotExists
Disabled
Guest Configuration Deploy the Linux Guest Configuration extension to enable Guest Configuration assignments on Linux VMs
This policy deploys the Linux Guest Configuration extension to Linux virtual machines hosted in Azure that are supported by Guest Configuration. The Linux Guest Configuration extension is a prerequisite for all Linux Guest Configuration assignments and must be deployed to machines before using any Linux Guest Configuration policy definition. For more information on Guest Configuration, visit https://aka.ms/gcpol.
deployIfNotExists
Guest Configuration Deploy the Windows Guest Configuration extension to enable Guest Configuration assignments on Windows VMs
This policy deploys the Windows Guest Configuration extension to Windows virtual machines hosted in Azure that are supported by Guest Configuration. The Windows Guest Configuration extension is a prerequisite for all Windows Guest Configuration assignments and must be deployed to machines before using any Windows Guest Configuration policy definition. For more information on Guest Configuration, visit https://aka.ms/gcpol.
deployIfNotExists
Guest Configuration Linux machines should meet requirements for the Azure compute security baseline
Requires that prerequisites are deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Machines are non-compliant if the machine is not configured correctly for one of the recommendations in the Azure compute security baseline.
AuditIfNotExists
Disabled
Guest Configuration Linux virtual machines should enable Azure Disk Encryption or EncryptionAtHost.
Although a virtual machine's OS and data disks are encrypted-at-rest by default using platform managed keys; resource disks (temp disks), data caches, and data flowing between Compute and Storage resources are not encrypted. Use Azure Disk Encryption or EncryptionAtHost to remediate. Visit https://aka.ms/diskencryptioncomparison to compare encryption offerings. This policy requires two prerequisites to be deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol.
AuditIfNotExists
Disabled
Guest Configuration Windows Defender Exploit Guard should be enabled on your machines
Windows Defender Exploit Guard uses the Azure Policy Guest Configuration agent. Exploit Guard has four components that are designed to lock down devices against a wide variety of attack vectors and block behaviors commonly used in malware attacks while enabling enterprises to balance their security risk and productivity requirements (Windows only).
AuditIfNotExists
Disabled
Guest Configuration Windows machines should be configured to use secure communication protocols
To protect the privacy of information communicated over the Internet, your machines should use the latest version of the industry-standard cryptographic protocol, Transport Layer Security (TLS). TLS secures communications over a network by encrypting a connection between machines.
AuditIfNotExists
Disabled
Guest Configuration Windows machines should meet requirements of the Azure compute security baseline
Requires that prerequisites are deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol. Machines are non-compliant if the machine is not configured correctly for one of the recommendations in the Azure compute security baseline.
AuditIfNotExists
Disabled
Guest Configuration Windows virtual machines should enable Azure Disk Encryption or EncryptionAtHost.
Although a virtual machine's OS and data disks are encrypted-at-rest by default using platform managed keys; resource disks (temp disks), data caches, and data flowing between Compute and Storage resources are not encrypted. Use Azure Disk Encryption or EncryptionAtHost to remediate. Visit https://aka.ms/diskencryptioncomparison to compare encryption offerings. This policy requires two prerequisites to be deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol.
AuditIfNotExists
Disabled
HDInsight Configure Azure HDInsight clusters to use private DNS zones
Use private DNS zones to override the DNS resolution for a private endpoint. A private DNS zone links to your virtual network to resolve to Azure HDInsight clusters. Learn more at: https://aka.ms/hdi.pl.
DeployIfNotExists
Disabled
Hybrid Compute Deploy Hybrid VM CPU Alert
Policy to audit/deploy VM CPU Alert
deployIfNotExists
disabled
Hybrid Compute Deploy Hybrid VM Data Disk Read Latency Alert
Policy to audit/deploy VM dataDiskReadLatency Alert
deployIfNotExists
disabled
Hybrid Compute Deploy Hybrid VM Data Disk Space Alert
Policy to audit/deploy VM data Disk Space Alert
deployIfNotExists
disabled
Hybrid Compute Deploy Hybrid VM Data Disk Write Latency Alert
Policy to audit/deploy VM dataDiskWriteLatency Alert
deployIfNotExists
disabled
Hybrid Compute Deploy Hybrid VM Disconnected Alert
Policy to Deploy Hybrid VM Disconnected Alert
deployIfNotExists
disabled
Hybrid Compute Deploy Hybrid VM HeartBeat Alert
Policy to audit/deploy VM HeartBeat Alert for all VMs in the subscription
deployIfNotExists
disabled
Hybrid Compute Deploy Hybrid VM Memory Alert
Policy to audit/deploy VM Memory Alert
deployIfNotExists
disabled
Hybrid Compute Deploy Hybrid VM Network Read Alert
Policy to audit/deploy VM Nework Read Alert
deployIfNotExists
disabled
Hybrid Compute Deploy Hybrid VM Network Write Alert
Policy to audit/deploy VM Network Out Alert
deployIfNotExists
disabled
Hybrid Compute Deploy Hybrid VM OS Disk Read Latency Alert
Policy to audit/deploy VM OSDiskreadLatency Alert
deployIfNotExists
disabled
Hybrid Compute Deploy Hybrid VM OS Disk Space Alert
Policy to audit/deploy VM OSDiskSpace Alert
deployIfNotExists
disabled
Hybrid Compute Deploy Hybrid VM OS Disk Write Latency Alert
Policy to audit/deploy VM OSDiskwriteLatency Alert
deployIfNotExists
disabled
Internet of Things Configure Azure Device Update for IoT Hub accounts to use private DNS zones
Azure Private DNS provides a reliable, secure DNS service to manage and resolve domain names in a virtual network without the need to add a custom DNS solution. You can use private DNS zones to override the DNS resolution by using your own custom domain names for a private endpoint. This policy deploys a private DNS Zone for Device Updatefor IoT Hub private endpoints.
DeployIfNotExists
Disabled
Internet of Things Configure IoT Hub device provisioning instances to use private DNS zones
Use private DNS zones to override the DNS resolution for a private endpoint. A private DNS zone links to your virtual network to resolve to an IoT Hub device provisioning service instance. Learn more at: https://aka.ms/iotdpsvnet.
DeployIfNotExists
Disabled
Internet of Things Deploy - Configure Azure IoT Hubs to use private DNS zones
Azure Private DNS provides a reliable, secure DNS service to manage and resolve domain names in a virtual network without the need to add a custom DNS solution. You can use private DNS zones to override the DNS resolution by using your own custom domain names for a private endpoint. This policy deploys a private DNS Zone for IoT Hub private endpoints.
deployIfNotExists
Disabled
Internet of Things Deploy - Configure IoT Central to use private DNS zones
Azure Private DNS provides a reliable, secure DNS service to manage and resolve domain names in a virtual network without the need to add a custom DNS solution. You can use private DNS zones to override the DNS resolution by using your own custom domain names for a private endpoint. This policy deploys a private DNS Zone for IoT Central private endpoints.
DeployIfNotExists
Disabled
Internet of Things Resource logs in IoT Hub should be enabled
Audit enabling of resource logs. This enables you to recreate activity trails to use for investigation purposes; when a security incident occurs or when your network is compromised
AuditIfNotExists
Disabled
Key Vault [Preview]: Azure Key Vault Managed HSM keys should have an expiration date
To use this policy in preview, you must first follow these instructions at https://aka.ms/mhsmgovernance. Cryptographic keys should have a defined expiration date and not be permanent. Keys that are valid forever provide a potential attacker with more time to compromise the key. It is a recommended security practice to set expiration dates on cryptographic keys.
Deny
Disabled
Audit
Deny
Disabled
Audit
Key Vault [Preview]: Azure Key Vault Managed HSM Keys should have more than the specified number of days before expiration
To use this policy in preview, you must first follow these instructions at https://aka.ms/mhsmgovernance. If a key is too close to expiration, an organizational delay to rotate the key may result in an outage. Keys should be rotated at a specified number of days prior to expiration to provide sufficient time to react to a failure.
Deny
Disabled
Audit
Deny
Disabled
Audit
Key Vault [Preview]: Azure Key Vault Managed HSM keys using elliptic curve cryptography should have the specified curve names
To use this policy in preview, you must first follow these instructions at https://aka.ms/mhsmgovernance. Keys backed by elliptic curve cryptography can have different curve names. Some applications are only compatible with specific elliptic curve keys. Enforce the types of elliptic curve keys that are allowed to be created in your environment.
Deny
Disabled
Audit
Deny
Disabled
Audit
Key Vault [Preview]: Azure Key Vault Managed HSM keys using RSA cryptography should have a specified minimum key size
To use this policy in preview, you must first follow these instructions at https://aka.ms/mhsmgovernance. Set the minimum allowed key size for use with your key vaults. Use of RSA keys with small key sizes is not a secure practice and doesn't meet many industry certification requirements.
Deny
Disabled
Audit
Deny
Disabled
Audit
Key Vault [Preview]: Azure Key Vault Managed HSM should disable public network access
Disable public network access for your Azure Key Vault Managed HSM so that it's not accessible over the public internet. This can reduce data leakage risks. Learn more at: https://docs.microsoft.com/azure/key-vault/managed-hsm/private-link#allow-trusted-services-to-access-managed-hsm.
Deny
Disabled
Audit
Key Vault [Preview]: Configure Azure Key Vault Managed HSM to disable public network access
Disable public network access for your Azure Key Vault Managed HSM so that it's not accessible over the public internet. This can reduce data leakage risks. Learn more at: https://docs.microsoft.com/azure/key-vault/managed-hsm/private-link#allow-trusted-services-to-access-managed-hsm.
Modify
Disabled
Modify
Disabled
Key Vault Azure Key Vault Managed HSM should have purge protection enabled
Malicious deletion of an Azure Key Vault Managed HSM can lead to permanent data loss. A malicious insider in your organization can potentially delete and purge Azure Key Vault Managed HSM. Purge protection protects you from insider attacks by enforcing a mandatory retention period for soft deleted Azure Key Vault Managed HSM. No one inside your organization or Microsoft will be able to purge your Azure Key Vault Managed HSM during the soft delete retention period.
Deny
Disabled
Audit
Deny
Disabled
Audit
Key Vault Azure Key Vault should disable public network access
Disable public network access for your key vault so that it's not accessible over the public internet. This can reduce data leakage risks. Learn more at: https://aka.ms/akvprivatelink.
Deny
Disabled
Audit
Key Vault Azure Key Vault should have firewall enabled or public network access disabled
Enable the key vault firewall so that the key vault is not accessible by default to any public IPs or disable public network access for your key vault so that it's not accessible over the public internet. Optionally, you can configure specific IP ranges to limit access to those networks. Learn more at: https://docs.microsoft.com/azure/key-vault/general/network-security and https://aka.ms/akvprivatelink
Audit
Deny
Disabled
Audit
Deny
Disabled
Audit
Deny
Disabled
Key Vault Azure Key Vault should use RBAC permission model
Enable RBAC permission model across Key Vaults. Learn more at: https://learn.microsoft.com/en-us/azure/key-vault/general/rbac-migration
Deny
Disabled
Audit
Deny
Disabled
Audit
Audit
Deny
Disabled
Key Vault Azure Key Vaults should use private link
Azure Private Link lets you connect your virtual networks to Azure services without a public IP address at the source or destination. The Private Link platform handles the connectivity between the consumer and services over the Azure backbone network. By mapping private endpoints to key vault, you can reduce data leakage risks. Learn more about private links at: https://aka.ms/akvprivatelink.
Audit
Disabled
Key Vault Certificates should be issued by the specified integrated certificate authority
Manage your organizational compliance requirements by specifying the Azure integrated certificate authorities that can issue certificates in your key vault such as Digicert or GlobalSign.
Deny
deny
disabled
audit
Deny
deny
disabled
audit
Key Vault Certificates should be issued by the specified non-integrated certificate authority
Manage your organizational compliance requirements by specifying one custom or internal certificate authorities that can issue certificates in your key vault.
Disabled
deny
disabled
audit
Disabled
deny
disabled
audit
Key Vault Certificates should have the specified lifetime action triggers
Manage your organizational compliance requirements by specifying whether a certificate lifetime action is triggered at a specific percentage of its lifetime or at a certain number of days prior to its expiration.
Audit
deny
disabled
audit
Audit
deny
disabled
audit
Key Vault Certificates should have the specified maximum validity period
Manage your organizational compliance requirements by specifying the maximum amount of time that a certificate can be valid within your key vault.
Disabled
deny
disabled
audit
Disabled
deny
disabled
audit
disabled
deny
audit
Key Vault Certificates should not expire within the specified number of days
Manage certificates that will expire within a specified number of days to ensure your organization has sufficient time to rotate the certificate prior to expiration.
Deny
deny
disabled
audit
Deny
deny
disabled
audit
Key Vault Certificates should use allowed key types
Manage your organizational compliance requirements by restricting the key types allowed for certificates.
Deny
deny
disabled
audit
Deny
deny
disabled
audit
Key Vault Certificates using elliptic curve cryptography should have allowed curve names
Manage the allowed elliptic curve names for ECC Certificates stored in key vault. More information can be found at https://aka.ms/akvpolicy.
Deny
deny
disabled
audit
Deny
deny
disabled
audit
Key Vault Certificates using RSA cryptography should have the specified minimum key size
Manage your organizational compliance requirements by specifying a minimum key size for RSA certificates stored in your key vault.
Deny
deny
disabled
audit
Deny
deny
disabled
audit
Key Vault Configure Azure Key Vaults to use private DNS zones
Use private DNS zones to override the DNS resolution for a private endpoint. A private DNS zone links to your virtual network to resolve to key vault. Learn more at: https://aka.ms/akvprivatelink.
DeployIfNotExists
Disabled
Key Vault Configure key vaults to enable firewall
Enable the key vault firewall so that the key vault is not accessible by default to any public IPs. You can then configure specific IP ranges to limit access to those networks. Learn more at: https://docs.microsoft.com/azure/key-vault/general/network-security
Modify
Disabled
Modify
Disabled
Key Vault Deploy Activity Log Key Vault Delete Alert
Policy to Deploy Activity Log Key Vault Delete Alert
deployIfNotExists
disabled
deployIfNotExists
disabled
deployIfNotExists
disabled
Key Vault Deploy Activity Log Managed HSMs Delete Alert
Policy to Deploy Activity Log Managed HSMs Delete Alert
deployIfNotExists
disabled
deployIfNotExists
disabled
deployIfNotExists
disabled
Key Vault Deploy Key Vault Availability Alert
Policy to audit/deploy KeyVault Availability Alert
disabled
deployIfNotExists
disabled
deployIfNotExists
disabled
deployIfNotExists
Key Vault Deploy Key Vault Capacity Alert
Policy to audit/deploy KeyVault Capacity Alert
disabled
deployIfNotExists
disabled
deployIfNotExists
disabled
deployIfNotExists
Key Vault Deploy Key Vault Latency Alert
Policy to audit/deploy KeyVault Latency Alert
disabled
deployIfNotExists
disabled
deployIfNotExists
disabled
deployIfNotExists
Key Vault Deploy Key Vault Requests Alert
Policy to audit/deploy KeyVault Requests Alert
disabled
deployIfNotExists
disabled
deployIfNotExists
disabled
deployIfNotExists
Key Vault Deploy Managed HSMs Availability Alert
Policy to audit/deploy Managed HSMs Availability Alert
disabled
deployIfNotExists
disabled
deployIfNotExists
disabled
deployIfNotExists
Key Vault Deploy Managed HSMs Latency Alert
Policy to audit/deploy Managed HSMs Latency Alert
disabled
deployIfNotExists
disabled
deployIfNotExists
disabled
deployIfNotExists
Key Vault Key Vault keys should have an expiration date
Cryptographic keys should have a defined expiration date and not be permanent. Keys that are valid forever provide a potential attacker with more time to compromise the key. It is a recommended security practice to set expiration dates on cryptographic keys.
Audit
Deny
Disabled
Audit
Deny
Disabled
Disabled
Deny
Audit
Key Vault Key Vault secrets should have an expiration date
Secrets should have a defined expiration date and not be permanent. Secrets that are valid forever provide a potential attacker with more time to compromise them. It is a recommended security practice to set expiration dates on secrets.
Audit
Deny
Disabled
Audit
Deny
Disabled
Disabled
Deny
Audit
Key Vault Key vaults should have deletion protection enabled
Malicious deletion of a key vault can lead to permanent data loss. You can prevent permanent data loss by enabling purge protection and soft delete. Purge protection protects you from insider attacks by enforcing a mandatory retention period for soft deleted key vaults. No one inside your organization or Microsoft will be able to purge your key vaults during the soft delete retention period. Keep in mind that key vaults created after September 1st 2019 have soft-delete enabled by default.
Deny
Disabled
Audit
Deny
Disabled
Audit
Audit
Deny
Disabled
Key Vault Key vaults should have soft delete enabled
Deleting a key vault without soft delete enabled permanently deletes all secrets, keys, and certificates stored in the key vault. Accidental deletion of a key vault can lead to permanent data loss. Soft delete allows you to recover an accidentally deleted key vault for a configurable retention period.
Deny
Disabled
Audit
Deny
Disabled
Audit
Audit
Deny
Disabled
Key Vault Keys should be the specified cryptographic type RSA or EC
Some applications require the use of keys backed by a specific cryptographic type. Enforce a particular cryptographic key type, RSA or EC, in your environment.
Deny
Disabled
Audit
Deny
Disabled
Audit
Key Vault Keys should have more than the specified number of days before expiration
If a key is too close to expiration, an organizational delay to rotate the key may result in an outage. Keys should be rotated at a specified number of days prior to expiration to provide sufficient time to react to a failure.
Audit
Deny
Disabled
Audit
Deny
Disabled
Key Vault Keys should have the specified maximum validity period
Manage your organizational compliance requirements by specifying the maximum amount of time in days that a key can be valid within your key vault.
Disabled
Deny
Audit
Disabled
Deny
Audit
Key Vault Keys should not be active for longer than the specified number of days
Specify the number of days that a key should be active. Keys that are used for an extended period of time increase the probability that an attacker could compromise the key. As a good security practice, make sure that your keys have not been active longer than two years.
Disabled
Deny
Audit
Disabled
Deny
Audit
Key Vault Keys using elliptic curve cryptography should have the specified curve names
Keys backed by elliptic curve cryptography can have different curve names. Some applications are only compatible with specific elliptic curve keys. Enforce the types of elliptic curve keys that are allowed to be created in your environment.
Deny
Disabled
Audit
Deny
Disabled
Audit
Key Vault Keys using RSA cryptography should have a specified minimum key size
Set the minimum allowed key size for use with your key vaults. Use of RSA keys with small key sizes is not a secure practice and doesn't meet many industry certification requirements.
Deny
Disabled
Audit
Deny
Disabled
Audit
Key Vault Resource logs in Key Vault should be enabled
Audit enabling of resource logs. This enables you to recreate activity trails to use for investigation purposes when a security incident occurs or when your network is compromised
AuditIfNotExists
Disabled
Key Vault Secrets should have content type set
A content type tag helps identify whether a secret is a password, connection string, etc. Different secrets have different rotation requirements. Content type tag should be set on secrets.
Deny
Disabled
Audit
Deny
Disabled
Audit
Key Vault Secrets should have more than the specified number of days before expiration
If a secret is too close to expiration, an organizational delay to rotate the secret may result in an outage. Secrets should be rotated at a specified number of days prior to expiration to provide sufficient time to react to a failure.
Audit
Deny
Disabled
Audit
Deny
Disabled
Key Vault Secrets should have the specified maximum validity period
Manage your organizational compliance requirements by specifying the maximum amount of time in days that a secret can be valid within your key vault.
Deny
Disabled
Audit
Deny
Disabled
Audit
Key Vault Secrets should not be active for longer than the specified number of days
If your secrets were created with an activation date set in the future, you must ensure that your secrets have not been active for longer than the specified duration.
Disabled
Deny
Audit
Disabled
Deny
Audit
Kubernetes [Preview]: Azure Arc enabled Kubernetes clusters should have Microsoft Defender for Cloud extension installed
Microsoft Defender for Cloud extension for Azure Arc provides threat protection for your Arc enabled Kubernetes clusters. The extension collects data from all nodes in the cluster and sends it to the Azure Defender for Kubernetes backend in the cloud for further analysis. Learn more in https://docs.microsoft.com/azure/defender-for-cloud/defender-for-containers-enable?pivots=defender-for-container-arc.
AuditIfNotExists
Disabled
Kubernetes Azure Arc enabled Kubernetes clusters should have the Azure Policy extension installed
The Azure Policy extension for Azure Arc provides at-scale enforcements and safeguards on your Arc enabled Kubernetes clusters in a centralized, consistent manner. Learn more at https://aka.ms/akspolicydoc.
AuditIfNotExists
Disabled
Kubernetes Azure Kubernetes Clusters should enable Key Management Service (KMS)
Use Key Management Service (KMS) to encrypt secret data at rest in etcd for Kubernetes cluster security. Learn more at: https://aka.ms/aks/kmsetcdencryption.
Audit
Disabled
Audit
Disabled
Kubernetes Azure Kubernetes Clusters should use Azure CNI
Azure CNI is a prerequisite for some Azure Kubernetes Service features, including Azure network policies, Windows node pools and virtual nodes add-on. Learn more at: https://aka.ms/aks-azure-cni
Audit
Disabled
Audit
Disabled
Kubernetes Azure Kubernetes Service clusters should have Defender profile enabled
Microsoft Defender for Containers provides cloud-native Kubernetes security capabilities including environment hardening, workload protection, and run-time protection. When you enable the SecurityProfile.AzureDefender on your Azure Kubernetes Service cluster, an agent is deployed to your cluster to collect security event data. Learn more about Microsoft Defender for Containers in https://docs.microsoft.com/azure/defender-for-cloud/defender-for-containers-introduction?tabs=defender-for-container-arch-aks
Audit
Disabled
Kubernetes Azure Kubernetes Service Clusters should have local authentication methods disabled
Disabling local authentication methods improves security by ensuring that Azure Kubernetes Service Clusters should exclusively require Azure Active Directory identities for authentication. Learn more at: https://aka.ms/aks-disable-local-accounts.
Deny
Disabled
Audit
Deny
Disabled
Audit
Kubernetes Azure Kubernetes Service Private Clusters should be enabled
Enable the private cluster feature for your Azure Kubernetes Service cluster to ensure network traffic between your API server and your node pools remains on the private network only. This is a common requirement in many regulatory and industry compliance standards.
Deny
Disabled
Audit
Deny
Disabled
Audit
Deny
Disabled
Audit
Kubernetes Azure Policy Add-on for Kubernetes service (AKS) should be installed and enabled on your clusters
Azure Policy Add-on for Kubernetes service (AKS) extends Gatekeeper v3, an admission controller webhook for Open Policy Agent (OPA), to apply at-scale enforcements and safeguards on your clusters in a centralized, consistent manner.
Audit
Disabled
Kubernetes Both operating systems and data disks in Azure Kubernetes Service clusters should be encrypted by customer-managed keys
Encrypting OS and data disks using customer-managed keys provides more control and greater flexibility in key management. This is a common requirement in many regulatory and industry compliance standards.
Deny
Disabled
Audit
Deny
Disabled
Audit
Kubernetes Configure Azure Kubernetes Service clusters to enable Defender profile
Microsoft Defender for Containers provides cloud-native Kubernetes security capabilities including environment hardening, workload protection, and run-time protection. When you enable the SecurityProfile.Defender on your Azure Kubernetes Service cluster, an agent is deployed to your cluster to collect security event data. Learn more about Microsoft Defender for Containers: https://docs.microsoft.com/azure/defender-for-cloud/defender-for-containers-introduction?tabs=defender-for-container-arch-aks.
DeployIfNotExists
Disabled
Kubernetes Deploy Azure Policy Add-on to Azure Kubernetes Service clusters
Use Azure Policy Add-on to manage and report on the compliance state of your Azure Kubernetes Service (AKS) clusters. For more information, see https://aka.ms/akspolicydoc.
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
Kubernetes Disable Command Invoke on Azure Kubernetes Service clusters
Disabling command invoke can enhance the security by rejecting invoke-command access to the cluster
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
Kubernetes Ensure cluster containers have readiness or liveness probes configured
This policy enforces that all pods have a readiness and/or liveness probes configured. Probe Types can be any of tcpSocket, httpGet and exec. This policy is generally available for Kubernetes Service (AKS), and preview for Azure Arc enabled Kubernetes. For instructions on using this policy, visit https://aka.ms/kubepolicydoc.
Deny
Disabled
Audit
Deny
Disabled
Audit
Kubernetes Kubernetes cluster containers CPU and memory resource limits should not exceed the specified limits
Enforce container CPU and memory resource limits to prevent resource exhaustion attacks in a Kubernetes cluster. This policy is generally available for Kubernetes Service (AKS), and preview for Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc.
Audit
deny
disabled
audit
Kubernetes Kubernetes cluster containers should not share host process ID or host IPC namespace
Block pod containers from sharing the host process ID namespace and host IPC namespace in a Kubernetes cluster. This recommendation is part of CIS 5.2.2 and CIS 5.2.3 which are intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc.
Deny
deny
disabled
audit
Deny
deny
disabled
audit
Audit
deny
disabled
audit
Kubernetes Kubernetes cluster containers should only use allowed AppArmor profiles
Containers should only use allowed AppArmor profiles in a Kubernetes cluster. This policy is generally available for Kubernetes Service (AKS), and preview for Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc.
Audit
deny
disabled
audit
Kubernetes Kubernetes cluster containers should only use allowed capabilities
Restrict the capabilities to reduce the attack surface of containers in a Kubernetes cluster. This recommendation is part of CIS 5.2.8 and CIS 5.2.9 which are intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc.
Deny
deny
disabled
audit
Deny
deny
disabled
audit
Audit
deny
disabled
audit
Kubernetes Kubernetes cluster containers should only use allowed images
Use images from trusted registries to reduce the Kubernetes cluster's exposure risk to unknown vulnerabilities, security issues and malicious images. For more information, see https://aka.ms/kubepolicydoc.
Audit
deny
disabled
audit
Kubernetes Kubernetes cluster containers should run with a read only root file system
Run containers with a read only root file system to protect from changes at run-time with malicious binaries being added to PATH in a Kubernetes cluster. This policy is generally available for Kubernetes Service (AKS), and preview for Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc.
Audit
deny
disabled
audit
Kubernetes Kubernetes cluster pod hostPath volumes should only use allowed host paths
Limit pod HostPath volume mounts to the allowed host paths in a Kubernetes Cluster. This policy is generally available for Kubernetes Service (AKS), and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc.
Audit
deny
disabled
audit
Kubernetes Kubernetes cluster pods and containers should only run with approved user and group IDs
Control the user, primary group, supplemental group and file system group IDs that pods and containers can use to run in a Kubernetes Cluster. This policy is generally available for Kubernetes Service (AKS), and preview for Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc.
Audit
deny
disabled
audit
Kubernetes Kubernetes cluster pods should only use approved host network and port range
Restrict pod access to the host network and the allowable host port range in a Kubernetes cluster. This recommendation is part of CIS 5.2.4 which is intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc.
Audit
deny
disabled
audit
Kubernetes Kubernetes cluster services should listen only on allowed ports
Restrict services to listen only on allowed ports to secure access to the Kubernetes cluster. This policy is generally available for Kubernetes Service (AKS), and preview for Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc.
Audit
deny
disabled
audit
Kubernetes Kubernetes cluster should not allow privileged containers
Do not allow privileged containers creation in a Kubernetes cluster. This recommendation is part of CIS 5.2.1 which is intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc.
Deny
deny
disabled
audit
Deny
deny
disabled
audit
Audit
deny
disabled
audit
Kubernetes Kubernetes cluster should not use naked pods
Block usage of naked Pods. Naked Pods will not be rescheduled in the event of a node failure. Pods should be managed by Deployment, Replicset, Daemonset or Jobs
Deny
Disabled
Audit
Deny
Disabled
Audit
Kubernetes Kubernetes cluster Windows containers should not run as ContainerAdministrator
Prevent usage of ContainerAdministrator as the user to execute the container processes for Windows pods or containers. This recommendation is intended to improve the security of Windows nodes. For more information, see https://kubernetes.io/docs/concepts/windows/intro/ .
Deny
Disabled
Audit
Deny
Disabled
Audit
Kubernetes Kubernetes clusters should be accessible only over HTTPS
Use of HTTPS ensures authentication and protects data in transit from network layer eavesdropping attacks. This capability is currently generally available for Kubernetes Service (AKS), and in preview for Azure Arc enabled Kubernetes. For more info, visit https://aka.ms/kubepolicydoc
deny
disabled
audit
Audit
deny
disabled
audit
Kubernetes Kubernetes clusters should disable automounting API credentials
Disable automounting API credentials to prevent a potentially compromised Pod resource to run API commands against Kubernetes clusters. For more information, see https://aka.ms/kubepolicydoc.
Audit
deny
disabled
audit
Kubernetes Kubernetes clusters should not allow container privilege escalation
Do not allow containers to run with privilege escalation to root in a Kubernetes cluster. This recommendation is part of CIS 5.2.5 which is intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc.
Deny
deny
disabled
audit
Deny
deny
disabled
audit
Audit
deny
disabled
audit
Kubernetes Kubernetes clusters should not grant CAP_SYS_ADMIN security capabilities
To reduce the attack surface of your containers, restrict CAP_SYS_ADMIN Linux capabilities. For more information, see https://aka.ms/kubepolicydoc.
Audit
deny
disabled
audit
Kubernetes Kubernetes clusters should not use the default namespace
Prevent usage of the default namespace in Kubernetes clusters to protect against unauthorized access for ConfigMap, Pod, Secret, Service, and ServiceAccount resource types. For more information, see https://aka.ms/kubepolicydoc.
Deny
deny
disabled
audit
Deny
deny
disabled
audit
Audit
deny
disabled
audit
Kubernetes Kubernetes clusters should use internal load balancers
Use internal load balancers to make a Kubernetes service accessible only to applications running in the same virtual network as the Kubernetes cluster. For more information, see https://aka.ms/kubepolicydoc.
Deny
deny
disabled
audit
Deny
deny
disabled
audit
Kubernetes Resource logs in Azure Kubernetes Service should be enabled
Azure Kubernetes Service's resource logs can help recreate activity trails when investigating security incidents. Enable it to make sure the logs will exist when needed
AuditIfNotExists
Disabled
Kubernetes Temp disks and cache for agent node pools in Azure Kubernetes Service clusters should be encrypted at host
To enhance data security, the data stored on the virtual machine (VM) host of your Azure Kubernetes Service nodes VMs should be encrypted at rest. This is a common requirement in many regulatory and industry compliance standards.
Deny
Disabled
Audit
Deny
Disabled
Audit
Logic Apps Configure Logic apps to use the latest TLS version
Periodically, newer versions are released for TLS either due to security flaws, include additional functionality, and enhance speed. Upgrade to the latest TLS version for Function apps to take advantage of security fixes, if any, and/or new functionalities of the latest version.
DeployIfNotExists
Disabled
Logic Apps Logic app should only be accessible over HTTPS
Use of HTTPS ensures server/service authentication and protects data in transit from network layer eavesdropping attacks.
Deny
Disabled
Audit
Logic Apps Logic apps should disable public network access
Disabling public network access improves security by ensuring that the Logic App is not exposed on the public internet. Creating private endpoints can limit exposure of a Logic App. Learn more at: https://aka.ms/app-service-private-endpoint.
Deny
Disabled
Audit
Logic Apps Resource logs in Logic Apps should be enabled
Audit enabling of resource logs. This enables you to recreate activity trails to use for investigation purposes; when a security incident occurs or when your network is compromised
AuditIfNotExists
Disabled
Machine Learning [Preview]: Azure Machine Learning Model Registry Deployments are restricted except for the allowed Registry
Only deploy Registry Models in the allowed Registry and that are not restricted.
Deny
Disabled
Deny
Disabled
Machine Learning [Preview]: Configure allowed module authors for specified Azure Machine Learning computes
Provide allowed module authors in specified Azure Machine Learning computes and can be assigned at the workspace. For more information, visit https://aka.ms/amlpolicydoc.
enforceSetting
disabled
enforceSetting
disabled
Machine Learning [Preview]: Configure allowed Python packages for specified Azure Machine Learning computes
Provide allowed Python packages in specified Azure Machine Learning computes and can be assigned at the workspace. For more information, visit https://aka.ms/amlpolicydoc.
enforceSetting
disabled
enforceSetting
disabled
Machine Learning [Preview]: Configure allowed registries for specified Azure Machine Learning computes
Provide registries that are allowed in specified Azure Machine Learning computes and can be assigned at the workspace. For more information, visit https://aka.ms/amlpolicydoc.
enforceSetting
disabled
enforceSetting
disabled
Machine Learning Azure Machine Learning Compute Instance should have idle shutdown.
Having an idle shutdown schedule reduces cost by shutting down computes that are idle after a pre-determined period of activity.
Deny
Disabled
Audit
Deny
Disabled
Audit
Machine Learning Azure Machine Learning compute instances should be recreated to get the latest software updates
Ensure Azure Machine Learning compute instances run on the latest available operating system. Security is improved and vulnerabilities reduced by running with the latest security patches. For more information, visit https://aka.ms/azureml-ci-updates/.
Audit
Disabled
Audit
Disabled
Audit
Disabled
Machine Learning Azure Machine Learning Computes should be in a virtual network
Azure Virtual Networks provide enhanced security and isolation for your Azure Machine Learning Compute Clusters and Instances, as well as subnets, access control policies, and other features to further restrict access. When a compute is configured with a virtual network, it is not publicly addressable and can only be accessed from virtual machines and applications within the virtual network.
Audit
Disabled
Audit
Disabled
Audit
Disabled
Machine Learning Azure Machine Learning Computes should have local authentication methods disabled
Disabling local authentication methods improves security by ensuring that Machine Learning Computes require Azure Active Directory identities exclusively for authentication. Learn more at: https://aka.ms/azure-ml-aad-policy.
Deny
Disabled
Audit
Deny
Disabled
Audit
Audit
Deny
Disabled
Machine Learning Azure Machine Learning workspaces should be encrypted with a customer-managed key
Manage encryption at rest of Azure Machine Learning workspace data with customer-managed keys. By default, customer data is encrypted with service-managed keys, but customer-managed keys are commonly required to meet regulatory compliance standards. Customer-managed keys enable the data to be encrypted with an Azure Key Vault key created and owned by you. You have full control and responsibility for the key lifecycle, including rotation and management. Learn more at https://aka.ms/azureml-workspaces-cmk.
Deny
Disabled
Audit
Deny
Disabled
Audit
Disabled
Deny
Audit
Machine Learning Azure Machine Learning Workspaces should disable public network access
Disabling public network access improves security by ensuring that the Machine Learning Workspaces aren't exposed on the public internet. You can control exposure of your workspaces by creating private endpoints instead. Learn more at: https://learn.microsoft.com/azure/machine-learning/how-to-configure-private-link?view=azureml-api-2&tabs=azure-portal.
Audit
Deny
Disabled
Deny
Disabled
Audit
Machine Learning Azure Machine Learning workspaces should enable V1LegacyMode to support network isolation backward compatibility
Azure ML is making a transition to a new V2 API platform on Azure Resource Manager and you can control API platform version using V1LegacyMode parameter. Enabling the V1LegacyMode parameter will enable you to keep your workspaces in the same network isolation as V1, though you won't have use of the new V2 features. We recommend turning on V1 Legacy Mode only when you want to keep the AzureML control plane data inside your private networks. Learn more at: https://aka.ms/V1LegacyMode.
Deny
Disabled
Audit
Deny
Disabled
Audit
Machine Learning Azure Machine Learning workspaces should use private link
Azure Private Link lets you connect your virtual network to Azure services without a public IP address at the source or destination. The Private Link platform handles the connectivity between the consumer and services over the Azure backbone network. By mapping private endpoints to Azure Machine Learning workspaces, data leakage risks are reduced. Learn more about private links at: https://docs.microsoft.com/azure/machine-learning/how-to-configure-private-link.
Audit
Disabled
Audit
Disabled
Audit
Disabled
Machine Learning Azure Machine Learning workspaces should use user-assigned managed identity
Manange access to Azure ML workspace and associated resources, Azure Container Registry, KeyVault, Storage, and App Insights using user-assigned managed identity. By default, system-assigned managed identity is used by Azure ML workspace to access the associated resources. User-assigned managed identity allows you to create the identity as an Azure resource and maintain the life cycle of that identity. Learn more at https://docs.microsoft.com/azure/machine-learning/how-to-use-managed-identities?tabs=python.
Deny
Disabled
Audit
Deny
Disabled
Audit
Machine Learning Configure Azure Machine Learning Computes to disable local authentication methods
Disable location authentication methods so that your Machine Learning Computes require Azure Active Directory identities exclusively for authentication. Learn more at: https://aka.ms/azure-ml-aad-policy.
Modify
Disabled
Modify
Disabled
Machine Learning Configure Azure Machine Learning workspace to use private DNS zones
Use private DNS zones to override the DNS resolution for a private endpoint. A private DNS zone links to your virtual network to resolve to Azure Machine Learning workspaces. Learn more at: https://docs.microsoft.com/azure/machine-learning/how-to-network-security-overview.
DeployIfNotExists
Disabled
Machine Learning Configure Azure Machine Learning Workspaces to disable public network access
Disable public network access for Azure Machine Learning Workspaces so that your workspaces aren't accessible over the public internet. This helps protect the workspaces against data leakage risks. You can control exposure of your workspaces by creating private endpoints instead. Learn more at: https://learn.microsoft.com/azure/machine-learning/how-to-configure-private-link?view=azureml-api-2&tabs=azure-portal.
Modify
Disabled
Modify
Disabled
Machine Learning Resource logs in Azure Machine Learning Workspaces should be enabled
Resource logs enable recreating activity trails to use for investigation purposes when a security incident occurs or when your network is compromised.
AuditIfNotExists
Disabled
AuditIfNotExists
Disabled
AuditIfNotExists
Disabled
Managed Grafana Azure Managed Grafana workspaces should disable public network access
Disabling public network access improves security by ensuring that your Azure Managed Grafana workspace isn't exposed on the public internet. Creating private endpoints can limit exposure of your workspaces.
Deny
Disabled
Audit
Managed Grafana Configure Azure Managed Grafana workspaces to use private DNS zones
Use private DNS zones to override the DNS resolution for a private endpoint. A private DNS zone links to your virtual network to resolve to Azure Managed Grafana workspaces.
DeployIfNotExists
Disabled
Managed Identity [Preview]: Assign Built-In User-Assigned Managed Identity to Virtual Machine Scale Sets
Create and assign a built-in user-assigned managed identity or assign a pre-created user-assigned managed identity at scale to virtual machine scale sets. For more detailed documentation, visit aka.ms/managedidentitypolicy.
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
Managed Identity [Preview]: Assign Built-In User-Assigned Managed Identity to Virtual Machines
Create and assign a built-in user-assigned managed identity or assign a pre-created user-assigned managed identity at scale to virtual machines. For more detailed documentation, visit aka.ms/managedidentitypolicy.
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
Media Services Configure Azure Media Services to use private DNS zones
Use private DNS zones to override the DNS resolution for a private endpoint. A private DNS zone links to your virtual network to resolve to Media Services account. Learn more at: https://aka.ms/mediaservicesprivatelinkdocs.
DeployIfNotExists
Disabled
Media Services Configure Azure Media Services to use private DNS zones
Use private DNS zones to override the DNS resolution for a private endpoint. A private DNS zone links to your virtual network to resolve to Media Services account. Learn more at: https://aka.ms/mediaservicesprivatelinkdocs.
DeployIfNotExists
Disabled
Media Services Configure Azure Media Services to use private DNS zones
Use private DNS zones to override the DNS resolution for a private endpoint. A private DNS zone links to your virtual network to resolve to Media Services account. Learn more at: https://aka.ms/mediaservicesprivatelinkdocs.
DeployIfNotExists
Disabled
Migrate Configure Azure Migrate resources to use private DNS zones
Use private DNS zones to override the DNS resolution for a private endpoint. A private DNS zone links to your virtual network to resolve to your Azure Migrate project. Learn more at: https://aka.ms/privatednszone.
DeployIfNotExists
Disabled
Monitoring [Preview]: Log Analytics extension should be installed on your Linux Azure Arc machines
This policy audits Linux Azure Arc machines if the Log Analytics extension is not installed.
AuditIfNotExists
Disabled
Monitoring [Preview]: Log Analytics extension should be installed on your Windows Azure Arc machines
This policy audits Windows Azure Arc machines if the Log Analytics extension is not installed.
Disabled
AuditIfNotExists
Monitoring [Preview]: Network traffic data collection agent should be installed on Linux virtual machines
Security Center uses the Microsoft Dependency agent to collect network traffic data from your Azure virtual machines to enable advanced network protection features such as traffic visualization on the network map, network hardening recommendations and specific network threats.
AuditIfNotExists
Disabled
Monitoring [Preview]: Network traffic data collection agent should be installed on Windows virtual machines
Security Center uses the Microsoft Dependency agent to collect network traffic data from your Azure virtual machines to enable advanced network protection features such as traffic visualization on the network map, network hardening recommendations and specific network threats.
AuditIfNotExists
Disabled
Monitoring Configure Azure Monitor Private Link Scope to use private DNS zones
Use private DNS zones to override the DNS resolution for a private endpoint. A private DNS zone links to your virtual network to resolve to Azure Monitor private link scope. Learn more at: https://docs.microsoft.com/azure/azure-monitor/logs/private-link-security#connect-to-a-private-endpoint.
DeployIfNotExists
Disabled
Monitoring Configure Dependency agent on Azure Arc enabled Linux servers with Azure Monitoring Agent settings
Enable VM insights on servers and machines connected to Azure through Arc enabled servers by installing the Dependency agent virtual machine extension with Azure Monitoring Agent settings. VM insights uses the Dependency agent to collect network metrics and discovered data about processes running on the machine and external process dependencies. See more - https://aka.ms/vminsightsdocs.
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
Monitoring Configure Dependency agent on Azure Arc enabled Windows servers with Azure Monitoring Agent settings
Enable VM insights on servers and machines connected to Azure through Arc enabled servers by installing the Dependency agent virtual machine extension with Azure Monitoring Agent settings. VM insights uses the Dependency agent to collect network metrics and discovered data about processes running on the machine and external process dependencies. See more - https://aka.ms/vminsightsdocs.
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
Monitoring Configure Linux Arc-enabled machines to run Azure Monitor Agent
Automate the deployment of Azure Monitor Agent extension on your Linux Arc-enabled machines for collecting telemetry data from the guest OS. This policy will install the extension if the region is supported. Learn more: https://aka.ms/AMAOverview.
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
Monitoring Configure Linux Machines to be associated with a Data Collection Rule or a Data Collection Endpoint
Deploy Association to link Linux virtual machines, virtual machine scale sets, and Arc machines to the specified Data Collection Rule or the specified Data Collection Endpoint. The list of locations and OS images are updated over time as support is increased.
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
Monitoring Configure Linux virtual machine scale sets to run Azure Monitor Agent with user-assigned managed identity-based authentication
Automate the deployment of Azure Monitor Agent extension on your Linux virtual machine scale sets for collecting telemetry data from the guest OS. This policy will install the extension and configure it to use the specified user-assigned managed identity if the OS and region are supported, and skip install otherwise. Learn more: https://aka.ms/AMAOverview.
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
Monitoring Configure Linux virtual machines to run Azure Monitor Agent with user-assigned managed identity-based authentication
Automate the deployment of Azure Monitor Agent extension on your Linux virtual machines for collecting telemetry data from the guest OS. This policy will install the extension and configure it to use the specified user-assigned managed identity if the OS and region are supported, and skip install otherwise. Learn more: https://aka.ms/AMAOverview.
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
Monitoring Configure Windows Arc-enabled machines to run Azure Monitor Agent
Automate the deployment of Azure Monitor Agent extension on your Windows Arc-enabled machines for collecting telemetry data from the guest OS. This policy will install the extension if the OS and region are supported and system-assigned managed identity is enabled, and skip install otherwise. Learn more: https://aka.ms/AMAOverview.
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
Monitoring Configure Windows Machines to be associated with a Data Collection Rule or a Data Collection Endpoint
Deploy Association to link Windows virtual machines, virtual machine scale sets, and Arc machines to the specified Data Collection Rule or the specified Data Collection Endpoint. The list of locations and OS images are updated over time as support is increased.
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
Monitoring Configure Windows virtual machine scale sets to run Azure Monitor Agent with user-assigned managed identity-based authentication
Automate the deployment of Azure Monitor Agent extension on your Windows virtual machine scale sets for collecting telemetry data from the guest OS. This policy will install the extension and configure it to use the specified user-assigned managed identity if the OS and region are supported, and skip install otherwise. Learn more: https://aka.ms/AMAOverview.
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
Monitoring Configure Windows virtual machines to run Azure Monitor Agent with user-assigned managed identity-based authentication
Automate the deployment of Azure Monitor Agent extension on your Windows virtual machines for collecting telemetry data from the guest OS. This policy will install the extension and configure it to use the specified user-assigned managed identity if the OS and region are supported, and skip install otherwise. Learn more: https://aka.ms/AMAOverview.
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
Monitoring Deploy Activity Log LA Workspace Delete Alert
Policy to Deploy Activity Log LA Workspace Delete Alert
deployIfNotExists
disabled
Monitoring Deploy Activity Log LA Workspace Regenerate Key Alert
Policy to Deploy Activity Log LA Workspace Regenerate Key Alert
deployIfNotExists
disabled
Monitoring Deploy Activity Log Storage Account Delete Alert
Policy to Deploy Activity Log Storage Account Delete Alert
deployIfNotExists
disabled
deployIfNotExists
disabled
deployIfNotExists
disabled
Monitoring Deploy AMBA Notification Assets
Policy to deploy Action Group and Alert Processing Rule for all AMBA alerts
deployIfNotExists
Monitoring Deploy AMBA Notification Suppression Asset
Policy to deploy empty and disabled suppression Alert Processing Rule for all AMBA alerts
deployIfNotExists
Monitoring Deploy Dependency agent for Linux virtual machine scale sets with Azure Monitoring Agent settings
Deploy Dependency agent for Linux virtual machine scale sets with Azure Monitoring Agent settings if the VM Image (OS) is in the list defined and the agent is not installed. Note: if your scale set upgradePolicy is set to Manual, you need to apply the extension to the all virtual machines in the set by calling upgrade on them. In CLI this would be az vmss update-instances.
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
Monitoring Deploy Dependency agent for Linux virtual machines with Azure Monitoring Agent settings
Deploy Dependency agent for Linux virtual machines with Azure Monitoring Agent settings if the VM Image (OS) is in the list defined and the agent is not installed.
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
Monitoring Deploy Dependency agent to be enabled on Windows virtual machine scale sets with Azure Monitoring Agent settings
Deploy Dependency agent for Windows virtual machine scale sets with Azure Monitoring Agent settings if the virtual machine image is in the list defined and the agent is not installed. If your scale set upgradePolicy is set to Manual, you need to apply the extension to all the virtual machines in the set by updating them.
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
Monitoring Deploy Dependency agent to be enabled on Windows virtual machines with Azure Monitoring Agent settings
Deploy Dependency agent for Windows virtual machines with Azure Monitoring Agent settings if the virtual machine image is in the list defined and the agent is not installed.
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
Monitoring Deploy LA Workspace Daily Cap Limit Reached Alert
Policy to audit/deploy LA Workspace Daily Cap Limit Reached Alert
deployIfNotExists
disabled
Monitoring Deploy Resource Health Unhealthy Alert
Policy to Deploy Resource Health Unhealthy Alert
deployIfNotExists
disabled
Monitoring Deploy Service Health Action Group
Policy to deploy action group for Service Health alerts
deployIfNotExists
Monitoring Deploy Service Health Advisory Alert
Policy to Deploy Service Health Advisory Alert
deployIfNotExists
disabled
Monitoring Deploy Service Health Incident Alert
Policy to Deploy Service Health Incident Alert
deployIfNotExists
disabled
Monitoring Deploy Service Health Maintenance Alert
Policy to Deploy Service Health Maintenance Alert
deployIfNotExists
disabled
Monitoring Deploy Service Health Security Advisory Alert
Policy to Deploy Service Health Security Advisory Alert
deployIfNotExists
disabled
Monitoring Enable logging by category group for 1ES Hosted Pools (microsoft.cloudtest/hostedpools) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for 1ES Hosted Pools (microsoft.cloudtest/hostedpools).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Analysis Services (microsoft.analysisservices/servers) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Analysis Services (microsoft.analysisservices/servers).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Apache Spark pools (microsoft.synapse/workspaces/bigdatapools) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Apache Spark pools (microsoft.synapse/workspaces/bigdatapools).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for API Management services (microsoft.apimanagement/service) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for API Management services (microsoft.apimanagement/service).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for App Configuration (microsoft.appconfiguration/configurationstores) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for App Configuration (microsoft.appconfiguration/configurationstores).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for App Service Environments (microsoft.web/hostingenvironments) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for App Service Environments (microsoft.web/hostingenvironments).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Application gateways (microsoft.network/applicationgateways) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Application gateways (microsoft.network/applicationgateways).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Application groups (microsoft.desktopvirtualization/applicationgroups) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Application groups (microsoft.desktopvirtualization/applicationgroups).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Application Insights (microsoft.insights/components) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Application Insights (microsoft.insights/components).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Attestation providers (microsoft.attestation/attestationproviders) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Attestation providers (microsoft.attestation/attestationproviders).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Automation Accounts (microsoft.automation/automationaccounts) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Automation Accounts (microsoft.automation/automationaccounts).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for AVS Private clouds (microsoft.avs/privateclouds) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for AVS Private clouds (microsoft.avs/privateclouds).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Azure AD Domain Services (microsoft.aad/domainservices) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Azure AD Domain Services (microsoft.aad/domainservices).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Azure API for FHIR (microsoft.healthcareapis/services) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Azure API for FHIR (microsoft.healthcareapis/services).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Azure Cache for Redis (microsoft.cache/redis) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Azure Cache for Redis (microsoft.cache/redis).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Azure Cosmos DB accounts (microsoft.documentdb/databaseaccounts) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Azure Cosmos DB accounts (microsoft.documentdb/databaseaccounts).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Azure Data Explorer Clusters (microsoft.kusto/clusters) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Azure Data Explorer Clusters (microsoft.kusto/clusters).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Azure Database for MariaDB servers (microsoft.dbformariadb/servers) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Azure Database for MariaDB servers (microsoft.dbformariadb/servers).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Azure Database for MySQL servers (microsoft.dbformysql/servers) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Azure Database for MySQL servers (microsoft.dbformysql/servers).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Azure Databricks Services (microsoft.databricks/workspaces) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Azure Databricks Services (microsoft.databricks/workspaces).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Azure Digital Twins (microsoft.digitaltwins/digitaltwinsinstances) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Azure Digital Twins (microsoft.digitaltwins/digitaltwinsinstances).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Azure FarmBeats (microsoft.agfoodplatform/farmbeats) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Azure FarmBeats (microsoft.agfoodplatform/farmbeats).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Azure Load Testing (microsoft.loadtestservice/loadtests) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Azure Load Testing (microsoft.loadtestservice/loadtests).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Azure Machine Learning (microsoft.machinelearningservices/workspaces) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Azure Machine Learning (microsoft.machinelearningservices/workspaces).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Azure Managed Grafana (microsoft.dashboard/grafana) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Azure Managed Grafana (microsoft.dashboard/grafana).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Azure Spring Apps (microsoft.appplatform/spring) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Azure Spring Apps (microsoft.appplatform/spring).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Azure Synapse Analytics (microsoft.synapse/workspaces) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Azure Synapse Analytics (microsoft.synapse/workspaces).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Azure Video Indexer (microsoft.videoindexer/accounts) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Azure Video Indexer (microsoft.videoindexer/accounts).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Backup vaults (microsoft.dataprotection/backupvaults) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Backup vaults (microsoft.dataprotection/backupvaults).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Bastions (microsoft.network/bastionhosts) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Bastions (microsoft.network/bastionhosts).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Batch accounts (microsoft.batch/batchaccounts) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Batch accounts (microsoft.batch/batchaccounts).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Bot Services (microsoft.botservice/botservices) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Bot Services (microsoft.botservice/botservices).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Caches (microsoft.cache/redisenterprise/databases) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Caches (microsoft.cache/redisenterprise/databases).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Chaos Experiments (microsoft.chaos/experiments) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Chaos Experiments (microsoft.chaos/experiments).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Code Signing Accounts (microsoft.codesigning/codesigningaccounts) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Code Signing Accounts (microsoft.codesigning/codesigningaccounts).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Cognitive Services (microsoft.cognitiveservices/accounts) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Cognitive Services (microsoft.cognitiveservices/accounts).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Communication Services (microsoft.communication/communicationservices) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Communication Services (microsoft.communication/communicationservices).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Connected Cache Resources (microsoft.connectedcache/ispcustomers) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Connected Cache Resources (microsoft.connectedcache/ispcustomers).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Container Apps Environments (microsoft.app/managedenvironments) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Container Apps Environments (microsoft.app/managedenvironments).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Container instances (microsoft.containerinstance/containergroups) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Container instances (microsoft.containerinstance/containergroups).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Container registries (microsoft.containerregistry/registries) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Container registries (microsoft.containerregistry/registries).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Data collection rules (microsoft.insights/datacollectionrules) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Data collection rules (microsoft.insights/datacollectionrules).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Data factories (V2) (microsoft.datafactory/factories) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Data factories (V2) (microsoft.datafactory/factories).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Data Lake Analytics (microsoft.datalakeanalytics/accounts) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Data Lake Analytics (microsoft.datalakeanalytics/accounts).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Data Lake Storage Gen1 (microsoft.datalakestore/accounts) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Data Lake Storage Gen1 (microsoft.datalakestore/accounts).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Data Shares (microsoft.datashare/accounts) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Data Shares (microsoft.datashare/accounts).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Dedicated SQL pools (microsoft.synapse/workspaces/sqlpools) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Dedicated SQL pools (microsoft.synapse/workspaces/sqlpools).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Dev centers (microsoft.devcenter/devcenters) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Dev centers (microsoft.devcenter/devcenters).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for DICOM service (microsoft.healthcareapis/workspaces/dicomservices) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for DICOM service (microsoft.healthcareapis/workspaces/dicomservices).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Endpoints (microsoft.cdn/profiles/endpoints) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Endpoints (microsoft.cdn/profiles/endpoints).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Event Grid Domains (microsoft.eventgrid/domains) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Event Grid Domains (microsoft.eventgrid/domains).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Event Grid Partner Namespaces (microsoft.eventgrid/partnernamespaces) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Event Grid Partner Namespaces (microsoft.eventgrid/partnernamespaces).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Event Grid Partner Topics (microsoft.eventgrid/partnertopics) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Event Grid Partner Topics (microsoft.eventgrid/partnertopics).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Event Grid System Topics (microsoft.eventgrid/systemtopics) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Event Grid System Topics (microsoft.eventgrid/systemtopics).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Event Grid Topics (microsoft.eventgrid/topics) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Event Grid Topics (microsoft.eventgrid/topics).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Event Hubs Namespaces (microsoft.eventhub/namespaces) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Event Hubs Namespaces (microsoft.eventhub/namespaces).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Experiment Workspaces (microsoft.experimentation/experimentworkspaces) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Experiment Workspaces (microsoft.experimentation/experimentworkspaces).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for ExpressRoute circuits (microsoft.network/expressroutecircuits) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for ExpressRoute circuits (microsoft.network/expressroutecircuits).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for FHIR service (microsoft.healthcareapis/workspaces/fhirservices) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for FHIR service (microsoft.healthcareapis/workspaces/fhirservices).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Firewalls (microsoft.network/azurefirewalls) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Firewalls (microsoft.network/azurefirewalls).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Front Door and CDN profiles (microsoft.cdn/profiles) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Front Door and CDN profiles (microsoft.cdn/profiles).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Front Door and CDN profiles (microsoft.network/frontdoors) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Front Door and CDN profiles (microsoft.network/frontdoors).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Host pools (microsoft.desktopvirtualization/hostpools) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Host pools (microsoft.desktopvirtualization/hostpools).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for HPC caches (microsoft.storagecache/caches) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for HPC caches (microsoft.storagecache/caches).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Integration accounts (microsoft.logic/integrationaccounts) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Integration accounts (microsoft.logic/integrationaccounts).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for IoT Hub (microsoft.devices/iothubs) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for IoT Hub (microsoft.devices/iothubs).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Key vaults (microsoft.keyvault/vaults) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Key vaults (microsoft.keyvault/vaults).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Live events (microsoft.media/mediaservices/liveevents) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Live events (microsoft.media/mediaservices/liveevents).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Load balancers (microsoft.network/loadbalancers) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Load balancers (microsoft.network/loadbalancers).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Log Analytics workspaces (microsoft.operationalinsights/workspaces) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Log Analytics workspaces (microsoft.operationalinsights/workspaces).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Logic apps (microsoft.logic/workflows) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Logic apps (microsoft.logic/workflows).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Managed CCF Apps (microsoft.confidentialledger/managedccfs) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Managed CCF Apps (microsoft.confidentialledger/managedccfs).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Managed databases (microsoft.sql/managedinstances/databases) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Managed databases (microsoft.sql/managedinstances/databases).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Managed HSMs (microsoft.keyvault/managedhsms) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Managed HSMs (microsoft.keyvault/managedhsms).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Media Services (microsoft.media/mediaservices) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Media Services (microsoft.media/mediaservices).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for MedTech service (microsoft.healthcareapis/workspaces/iotconnectors) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for MedTech service (microsoft.healthcareapis/workspaces/iotconnectors).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Microsoft Purview accounts (microsoft.purview/accounts) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Microsoft Purview accounts (microsoft.purview/accounts).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for microsoft.autonomousdevelopmentplatform/workspaces to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for microsoft.autonomousdevelopmentplatform/workspaces.
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for microsoft.azuresphere/catalogs to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for microsoft.azuresphere/catalogs.
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for microsoft.cdn/cdnwebapplicationfirewallpolicies to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for microsoft.cdn/cdnwebapplicationfirewallpolicies.
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for microsoft.classicnetwork/networksecuritygroups to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for microsoft.classicnetwork/networksecuritygroups.
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for microsoft.community/communitytrainings to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for microsoft.community/communitytrainings.
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for microsoft.connectedcache/enterprisemcccustomers to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for microsoft.connectedcache/enterprisemcccustomers.
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for microsoft.customproviders/resourceproviders to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for microsoft.customproviders/resourceproviders.
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for microsoft.d365customerinsights/instances to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for microsoft.d365customerinsights/instances.
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for microsoft.dbformysql/flexibleservers to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for microsoft.dbformysql/flexibleservers.
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for microsoft.dbforpostgresql/flexibleservers to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for microsoft.dbforpostgresql/flexibleservers.
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for microsoft.dbforpostgresql/servergroupsv2 to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for microsoft.dbforpostgresql/servergroupsv2.
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for microsoft.dbforpostgresql/servers to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for microsoft.dbforpostgresql/servers.
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for microsoft.devices/provisioningservices to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for microsoft.devices/provisioningservices.
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for microsoft.documentdb/cassandraclusters to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for microsoft.documentdb/cassandraclusters.
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for microsoft.documentdb/mongoclusters to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for microsoft.documentdb/mongoclusters.
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for microsoft.insights/autoscalesettings to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for microsoft.insights/autoscalesettings.
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for microsoft.machinelearningservices/registries to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for microsoft.machinelearningservices/registries.
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for microsoft.machinelearningservices/workspaces/onlineendpoints to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for microsoft.machinelearningservices/workspaces/onlineendpoints.
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for microsoft.managednetworkfabric/networkdevices to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for microsoft.managednetworkfabric/networkdevices.
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for microsoft.network/dnsresolverpolicies to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for microsoft.network/dnsresolverpolicies.
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for microsoft.network/networkmanagers/ipampools to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for microsoft.network/networkmanagers/ipampools.
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for microsoft.network/networksecurityperimeters to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for microsoft.network/networksecurityperimeters.
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for microsoft.network/p2svpngateways to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for microsoft.network/p2svpngateways.
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for microsoft.network/vpngateways to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for microsoft.network/vpngateways.
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for microsoft.networkanalytics/dataproducts to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for microsoft.networkanalytics/dataproducts.
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for microsoft.networkcloud/baremetalmachines to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for microsoft.networkcloud/baremetalmachines.
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for microsoft.networkcloud/clusters to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for microsoft.networkcloud/clusters.
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for microsoft.networkcloud/storageappliances to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for microsoft.networkcloud/storageappliances.
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for microsoft.networkfunction/azuretrafficcollectors to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for microsoft.networkfunction/azuretrafficcollectors.
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for microsoft.notificationhubs/namespaces/notificationhubs to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for microsoft.notificationhubs/namespaces/notificationhubs.
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for microsoft.openenergyplatform/energyservices to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for microsoft.openenergyplatform/energyservices.
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for microsoft.powerbi/tenants/workspaces to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for microsoft.powerbi/tenants/workspaces.
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for microsoft.servicenetworking/trafficcontrollers to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for microsoft.servicenetworking/trafficcontrollers.
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for microsoft.synapse/workspaces/kustopools to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for microsoft.synapse/workspaces/kustopools.
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for microsoft.timeseriesinsights/environments to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for microsoft.timeseriesinsights/environments.
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for microsoft.timeseriesinsights/environments/eventsources to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for microsoft.timeseriesinsights/environments/eventsources.
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for microsoft.workloads/sapvirtualinstances to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for microsoft.workloads/sapvirtualinstances.
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Network Managers (microsoft.network/networkmanagers) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Network Managers (microsoft.network/networkmanagers).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Network security groups (microsoft.network/networksecuritygroups) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Network security groups (microsoft.network/networksecuritygroups).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Notification Hub Namespaces (microsoft.notificationhubs/namespaces) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Notification Hub Namespaces (microsoft.notificationhubs/namespaces).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Playwright Testing (microsoft.azureplaywrightservice/accounts) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Playwright Testing (microsoft.azureplaywrightservice/accounts).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Power BI Embedded (microsoft.powerbidedicated/capacities) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Power BI Embedded (microsoft.powerbidedicated/capacities).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Public IP addresses (microsoft.network/publicipaddresses) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Public IP addresses (microsoft.network/publicipaddresses).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Public IP Prefixes (microsoft.network/publicipprefixes) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Public IP Prefixes (microsoft.network/publicipprefixes).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Recovery Services vaults (microsoft.recoveryservices/vaults) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Recovery Services vaults (microsoft.recoveryservices/vaults).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Relays (microsoft.relay/namespaces) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Relays (microsoft.relay/namespaces).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Scaling plans (microsoft.desktopvirtualization/scalingplans) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Scaling plans (microsoft.desktopvirtualization/scalingplans).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for SCOPE pools (microsoft.synapse/workspaces/scopepools) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for SCOPE pools (microsoft.synapse/workspaces/scopepools).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Search services (microsoft.search/searchservices) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Search services (microsoft.search/searchservices).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Service Bus Namespaces (microsoft.servicebus/namespaces) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Service Bus Namespaces (microsoft.servicebus/namespaces).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for SignalR (microsoft.signalrservice/signalr) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for SignalR (microsoft.signalrservice/signalr).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for SQL databases (microsoft.sql/servers/databases) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for SQL databases (microsoft.sql/servers/databases).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for SQL managed instances (microsoft.sql/managedinstances) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for SQL managed instances (microsoft.sql/managedinstances).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Storage movers (microsoft.storagemover/storagemovers) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Storage movers (microsoft.storagemover/storagemovers).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Stream Analytics jobs (microsoft.streamanalytics/streamingjobs) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Stream Analytics jobs (microsoft.streamanalytics/streamingjobs).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Streaming Endpoints (microsoft.media/mediaservices/streamingendpoints) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Streaming Endpoints (microsoft.media/mediaservices/streamingendpoints).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Traffic Manager profiles (microsoft.network/trafficmanagerprofiles) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Traffic Manager profiles (microsoft.network/trafficmanagerprofiles).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Video Analyzers (microsoft.media/videoanalyzers) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Video Analyzers (microsoft.media/videoanalyzers).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Virtual network gateways (microsoft.network/virtualnetworkgateways) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Virtual network gateways (microsoft.network/virtualnetworkgateways).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Virtual networks (microsoft.network/virtualnetworks) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Virtual networks (microsoft.network/virtualnetworks).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Volumes (microsoft.netapp/netappaccounts/capacitypools/volumes) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Volumes (microsoft.netapp/netappaccounts/capacitypools/volumes).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Web PubSub Service (microsoft.signalrservice/webpubsub) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Web PubSub Service (microsoft.signalrservice/webpubsub).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Monitoring Enable logging by category group for Workspaces (microsoft.desktopvirtualization/workspaces) to Log Analytics
Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This policy deploys a diagnostic setting using a category group to route logs to a Log Analytics workspace for Workspaces (microsoft.desktopvirtualization/workspaces).
SetByParameter
Disabled
AuditIfNotExists
DeployIfNotExists
Network [Deprecated]: Azure firewall policy should enable TLS inspection within application rules
This policy is deprecated because Microsoft 365 App Compliance Program no longer requires Azure Firewall as the only network security control solution. Learn more details about the latest M365 APP Compliance requirements about network security controls at aka.ms/acat-cert2-seg-ops-nsc. Learn more about policy definition deprecation at aka.ms/policydefdeprecation.
Deny
Disabled
Audit
Deny
Disabled
Audit
Network [Deprecated]: Azure Firewall Premium should configure a valid intermediate certificate to enable TLS inspection
This policy is deprecated because Microsoft 365 App Compliance Program no longer requires Azure Firewall premium as the only network security control solution. Learn more details about the latest M365 APP Compliance requirements about network security controls at aka.ms/acat-cert2-seg-ops-nsc. Learn more about policy definition deprecation at aka.ms/policydefdeprecation.
Deny
Disabled
Audit
Deny
Disabled
Audit
Network [Deprecated]: Bypass list of Intrusion Detection and Prevention System (IDPS) should be empty in Firewall Policy Premium
This policy is deprecated because Microsoft 365 App Compliance Program no longer requires Azure Firewall premium as the only network security control solution. Learn more details about the latest M365 APP Compliance requirements about network security controls at aka.ms/acat-cert2-seg-ops-nsc. Learn more about policy definition deprecation at aka.ms/policydefdeprecation.
Deny
Disabled
Audit
Deny
Disabled
Audit
Network [Deprecated]: Firewall Policy Premium should enable all IDPS signature rules to monitor all inbound and outbound traffic flows
This policy is deprecated because Microsoft 365 App Compliance Program no longer requires Azure Firewall premium as the only network security control solution. Learn more details about the latest M365 APP Compliance requirements about network security controls at aka.ms/acat-cert2-seg-ops-nsc. Learn more about policy definition deprecation at aka.ms/policydefdeprecation.
Deny
Disabled
Audit
Deny
Disabled
Audit
Network [Deprecated]: Firewall Policy Premium should enable the Intrusion Detection and Prevention System (IDPS)
This policy is deprecated because Microsoft 365 App Compliance Program no longer requires Azure Firewall premium as the only network security control solution. Learn more details about the latest M365 APP Compliance requirements about network security controls at aka.ms/acat-cert2-seg-ops-nsc. Learn more about policy definition deprecation at aka.ms/policydefdeprecation.
Deny
Disabled
Audit
Deny
Disabled
Audit
Network [Deprecated]: Web Application Firewall (WAF) should enable all firewall rules for Application Gateway
This policy is deprecated because sometimes it is impractical to enable all WAF rules. Instead of continuing to use this policy, we recommend you instead assign this replacement policy with policy ID 564feb30-bf6a-4854-b4bb-0d2d2d1e6c66. Learn more details about the latest M365 APP Compliance requirements about network security controls at aka.ms/acat-cert2-seg-ops-nsc. Learn more about policy definition deprecation at aka.ms/policydefdeprecation.
Deny
Disabled
Audit
Deny
Disabled
Audit
Network [Preview]: All Internet traffic should be routed via your deployed Azure Firewall
Azure Security Center has identified that some of your subnets aren't protected with a next generation firewall. Protect your subnets from potential threats by restricting access to them with Azure Firewall or a supported next generation firewall
AuditIfNotExists
Disabled
Network Application Gateway should be deployed with predefined Microsoft policy that is using TLS version 1.2
This policy enables you to restrict that Application Gateways is always deployed with predefined Microsoft policy that is using TLS version 1.2
Deny
Disabled
Audit
Deny
Disabled
Audit
Network Azure Web Application Firewall should be enabled for Azure Front Door entry-points
Deploy Azure Web Application Firewall (WAF) in front of public facing web applications for additional inspection of incoming traffic. Web Application Firewall (WAF) provides centralized protection of your web applications from common exploits and vulnerabilities such as SQL injections, Cross-Site Scripting, local and remote file executions. You can also restrict access to your web applications by countries, IP address ranges, and other http(s) parameters via custom rules.
Deny
Disabled
Audit
Deny
Disabled
Audit
Audit
Deny
Disabled
Network Deny or Audit service endpoints on subnets
This Policy will deny/audit Service Endpoints on subnets. Service Endpoints allows the network traffic to bypass Network appliances, such as the Azure Firewall.
Deny
Disabled
Audit
Deny
Disabled
Audit
Network Deny vNet peering cross subscription.
This policy denies the creation of vNet Peerings outside of the same subscriptions under the assigned scope.
Deny
Disabled
Audit
Network Deploy Activity Log Azure FireWall Delete Alert
Policy to Deploy Activity Log Azure Firewall Delete Alert
deployIfNotExists
disabled
Network Deploy Activity Log NSG Delete Alert
Policy to Deploy Activity Log NSG Delete Alert
deployIfNotExists
disabled
deployIfNotExists
disabled
Network Deploy Activity Log Route Table Update Alert
Policy to Deploy Activity Log Route Table Update Alert
deployIfNotExists
disabled
deployIfNotExists
disabled
Network Deploy Activity Log VPN Gateway Delete Alert
Policy to Deploy Activity Log VPN Gateway Delete Alert
deployIfNotExists
disabled
Network Deploy AFW FirewallHealth Alert
Policy to audit/deploy Azure Firewall FirewallHealth Alert
deployIfNotExists
disabled
Network Deploy AFW SNATPortUtilization Alert
Policy to audit/deploy Azure Firewall SNATPortUtilization Alert
deployIfNotExists
disabled
Network Deploy ERG ExpressRoute Bits In Alert
Policy to audit/deploy ER Gateway Connection BitsInPerSecond Alert
disabled
deployIfNotExists
Network Deploy ERG ExpressRoute Bits Out Alert
Policy to audit/deploy ER Gateway Connection BitsOutPerSecond Alert
disabled
deployIfNotExists
Network Deploy ERG ExpressRoute CPU Utilization Alert
Policy to audit/deploy ER Gateway Express Route CPU Utilization Alert
deployIfNotExists
disabled
Network Deploy ExpressRoute Circuits Arp Availability Alert
Policy to audit/deploy ExpressRoute Circuits Arp Availability Alert
deployIfNotExists
disabled
Network Deploy ExpressRoute Circuits Bgp Availability Alert
Policy to audit/deploy ExpressRoute Circuits Bgp Availability Alert
deployIfNotExists
disabled
Network Deploy ExpressRoute Circuits QosDropBitsInPerSecond Alert
Policy to audit/deploy ExpressRoute Circuits QosDropBitsInPerSecond Alert
deployIfNotExists
disabled
Network Deploy ExpressRoute Circuits QosDropBitsOutPerSecond Alert
Policy to audit/deploy ExpressRoute Circuits QosDropBitsOutPerSecond Alert
deployIfNotExists
disabled
Network Deploy PDNSZ Capacity Utilization Alert
Policy to audit/deploy Private DNS Zone Capacity Utilization Alert
deployIfNotExists
disabled
Network Deploy PDNSZ Query Volume Alert
Policy to audit/deploy Private DNS Zone Query Volume Alert
disabled
deployIfNotExists
Network Deploy PDNSZ Record Set Capacity Alert
Policy to audit/deploy Private DNS Zone Record Set Capacity Alert
deployIfNotExists
disabled
Network Deploy PDNSZ Registration Capacity Utilization Alert
Policy to audit/deploy Private DNS Zone Registration Capacity Utilization Alert
deployIfNotExists
disabled
Network Deploy PIP Bytes in DDoS Attack Alert
Policy to audit/deploy PIP Bytes in DDoS Attack Alert
disabled
deployIfNotExists
disabled
deployIfNotExists
Network Deploy PIP DDoS Attack Alert
Policy to audit/deploy PIP DDoS Attack Alert
deployIfNotExists
disabled
deployIfNotExists
disabled
Network Deploy PIP Packets in DDoS Attack Alert
Policy to audit/deploy PIP Packets in DDoS Attack Alert
disabled
deployIfNotExists
disabled
deployIfNotExists
Network Deploy PIP VIP Availability Alert
Policy to audit/deploy PIP VIP Availability Alert
deployIfNotExists
disabled
deployIfNotExists
disabled
Network Deploy VNet DDoS Attack Alert
Policy to audit/deploy Virtual Network DDoS Attack Alert
deployIfNotExists
disabled
deployIfNotExists
disabled
Network Deploy VNetG Egress Packet Drop Count Alert
Policy to audit/deploy Vnet Gateway Egress Packet Drop Count Alert
deployIfNotExists
disabled
Network Deploy VNetG Egress Packet Drop Mismatch Alert
Policy to audit/deploy Vnet Gateway Egress Packet Drop Mismatch Alert
deployIfNotExists
disabled
Network Deploy VNetG ExpressRoute Bits Per Second Alert
Policy to audit/deploy Virtual Network Gateway Express Route Bits Per Second Alert
deployIfNotExists
disabled
Network Deploy VNetG ExpressRoute CPU Utilization Alert
Policy to audit/deploy Virtual Network Gateway Express Route CPU Utilization Alert
deployIfNotExists
disabled
Network Deploy VNetG Ingress Packet Drop Count Alert
Policy to audit/deploy Vnet Gateway Ingress Packet Drop Count Alert
deployIfNotExists
disabled
Network Deploy VNetG Ingress Packet Drop Mismatch Alert
Policy to audit/deploy Vnet Gateway Ingress Packet Drop Mismatch Alert
deployIfNotExists
disabled
Network Deploy VNetG Tunnel Bandwidth Alert
Policy to audit/deploy Virtual Network Gateway Tunnel Bandwidth Alert
deployIfNotExists
disabled
Network Deploy VNetG Tunnel Egress Alert
Policy to audit/deploy Virtual Network Gateway Tunnel Egress Alert
disabled
deployIfNotExists
Network Deploy VNetG Tunnel Ingress Alert
Policy to audit/deploy Virtual Network Gateway Tunnel Ingress Alert
disabled
deployIfNotExists
Network Deploy VPNG BGP Peer Status Alert
Policy to audit/deploy VPN Gateway BGP Peer Status Alert
deployIfNotExists
disabled
Network Deploy VPNG Bandwidth Utilization Alert
Policy to audit/deploy VPN Gateway Bandwidth Utilization Alert
deployIfNotExists
disabled
Network Deploy VPNG Egress Alert
Policy to audit/deploy VPN Gateway Egress Alert
disabled
deployIfNotExists
Network Deploy VPNG Egress Packet Drop Count Alert
Policy to audit/deploy VPN Gateway Egress Packet Drop Count Alert
deployIfNotExists
disabled
Network Deploy VPNG Egress Packet Drop Mismatch Alert
Policy to audit/deploy VPN Gateway Egress Packet Drop Mismatch Alert
deployIfNotExists
disabled
Network Deploy VPNG Ingress Alert
Policy to audit/deploy VPN Gateway Ingress Alert
disabled
deployIfNotExists
Network Deploy VPNG Ingress Packet Drop Count Alert
Policy to audit/deploy VPN Gateway Ingress Packet Drop Count Alert
deployIfNotExists
disabled
Network Deploy VPNG Ingress Packet Drop Mismatch Alert
Policy to audit/deploy VPN Gateway Ingress Packet Drop Mismatch Alert
deployIfNotExists
disabled
Network Enforce specific configuration of Network Security Groups (NSG)
This policy enforces the configuration of Network Security Groups (NSG).
Disabled
Modify
Disabled
Modify
Network Enforce specific configuration of User-Defined Routes (UDR)
This policy enforces the configuration of User-Defined Routes (UDR) within a subnet.
Disabled
Modify
Disabled
Modify
Network Gateway subnets should not be configured with a network security group
This policy denies if a gateway subnet is configured with a network security group. Assigning a network security group to a gateway subnet will cause the gateway to stop functioning.
deny deny
Network Management port access from the Internet should be blocked
This policy denies any network security rule that allows management port access from the Internet, by default blocking SSH/RDP ports.
Deny
Disabled
Audit
Deny
Disabled
Audit
Network Network interfaces should disable IP forwarding
This policy denies the network interfaces which enabled IP forwarding. The setting of IP forwarding disables Azure's check of the source and destination for a network interface. This should be reviewed by the network security team.
deny deny
Network Network interfaces should not have public IPs
This policy denies the network interfaces which are configured with any public IP. Public IP addresses allow internet resources to communicate inbound to Azure resources, and Azure resources to communicate outbound to the internet. This should be reviewed by the network security team.
deny deny
Network Network Watcher should be enabled
Network Watcher is a regional service that enables you to monitor and diagnose conditions at a network scenario level in, to, and from Azure. Scenario level monitoring enables you to diagnose problems at an end to end network level view. It is required to have a network watcher resource group to be created in every region where a virtual network is present. An alert is enabled if a network watcher resource group is not available in a particular region.
AuditIfNotExists
Disabled
Network Subnets should have a Network Security Group
This policy denies the creation of a subnet without a Network Security Group. NSG help to protect traffic across subnet-level.
Deny
Disabled
Audit
Deny
Disabled
Audit
Network Subnets should have a User Defined Route
This policy denies the creation of a subnet without a User Defined Route (UDR).
Deny
Disabled
Audit
Deny
Disabled
Audit
Network Virtual networks should be protected by Azure DDoS Protection
Protect your virtual networks against volumetric and protocol attacks with Azure DDoS Protection. For more information, visit https://aka.ms/ddosprotectiondocs.
Modify
Disabled
Audit
Modify
Disabled
Audit
Network VPN gateways should use only Azure Active Directory (Azure AD) authentication for point-to-site users
Disabling local authentication methods improves security by ensuring that VPN Gateways use only Azure Active Directory identities for authentication. Learn more about Azure AD authentication at https://docs.microsoft.com/azure/vpn-gateway/openvpn-azure-ad-tenant
Deny
Disabled
Audit
Deny
Disabled
Audit
Audit
Deny
Disabled
Network Web Application Firewall (WAF) should be enabled for Application Gateway
Deploy Azure Web Application Firewall (WAF) in front of public facing web applications for additional inspection of incoming traffic. Web Application Firewall (WAF) provides centralized protection of your web applications from common exploits and vulnerabilities such as SQL injections, Cross-Site Scripting, local and remote file executions. You can also restrict access to your web applications by countries, IP address ranges, and other http(s) parameters via custom rules.
Deny
Disabled
Audit
Deny
Disabled
Audit
Audit
Deny
Disabled
Network Web Application Firewall (WAF) should use the specified mode for Application Gateway
Mandates the use of 'Detection' or 'Prevention' mode to be active on all Web Application Firewall policies for Application Gateway.
Deny
Disabled
Audit
Deny
Disabled
Audit
Network Web Application Firewall (WAF) should use the specified mode for Azure Front Door Service
Mandates the use of 'Detection' or 'Prevention' mode to be active on all Web Application Firewall policies for Azure Front Door Service.
Deny
Disabled
Audit
Deny
Disabled
Audit
Networking Deploy ER Direct ExpressRoute RxLightLevel High Alert
Policy to audit/deploy ER Direct RxLightLevel High Alert
deployIfNotExists
disabled
Networking Deploy Frontdoor Backend Health Percentage Alert
Policy to audit/deploy FrontDoor Backend Health Percentage Alert
deployIfNotExists
disabled
Networking Deploy Frontdoor Backend Request Latency Alert
Policy to audit/deploy Frontdoor Backend Request Latency Alert
deployIfNotExists
disabled
Networking Deploy FrontDoor CDN Profile Origin Latency Alert
Policy to audit/deploy FrontDoor CDN Profile Origin Latency Alert
disabled
deployIfNotExists
Networking Deploy FrontDoor CDN Profile Percentage4XX Alert
Policy to audit/deploy FrontDoor CDN Profile Percentage4XX Alert
deployIfNotExists
disabled
Networking Deploy FrontDoor CDN Profile Percentage5XX Alert
Policy to audit/deploy FrontDoor CDN Profile Percentage5XX Alert
deployIfNotExists
disabled
Resilience [Preview]: API Management Service should be Zone Redundant
API Management Service can be configured to be Zone Redundant or not. An API Management Service is Zone Redundant if its sku name is 'Premium' and it has at least two entries in it's zones array. This policy identifies API Management Services lacking the redundancy needed to withstand a zone outage.
Audit
Deny
Disabled
Resilience [Preview]: App Service Plans should be Zone Redundant
App Service Plans can be configured to be Zone Redundant or not. When the 'zoneRedundant' property is set to 'false' for an App Service Plan, it is not configured for Zone Redundancy. This policy identifies and enforces the Zone Redundancy configuration for App Service Plans.
Audit
Deny
Disabled
Resilience [Preview]: Application Gateways should be Zone Resilient
Application Gateways can be configured to be either Zone Aligned, Zone Redundant, or neither. Application Gatewaysmthat havenexactly one entry in their zones array are considered Zone Aligned. In contrast, Application Gatmways withn3 or more entries in their zones array are recognized as Zone Redundant. This policy helps identify and enforce these resilience configurations.
Audit
Deny
Disabled
Resilience [Preview]: Azure AI Search Service should be Zone Redundant
Azure AI Search Service can be configured to be Zone Redundant or not. Availability zones are used when you add two or more replicas to your search service. Each replica is placed in a different availability zone within the region.
Audit
Deny
Disabled
Resilience [Preview]: Azure Cache for Redis Enterprise & Flash should be Zone Redundant
Azure Cache for Redis Enterprise & Flash can be configured to be Zone Redundant or not. Azure Cache for Redis Enterprise & Flash instances with fewer than 3 entries in their zones array are not Zone Redundant. This policy identifies Azure Cache for Redis Enterprise & Flash instances lacking the redundancy needed to withstand a zone outage.
Audit
Deny
Disabled
Resilience [Preview]: Azure Cache for Redis should be Zone Redundant
Azure Cache for Redis can be configured to be Zone Redundant or not. Azure Cache for Redis instances with fewer than 2 entries in their zones array or zonalAllocationPolicy is set to 'NoZones' or the sku is 'Basic' are not Zone Redundant. This policy identifies Azure Cache for Redis instances lacking the redundancy needed to withstand a zone outage.
Audit
Deny
Disabled
Resilience [Preview]: Azure Data Explorer Clusters should be Zone Redundant
Azure Data Explorer Clusters can be configured to be Zone Redundant or not. An Azure Data Explorer Cluster is considered Zone Redundant if it has at least two entries in its zones array. This policy helps ensure the your Azure Data Explorer Clusters are Zone Redundant.
Audit
Deny
Disabled
Resilience [Preview]: Azure Database for MySQL Flexible Server should be Zone Resilient
Azure Database for MySQL Flexible Server can be configured to be either Zone Aligned, Zone Redundant, or neither. MySQL Server that has a standby server selected in same zone for high availability is considered Zone Aligned. In contrast, MySQL Server that has a standby server selected to be in a different zone for high availability is recognized as Zone Redundant. This policy helps identify and enforce these resilience configurations.
Audit
Deny
Disabled
Resilience [Preview]: Azure Database for PostgreSQL Flexible Server should be Zone Resilient
Azure Database for PostgreSQL Flexible Server can be configured to be either Zone Aligned, Zone Redundant, or neither. PostgreSQL Server that has a standby server selected in same zone for high availability is considered Zone Aligned. In contrast, PostgreSQL Server that has a standby server selected to be in a different zone for high availability is recognized as Zone Redundant. This policy helps identify and enforce these resilience configurations.
Audit
Deny
Disabled
Resilience [Preview]: Azure HDInsight should be Zone Aligned
Azure HDInsight can be configured to be Zone Aligned or not. Azure HDInsight that has exactly one entry in its zones array is considered Zone Aligned. This policy ensures that an Azure HDInsight cluster is configured to operate within a single availability zone.
Audit
Deny
Disabled
Resilience [Preview]: Azure Kubernetes Service Managed Clusters should be Zone Redundant
Azure Kubernetes Service Managed Clusters can be configured to be Zone Redundant or not. The policy checks the node pools in the cluster and ensures that avaialbilty zones are set for all the node pools.
Audit
Deny
Disabled
Resilience [Preview]: Azure Managed Grafana should be Zone Redundant
Azure Managed Grafana can be configured to be Zone Redundant or not. An Azure Managed Grafana instance is Zone Redundant is it's 'zoneRedundancy' property is set to 'Enabled'. Enforcing this policy helps ensure that your Azure Managed Grafana is appropriately configured for zone resilience, reducing the risk of downtime during zone outages.
Audit
Deny
Disabled
Resilience [Preview]: Backup and Site Recovery should be Zone Redundant
Backup and Site Recovery can be configured to be Zone Redundant or not. Backup and Site Recovery is Zone Redundant if it's 'standardTierStorageRedundancy' property is set to 'ZoneRedundant'. Enforcing this policy helps ensure that Backup and Site Recovery is appropriately configured for zone resilience, reducing the risk of downtime during zone outages.
Audit
Deny
Disabled
Resilience [Preview]: Backup Vaults should be Zone Redundant
Backup Vaults can be configured to be Zone Redundant or not. Backup Vaults are Zone Redundant if it's storage settings type is set to 'ZoneRedundant' and they are considered to be resilient. Geo Redundant or Locally Redundant Backup Vaults are not considered resilient. Enforcing this policy helps ensure that Backup Vaults are appropriately configured for zone resilience, reducing the risk of downtime during zone outages.
Audit
Deny
Disabled
Resilience [Preview]: Container App should be Zone Redundant
Container App can be configured to be Zone Redundant or not. A Container App is Zone Redundant if its managed environment's 'ZoneRedundant' property is set to true. This policy identifies Container App lacking the redundancy needed to withstand a zone outage.
Audit
Deny
Disabled
Resilience [Preview]: Container Instances should be Zone Aligned
Container Instances can be configured to be Zone Aligned or not. They are considered Zone Aligned if they have only one entry in their zones array. This policy ensures that they are configured to operate within a single availability zone.
Audit
Deny
Disabled
Resilience [Preview]: Container Registry should be Zone Redundant
Container Registry can be configured to be Zone Redundant or not. When the zoneRedundancy property for a Container Registry is set to 'Disabled', it means the registry is not Zone Redundant. Enforcing this policy helps ensure that your Container Registry is appropriately configured for zone resilience, reducing the risk of downtime during zone outages.
Audit
Deny
Disabled
Resilience [Preview]: Cosmos Database Accounts should be Zone Redundant
Cosmos Database Accounts can be configured to be Zone Redundant or not. If the 'enableMultipleWriteLocations' is set to 'true' then all locations must have a 'isZoneRedundant' property and it must be set to 'true'. If the 'enableMultipleWriteLocations' is set to 'false' then the primary location ('failoverPriority' set to 0) must have a 'isZoneRedundant' property and it must be set to 'true'. Enforcing this policy ensures Cosmos Database Accounts are appropriately configured for zone redundancy.
Audit
Deny
Disabled
Resilience [Preview]: Event Hubs should be Zone Redundant
Event Hubs can be configured to be Zone Redundant or not. Event Hubs are Zone Redundant if it's 'zoneRedundant' property is set to 'true'. Enforcing this policy helps ensure that Event Hubs are appropriately configured for zone resilience, reducing the risk of downtime during zone outages.
Audit
Deny
Disabled
Resilience [Preview]: Firewalls should be Zone Resilient
Firewalls can be configured to be either Zone Aligned, Zone Redundant, or neither. Firewalls that have exactly one entry in its zones array are considered Zone Aligned. In contrast, Firewalls with 3 or more entries in its zones array are recognized as Zone Redundant. This policy helps identify and enforce these resilience configurations.
Audit
Deny
Disabled
Resilience [Preview]: Load Balancers should be Zone Resilient
Load Balancers with a sku other than Basic inherit the resilience of the Public IP addresses in their frontend. When combined with the 'Public IP addresses should be Zone Resilient' policy, this approach ensures the necessary redundancy to withstand a zone outage.
Audit
Deny
Disabled
Resilience [Preview]: Managed Disks should be Zone Resilient
Managed Disks can be configured to be either Zone Aligned, Zone Redundant, or neither. Managed Disks with exactly one zone assignment are Zone Aligned. Managed Disks with a sku name that ends in ZRS are Zone Redundant. This policy assists in identifying and enforcing these resilience configurations for Managed Disks.
Audit
Deny
Disabled
Resilience [Preview]: NAT gateway should be Zone Aligned
NAT gateway can be configured to be Zone Aligned or not. NAT gateway that has exactly one entry in its zones array is considered Zone Aligned. This policy ensures that an NAT gateway is configured to operate within a single availability zone.
Audit
Deny
Disabled
Resilience [Preview]: Public IP addresses should be Zone Resilient
Public IP addresses can be configured to be either Zone Aligned, Zone Redundant, or neither. Public IP addresses that are regional, with exactly one entry in their zones array are considered Zone Aligned. In contrast, Public IP addresses that are regional, with 3 or more entries in their zones array are recognized as Zone Redundant. This policy helps identify and enforce these resilience configurations.
Audit
Deny
Disabled
Resilience [Preview]: Public IP Prefixes should be Zone Resilient
Public IP Prefixes can be configured to be either Zone Aligned, Zone Redundant, or neither. Public IP prefixes that have exactly one entry in their zones array are considered Zone Aligned. In contrast, Public IP prefixes with 3 or more entries in their zones array are recognized as Zone Redundant. This policy helps identify and enforce these resilience configurations.
Audit
Deny
Disabled
Resilience [Preview]: Service Bus should be Zone Redundant
Service Bus can be configured to be Zone Redundant or not. When the 'zoneRedundant' property is set to 'false' for a Service Bus, it means it is not configured for Zone Redundancy. This policy identifies and enforces the Zone Redundancy configuration for Service Bus instances.
Audit
Deny
Disabled
Resilience [Preview]: Service Fabric Clusters should be Zone Redundant
Service Fabric Clusters can be configured to be Zone Redundant or not. Servicefabric Clusters whose nodeType do not have the multipleAvailabilityZones set to true are not Zone Redundant. This policy identifies Servicefabric Clusters lacking the redundancy needed to withstand a zone outage.
Audit
Deny
Disabled
Resilience [Preview]: SQL Databases should be Zone Redundant
SQL Databases can be configured to be Zone Redundant or not. Databases with the 'zoneRedundant' setting set to 'false' are not configured for zone redundancy. This policy helps identify SQL databases that need zone redundancy configuration to enhance availability and resilience within Azure.
Audit
Deny
Disabled
Resilience [Preview]: SQL Elastic database pools should be Zone Redundant
SQL Elastic database pools can be configured to be Zone Redundant or not. SQL Elastic database pools are Zone Redundant if it's 'zoneRedundant' property is set to 'true'. Enforcing this policy helps ensure that Event Hubs are appropriately configured for zone resilience, reducing the risk of downtime during zone outages.
Audit
Deny
Disabled
Resilience [Preview]: SQL Managed Instances should be Zone Redundant
SQL Managed Instances can be configured to be Zone Redundant or not. Instances with the 'zoneRedundant' setting set to 'false' are not configured for zone redundancy. This policy helps identify SQL managedInstances that need zone redundancy configuration to enhance availability and resilience within Azure.
Audit
Deny
Disabled
Resilience [Preview]: Storage Accounts should be Zone Redundant
Storage Accounts can be configured to be Zone Redundant or not. If a Storage Account's SKU name does not end with 'ZRS' or its kind is 'Storage,' it is not Zone Redundant. This policy ensures that your Storage Accounts use ae Zone Redundant configuration.
Audit
Deny
Disabled
Resilience [Preview]: Virtual Machine Scale Sets should be Zone Resilient
Virtual Machine Scale Sets can be configured to be either Zone Aligned, Zone Redundant, or neither. Virtual Machine Scale Sets that have exactly one entry in their zones array are considered Zone Aligned. In contrast, Virtual Machine Scale Sets with 3 or more entries in their zones array and a capacity of at least 3 are recognized as Zone Redundant. This policy helps identify and enforce these resilience configurations.
Audit
Deny
Disabled
Resilience [Preview]: Virtual Machines should be Zone Aligned
Virtual Machines can be configured to be Zone Aligned or not. They are considered Zone Aligned if they have only one entry in their zones array. This policy ensures that they are configured to operate within a single availability zone.
Audit
Deny
Disabled
Resilience [Preview]: Virtual network gateways should be Zone Redundant
Virtual network gateways can be configured to be Zone Redundant or not. Virtual network gateways whose SKU name or tier does not end with 'AZ' are not Zone Redundant. This policy identifies Virtual network gateways lacking the redundancy needed to withstand a zone outage.
Audit
Deny
Disabled
Search Azure AI Search service should use a SKU that supports private link
With supported SKUs of Azure AI Search, Azure Private Link lets you connect your virtual network to Azure services without a public IP address at the source or destination. The private link platform handles the connectivity between the consumer and services over the Azure backbone network. By mapping private endpoints to your Search service, data leakage risks are reduced. Learn more at: https://aka.ms/azure-cognitive-search/inbound-private-endpoints.
Deny
Disabled
Audit
Deny
Disabled
Audit
Search Azure AI Search services should disable public network access
Disabling public network access improves security by ensuring that your Azure AI Search service is not exposed on the public internet. Creating private endpoints can limit exposure of your Search service. Learn more at: https://aka.ms/azure-cognitive-search/inbound-private-endpoints.
Deny
Disabled
Audit
Search Azure AI Search services should have local authentication methods disabled
Disabling local authentication methods improves security by ensuring that Azure AI Search services exclusively require Azure Active Directory identities for authentication. Learn more at: https://aka.ms/azure-cognitive-search/rbac. Note that while the disable local authentication parameter is still in preview, the deny effect for this policy may result in limited Azure AI Search portal functionality since some features of the Portal use the GA API which does not support the parameter.
Deny
Disabled
Audit
Deny
Disabled
Audit
Search Azure AI Search services should use customer-managed keys to encrypt data at rest
Enabling encryption at rest using a customer-managed key on your Azure AI Search services provides additional control over the key used to encrypt data at rest. This feature is often applicable to customers with special compliance requirements to manage data encryption keys using a key vault.
AuditIfNotExists
Disabled
AuditIfNotExists
Disabled
Search Configure Azure AI Search services to disable local authentication
Disable local authentication methods so that your Azure AI Search services exclusively require Azure Active Directory identities for authentication. Learn more at: https://aka.ms/azure-cognitive-search/rbac.
Modify
Disabled
Modify
Disabled
Search Configure Azure AI Search services to disable public network access
Disable public network access for your Azure AI Search service so that it is not accessible over the public internet. This can reduce data leakage risks. Learn more at: https://aka.ms/azure-cognitive-search/inbound-private-endpoints.
Modify
Disabled
Modify
Disabled
Search Configure Azure AI Search services to use private DNS zones
Use private DNS zones to override the DNS resolution for a private endpoint. A private DNS zone links to your virtual network to resolve to your Azure AI Search service. Learn more at: https://aka.ms/azure-cognitive-search/inbound-private-endpoints.
DeployIfNotExists
Disabled
Search Resource logs in Search services should be enabled
Audit enabling of resource logs. This enables you to recreate activity trails to use for investigation purposes; when a security incident occurs or when your network is compromised
AuditIfNotExists
Disabled
AuditIfNotExists
Disabled
AuditIfNotExists
Disabled
Security Center [Deprecated]: Virtual machines should encrypt temp disks, caches, and data flows between Compute and Storage resources
This policy definition is no longer the recommended way to achieve its intent. Instead of continuing to use this policy, we recommend you assign this replacement policies with policy IDs 3dc5edcd-002d-444c-b216-e123bbfa37c0 and ca88aadc-6e2b-416c-9de2-5a0f01d1693f. Learn more about policy definition deprecation at aka.ms/policydefdeprecation
AuditIfNotExists
Disabled
AuditIfNotExists
Disabled
Security Center [Preview]: Configure ChangeTracking Extension for Linux virtual machine scale sets
Configure Linux virtual machine scale sets to automatically install the ChangeTracking Extension to enable File Integrity Monitoring(FIM) in Azure Security Center. FIM examines operating system files, Windows registries, application software, Linux system files, and more, for changes that might indicate an attack. The extension can be installed in virtual machines and locations supported by Azure Monitor Agent.
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
Security Center [Preview]: Configure ChangeTracking Extension for Windows virtual machine scale sets
Configure Windows virtual machine scale sets to automatically install the ChangeTracking Extension to enable File Integrity Monitoring(FIM) in Azure Security Center. FIM examines operating system files, Windows registries, application software, Linux system files, and more, for changes that might indicate an attack. The extension can be installed in virtual machines and locations supported by Azure Monitor Agent.
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
Security Center [Preview]: Deploy Microsoft Defender for Endpoint agent on Linux hybrid machines
Deploys Microsoft Defender for Endpoint agent on Linux hybrid machines
DeployIfNotExists
Disabled
AuditIfNotExists
Security Center [Preview]: Deploy Microsoft Defender for Endpoint agent on Linux virtual machines
Deploys Microsoft Defender for Endpoint agent on applicable Linux VM images.
DeployIfNotExists
Disabled
AuditIfNotExists
Security Center [Preview]: Deploy Microsoft Defender for Endpoint agent on Windows Azure Arc machines
Deploys Microsoft Defender for Endpoint on Windows Azure Arc machines.
DeployIfNotExists
Disabled
AuditIfNotExists
Security Center [Preview]: Deploy Microsoft Defender for Endpoint agent on Windows virtual machines
Deploys Microsoft Defender for Endpoint on applicable Windows VM images.
DeployIfNotExists
Disabled
AuditIfNotExists
Security Center [Preview]: Guest Attestation extension should be installed on supported Linux virtual machines
Install Guest Attestation extension on supported Linux virtual machines to allow Azure Security Center to proactively attest and monitor the boot integrity. Once installed, boot integrity will be attested via Remote Attestation. This assessment applies to Trusted Launch and Confidential Linux virtual machines.
AuditIfNotExists
Disabled
Security Center [Preview]: Guest Attestation extension should be installed on supported Linux virtual machines scale sets
Install Guest Attestation extension on supported Linux virtual machines scale sets to allow Azure Security Center to proactively attest and monitor the boot integrity. Once installed, boot integrity will be attested via Remote Attestation. This assessment applies to Trusted Launch and Confidential Linux virtual machine scale sets.
AuditIfNotExists
Disabled
Security Center [Preview]: Guest Attestation extension should be installed on supported Windows virtual machines
Install Guest Attestation extension on supported virtual machines to allow Azure Security Center to proactively attest and monitor the boot integrity. Once installed, boot integrity will be attested via Remote Attestation. This assessment applies to Trusted Launch and Confidential Windows virtual machines.
AuditIfNotExists
Disabled
Security Center [Preview]: Guest Attestation extension should be installed on supported Windows virtual machines scale sets
Install Guest Attestation extension on supported virtual machines scale sets to allow Azure Security Center to proactively attest and monitor the boot integrity. Once installed, boot integrity will be attested via Remote Attestation. This assessment applies to Trusted Launch and Confidential Windows virtual machine scale sets.
AuditIfNotExists
Disabled
Security Center [Preview]: Linux virtual machines should use only signed and trusted boot components
All OS boot components (boot loader, kernel, kernel drivers) must be signed by trusted publishers. Defender for Cloud has identified untrusted OS boot components on one or more of your Linux machines. To protect your machines from potentially malicious components, add them to your allow list or remove the identified components.
AuditIfNotExists
Disabled
Security Center [Preview]: Secure Boot should be enabled on supported Windows virtual machines
Enable Secure Boot on supported Windows virtual machines to mitigate against malicious and unauthorized changes to the boot chain. Once enabled, only trusted bootloaders, kernel and kernel drivers will be allowed to run. This assessment applies to Trusted Launch and Confidential Windows virtual machines.
Audit
Disabled
Security Center [Preview]: vTPM should be enabled on supported virtual machines
Enable virtual TPM device on supported virtual machines to facilitate Measured Boot and other OS security features that require a TPM. Once enabled, vTPM can be used to attest boot integrity. This assessment only applies to trusted launch enabled virtual machines.
Audit
Disabled
Security Center A maximum of 3 owners should be designated for your subscription
It is recommended to designate up to 3 subscription owners in order to reduce the potential for breach by a compromised owner.
AuditIfNotExists
Disabled
Security Center A vulnerability assessment solution should be enabled on your virtual machines
Audits virtual machines to detect whether they are running a supported vulnerability assessment solution. A core component of every cyber risk and security program is the identification and analysis of vulnerabilities. Azure Security Center's standard pricing tier includes vulnerability scanning for your virtual machines at no extra cost. Additionally, Security Center can automatically deploy this tool for you.
AuditIfNotExists
Disabled
Security Center All network ports should be restricted on network security groups associated to your virtual machine
Azure Security Center has identified some of your network security groups' inbound rules to be too permissive. Inbound rules should not allow access from 'Any' or 'Internet' ranges. This can potentially enable attackers to target your resources.
AuditIfNotExists
Disabled
Security Center API endpoints in Azure API Management should be authenticated
API endpoints published within Azure API Management should enforce authentication to help minimize security risk. Authentication mechanisms are sometimes implemented incorrectly or are missing. This allows attackers to exploit implementation flaws and to access data. Learn More about the OWASP API Threat for Broken User Authentication here: https://learn.microsoft.com/azure/api-management/mitigate-owasp-api-threats#broken-user-authentication
AuditIfNotExists
Disabled
Security Center API endpoints that are unused should be disabled and removed from the Azure API Management service
As a security best practice, API endpoints that haven't received traffic for 30 days are considered unused and should be removed from the Azure API Management service. Keeping unused API endpoints may pose a security risk to your organization. These may be APIs that should have been deprecated from the Azure API Management service but may have been accidentally left active. Such APIs typically do not receive the most up to date security coverage.
AuditIfNotExists
Disabled
Security Center Authorized IP ranges should be defined on Kubernetes Services
Restrict access to the Kubernetes Service Management API by granting API access only to IP addresses in specific ranges. It is recommended to limit access to authorized IP ranges to ensure that only applications from allowed networks can access the cluster.
Audit
Disabled
Security Center Azure DDoS Protection should be enabled
DDoS protection should be enabled for all virtual networks with a subnet that is part of an application gateway with a public IP.
AuditIfNotExists
Disabled
Security Center Azure Defender for App Service should be enabled
Azure Defender for App Service leverages the scale of the cloud, and the visibility that Azure has as a cloud provider, to monitor for common web app attacks.
AuditIfNotExists
Disabled
Security Center Azure Defender for Azure SQL Database servers should be enabled
Azure Defender for SQL provides functionality for surfacing and mitigating potential database vulnerabilities, detecting anomalous activities that could indicate threats to SQL databases, and discovering and classifying sensitive data.
AuditIfNotExists
Disabled
Security Center Azure Defender for Key Vault should be enabled
Azure Defender for Key Vault provides an additional layer of protection and security intelligence by detecting unusual and potentially harmful attempts to access or exploit key vault accounts.
AuditIfNotExists
Disabled
Security Center Azure Defender for open-source relational databases should be enabled
Azure Defender for open-source relational databases detects anomalous activities indicating unusual and potentially harmful attempts to access or exploit databases. Learn more about the capabilities of Azure Defender for open-source relational databases at https://aka.ms/AzDforOpenSourceDBsDocu. Important: Enabling this plan will result in charges for protecting your open-source relational databases. Learn about the pricing on Security Center's pricing page: https://aka.ms/pricing-security-center
AuditIfNotExists
Disabled
Security Center Azure Defender for Resource Manager should be enabled
Azure Defender for Resource Manager automatically monitors the resource management operations in your organization. Azure Defender detects threats and alerts you about suspicious activity. Learn more about the capabilities of Azure Defender for Resource Manager at https://aka.ms/defender-for-resource-manager . Enabling this Azure Defender plan results in charges. Learn about the pricing details per region on Security Center's pricing page: https://aka.ms/pricing-security-center .
AuditIfNotExists
Disabled
Security Center Azure Defender for servers should be enabled
Azure Defender for servers provides real-time threat protection for server workloads and generates hardening recommendations as well as alerts about suspicious activities.
AuditIfNotExists
Disabled
Security Center Azure Defender for SQL servers on machines should be enabled
Azure Defender for SQL provides functionality for surfacing and mitigating potential database vulnerabilities, detecting anomalous activities that could indicate threats to SQL databases, and discovering and classifying sensitive data.
AuditIfNotExists
Disabled
Security Center Azure Defender for SQL should be enabled for unprotected MySQL flexible servers
Audit MySQL flexible servers without Advanced Data Security
AuditIfNotExists
Disabled
Security Center Azure Defender for SQL should be enabled for unprotected PostgreSQL flexible servers
Audit PostgreSQL flexible servers without Advanced Data Security
AuditIfNotExists
Disabled
Security Center Azure registry container images should have vulnerabilities resolved (powered by Microsoft Defender Vulnerability Management)
Container image vulnerability assessment scans your registry for commonly known vulnerabilities (CVEs) and provides a detailed vulnerability report for each image. Resolving vulnerabilities can greatly improve your security posture, ensuring images are safe to use prior to deployment.
AuditIfNotExists
Disabled
Security Center Azure running container images should have vulnerabilities resolved (powered by Microsoft Defender Vulnerability Management)
Container image vulnerability assessment scans your registry for commonly known vulnerabilities (CVEs) and provides a detailed vulnerability report for each image. This recommendation provides visibility to vulnerable images currently running in your Kubernetes clusters. Remediating vulnerabilities in container images that are currently running is key to improving your security posture, significantly reducing the attack surface for your containerized workloads.
AuditIfNotExists
Disabled
Security Center Blocked accounts with owner permissions on Azure resources should be removed
Deprecated accounts with owner permissions should be removed from your subscription. Deprecated accounts are accounts that have been blocked from signing in.
AuditIfNotExists
Disabled
Security Center Blocked accounts with read and write permissions on Azure resources should be removed
Deprecated accounts should be removed from your subscriptions. Deprecated accounts are accounts that have been blocked from signing in.
AuditIfNotExists
Disabled
Security Center Configure Advanced Threat Protection to be enabled on Azure database for MySQL flexible servers
Enable Advanced Threat Protection on your Azure database for MySQL flexible servers to detect anomalous activities indicating unusual and potentially harmful attempts to access or exploit databases.
DeployIfNotExists
Disabled
Security Center Configure Advanced Threat Protection to be enabled on Azure database for PostgreSQL flexible servers
Enable Advanced Threat Protection on your Azure database for PostgreSQL flexible servers to detect anomalous activities indicating unusual and potentially harmful attempts to access or exploit databases.
DeployIfNotExists
Disabled
Security Center Configure Arc-enabled SQL Servers to automatically install Azure Monitor Agent
Automate the deployment of Azure Monitor Agent extension on your Windows Arc-enabled SQL Servers. Learn more: https://aka.ms/AMAOverview.
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
Security Center Configure Arc-enabled SQL Servers to automatically install Microsoft Defender for SQL
Configure Windows Arc-enabled SQL Servers to automatically install the Microsoft Defender for SQL agent. Microsoft Defender for SQL collects events from the agent and uses them to provide security alerts and tailored hardening tasks (recommendations).
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
Security Center Configure Arc-enabled SQL Servers to automatically install Microsoft Defender for SQL and DCR with a user-defined LA workspace
Microsoft Defender for SQL collects events from the agent and uses them to provide security alerts and tailored hardening tasks (recommendations). Create a resource group and a Data Collection Rule in the same region as the user-defined Log Analytics workspace.
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
Security Center Configure Arc-enabled SQL Servers with Data Collection Rule Association to Microsoft Defender for SQL user-defined DCR
Configure association between Arc-enabled SQL Servers and the Microsoft Defender for SQL user-defined DCR. Deleting this association will break the detection of security vulnerabilities for this Arc-enabled SQL Servers.
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
Security Center Configure Azure Defender for App Service to be enabled
Azure Defender for App Service leverages the scale of the cloud, and the visibility that Azure has as a cloud provider, to monitor for common web app attacks.
DeployIfNotExists
Disabled
Security Center Configure Azure Defender for Azure SQL database to be enabled
Azure Defender for SQL provides functionality for surfacing and mitigating potential database vulnerabilities, detecting anomalous activities that could indicate threats to SQL databases, and discovering and classifying sensitive data.
DeployIfNotExists
Disabled
Security Center Configure Azure Defender for open-source relational databases to be enabled
Azure Defender for open-source relational databases detects anomalous activities indicating unusual and potentially harmful attempts to access or exploit databases. Learn more about the capabilities of Azure Defender for open-source relational databases at https://aka.ms/AzDforOpenSourceDBsDocu. Important: Enabling this plan will result in charges for protecting your open-source relational databases. Learn about the pricing on Security Center's pricing page: https://aka.ms/pricing-security-center
DeployIfNotExists
Disabled
Security Center Configure Azure Defender for Resource Manager to be enabled
Azure Defender for Resource Manager automatically monitors the resource management operations in your organization. Azure Defender detects threats and alerts you about suspicious activity. Learn more about the capabilities of Azure Defender for Resource Manager at https://aka.ms/defender-for-resource-manager . Enabling this Azure Defender plan results in charges. Learn about the pricing details per region on Security Center's pricing page: https://aka.ms/pricing-security-center .
DeployIfNotExists
Disabled
Security Center Configure Azure Defender for servers to be enabled
Azure Defender for servers provides real-time threat protection for server workloads and generates hardening recommendations as well as alerts about suspicious activities.
DeployIfNotExists
Disabled
Security Center Configure Azure Defender for SQL servers on machines to be enabled
Azure Defender for SQL provides functionality for surfacing and mitigating potential database vulnerabilities, detecting anomalous activities that could indicate threats to SQL databases, and discovering and classifying sensitive data.
DeployIfNotExists
Disabled
Security Center Configure ChangeTracking Extension for Linux Arc machines
Configure Linux Arc machines to automatically install the ChangeTracking Extension to enable File Integrity Monitoring(FIM) in Azure Security Center. FIM examines operating system files, Windows registries, application software, Linux system files, and more, for changes that might indicate an attack. The extension can be installed in virtual machines and locations supported by Azure Monitor Agent.
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
Security Center Configure ChangeTracking Extension for Linux virtual machines
Configure Linux virtual machines to automatically install the ChangeTracking Extension to enable File Integrity Monitoring(FIM) in Azure Security Center. FIM examines operating system files, Windows registries, application software, Linux system files, and more, for changes that might indicate an attack. The extension can be installed in virtual machines and locations supported by Azure Monitor Agent.
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
Security Center Configure ChangeTracking Extension for Windows Arc machines
Configure Windows Arc machines to automatically install the ChangeTracking Extension to enable File Integrity Monitoring(FIM) in Azure Security Center. FIM examines operating system files, Windows registries, application software, Linux system files, and more, for changes that might indicate an attack. The extension can be installed in virtual machines and locations supported by Azure Monitor Agent.
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
Security Center Configure ChangeTracking Extension for Windows virtual machines
Configure Windows virtual machines to automatically install the ChangeTracking Extension to enable File Integrity Monitoring(FIM) in Azure Security Center. FIM examines operating system files, Windows registries, application software, Linux system files, and more, for changes that might indicate an attack. The extension can be installed in virtual machines and locations supported by Azure Monitor Agent.
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
Security Center Configure machines to receive a vulnerability assessment provider
Azure Defender includes vulnerability scanning for your machines at no extra cost. You don't need a Qualys license or even a Qualys account - everything's handled seamlessly inside Security Center. When you enable this policy, Azure Defender automatically deploys the Qualys vulnerability assessment provider to all supported machines that don't already have it installed.
DeployIfNotExists
Disabled
Security Center Configure Microsoft Defender CSPM plan
Defender Cloud Security Posture Management (CSPM) provides enhanced posture capabilities and a new intelligent cloud security graph to help identify, prioritize, and reduce risk. Defender CSPM is available in addition to the free foundational security posture capabilities turned on by default in Defender for Cloud.
DeployIfNotExists
Disabled
Security Center Configure Microsoft Defender for Azure Cosmos DB to be enabled
Microsoft Defender for Azure Cosmos DB is an Azure-native layer of security that detects attempts to exploit databases in your Azure Cosmos DB accounts. Defender for Azure Cosmos DB detects potential SQL injections, known bad actors based on Microsoft Threat Intelligence, suspicious access patterns, and potential exploitations of your database through compromised identities or malicious insiders.
DeployIfNotExists
Disabled
Security Center Configure Microsoft Defender for Containers to be enabled
Microsoft Defender for Containers provides hardening, vulnerability assessment and run-time protections for your Azure, hybrid, and multi-cloud Kubernetes environments.
DeployIfNotExists
Disabled
Security Center Configure Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud (WDATP_EXCLUDE_LINUX...)
Configures the Microsoft Defender for Endpoint integration settings, within Microsoft Defender for Cloud (also known as WDATP_EXCLUDE_LINUX_...), for enabling auto provisioning of MDE for Linux servers. WDATP setting must be turned on for this setting to be applied. See: https://learn.microsoft.com/azure/defender-for-cloud/integration-defender-for-endpoint for more information.
DeployIfNotExists
Disabled
Security Center Configure Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud (WDATP_UNIFIED_SOLUTION)
Configures the Microsoft Defender for Endpoint integration settings, within Microsoft Defender for Cloud (also known as WDATP_UNIFIED_SOLUTION), for enabling auto provisioning of MDE Unified Agent for Windows Server 2012R2 and 2016. WDATP setting must be turned on for this setting to be applied. See: https://learn.microsoft.com/azure/defender-for-cloud/integration-defender-for-endpoint for more information.
DeployIfNotExists
Disabled
Security Center Configure Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud (WDATP)
Configures the Microsoft Defender for Endpoint integration settings, within Microsoft Defender for Cloud (also known as WDATP), for Windows downlevel machines onboarded to MDE via MMA, and auto provisioning of MDE on Windows Server 2019 , Windows Virtual Desktop and above. Must be turned on in order for the other settings (WDATP_UNIFIED, etc.) to work. See: https://learn.microsoft.com/azure/defender-for-cloud/integration-defender-for-endpoint for more information.
DeployIfNotExists
Disabled
Security Center Configure Microsoft Defender for Key Vault plan
Microsoft Defender for Key Vault provides an additional layer of protection and security intelligence by detecting unusual and potentially harmful attempts to access or exploit key vault accounts.
DeployIfNotExists
Disabled
Security Center Configure Microsoft Defender for SQL to be enabled on Synapse workspaces
Enable Microsoft Defender for SQL on your Azure Synapse workspaces to detect anomalous activities indicating unusual and potentially harmful attempts to access or exploit SQL databases.
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
Security Center Configure Microsoft Defender for Storage to be enabled
Microsoft Defender for Storage is an Azure-native layer of security intelligence that detects potential threats to your storage accounts. This policy will enable all Defender for Storage capabilities; Activity Monitoring, Malware Scanning and Sensitive Data Threat Detection. To learn more about Defender for Storage capabilities and benefits, visit aka.ms/DefenderForStorage.
DeployIfNotExists
Disabled
Security Center Configure SQL Virtual Machines to automatically install Azure Monitor Agent
Automate the deployment of Azure Monitor Agent extension on your Windows SQL Virtual Machines. Learn more: https://aka.ms/AMAOverview.
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
Security Center Configure SQL Virtual Machines to automatically install Microsoft Defender for SQL
Configure Windows SQL Virtual Machines to automatically install the Microsoft Defender for SQL extension. Microsoft Defender for SQL collects events from the agent and uses them to provide security alerts and tailored hardening tasks (recommendations).
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
Security Center Configure SQL Virtual Machines to automatically install Microsoft Defender for SQL and DCR with a user-defined LA workspace
Microsoft Defender for SQL collects events from the agent and uses them to provide security alerts and tailored hardening tasks (recommendations). Create a resource group and a Data Collection Rule in the same region as the user-defined Log Analytics workspace.
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
Security Center Create and assign a built-in user-assigned managed identity
Create and assign a built-in user-assigned managed identity at scale to SQL virtual machines.
DeployIfNotExists
Disabled
AuditIfNotExists
DeployIfNotExists
Disabled
AuditIfNotExists
Security Center Deploy export to Log Analytics workspace for Microsoft Defender for Cloud data
Enable export to Log Analytics workspace of Microsoft Defender for Cloud data. This policy deploys an export to Log Analytics workspace configuration with your conditions and target workspace on the assigned scope. To deploy this policy on newly created subscriptions, open the Compliance tab, select the relevant non-compliant assignment and create a remediation task.
deployIfNotExists
Security Center Deploy Microsoft Defender for Cloud Security Contacts
Deploy Microsoft Defender for Cloud Security Contacts
DeployIfNotExists
Disabled
Security Center Email notification for high severity alerts should be enabled
To ensure the relevant people in your organization are notified when there is a potential security breach in one of your subscriptions, enable email notifications for high severity alerts in Security Center.
AuditIfNotExists
Disabled
Security Center Email notification to subscription owner for high severity alerts should be enabled
To ensure your subscription owners are notified when there is a potential security breach in their subscription, set email notifications to subscription owners for high severity alerts in Security Center.
AuditIfNotExists
Disabled
Security Center Guest accounts with owner permissions on Azure resources should be removed
External accounts with owner permissions should be removed from your subscription in order to prevent unmonitored access.
AuditIfNotExists
Disabled
Security Center Guest accounts with read permissions on Azure resources should be removed
External accounts with read privileges should be removed from your subscription in order to prevent unmonitored access.
AuditIfNotExists
Disabled
Security Center Guest accounts with write permissions on Azure resources should be removed
External accounts with write privileges should be removed from your subscription in order to prevent unmonitored access.
AuditIfNotExists
Disabled
Security Center Guest Configuration extension should be installed on your machines
To ensure secure configurations of in-guest settings of your machine, install the Guest Configuration extension. In-guest settings that the extension monitors include the configuration of the operating system, application configuration or presence, and environment settings. Once installed, in-guest policies will be available such as 'Windows Exploit guard should be enabled'. Learn more at https://aka.ms/gcpol.
AuditIfNotExists
Disabled
Security Center Internet-facing virtual machines should be protected with network security groups
Protect your virtual machines from potential threats by restricting access to them with network security groups (NSG). Learn more about controlling traffic with NSGs at https://aka.ms/nsg-doc
AuditIfNotExists
Disabled
Security Center IP Forwarding on your virtual machine should be disabled
Enabling IP forwarding on a virtual machine's NIC allows the machine to receive traffic addressed to other destinations. IP forwarding is rarely required (e.g., when using the VM as a network virtual appliance), and therefore, this should be reviewed by the network security team.
AuditIfNotExists
Disabled
Security Center Machines should have secret findings resolved
Audits virtual machines to detect whether they contain secret findings from the secret scanning solutions on your virtual machines.
AuditIfNotExists
Disabled
Security Center Management ports of virtual machines should be protected with just-in-time network access control
Possible network Just In Time (JIT) access will be monitored by Azure Security Center as recommendations
AuditIfNotExists
Disabled
Security Center Management ports should be closed on your virtual machines
Open remote management ports are exposing your VM to a high level of risk from Internet-based attacks. These attacks attempt to brute force credentials to gain admin access to the machine.
AuditIfNotExists
Disabled
Security Center Microsoft Defender CSPM should be enabled
Defender Cloud Security Posture Management (CSPM) provides enhanced posture capabilities and a new intelligent cloud security graph to help identify, prioritize, and reduce risk. Defender CSPM is available in addition to the free foundational security posture capabilities turned on by default in Defender for Cloud.
AuditIfNotExists
Disabled
Security Center Microsoft Defender for APIs should be enabled
Microsoft Defender for APIs brings new discovery, protection, detection, & response coverage to monitor for common API based attacks & security misconfigurations.
AuditIfNotExists
Disabled
Security Center Microsoft Defender for Containers should be enabled
Microsoft Defender for Containers provides hardening, vulnerability assessment and run-time protections for your Azure, hybrid, and multi-cloud Kubernetes environments.
AuditIfNotExists
Disabled
Security Center Microsoft Defender for SQL should be enabled for unprotected Synapse workspaces
Enable Defender for SQL to protect your Synapse workspaces. Defender for SQL monitors your Synapse SQL to detect anomalous activities indicating unusual and potentially harmful attempts to access or exploit databases.
AuditIfNotExists
Disabled
Security Center Microsoft Defender for SQL status should be protected for Arc-enabled SQL Servers
Microsoft Defender for SQL provides functionality for surfacing and mitigating potential database vulnerabilities, detecting anomalous activities that could indicate threats to SQL databases, discovering and classifying sensitive data. Once enabled, the protection status indicates that the resource is actively monitored. Even when Defender is enabled, multiple configuration settings should be validated on the agent, machine, workspace and SQL server to ensure active protection.
Audit
Disabled
Security Center Microsoft Defender for Storage should be enabled
Microsoft Defender for Storage detects potential threats to your storage accounts. It helps prevent the three major impacts on your data and workload: malicious file uploads, sensitive data exfiltration, and data corruption. The new Defender for Storage plan includes Malware Scanning and Sensitive Data Threat Detection. This plan also provides a predictable pricing structure (per storage account) for control over coverage and costs.
AuditIfNotExists
Disabled
Security Center Non-internet-facing virtual machines should be protected with network security groups
Protect your non-internet-facing virtual machines from potential threats by restricting access with network security groups (NSG). Learn more about controlling traffic with NSGs at https://aka.ms/nsg-doc
AuditIfNotExists
Disabled
Security Center Role-Based Access Control (RBAC) should be used on Kubernetes Services
To provide granular filtering on the actions that users can perform, use Role-Based Access Control (RBAC) to manage permissions in Kubernetes Service Clusters and configure relevant authorization policies.
Audit
Disabled
Security Center Setup subscriptions to transition to an alternative vulnerability assessment solution
Microsoft Defender for cloud offers vulnerability scanning for your machines at no extra cost. Enabling this policy will cause Defender for Cloud to automatically propagate the findings from the built-in Microsoft Defender vulnerability management solution to all supported machines.
DeployIfNotExists
Disabled
Security Center SQL databases should have vulnerability findings resolved
Monitor vulnerability assessment scan results and recommendations for how to remediate database vulnerabilities.
AuditIfNotExists
Disabled
Security Center SQL server-targeted autoprovisioning should be enabled for SQL servers on machines plan
To ensure your SQL VMs and Arc-enabled SQL Servers are protected, ensure the SQL-targeted Azure Monitoring Agent is configured to automatically deploy. This is also necessary if you've previously configured autoprovisioning of the Microsoft Monitoring Agent, as that component is being deprecated. Learn more: https://aka.ms/SQLAMAMigration
AuditIfNotExists
Disabled
Security Center SQL servers on machines should have vulnerability findings resolved
SQL vulnerability assessment scans your database for security vulnerabilities, and exposes any deviations from best practices such as misconfigurations, excessive permissions, and unprotected sensitive data. Resolving the vulnerabilities found can greatly improve your database security posture.
AuditIfNotExists
Disabled
Security Center Subnets should be associated with a Network Security Group
Protect your subnet from potential threats by restricting access to it with a Network Security Group (NSG). NSGs contain a list of Access Control List (ACL) rules that allow or deny network traffic to your subnet.
Disabled
AuditIfNotExists
Security Center Subscriptions should have a contact email address for security issues
To ensure the relevant people in your organization are notified when there is a potential security breach in one of your subscriptions, set a security contact to receive email notifications from Security Center.
AuditIfNotExists
Disabled
Security Center System updates should be installed on your machines (powered by Update Center)
Your machines are missing system, security, and critical updates. Software updates often include critical patches to security holes. Such holes are frequently exploited in malware attacks so it's vital to keep your software updated. To install all outstanding patches and secure your machines, follow the remediation steps.
AuditIfNotExists
Disabled
Security Center There should be more than one owner assigned to your subscription
It is recommended to designate more than one subscription owner in order to have administrator access redundancy.
AuditIfNotExists
Disabled
Security Center Virtual machines' Guest Configuration extension should be deployed with system-assigned managed identity
The Guest Configuration extension requires a system assigned managed identity. Azure virtual machines in the scope of this policy will be non-compliant when they have the Guest Configuration extension installed but do not have a system assigned managed identity. Learn more at https://aka.ms/gcpol
AuditIfNotExists
Disabled
Service Bus All authorization rules except RootManageSharedAccessKey should be removed from Service Bus namespace
Service Bus clients should not use a namespace level access policy that provides access to all queues and topics in a namespace. To align with the least privilege security model, you should create access policies at the entity level for queues and topics to provide access to only the specific entity
Deny
Disabled
Audit
Deny
Disabled
Audit
Service Bus Azure Service Bus namespaces should have local authentication methods disabled
Disabling local authentication methods improves security by ensuring that Azure Service Bus namespaces exclusively require Microsoft Entra ID identities for authentication. Learn more at: https://aka.ms/disablelocalauth-sb.
Deny
Disabled
Audit
Deny
Disabled
Audit
Service Bus Configure Azure Service Bus namespaces to disable local authentication
Disable local authentication methods so that your Azure ServiceBus namespaces exclusively require Microsoft Entra ID identities for authentication. Learn more at: https://aka.ms/disablelocalauth-sb.
Modify
Disabled
Modify
Disabled
Service Bus Configure Service Bus namespaces to use private DNS zones
Use private DNS zones to override the DNS resolution for a private endpoint. A private DNS zone links to your virtual network to resolve to Service Bus namespaces. Learn more at: https://docs.microsoft.com/azure/service-bus-messaging/private-link-service.
DeployIfNotExists
Disabled
Service Bus Resource logs in Service Bus should be enabled
Audit enabling of resource logs. This enables you to recreate activity trails to use for investigation purposes; when a security incident occurs or when your network is compromised
AuditIfNotExists
Disabled
Service Bus Service Bus Namespaces should disable public network access
Azure Service Bus should have public network access disabled. Disabling public network access improves security by ensuring that the resource isn't exposed on the public internet. You can limit exposure of your resources by creating private endpoints instead. Learn more at: https://docs.microsoft.com/azure/service-bus-messaging/private-link-service
Deny
Disabled
Audit
Service Bus Service Bus namespaces should have double encryption enabled
Enabling double encryption helps protect and safeguard your data to meet your organizational security and compliance commitments. When double encryption has been enabled, data in the storage account is encrypted twice, once at the service level and once at the infrastructure level, using two different encryption algorithms and two different keys.
Deny
Disabled
Audit
Deny
Disabled
Audit
Service Bus Service Bus Premium namespaces should use a customer-managed key for encryption
Azure Service Bus supports the option of encrypting data at rest with either Microsoft-managed keys (default) or customer-managed keys. Choosing to encrypt data using customer-managed keys enables you to assign, rotate, disable, and revoke access to the keys that Service Bus will use to encrypt data in your namespace. Note that Service Bus only supports encryption with customer-managed keys for premium namespaces.
Audit
Disabled
Audit
Disabled
Service Fabric Service Fabric clusters should have the ClusterProtectionLevel property set to EncryptAndSign
Service Fabric provides three levels of protection (None, Sign and EncryptAndSign) for node-to-node communication using a primary cluster certificate. Set the protection level to ensure that all node-to-node messages are encrypted and digitally signed
Audit
Deny
Disabled
Service Fabric Service Fabric clusters should only use Azure Active Directory for client authentication
Audit usage of client authentication only via Azure Active Directory in Service Fabric
Audit
Deny
Disabled
SignalR Azure SignalR Service should use private link
Azure Private Link lets you connect your virtual network to Azure services without a public IP address at the source or destination. The private link platform handles the connectivity between the consumer and services over the Azure backbone network. By mapping private endpoints to your Azure SignalR Service resource instead of the entire service, you'll reduce your data leakage risks. Learn more about private links at: https://aka.ms/asrs/privatelink.
Audit
Disabled
SignalR Deploy - Configure private DNS zones for private endpoints connect to Azure SignalR Service
Use private DNS zones to override the DNS resolution for a private endpoint. A private DNS zone links to your virtual network to resolve to Azure SignalR Service resource. Learn more at: https://aka.ms/asrs/privatelink.
DeployIfNotExists
Disabled
Site Recovery [Preview]: Configure Azure Recovery Services vaults to use private DNS zones
Use private DNS zones to override the DNS resolution for a private endpoint. A private DNS zone links to your virtual network to resolve to Recovery Services Vaults. Learn more at: https://aka.ms/privatednszone.
DeployIfNotExists
Disabled
Site Recovery Deploy RV ASR Health Monitoring Alerts
Policy to audit/update Recovery Vault ASR Health Alerting to Azure monitor alerts
modify
disabled
audit
modify
disabled
audit
modify
disabled
audit
Site Recovery Deploy RV Backup Health Monitoring Alerts
Policy to audit/update Recovery Vault Backup Health Alerting to Azure monitor alerts
modify
disabled
audit
modify
disabled
audit
modify
disabled
audit
SQL [Preview]: Azure PostgreSQL flexible server should have Microsoft Entra Only Authentication enabled
Disabling local authentication methods and allowing only Microsoft Entra Authentication improves security by ensuring that Azure PostgreSQL flexible server can exclusively be accessed by Microsoft Entra identities.
Audit
Disabled
SQL A Microsoft Entra administrator should be provisioned for MySQL servers
Audit provisioning of a Microsoft Entra administrator for your MySQL server to enable Microsoft Entra authentication. Microsoft Entra authentication enables simplified permission management and centralized identity management of database users and other Microsoft services
AuditIfNotExists
Disabled
SQL A Microsoft Entra administrator should be provisioned for PostgreSQL servers
Audit provisioning of a Microsoft Entra administrator for your PostgreSQL server to enable Microsoft Entra authentication. Microsoft Entra authentication enables simplified permission management and centralized identity management of database users and other Microsoft services
AuditIfNotExists
Disabled
SQL An Azure Active Directory administrator should be provisioned for SQL servers
Audit provisioning of an Azure Active Directory administrator for your SQL server to enable Azure AD authentication. Azure AD authentication enables simplified permission management and centralized identity management of database users and other Microsoft services
AuditIfNotExists
Disabled
SQL Auditing on SQL server should be enabled
Auditing on your SQL Server should be enabled to track database activities across all databases on the server and save them in an audit log.
AuditIfNotExists
Disabled
SQL Azure Database for MySQL server deploy a specific min TLS version and enforce SSL.
Deploy a specific min TLS version requirement and enforce SSL on Azure Database for MySQL server. Enforce the Server to client applications using minimum version of Tls to secure the connection between your database server and your client applications helps protect against 'man in the middle' attacks by encrypting the data stream between the server and your application. This configuration enforces that SSL is always enabled for accessing your database server.
DeployIfNotExists
Disabled
SQL **Azure Database for PostgreSQL server deploy a specific min TLS version requirement and enforce SSL **
Deploy a specific min TLS version requirement and enforce SSL on Azure Database for PostgreSQL server. Enables secure server to client by enforce minimal Tls Version to secure the connection between your database server and your client applications helps protect against 'man in the middle' attacks by encrypting the data stream between the server and your application. This configuration enforces that SSL is always enabled for accessing your database server.
DeployIfNotExists
Disabled
SQL Azure Defender for SQL should be enabled for unprotected Azure SQL servers
Audit SQL servers without Advanced Data Security
AuditIfNotExists
Disabled
SQL Azure Defender for SQL should be enabled for unprotected SQL Managed Instances
Audit each SQL Managed Instance without advanced data security.
AuditIfNotExists
Disabled
SQL Azure MySQL flexible server should have Microsoft Entra Only Authentication enabled
Disabling local authentication methods and allowing only Microsoft Entra Authentication improves security by ensuring that Azure MySQL flexible server can exclusively be accessed by Microsoft Entra identities.
AuditIfNotExists
Disabled
SQL Azure SQL Database should be running TLS version 1.2 or newer
Setting TLS version to 1.2 or newer improves security by ensuring your Azure SQL Database can only be accessed from clients using TLS 1.2 or newer. Using versions of TLS less than 1.2 is not recommended since they have well documented security vulnerabilities.
Deny
Disabled
Audit
Audit
Deny
Disabled
SQL Azure SQL Database should have Microsoft Entra-only authentication enabled
Require Azure SQL logical servers to use Microsoft Entra-only authentication. This policy doesn't block servers from being created with local authentication enabled. It does block local authentication from being enabled on resources after create. Consider using the 'Microsoft Entra-only authentication' initiative instead to require both. Learn more at: https://aka.ms/adonlycreate.
Audit
Deny
Disabled
SQL Azure SQL Database should have Microsoft Entra-only authentication enabled during creation
Require Azure SQL logical servers to be created with Microsoft Entra-only authentication. This policy doesn't block local authentication from being re-enabled on resources after create. Consider using the 'Microsoft Entra-only authentication' initiative instead to require both. Learn more at: https://aka.ms/adonlycreate.
Deny
Disabled
Audit
Deny
Disabled
Audit
Audit
Deny
Disabled
SQL Azure SQL Database should have the minimal TLS version set to the highest version
Setting minimal TLS version to 1.2 improves security by ensuring your Azure SQL Database can only be accessed from clients using TLS 1.2. Using versions of TLS less than 1.2 is not reccomended since they have well documented security vunerabilities.
Audit
Deny
Disabled
SQL Azure SQL Managed Instance should have Microsoft Entra-only authentication enabled
Require Azure SQL Managed Instance to use Microsoft Entra-only authentication. This policy doesn't block Azure SQL Managed instances from being created with local authentication enabled. It does block local authentication from being enabled on resources after create. Consider using the 'Microsoft Entra-only authentication' initiative instead to require both. Learn more at: https://aka.ms/adonlycreate.
Audit
Deny
Disabled
SQL Azure SQL Managed Instances should disable public network access
Disabling public network access (public endpoint) on Azure SQL Managed Instances improves security by ensuring that they can only be accessed from inside their virtual networks or via Private Endpoints. To learn more about public network access, visit https://aka.ms/mi-public-endpoint.
Audit
Deny
Disabled
Deny
Disabled
Audit
SQL Azure SQL Managed Instances should have Microsoft Entra-only authentication enabled during creation
Require Azure SQL Managed Instance to be created with Microsoft Entra-only authentication. This policy doesn't block local authentication from being re-enabled on resources after create. Consider using the 'Microsoft Entra-only authentication' initiative instead to require both. Learn more at: https://aka.ms/adonlycreate.
Deny
Disabled
Audit
Deny
Disabled
Audit
Audit
Deny
Disabled
SQL Configure Advanced Threat Protection to be enabled on Azure database for MariaDB servers
Enable Advanced Threat Protection on your non-Basic tier Azure database for MariaDB servers to detect anomalous activities indicating unusual and potentially harmful attempts to access or exploit databases.
DeployIfNotExists
Disabled
SQL Configure Advanced Threat Protection to be enabled on Azure database for MySQL servers
Enable Advanced Threat Protection on your non-Basic tier Azure database for MySQL servers to detect anomalous activities indicating unusual and potentially harmful attempts to access or exploit databases.
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
SQL Configure Advanced Threat Protection to be enabled on Azure database for PostgreSQL servers
Enable Advanced Threat Protection on your non-Basic tier Azure database for PostgreSQL servers to detect anomalous activities indicating unusual and potentially harmful attempts to access or exploit databases.
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
SQL Configure Azure Defender to be enabled on SQL managed instances
Enable Azure Defender on your Azure SQL Managed Instances to detect anomalous activities indicating unusual and potentially harmful attempts to access or exploit databases.
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
SQL Configure Azure Defender to be enabled on SQL servers
Enable Azure Defender on your Azure SQL Servers to detect anomalous activities indicating unusual and potentially harmful attempts to access or exploit databases.
DeployIfNotExists
SQL Configure Azure SQL Server to disable public network access
Disabling the public network access property shuts down public connectivity such that Azure SQL Server can only be accessed from a private endpoint. This configuration disables the public network access for all databases under the Azure SQL Server.
Modify
Disabled
Modify
Disabled
SQL Deploy Advanced Data Security on SQL servers
This policy enables Advanced Data Security on SQL Servers. This includes turning on Threat Detection and Vulnerability Assessment. It will automatically create a storage account in the same region and resource group as the SQL server to store scan results, with a 'sqlva' prefix.
DeployIfNotExists DeployIfNotExists
SQL Enforce SSL connection should be enabled for MySQL database servers
Azure Database for MySQL supports connecting your Azure Database for MySQL server to client applications using Secure Sockets Layer (SSL). Enforcing SSL connections between your database server and your client applications helps protect against 'man in the middle' attacks by encrypting the data stream between the server and your application. This configuration enforces that SSL is always enabled for accessing your database server.
Audit
Disabled
SQL Enforce SSL connection should be enabled for PostgreSQL database servers
Azure Database for PostgreSQL supports connecting your Azure Database for PostgreSQL server to client applications using Secure Sockets Layer (SSL). Enforcing SSL connections between your database server and your client applications helps protect against 'man in the middle' attacks by encrypting the data stream between the server and your application. This configuration enforces that SSL is always enabled for accessing your database server.
Audit
Disabled
SQL Geo-redundant backup should be enabled for Azure Database for MariaDB
Azure Database for MariaDB allows you to choose the redundancy option for your database server. It can be set to a geo-redundant backup storage in which the data is not only stored within the region in which your server is hosted, but is also replicated to a paired region to provide recovery option in case of a region failure. Configuring geo-redundant storage for backup is only allowed during server create.
Audit
Disabled
SQL Geo-redundant backup should be enabled for Azure Database for MySQL
Azure Database for MySQL allows you to choose the redundancy option for your database server. It can be set to a geo-redundant backup storage in which the data is not only stored within the region in which your server is hosted, but is also replicated to a paired region to provide recovery option in case of a region failure. Configuring geo-redundant storage for backup is only allowed during server create.
Audit
Disabled
SQL Geo-redundant backup should be enabled for Azure Database for PostgreSQL
Azure Database for PostgreSQL allows you to choose the redundancy option for your database server. It can be set to a geo-redundant backup storage in which the data is not only stored within the region in which your server is hosted, but is also replicated to a paired region to provide recovery option in case of a region failure. Configuring geo-redundant storage for backup is only allowed during server create.
Audit
Disabled
SQL Infrastructure encryption should be enabled for Azure Database for MySQL servers
Enable infrastructure encryption for Azure Database for MySQL servers to have higher level of assurance that the data is secure. When infrastructure encryption is enabled, the data at rest is encrypted twice using FIPS 140-2 compliant Microsoft managed keys.
Deny
Disabled
Audit
Deny
Disabled
Audit
SQL MySQL database servers enforce SSL connections.
Azure Database for MySQL supports connecting your Azure Database for MySQL server to client applications using Secure Sockets Layer (SSL). Enforcing SSL connections between your database server and your client applications helps protect against 'man in the middle' attacks by encrypting the data stream between the server and your application. This configuration enforces that SSL is always enabled for accessing your database server.
Audit
Deny
Disabled
SQL MySQL servers should use customer-managed keys to encrypt data at rest
Use customer-managed keys to manage the encryption at rest of your MySQL servers. By default, the data is encrypted at rest with service-managed keys, but customer-managed keys are commonly required to meet regulatory compliance standards. Customer-managed keys enable the data to be encrypted with an Azure Key Vault key created and owned by you. You have full control and responsibility for the key lifecycle, including rotation and management.
AuditIfNotExists
Disabled
AuditIfNotExists
Disabled
Disabled
AuditIfNotExists
SQL PostgreSQL database servers enforce SSL connection.
Azure Database for PostgreSQL supports connecting your Azure Database for PostgreSQL server to client applications using Secure Sockets Layer (SSL). Enforcing SSL connections between your database server and your client applications helps protect against 'man in the middle' attacks by encrypting the data stream between the server and your application. This configuration enforces that SSL is always enabled for accessing your database server.
Audit
Deny
Disabled
SQL PostgreSQL servers should use customer-managed keys to encrypt data at rest
Use customer-managed keys to manage the encryption at rest of your PostgreSQL servers. By default, the data is encrypted at rest with service-managed keys, but customer-managed keys are commonly required to meet regulatory compliance standards. Customer-managed keys enable the data to be encrypted with an Azure Key Vault key created and owned by you. You have full control and responsibility for the key lifecycle, including rotation and management.
AuditIfNotExists
Disabled
AuditIfNotExists
Disabled
Disabled
AuditIfNotExists
SQL Private endpoint connections on Azure SQL Database should be enabled
Private endpoint connections enforce secure communication by enabling private connectivity to Azure SQL Database.
Audit
Disabled
SQL Private endpoint should be enabled for MariaDB servers
Private endpoint connections enforce secure communication by enabling private connectivity to Azure Database for MariaDB. Configure a private endpoint connection to enable access to traffic coming only from known networks and prevent access from all other IP addresses, including within Azure.
AuditIfNotExists
Disabled
SQL Private endpoint should be enabled for MySQL servers
Private endpoint connections enforce secure communication by enabling private connectivity to Azure Database for MySQL. Configure a private endpoint connection to enable access to traffic coming only from known networks and prevent access from all other IP addresses, including within Azure.
AuditIfNotExists
Disabled
SQL Private endpoint should be enabled for PostgreSQL servers
Private endpoint connections enforce secure communication by enabling private connectivity to Azure Database for PostgreSQL. Configure a private endpoint connection to enable access to traffic coming only from known networks and prevent access from all other IP addresses, including within Azure.
AuditIfNotExists
Disabled
SQL Public network access on Azure SQL Database should be disabled
Disabling the public network access property improves security by ensuring your Azure SQL Database can only be accessed from a private endpoint. This configuration denies all logins that match IP or virtual network based firewall rules.
Audit
Deny
Disabled
Deny
Disabled
Audit
SQL Public network access should be disabled for MariaDB servers
Disable the public network access property to improve security and ensure your Azure Database for MariaDB can only be accessed from a private endpoint. This configuration strictly disables access from any public address space outside of Azure IP range, and denies all logins that match IP or virtual network-based firewall rules.
Audit
Deny
Disabled
Deny
Disabled
Audit
SQL Public network access should be disabled for MySQL flexible servers
Disabling the public network access property improves security by ensuring your Azure Database for MySQL flexible servers can only be accessed from a private endpoint. This configuration strictly disables access from any public address space outside of Azure IP range and denies all logins that match IP or virtual network-based firewall rules.
Deny
Disabled
Audit
SQL Public network access should be disabled for MySQL servers
Disable the public network access property to improve security and ensure your Azure Database for MySQL can only be accessed from a private endpoint. This configuration strictly disables access from any public address space outside of Azure IP range, and denies all logins that match IP or virtual network-based firewall rules.
Audit
Deny
Disabled
Deny
Disabled
Audit
SQL Public network access should be disabled for PostgreSQL flexible servers
Disabling the public network access property improves security by ensuring your Azure Database for PostgreSQL flexible servers can only be accessed from a private endpoint. This configuration strictly disables access from any public address space outside of Azure IP range and denies all logins that match IP based firewall rules.
Deny
Disabled
Audit
SQL Public network access should be disabled for PostgreSQL servers
Disable the public network access property to improve security and ensure your Azure Database for PostgreSQL can only be accessed from a private endpoint. This configuration disables access from any public address space outside of Azure IP range, and denies all logins that match IP or virtual network-based firewall rules.
Audit
Deny
Disabled
Deny
Disabled
Audit
SQL SQL Managed Instance should have the minimal TLS version of 1.2
Setting minimal TLS version to 1.2 improves security by ensuring your SQL Managed Instance can only be accessed from clients using TLS 1.2. Using versions of TLS less than 1.2 is not recommended since they have well documented security vulnerabilities.
Audit
Disabled
SQL SQL Managed Instance should have the minimal TLS version set to the highest version
Setting minimal TLS version to 1.2 improves security by ensuring your SQL Managed Instance can only be accessed from clients using TLS 1.2. Using versions of TLS less than 1.2 is not recommended since they have well documented security vulnerabilities.
Audit
Deny
Disabled
SQL SQL managed instances deploy a specific min TLS version requirement.
Deploy a specific min TLS version requirement and enforce SSL on SQL managed instances. Enables secure server to client by enforce minimal Tls Version to secure the connection between your database server and your client applications helps protect against 'man in the middle' attacks by encrypting the data stream between the server and your application. This configuration enforces that SSL is always enabled for accessing your database server.
DeployIfNotExists
Disabled
SQL SQL managed instances should use customer-managed keys to encrypt data at rest
Implementing Transparent Data Encryption (TDE) with your own key provides you with increased transparency and control over the TDE Protector, increased security with an HSM-backed external service, and promotion of separation of duties. This recommendation applies to organizations with a related compliance requirement.
Deny
Disabled
Audit
Deny
Disabled
Audit
Disabled
Deny
Audit
SQL SQL servers deploys a specific min TLS version requirement.
Deploys a specific min TLS version requirement and enforce SSL on SQL servers. Enables secure server to client by enforce minimal Tls Version to secure the connection between your database server and your client applications helps protect against 'man in the middle' attacks by encrypting the data stream between the server and your application. This configuration enforces that SSL is always enabled for accessing your database server.
DeployIfNotExists
Disabled
SQL SQL servers should use customer-managed keys to encrypt data at rest
Implementing Transparent Data Encryption (TDE) with your own key provides increased transparency and control over the TDE Protector, increased security with an HSM-backed external service, and promotion of separation of duties. This recommendation applies to organizations with a related compliance requirement.
Deny
Disabled
Audit
Deny
Disabled
Audit
Disabled
Deny
Audit
SQL SQL servers with auditing to storage account destination should be configured with 90 days retention or higher
For incident investigation purposes, we recommend setting the data retention for your SQL Server' auditing to storage account destination to at least 90 days. Confirm that you are meeting the necessary retention rules for the regions in which you are operating. This is sometimes required for compliance with regulatory standards.
AuditIfNotExists
Disabled
SQL Transparent Data Encryption on SQL databases should be enabled
Transparent data encryption should be enabled to protect data-at-rest and meet compliance requirements
AuditIfNotExists
Disabled
SQL Vulnerability assessment should be enabled on SQL Managed Instance
Audit each SQL Managed Instance which doesn't have recurring vulnerability assessment scans enabled. Vulnerability assessment can discover, track, and help you remediate potential database vulnerabilities.
AuditIfNotExists
Disabled
SQL Vulnerability assessment should be enabled on your SQL servers
Audit Azure SQL servers which do not have vulnerability assessment properly configured. Vulnerability assessment can discover, track, and help you remediate potential database vulnerabilities.
AuditIfNotExists
Disabled
Stack HCI [Preview]: Azure Stack HCI servers should have consistently enforced application control policies
At a minimum, apply the Microsoft WDAC base policy in enforced mode on all Azure Stack HCI servers. Applied Windows Defender Application Control (WDAC) policies must be consistent across servers in the same cluster.
AuditIfNotExists
Disabled
Audit
Stack HCI [Preview]: Azure Stack HCI servers should meet Secured-core requirements
Ensure that all Azure Stack HCI servers meet the Secured-core requirements. To enable the Secured-core server requirements: 1. From the Azure Stack HCI clusters page, go to Windows Admin Center and select Connect. 2. Go to the Security extension and select Secured-core. 3. Select any setting that is not enabled and click Enable.
AuditIfNotExists
Disabled
Audit
Stack HCI [Preview]: Azure Stack HCI systems should have encrypted volumes
Use BitLocker to encrypt the OS and data volumes on Azure Stack HCI systems.
AuditIfNotExists
Disabled
Audit
Stack HCI [Preview]: Host and VM networking should be protected on Azure Stack HCI systems
Protect data on the Azure Stack HCI hosts network and on virtual machine network connections.
AuditIfNotExists
Disabled
Audit
Storage Allowed Copy scope should be restricted for Storage Accounts
Azure Storage accounts should restrict the allowed copy scope. Enforce this for increased data exfiltration protection.
Deny
Disabled
Audit
Deny
Disabled
Audit
Storage **Azure Storage deploy a specific min TLS version requirement and enforce SSL/HTTPS **
Deploy a specific min TLS version requirement and enforce SSL on Azure Storage. Enables secure server to client by enforce minimal Tls Version to secure the connection between your database server and your client applications helps protect against 'man in the middle' attacks by encrypting the data stream between the server and your application. This configuration enforces that SSL is always enabled for accessing your Azure Storage.
DeployIfNotExists
Disabled
Storage Configure a private DNS Zone ID for blob groupID
Configure private DNS zone group to override the DNS resolution for a blob groupID private endpoint.
DeployIfNotExists
Disabled
Storage Configure a private DNS Zone ID for blob_secondary groupID
Configure private DNS zone group to override the DNS resolution for a blob_secondary groupID private endpoint.
DeployIfNotExists
Disabled
Storage Configure a private DNS Zone ID for dfs groupID
Configure private DNS zone group to override the DNS resolution for a dfs groupID private endpoint.
DeployIfNotExists
Disabled
Storage Configure a private DNS Zone ID for dfs_secondary groupID
Configure private DNS zone group to override the DNS resolution for a dfs_secondary groupID private endpoint.
DeployIfNotExists
Disabled
Storage Configure a private DNS Zone ID for file groupID
Configure private DNS zone group to override the DNS resolution for a file groupID private endpoint.
DeployIfNotExists
Disabled
Storage Configure a private DNS Zone ID for queue groupID
Configure private DNS zone group to override the DNS resolution for a queue groupID private endpoint.
DeployIfNotExists
Disabled
Storage Configure a private DNS Zone ID for queue_secondary groupID
Configure private DNS zone group to override the DNS resolution for a queue_secondary groupID private endpoint.
DeployIfNotExists
Disabled
Storage Configure a private DNS Zone ID for table groupID
Configure private DNS zone group to override the DNS resolution for a table groupID private endpoint.
DeployIfNotExists
Disabled
Storage Configure a private DNS Zone ID for table_secondary groupID
Configure private DNS zone group to override the DNS resolution for a table_secondary groupID private endpoint.
DeployIfNotExists
Disabled
Storage Configure a private DNS Zone ID for web groupID
Configure private DNS zone group to override the DNS resolution for a web groupID private endpoint.
DeployIfNotExists
Disabled
Storage Configure a private DNS Zone ID for web_secondary groupID
Configure private DNS zone group to override the DNS resolution for a web_secondary groupID private endpoint.
DeployIfNotExists
Disabled
Storage Configure Azure File Sync to use private DNS zones
To access the private endpoint(s) for Storage Sync Service resource interfaces from a registered server, you need to configure your DNS to resolve the correct names to your private endpoint's private IP addresses. This policy creates the requisite Azure Private DNS Zone and A records for the interfaces of your Storage Sync Service private endpoint(s).
DeployIfNotExists
Disabled
Storage Configure storage accounts to disable public network access
To improve the security of Storage Accounts, ensure that they aren't exposed to the public internet and can only be accessed from a private endpoint. Disable the public network access property as described in https://aka.ms/storageaccountpublicnetworkaccess. This option disables access from any public address space outside the Azure IP range, and denies all logins that match IP or virtual network-based firewall rules. This reduces data leakage risks.
Modify
Disabled
Modify
Disabled
Storage Configure your Storage account public access to be disallowed
Anonymous public read access to containers and blobs in Azure Storage is a convenient way to share data but might present security risks. To prevent data breaches caused by undesired anonymous access, Microsoft recommends preventing public access to a storage account unless your scenario requires it.
Modify
Disabled
Modify
Disabled
Storage Deploy Defender for Storage (Classic) on storage accounts
This policy enables Defender for Storage (Classic) on storage accounts.
DeployIfNotExists
Disabled
DeployIfNotExists
Disabled
Storage Deploy SA Availability Alert
Policy to audit/deploy SA Availability Alert
deployIfNotExists
disabled
deployIfNotExists
disabled
deployIfNotExists
disabled
Storage Encryption for storage services should be enforced for Storage Accounts
Azure Storage accounts should enforce encryption for all storage services. Enforce this for increased encryption scope.
Deny
Disabled
Audit
Deny
Disabled
Audit
Storage Local users should be restricted for Storage Accounts
Azure Storage accounts should disable local users for features like SFTP. Enforce this for increased data exfiltration protection.
Disabled
Deny
Audit
Disabled
Deny
Audit
Storage Modify - Configure Azure File Sync to disable public network access
The Azure File Sync's internet-accessible public endpoint are disabled by your organizational policy. You may still access the Storage Sync Service via its private endpoint(s).
Modify
Disabled
Modify
Disabled
Storage Network ACL bypass option should be restricted for Storage Accounts
Azure Storage accounts should restrict the bypass option for service-level network ACLs. Enforce this for increased data exfiltration protection.
Deny
Disabled
Audit
Deny
Disabled
Audit
Storage Public network access should be disabled for Azure File Sync
Disabling the public endpoint allows you to restrict access to your Storage Sync Service resource to requests destined to approved private endpoints on your organization's network. There is nothing inherently insecure about allowing requests to the public endpoint, however, you may wish to disable it to meet regulatory, legal, or organizational policy requirements. You can disable the public endpoint for a Storage Sync Service by setting the incomingTrafficPolicy of the resource to AllowVirtualNetworksOnly.
Deny
Disabled
Audit
Storage Queue Storage should use customer-managed key for encryption
Secure your queue storage with greater flexibility using customer-managed keys. When you specify a customer-managed key, that key is used to protect and control access to the key that encrypts your data. Using customer-managed keys provides additional capabilities to control rotation of the key encryption key or cryptographically erase data.
Deny
Disabled
Audit
Deny
Disabled
Audit
Storage Resource Access Rules resource IDs should be restricted for Storage Accounts
Azure Storage accounts should restrict the resource access rule for service-level network ACLs to services from a specific Azure subscription. Enforce this for increased data exfiltration protection.
Deny
Disabled
Audit
Deny
Disabled
Audit
Storage Resource Access Rules Tenants should be restricted for Storage Accounts
Azure Storage accounts should restrict the resource access rule for service-level network ACLs to service from the same AAD tenant. Enforce this for increased data exfiltration protection.
Deny
Disabled
Audit
Deny
Disabled
Audit
Storage Secure transfer to storage accounts should be enabled
Audit requirement of Secure transfer in your storage account. Secure transfer is an option that forces your storage account to accept requests only from secure connections (HTTPS). Use of HTTPS ensures authentication between the server and the service and protects data in transit from network layer attacks such as man-in-the-middle, eavesdropping, and session-hijacking
Audit
Deny
Disabled
Storage Storage account encryption scopes should use customer-managed keys to encrypt data at rest
Use customer-managed keys to manage the encryption at rest of your storage account encryption scopes. Customer-managed keys enable the data to be encrypted with an Azure key-vault key created and owned by you. You have full control and responsibility for the key lifecycle, including rotation and management. Learn more about storage account encryption scopes at https://aka.ms/encryption-scopes-overview.
Deny
Disabled
Audit
Deny
Disabled
Audit
Storage Storage account encryption scopes should use double encryption for data at rest
Enable infrastructure encryption for encryption at rest of your storage account encryption scopes for added security. Infrastructure encryption ensures that your data is encrypted twice.
Deny
Disabled
Audit
Deny
Disabled
Audit
Storage Storage account keys should not be expired
Ensure the user storage account keys are not expired when key expiration policy is set, for improving security of account keys by taking action when the keys are expired.
Deny
Disabled
Audit
Deny
Disabled
Audit
Storage Storage account public access should be disallowed
Anonymous public read access to containers and blobs in Azure Storage is a convenient way to share data but might present security risks. To prevent data breaches caused by undesired anonymous access, Microsoft recommends preventing public access to a storage account unless your scenario requires it.
audit
deny
disabled
Deny
deny
disabled
audit
Storage Storage accounts should be migrated to new Azure Resource Manager resources
Use new Azure Resource Manager for your storage accounts to provide security enhancements such as: stronger access control (RBAC), better auditing, Azure Resource Manager based deployment and governance, access to managed identities, access to key vault for secrets, Azure AD-based authentication and support for tags and resource groups for easier security management
Deny
Disabled
Audit
Deny
Disabled
Audit
Audit
Deny
Disabled
Storage Storage accounts should disable public network access
To improve the security of Storage Accounts, ensure that they aren't exposed to the public internet and can only be accessed from a private endpoint. Disable the public network access property as described in https://aka.ms/storageaccountpublicnetworkaccess. This option disables access from any public address space outside the Azure IP range, and denies all logins that match IP or virtual network-based firewall rules. This reduces data leakage risks.
Deny
Disabled
Audit
Storage Storage accounts should have infrastructure encryption
Enable infrastructure encryption for higher level of assurance that the data is secure. When infrastructure encryption is enabled, data in a storage account is encrypted twice.
Deny
Disabled
Audit
Deny
Disabled
Audit
Storage Storage accounts should have the specified minimum TLS version
Configure a minimum TLS version for secure communication between the client application and the storage account. To minimize security risk, the recommended minimum TLS version is the latest released version, which is currently TLS 1.2.
Deny
Disabled
Audit
Storage Storage accounts should prevent cross tenant object replication
Audit restriction of object replication for your storage account. By default, users can configure object replication with a source storage account in one Azure AD tenant and a destination account in a different tenant. It is a security concern because customer's data can be replicated to a storage account that is owned by the customer. By setting allowCrossTenantReplication to false, objects replication can be configured only if both source and destination accounts are in the same Azure AD tenant.
Deny
Disabled
Audit
Deny
Disabled
Audit
Storage Storage accounts should prevent shared key access
Audit requirement of Azure Active Directory (Azure AD) to authorize requests for your storage account. By default, requests can be authorized with either Azure Active Directory credentials, or by using the account access key for Shared Key authorization. Of these two types of authorization, Azure AD provides superior security and ease of use over Shared Key, and is recommended by Microsoft.
Deny
Disabled
Audit
Deny
Disabled
Audit
Audit
Deny
Disabled
Storage Storage Accounts should restrict CORS rules
Deny CORS rules for storage account for increased data exfiltration protection and endpoint protection.
Deny
Disabled
Audit
Deny
Disabled
Audit
Storage Storage accounts should restrict network access
Network access to storage accounts should be restricted. Configure network rules so only applications from allowed networks can access the storage account. To allow connections from specific internet or on-premises clients, access can be granted to traffic from specific Azure virtual networks or to public internet IP address ranges
Deny
Disabled
Audit
Deny
Disabled
Audit
Disabled
Deny
Audit
Storage Storage accounts should restrict network access using virtual network rules
Protect your storage accounts from potential threats using virtual network rules as a preferred method instead of IP-based filtering. Disabling IP-based filtering prevents public IPs from accessing your storage accounts.
Deny
Disabled
Audit
Deny
Disabled
Audit
Audit
Deny
Disabled
Storage Storage Accounts should use a container delete retention policy
Enforce container delete retention policies larger than seven days for storage account. Enable this for increased data loss protection.
Deny
Disabled
Audit
Deny
Disabled
Audit
Storage Storage accounts should use customer-managed key for encryption
Secure your blob and file storage account with greater flexibility using customer-managed keys. When you specify a customer-managed key, that key is used to protect and control access to the key that encrypts your data. Using customer-managed keys provides additional capabilities to control rotation of the key encryption key or cryptographically erase data.
Audit
Disabled
Audit
Disabled
Disabled
Audit
Storage Storage accounts should use private link
Azure Private Link lets you connect your virtual network to Azure services without a public IP address at the source or destination. The Private Link platform handles the connectivity between the consumer and services over the Azure backbone network. By mapping private endpoints to your storage account, data leakage risks are reduced. Learn more about private links at - https://aka.ms/azureprivatelinkoverview
AuditIfNotExists
Disabled
Storage Storage Accounts with SFTP enabled should be denied
This policy denies the creation of Storage Accounts with SFTP enabled for Blob Storage.
Deny
Disabled
Audit
Deny
Disabled
Audit
Storage Table Storage should use customer-managed key for encryption
Secure your table storage with greater flexibility using customer-managed keys. When you specify a customer-managed key, that key is used to protect and control access to the key that encrypts your data. Using customer-managed keys provides additional capabilities to control rotation of the key encryption key or cryptographically erase data.
Deny
Disabled
Audit
Deny
Disabled
Audit
Storage Virtual network rules should be restricted for Storage Accounts
Azure Storage accounts should restrict the virtual network service-level network ACLs. Enforce this for increased data exfiltration protection.
Deny
Disabled
Audit
Deny
Disabled
Audit
Stream Analytics Azure Stream Analytics jobs should use customer-managed keys to encrypt data
Use customer-managed keys when you want to securely store any metadata and private data assets of your Stream Analytics jobs in your storage account. This gives you total control over how your Stream Analytics data is encrypted.
deny
disabled
audit
deny
disabled
audit
Stream Analytics Resource logs in Azure Stream Analytics should be enabled
Audit enabling of resource logs. This enables you to recreate activity trails to use for investigation purposes; when a security incident occurs or when your network is compromised
AuditIfNotExists
Disabled
Synapse Azure Synapse Workspace SQL Server should be running TLS version 1.2 or newer
Setting TLS version to 1.2 or newer improves security by ensuring your Azure Synapse workspace SQL server can only be accessed from clients using TLS 1.2 or newer. Using versions of TLS less than 1.2 is not recommended since they have well documented security vulnerabilities.
Deny
Disabled
Audit
Synapse Azure Synapse workspaces should allow outbound data traffic only to approved targets
Increase security of your Synapse workspace by allowing outbound data traffic only to approved targets. This helps prevention against data exfiltration by validating the target before sending data.
Deny
Disabled
Audit
Deny
Disabled
Audit
Synapse Azure Synapse workspaces should disable public network access
Disabling public network access improves security by ensuring that the Synapse workspace isn't exposed on the public internet. Creating private endpoints can limit exposure of your Synapse workspaces. Learn more at: https://docs.microsoft.com/azure/synapse-analytics/security/connectivity-settings.
Deny
Disabled
Audit
Synapse Azure Synapse workspaces should use customer-managed keys to encrypt data at rest
Use customer-managed keys to control the encryption at rest of the data stored in Azure Synapse workspaces. Customer-managed keys deliver double encryption by adding a second layer of encryption on top of the default encryption with service-managed keys.
Deny
Disabled
Audit
Deny
Disabled
Audit
Synapse Configure Azure Synapse Workspace Dedicated SQL minimum TLS version
Customers can raise or lower the minimal TLS version using the API, for both new Synapse workspaces or existing workspaces. So users who need to use a lower client version in the workspaces can connect while users who has security requirement can raise the minimum TLS version. Learn more at: https://docs.microsoft.com/azure/synapse-analytics/security/connectivity-settings.
Modify
Disabled
Modify
Disabled
Synapse Configure Azure Synapse workspaces to disable public network access
Disable public network access for your Synapse workspace so that it is not accessible over the public internet. This can reduce data leakage risks. Learn more at: https://docs.microsoft.com/azure/synapse-analytics/security/connectivity-settings.
Modify
Disabled
Modify
Disabled
Synapse Configure Azure Synapse workspaces to use private DNS zones
Use private DNS zones to override the DNS resolution for a private endpoint. A private DNS zone links to your virtual network to resolve to Azure Synapse workspace. Learn more at: https://docs.microsoft.com/azure/synapse-analytics/security/how-to-connect-to-workspace-from-restricted-network#appendix-dns-registration-for-private-endpoint.
DeployIfNotExists
Disabled
Synapse Configure Azure Synapse workspaces to use private DNS zones
Use private DNS zones to override the DNS resolution for a private endpoint. A private DNS zone links to your virtual network to resolve to Azure Synapse workspace. Learn more at: https://docs.microsoft.com/azure/synapse-analytics/security/how-to-connect-to-workspace-from-restricted-network#appendix-dns-registration-for-private-endpoint.
DeployIfNotExists
Disabled
Synapse Configure Azure Synapse workspaces to use private DNS zones
Use private DNS zones to override the DNS resolution for a private endpoint. A private DNS zone links to your virtual network to resolve to Azure Synapse workspace. Learn more at: https://docs.microsoft.com/azure/synapse-analytics/security/how-to-connect-to-workspace-from-restricted-network#appendix-dns-registration-for-private-endpoint.
DeployIfNotExists
Disabled
Synapse Configure Synapse Workspaces to use only Microsoft Entra identities for authentication during workspace creation
Require and reconfigure Synapse Workspaces to be created with Microsoft Entra-only authentication. This policy doesn't block local authentication from being re-enabled on resources after create. Consider using the 'Microsoft Entra-only authentication' initiative instead to require both. Learn more at: https://aka.ms/Synapse.
Modify
Disabled
Modify
Disabled
Synapse IP firewall rules on Azure Synapse workspaces should be removed
Removing all IP firewall rules improves security by ensuring your Azure Synapse workspace can only be accessed from a private endpoint. This configuration audits creation of firewall rules that allow public network access on the workspace.
Audit
Disabled
Audit
Disabled
Synapse Managed workspace virtual network on Azure Synapse workspaces should be enabled
Enabling a managed workspace virtual network ensures that your workspace is network isolated from other workspaces. Data integration and Spark resources deployed in this virtual network also provides user level isolation for Spark activities.
Deny
Disabled
Audit
Deny
Disabled
Audit
Synapse Synapse managed private endpoints should only connect to resources in approved Azure Active Directory tenants
Protect your Synapse workspace by only allowing connections to resources in approved Azure Active Directory (Azure AD) tenants. The approved Azure AD tenants can be defined during policy assignment.
Deny
Disabled
Audit
Deny
Disabled
Audit
Synapse Synapse Workspaces should have Microsoft Entra-only authentication enabled
Require Synapse Workspaces to use Microsoft Entra-only authentication. This policy doesn't block workspaces from being created with local authentication enabled. It does block local authentication from being enabled on resources after create. Consider using the 'Microsoft Entra-only authentication' initiative instead to require both. Learn more at: https://aka.ms/Synapse.
Audit
Deny
Disabled
Synapse Synapse Workspaces should use only Microsoft Entra identities for authentication during workspace creation
Require Synapse Workspaces to be created with Microsoft Entra-only authentication. This policy doesn't block local authentication from being re-enabled on resources after create. Consider using the 'Microsoft Entra-only authentication' initiative instead to require both. Learn more at: https://aka.ms/Synapse.
Deny
Disabled
Audit
Deny
Disabled
Audit
Audit
Deny
Disabled
Trusted Launch Disks and OS image should support TrustedLaunch
TrustedLaunch improves security of a Virtual Machine which requires OS Disk & OS Image to support it (Gen 2). To learn more about TrustedLaunch, visit https://aka.ms/trustedlaunch
Audit
Disabled
Trusted Launch Virtual Machine should have TrustedLaunch enabled
Enable TrustedLaunch on Virtual Machine for enhanced security, use VM SKU (Gen 2) that supports TrustedLaunch. To learn more about TrustedLaunch, visit https://learn.microsoft.com/en-us/azure/virtual-machines/trusted-launch
Audit
Disabled
Unknown Deploy AGW ApplicationGatewayTotalTime Alert
Policy to audit/deploy Azure Application Gateway ApplicationGatewayTotalTime Alert
deployIfNotExists
disabled
Unknown Deploy AGW BackendLastByteResponseTime Alert
Policy to audit/deploy Azure Application Gateway BackendLastByteResponseTime Alert
deployIfNotExists
disabled
Unknown Deploy AGW Capacity Units Alert
Policy to audit/deploy Azure Application Gateway CapacityUnits Alert
deployIfNotExists
disabled
Unknown Deploy AGW Compute Units Alert
Policy to audit/deploy Azure Application Gateway ComputeUnits Alert
deployIfNotExists
disabled
Unknown Deploy AGW CPU Utilization Alert
Policy to audit/deploy Azure Application Gateway CPU Utilization Alert
deployIfNotExists
disabled
Unknown Deploy AGW FailedRequests Alert
Policy to audit/deploy Azure Application Gateway FailedRequests Alert
deployIfNotExists
disabled
Unknown Deploy AGW ResponseStatus Alert
Policy to audit/deploy Azure Application Gateway ResponseStatus Alert
deployIfNotExists
disabled
Unknown Deploy AGW Unhealthy Host Count Alert
Policy to audit/deploy Azure Application Gateway Unhealthy Host Count Alert
deployIfNotExists
disabled
Unknown Deploy ALB Data Path Availability Alert
Policy to audit/deploy Azure Load Balancer Data Path Availability Alert
deployIfNotExists
disabled
deployIfNotExists
disabled
Unknown Deploy ALB Global Backend Availability Alert
Policy to audit/deploy Azure Load Balancer Global Backend Availability Alert
deployIfNotExists
disabled
deployIfNotExists
disabled
Unknown Deploy ALB Health Probe Status Alert
Policy to audit/deploy Azure Load Balancer Health Probe Status Alert
deployIfNotExists
disabled
deployIfNotExists
disabled
Unknown Deploy ALB Used SNAT Ports Alert
Policy to audit/deploy Azure Load Balancer Used SNAT Ports Alert
deployIfNotExists
disabled
deployIfNotExists
disabled
Unknown Deploy App Service Plan CPU Percentage Alert
Policy to audit/deploy App Service Plan CPU Percentage Alert
deployIfNotExists
disabled
deployIfNotExists
disabled
Unknown Deploy App Service Plan Memory Percentage Alert
Policy to audit/deploy App Service Plan Memory Percentage Alert
deployIfNotExists
disabled
deployIfNotExists
disabled
Unknown Deploy ER Direct ExpressRoute Bits In Alert
Policy to audit/deploy ER Direct Connection BitsInPerSecond Alert
deployIfNotExists
disabled
Unknown Deploy ER Direct ExpressRoute Bits Out Alert
Policy to audit/deploy ER Direct Connection BitsOutPerSecond Alert
deployIfNotExists
disabled
Unknown Deploy ER Direct ExpressRoute LineProtocol Alert
Policy to audit/deploy ER Direct LineProtocol Alert
deployIfNotExists
disabled
Unknown Deploy ER Direct ExpressRoute RxLightLevel Low Alert
Policy to audit/deploy ER Direct RxLightLevel Low Alert
deployIfNotExists
disabled
Unknown Deploy ER Direct ExpressRoute TxLightLevel High Alert
Policy to audit/deploy ER Direct TxLightLevel High Alert
deployIfNotExists
disabled
Unknown Deploy ER Direct ExpressRoute TxLightLevel Low Alert
Policy to audit/deploy ER Direct TxLightLevel Low Alert
deployIfNotExists
disabled
Unknown Deploy FrontDoor CDN Profile Origin Health Percentage Alert
Policy to audit/deploy FrontDoor Origin Health Percentage Alert
deployIfNotExists
disabled
Unknown Deploy Traffic Manager Endpoint Health Alert
Policy to audit/deploy FTraffic Manager Endpoint Health Health Alert
deployIfNotExists
disabled
VM Image Builder VM Image Builder templates should use private link
Azure Private Link lets you connect your virtual network to Azure services without a public IP address at the source or destination. The Private Link platform handles the connectivity between the consumer and services over the Azure backbone network. By mapping private endpoints to your VM Image Builder building resources, data leakage risks are reduced. Learn more about private links at: https://docs.microsoft.com/azure/virtual-machines/linux/image-builder-networking#deploy-using-an-existing-vnet.
Audit
Disabled
Web PubSub Configure Azure Web PubSub Service to use private DNS zones
Use private DNS zones to override the DNS resolution for a private endpoint. A private DNS zone links to your virtual network to resolve to Azure Web PubSub service. Learn more at: https://aka.ms/awps/privatelink.
DeployIfNotExists
Disabled
Web Services Deploy App Service Plan Disk Queue Length Alert
Policy to audit/deploy App Service Plan Disk Queue Length Alert
deployIfNotExists
disabled
deployIfNotExists
disabled
Web Services Deploy App Service Plan Http Queue Length Alert
Policy to audit/deploy App Service Plan Http Queue Length Alert
deployIfNotExists
disabled
deployIfNotExists
disabled

Policy Parameters by Policy

Category Policy Platform Landing Zones Production Decommissioned Management Corp Connectivity Sandbox Identity
API Management API Management services should use a virtual network
Azure Virtual Network deployment provides enhanced security, isolation and allows you to place your API Management service in a non-internet routable network that you control access to. These networks can then be connected to your on-premises networks using various VPN technologies, which enables access to your backend services within the network and/or on-premises. The developer portal and API gateway, can be configured to be accessible either from the Internet or only within the virtual network.
aPIManagementServicesShouldUseAVirtualN... = ["Developer", "Premium"]
App Configuration Configure private DNS zones for private endpoints connected to App Configuration
Use private DNS zones to override the DNS resolution for a private endpoint. A private DNS zone can be linked to your virtual network to resolve app configuration instances. Learn more at: https://aka.ms/appconfig/private-endpoint.
azureAppPrivateDnsZoneId = --DNSZonePrefix--privatelink.azconfig.io
App Service AppService append sites with minimum TLS version to enforce.
Append the AppService sites object to ensure that min Tls version is set to required minimum TLS version. Please note Append does not enforce compliance use then deny.
AppServiceminTlsVersion = 1.2
App Service Configure App Service apps to use private DNS zones
Use private DNS zones to override the DNS resolution for a private endpoint. A private DNS zone links a virtual network to an App Service. Learn more at: https://docs.microsoft.com/azure/app-service/networking/private-endpoint#dns.
azureAppServicesPrivateDnsZoneId = --DNSZonePrefix--privatelink.azurewebsi...
Automation Configure Azure Automation accounts with private DNS zones
Use private DNS zones to override the DNS resolution for a private endpoint. You need private DNS zone properly configured to connect to Azure Automation account via Azure Private Link. Learn more at: https://aka.ms/privatednszone.
azureAutomationWebhookPrivateDnsZoneId = --DNSZonePrefix--privatelink.azure-auto...
Automation Configure Azure Automation accounts with private DNS zones
Use private DNS zones to override the DNS resolution for a private endpoint. You need private DNS zone properly configured to connect to Azure Automation account via Azure Private Link. Learn more at: https://aka.ms/privatednszone.
azureAutomationDSCHybridPrivateDnsZoneId = --DNSZonePrefix--privatelink.azure-auto...
Automation Deploy Automation Account TotalJob Alert
Policy to audit/deploy Automation Account TotalJob Alert
AATotalJobAlertWindowSize = PT5M
AATotalJobAlertAlertState = true
AATotalJobAlertEvaluationFrequency = PT1M
AATotalJobAlertSeverity = 2
AATotalJobAlertThreshold = 20
Azure Arc Configure Azure Arc Private Link Scopes to use private DNS zones
Use private DNS zones to override the DNS resolution for a private endpoint. A private DNS zone links to your virtual network to resolve to Azure Arc Private Link Scopes. Learn more at: https://aka.ms/arc/privatelink.
azureArcGuestconfigurationPrivateDnsZoneId = --DNSZonePrefix--privatelink.guestconfi...
azureArcHybridResourceProviderPrivateDn... = --DNSZonePrefix--privatelink.his.arc.az...
azureArcKubernetesConfigurationPrivateD... = --DNSZonePrefix--privatelink.dp.kuberne...
Azure Databricks Configure Azure Databricks workspace to use private DNS zones
Use private DNS zones to override the DNS resolution for a private endpoint. A private DNS zone links to your virtual network to resolve to Azure Databricks workspaces. Learn more at: https://aka.ms/adbpe.
azureDatabricksPrivateDnsZoneId = --DNSZonePrefix--privatelink.azuredatab...
Azure Update Manager Configure periodic checking for missing system updates on azure virtual machines
Configure auto-assessment (every 24 hours) for OS updates on native Azure virtual machines. You can control the scope of assignment according to machine subscription, resource group, location or tag. Learn more about this for Windows: https://aka.ms/computevm-windowspatchassessmentmode, for Linux: https://aka.ms/computevm-linuxpatchassessmentmode.
assessmentMode = AutomaticByPlatform
locations = []
tagOperator = Any
tagValues = {}
assessmentMode = AutomaticByPlatform
locations = []
tagOperator = Any
tagValues = {}
Backup [Preview]: Configure Recovery Services vaults to use private DNS zones for backup
Use private DNS zones to override the DNS resolution for a private endpoint. A private DNS zone links to your virtual network to resolve to your Recovery Services vault. Learn more at: https://aka.ms/AB-PrivateEndpoints.
azureSiteRecoveryQueuePrivateDnsZoneID = --DNSZonePrefix--privatelink.queue.core...
azureSiteRecoveryBlobPrivateDnsZoneID = --DNSZonePrefix--privatelink.blob.core....
azureSiteRecoveryBackupPrivateDnsZoneID = --DNSZonePrefix--privatelink.--REGION-S...
Backup [Preview]: Immutability must be enabled for backup vaults
This policy audits if the immutable vaults property is enabled for Backup vaults in the scope. This helps protect your backup data from being deleted before its intended expiry. Learn more at https://aka.ms/AB-ImmutableVaults.
checkLockedImmutabilityOnly = false checkLockedImmutabilityOnly = false
Backup [Preview]: Soft delete should be enabled for Backup Vaults
This policy audits if soft delete is enabled for Backup vaults in the scope. Soft delete can help you recover your data after it has been deleted. Learn more at https://aka.ms/AB-SoftDelete
checkAlwaysOnSoftDeleteOnly = false checkAlwaysOnSoftDeleteOnly = false
Batch Deploy - Configure private DNS zones for private endpoints that connect to Batch accounts
Private DNS records allow private connections to private endpoints. Private endpoint connections allow secure communication by enabling private connectivity to Batch accounts without a need for public IP addresses at the source or destination. For more information on private endpoints and DNS zones in Batch, see https://docs.microsoft.com/azure/batch/private-connectivity.
azureBatchPrivateDnsZoneId = --DNSZonePrefix--privatelink.batch.azur...
Batch Resource logs in Batch accounts should be enabled
Audit enabling of resource logs. This enables you to recreate activity trails to use for investigation purposes; when a security incident occurs or when your network is compromised
diagnosticsLogsInBatchAccountRetentionDays = 1
Bot Service Configure BotService resources to use private DNS zones
Use private DNS zones to override the DNS resolution for a private endpoint. A private DNS zone links to your virtual network to resolve to BotService related resources. Learn more at: https://aka.ms/privatednszone.
azureBotServicePrivateDnsZoneId = --DNSZonePrefix--privatelink.directline...
Cache Azure Cache for Redis Append a specific min TLS version requirement and enforce TLS.
Append a specific min TLS version requirement and enforce SSL on Azure Cache for Redis. Enables secure server to client by enforce minimal Tls Version to secure the connection between your database server and your client applications helps protect against 'man in the middle' attacks by encrypting the data stream between the server and your application. This configuration enforces that SSL is always enabled for accessing your database server.
RedisMinTlsVersion = 1.2
Cache Configure Azure Cache for Redis to use private DNS zones
Use private DNS zones to override the DNS resolution for a private endpoint. A private DNS zone can be linked to your virtual network to resolve to Azure Cache for Redis. Learn more at: https://aka.ms/privatednszone.
azureRedisCachePrivateDnsZoneId = --DNSZonePrefix--privatelink.redis.cach...
ChangeTrackingAndInventory Configure Windows Arc-enabled machines to install AMA for ChangeTracking and Inventory
Automate the deployment of Azure Monitor Agent extension on your Windows Arc-enabled machines for enabling ChangeTracking and Inventory. This policy will install the extension if the OS and region are supported and system-assigned managed identity is enabled, and skip install otherwise. Learn more: https://aka.ms/AMAOverview.
listOfApplicableLocations = ["australiacentral", "australiacentral2... listOfApplicableLocations = ["australiacentral", "australiacentral2...
Cognitive Services Configure Cognitive Services accounts to use private DNS zones
Use private DNS zones to override the DNS resolution for a private endpoint. A private DNS zone links to your virtual network to resolve to Cognitive Services accounts. Learn more at: https://go.microsoft.com/fwlink/?linkid=2110097.
azureCognitiveServicesPrivateDnsZoneId = --DNSZonePrefix--privatelink.cognitives...
Compute Configure disk access resources to use private DNS zones
Use private DNS zones to override the DNS resolution for a private endpoint. A private DNS zone links to your virtual network to resolve to a managed disk. Learn more at: https://aka.ms/disksprivatelinksdoc.
azureDiskAccessPrivateDnsZoneId = --DNSZonePrefix--privatelink.blob.core....
Compute Deploy VM CPU Alert
Policy to audit/deploy VM CPU Alert
VMPercentCPUThreshold = 85
VMPercentCPUOperator = GreaterThan
VMPercentCPUAlertState = true
VMPercentCPUFailingPeriods = 1
VMPercentCPUAutoResolveTime = 00:10:00
VMPercentCPUTimeAggregation = Count
VMPercentCPUWindowSize = PT15M
VMPercentCPUAutoMitigate = true
VMPercentCPUAutoResolve = true
VMPercentCPUEvaluationFrequency = PT5M
VMPercentCPUAlertSeverity = 2
VMPercentCPUThreshold = 85
VMPercentCPUOperator = GreaterThan
VMPercentCPUAlertState = true
VMPercentCPUFailingPeriods = 1
VMPercentCPUAutoResolveTime = 00:10:00
VMPercentCPUTimeAggregation = Count
VMPercentCPUWindowSize = PT15M
VMPercentCPUAutoMitigate = true
VMPercentCPUAutoResolve = true
VMPercentCPUEvaluationFrequency = PT5M
VMPercentCPUAlertSeverity = 2
Compute Deploy VM Data Disk Read Latency Alert
Policy to audit/deploy VM dataDiskReadLatency Alert
VMDataDiskReadLatencyEvaluationPeriods = 1
VMDataDiskReadLatencyEvaluationFrequency = PT5M
VMDataDiskReadLatencyWindowSize = PT15M
VMDataDiskReadLatencyThreshold = 30
VMDataDiskReadLatencyAutoResolve = true
VMDataDiskReadLatencyAlertSeverity = 2
VMDataDiskReadLatencyOperator = GreaterThan
VMDataDiskReadLatencyTimeAggregation = Count
VMDataDiskReadLatencyAutoResolveTime = 00:10:00
VMDataDiskReadLatencyComputersToInclude = ["*"]
VMDataDiskReadLatencyAlertState = true
VMDataDiskReadLatencyAutoMitigate = true
VMDataDiskReadLatencyFailingPeriods = 1
VMDataDiskReadLatencyEvaluationPeriods = 1
VMDataDiskReadLatencyEvaluationFrequency = PT5M
VMDataDiskReadLatencyWindowSize = PT15M
VMDataDiskReadLatencyThreshold = 30
VMDataDiskReadLatencyAutoResolve = true
VMDataDiskReadLatencyAlertSeverity = 2
VMDataDiskReadLatencyOperator = GreaterThan
VMDataDiskReadLatencyTimeAggregation = Count
VMDataDiskReadLatencyAutoResolveTime = 00:10:00
VMDataDiskReadLatencyComputersToInclude = ["*"]
VMDataDiskReadLatencyAlertState = true
VMDataDiskReadLatencyAutoMitigate = true
VMDataDiskReadLatencyFailingPeriods = 1
Compute Deploy VM Data Disk Space Alert
Policy to audit/deploy VM data Disk Space Alert
VMDataDiskSpaceEvaluationPeriods = 1
VMDataDiskSpaceFailingPeriods = 1
VMDataDiskSpaceAlertSeverity = 2
VMDataDiskSpaceAutoResolve = true
VMDataDiskSpaceOperator = GreaterThan
VMDataDiskSpaceWindowSize = PT15M
VMDataDiskSpaceAutoMitigate = true
VMDataDiskSpaceThreshold = 10
VMDataDiskSpaceAlertState = true
VMDataDiskSpaceTimeAggregation = Count
VMDataDiskSpaceComputersToInclude = ["*"]
VMDataDiskSpaceEvaluationFrequency = PT5M
VMDataDiskSpaceAutoResolveTime = 00:10:00
VMDataDiskSpaceEvaluationPeriods = 1
VMDataDiskSpaceFailingPeriods = 1
VMDataDiskSpaceAlertSeverity = 2
VMDataDiskSpaceAutoResolve = true
VMDataDiskSpaceOperator = GreaterThan
VMDataDiskSpaceWindowSize = PT15M
VMDataDiskSpaceAutoMitigate = true
VMDataDiskSpaceThreshold = 10
VMDataDiskSpaceAlertState = true
VMDataDiskSpaceTimeAggregation = Count
VMDataDiskSpaceComputersToInclude = ["*"]
VMDataDiskSpaceEvaluationFrequency = PT5M
VMDataDiskSpaceAutoResolveTime = 00:10:00
Compute Deploy VM Data Disk Write Latency Alert
Policy to audit/deploy VM dataDiskWriteLatency Alert
VMDataDiskWriteLatencyAlertSeverity = 2
VMDataDiskWriteLatencyWindowSize = PT15M
VMDataDiskWriteLatencyEvaluationPeriods = 1
VMDataDiskWriteLatencyThreshold = 30
VMDataDiskWriteLatencyComputersToInclude = ["*"]
VMDataDiskWriteLatencyAutoResolve = true
VMDataDiskWriteLatencyFailingPeriods = 1
VMDataDiskWriteLatencyTimeAggregation = Count
VMDataDiskWriteLatencyAutoResolveTime = 00:10:00
VMDataDiskWriteLatencyAutoMitigate = true
VMDataDiskWriteLatencyOperator = GreaterThan
VMDataDiskWriteLatencyEvaluationFrequency = PT5M
VMDataDiskWriteLatencyAlertState = true
VMDataDiskWriteLatencyAlertSeverity = 2
VMDataDiskWriteLatencyWindowSize = PT15M
VMDataDiskWriteLatencyEvaluationPeriods = 1
VMDataDiskWriteLatencyThreshold = 30
VMDataDiskWriteLatencyComputersToInclude = ["*"]
VMDataDiskWriteLatencyAutoResolve = true
VMDataDiskWriteLatencyFailingPeriods = 1
VMDataDiskWriteLatencyTimeAggregation = Count
VMDataDiskWriteLatencyAutoResolveTime = 00:10:00
VMDataDiskWriteLatencyAutoMitigate = true
VMDataDiskWriteLatencyOperator = GreaterThan
VMDataDiskWriteLatencyEvaluationFrequency = PT5M
VMDataDiskWriteLatencyAlertState = true
Compute Deploy VM HeartBeat Alert
Policy to audit/deploy VM HeartBeat Alert for all VMs in the subscription
VMHeartBeatRGAlertSeverity = 1
VMHeartBeatRGComputersToInclude = ["*"]
ALZMonitorResourceGroupLocation = eastus
VMHeartBeatRGTimeAggregation = Count
VMHeartBeatRGEvaluationFrequency = PT5M
VMHeartBeatRGAutoResolveTime = 00:10:00
VMHeartBeatRGAutoResolve = true
VMHeartBeatRGAlertState = true
VMHeartBeatRGAutoMitigate = true
VMHeartBeatRGFailingPeriods = 1
VMHeartBeatRGOperator = GreaterThan
VMHeartBeatRGWindowSize = PT6H
VMHeartBeatRGThreshold = 10
ALZMonitorResourceGroupName = rg-amba-monitoring-001
ALZMonitorResourceGroupTags = {"Project":"amba-monitoring"}
VMHeartBeatRGAlertSeverity = 1
VMHeartBeatRGComputersToInclude = ["*"]
VMHeartBeatRGTimeAggregation = Count
VMHeartBeatRGEvaluationFrequency = PT5M
VMHeartBeatRGAutoResolveTime = 00:10:00
VMHeartBeatRGAutoResolve = true
VMHeartBeatRGAlertState = true
VMHeartBeatRGAutoMitigate = true
VMHeartBeatRGFailingPeriods = 1
VMHeartBeatRGOperator = GreaterThan
VMHeartBeatRGWindowSize = PT6H
VMHeartBeatRGThreshold = 10
Compute Deploy VM Memory Alert
Policy to audit/deploy VM Memory Alert
VMPercentMemoryAlertState = true
VMPercentMemoryOperator = GreaterThan
VMPercentMemoryWindowSize = PT15M
VMPercentMemoryFailingPeriods = 1
VMPercentMemoryEvaluationFrequency = PT5M
VMPercentMemoryAutoMitigate = true
VMPercentMemoryThreshold = 10
VMPercentMemoryAlertSeverity = 2
VMPercentMemoryTimeAggregation = Count
VMPercentMemoryAutoResolve = true
VMPercentMemoryAutoResolveTime = 00:10:00
VMPercentMemoryAlertState = true
VMPercentMemoryOperator = GreaterThan
VMPercentMemoryWindowSize = PT15M
VMPercentMemoryFailingPeriods = 1
VMPercentMemoryEvaluationFrequency = PT5M
VMPercentMemoryAutoMitigate = true
VMPercentMemoryThreshold = 10
VMPercentMemoryAlertSeverity = 2
VMPercentMemoryTimeAggregation = Count
VMPercentMemoryAutoResolve = true
VMPercentMemoryAutoResolveTime = 00:10:00
Compute Deploy VM Network Read Alert
Policy to audit/deploy VM Network Read Alert
VMNetworkInAutoMitigate = true
VMNetworkInAlertState = true
VMNetworkInWindowSize = PT15M
VMNetworkInEvaluationFrequency = PT5M
VMNetworkInTimeAggregation = Count
VMNetworkInAutoResolve = true
VMNetworkInComputersToInclude = ["*"]
VMNetworkInAutoResolveTime = 00:10:00
VMNetworkInThreshold = 10000000
VMNetworkInOperator = GreaterThan
VMNetworkInAlertSeverity = 2
VMNetworkInEvaluationPeriods = 1
VMNetworkInFailingPeriods = 1
VMNetworkInAutoMitigate = true
VMNetworkInAlertState = true
VMNetworkInWindowSize = PT15M
VMNetworkInEvaluationFrequency = PT5M
VMNetworkInTimeAggregation = Count
VMNetworkInAutoResolve = true
VMNetworkInComputersToInclude = ["*"]
VMNetworkInAutoResolveTime = 00:10:00
VMNetworkInThreshold = 10000000
VMNetworkInOperator = GreaterThan
VMNetworkInAlertSeverity = 2
VMNetworkInEvaluationPeriods = 1
VMNetworkInFailingPeriods = 1
Compute Deploy VM Network Write Alert
Policy to audit/deploy VM Network Out Alert
VMNetworkOutEvaluationPeriods = 1
VMNetworkOutAutoMitigate = true
VMNetworkOutEvaluationFrequency = PT5M
VMNetworkOutAutoResolveTime = 00:10:00
VMNetworkOutAutoResolve = true
VMNetworkOutComputersToInclude = ["*"]
VMNetworkOutTimeAggregation = Count
VMNetworkOutAlertSeverity = 2
VMNetworkOutFailingPeriods = 1
VMNetworkOutThreshold = 10000000
VMNetworkOutOperator = GreaterThan
VMNetworkOutAlertState = true
VMNetworkOutWindowSize = PT15M
VMNetwo
⚠️ **GitHub.com Fallback** ⚠️