
2
896470ca-9c6e-4176-9b38-5a655403c638
TenantSummary
Scope | Scope Id | Policy DisplayName | Policy Name | PolicyId | Category | ALZ | Effect | Role definitions | Unique assignments | Used in PolicySets | CreatedOn | CreatedBy | UpdatedOn | UpdatedBy |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Mg | esjh | 1234_AP_MG_RA_onRG_(1234_RG_CUST) | 1234_AP_MG_RA_onRG_(1234_RG_CUST) | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/1234_ap_mg_ra_onrg_(1234_rg_cust) | 1234_RgRoleAssignment | false | Fixed: deployIfNotExists | Owner | 0 | 2 (1234_API_MG_RA_onRG_(1234_RG_CUST) (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/1234_api_mg_ra_onrg_(1234_rg_cust)), 1234_API_MG_RA_onRG_(1234_RG_CUST) (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/1234_api_mg_ra_onrg_(1234_rg_cust))) | 09/14/2021 16:55:47 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | ||
Mg | 896470ca-9c6e-4176-9b38-5a655403c638 | 1234_AP_MG_RA_onSub | 42672afc-0fc0-4dea-9f1d-95dcd2f9a21c | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/policydefinitions/42672afc-0fc0-4dea-9f1d-95dcd2f9a21c | false | Fixed: deployIfNotExists | 1234 RoleAssignmentSubscriptionOwner | 3 (/providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/policyassignments/1b5ac3236f0246ef83a14435, /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/policyassignments/5f9ec45db52f479e940fc150, /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/policyassignments/a2d9426ccece4000b889c72f) | 0 | 03/09/2022 07:00:03 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | 03/10/2022 14:56:28 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |
Sub | 20217969-e578-4e91-beea-9bcf18b05a7e | 1234Deny-ra-if-SPObjectId | 8a9070c4-7eec-4b78-b044-62c20a06d1de | /subscriptions/20217969-e578-4e91-beea-9bcf18b05a7e/providers/microsoft.authorization/policydefinitions/8a9070c4-7eec-4b78-b044-62c20a06d1de | false | Fixed: deny | n/a | 1 (/subscriptions/20217969-e578-4e91-beea-9bcf18b05a7e/resourcegroups/protectedresources/providers/microsoft.authorization/policyassignments/fa0ac64635d34f42b8e052ba) | 0 | 03/17/2022 15:06:00 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||
Mg | esjh-online | ALZFake | 7a2ec127-9921-445e-a3bb-91f7099f545d | /providers/microsoft.management/managementgroups/esjh-online/providers/microsoft.authorization/policydefinitions/7a2ec127-9921-445e-a3bb-91f7099f545d | cust_fakeALZ_Locations | true | Fixed: audit | n/a | 0 | 0 | 09/08/2022 18:16:26 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | ||
Mg | esjh | Application Gateway should be deployed with WAF enabled | Deny-AppGW-Without-WAF | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deny-appgw-without-waf | Network | true | Default: Deny; Allowed: Audit,Deny,Disabled | n/a | 0 | 0 | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Sub | f28ba982-5ed0-4033-9bdf-e45e4b5df466 | Create NSG Rule | 4e7e976d-d94c-47a3-a534-392c641cecd8 | /subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/providers/microsoft.authorization/policydefinitions/4e7e976d-d94c-47a3-a534-392c641cecd8 | CUST_NSG | false | Fixed: append | n/a | 0 | 0 | 05/18/2021 18:01:38 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | 05/18/2021 18:22:00 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a |
Sub | 4dfa3b56-55bf-4059-802a-24e44a4fb60f | cust_Deploy a default budget on all subscriptions under the assigned scope | 1c5e347d-1d8f-4854-9d88-918455c3c983 | /subscriptions/4dfa3b56-55bf-4059-802a-24e44a4fb60f/providers/microsoft.authorization/policydefinitions/1c5e347d-1d8f-4854-9d88-918455c3c983 | ALZClone | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,AuditIfNotExists,Disabled | Contributor | 0 | 0 | 08/31/2022 13:35:26 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | ||
Mg | esjh-platform | cust2_Deploy a default budget on all subscriptions under the assigned scope | 4a132703-b3fd-4228-aaaa-f46ebc34a324 | /providers/microsoft.management/managementgroups/esjh-platform/providers/microsoft.authorization/policydefinitions/4a132703-b3fd-4228-aaaa-f46ebc34a324 | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,AuditIfNotExists,Disabled | Contributor | 0 | 0 | 08/31/2022 18:02:02 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||
Mg | esjh | Deny the creation of private DNS | Deny-Private-DNS-Zones | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deny-private-dns-zones | Network | true | Default: Deny; Allowed: Audit,Deny,Disabled | n/a | 0 | 1 (API - Deny the creation of private DNS - cust (/providers/microsoft.management/managementgroups/esjh-online/providers/microsoft.authorization/policysetdefinitions/ee6248fccddc45b59624ac8f)) | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | 896470ca-9c6e-4176-9b38-5a655403c638 | Deny the creation of private DNS - cust | 53568753-a797-45d7-a552-d55f4a398bbb | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/policydefinitions/53568753-a797-45d7-a552-d55f4a398bbb | Network-custom | true | Default: Deny; Allowed: Audit,Deny,Disabled | n/a | 1 (/subscriptions/20217969-e578-4e91-beea-9bcf18b05a7e/resourcegroups/nsg/providers/microsoft.authorization/policyassignments/d1212de8a8fd4184a8965eea) | 1 (API - Deny the creation of private DNS - cust (/providers/microsoft.management/managementgroups/esjh-online/providers/microsoft.authorization/policysetdefinitions/ee6248fccddc45b59624ac8f)) | 05/02/2022 07:01:25 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | ||
Mg | esjh | Deny the creation of public IP | Deny-PublicIP | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deny-publicip | Network | true | Default: Deny; Allowed: Audit,Deny,Disabled | n/a | 0 | 0 | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deny vNet peering | Deny-ERPeering | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deny-erpeering | Network | true | Default: Deny; Allowed: Audit,Deny,Disabled | n/a | 0 | 0 | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy a default budget on subscriptions | Deploy-Budget | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-budget | Budget | true | Fixed: DeployIfNotExists | Contributor | 0 | 0 | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy an Azure DDoS Protection Standard plan | Deploy-DDoSProtection | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-ddosprotection | Network | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Network Contributor | 0 | 0 | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy Azure Defender settings in Azure Security Center. | Deploy-ASC-Standard | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-asc-standard | Security Center | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Security Admin | 1 (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-asc-security) | 0 | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy Azure Firewall Manager policy in the subscription | Deploy-FirewallPolicy | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-firewallpolicy | Network | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Network Contributor | 0 | 0 | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy Diagnostic Settings for Activity Log to Log Analytics workspace | Deploy-Diagnostics-ActivityLog | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-activitylog | Monitoring | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Monitoring Contributor, Log Analytics Contributor | 1 (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-azactivity-log) | 0 | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy Diagnostic Settings for Analysis Services to Log Analytics workspace | Deploy-Diagnostics-AnalysisService | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-analysisservice | Monitoring | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Monitoring Contributor, Log Analytics Contributor | 0 | 1 (Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-diag-loganalytics)) | 01/10/2021 20:57:37 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy Diagnostic Settings for API Management to Log Analytics workspace | Deploy-Diagnostics-APIMgmt | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-apimgmt | Monitoring | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Monitoring Contributor, Log Analytics Contributor | 0 | 1 (Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-diag-loganalytics)) | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy Diagnostic Settings for App Service Plan to Log Analytics workspace | Deploy-Diagnostics-WebServerFarm | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-webserverfarm | Monitoring | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Monitoring Contributor, Log Analytics Contributor | 0 | 1 (Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-diag-loganalytics)) | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy Diagnostic Settings for App Service to Log Analytics workspace | Deploy-Diagnostics-Website | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-website | Monitoring | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Monitoring Contributor, Log Analytics Contributor | 0 | 1 (Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-diag-loganalytics)) | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy Diagnostic Settings for Application Gateway to Log Analytics workspace | Deploy-Diagnostics-ApplicationGateway | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-applicationgateway | Monitoring | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Monitoring Contributor, Log Analytics Contributor | 0 | 1 (Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-diag-loganalytics)) | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy Diagnostic Settings for Automation to Log Analytics workspace | Deploy-Diagnostics-AA | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-aa | Monitoring | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Monitoring Contributor, Log Analytics Contributor | 0 | 1 (Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-diag-loganalytics)) | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy Diagnostic Settings for Azure Data Lake Store to Log Analytics workspace | Deploy-Diagnostics-DataLakeStore | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-datalakestore | Monitoring | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Monitoring Contributor, Log Analytics Contributor | 0 | 1 (Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-diag-loganalytics)) | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy Diagnostic Settings for Azure Function App to Log Analytics workspace | Deploy-Diagnostics-Function | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-function | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Monitoring Contributor, Log Analytics Contributor | 0 | 1 (Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-diag-loganalytics)) | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | 09/14/2021 15:38:21 | ObjectType: SP APP INT, ObjectDisplayName: AzOps, ObjectSignInName: n/a, ObjectId: c295384a-33d9-475e-abaf-d2fb0274299a | |
Mg | esjh | Deploy Diagnostic Settings for Batch to Log Analytics workspace | Deploy-Diagnostics-Batch | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-batch | Monitoring | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Monitoring Contributor, Log Analytics Contributor | 0 | 1 (Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-diag-loganalytics)) | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy Diagnostic Settings for CDN Endpoint to Log Analytics workspace | Deploy-Diagnostics-CDNEndpoints | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-cdnendpoints | Monitoring | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Monitoring Contributor, Log Analytics Contributor | 0 | 1 (Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-diag-loganalytics)) | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy Diagnostic Settings for Cognitive Services to Log Analytics workspace | Deploy-Diagnostics-CognitiveServices | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-cognitiveservices | Monitoring | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Monitoring Contributor, Log Analytics Contributor | 0 | 1 (Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-diag-loganalytics)) | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy Diagnostic Settings for Container Instances to Log Analytics workspace | Deploy-Diagnostics-ACI | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-aci | Monitoring | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Monitoring Contributor, Log Analytics Contributor | 0 | 1 (Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-diag-loganalytics)) | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy Diagnostic Settings for Container Registry to Log Analytics workspace | Deploy-Diagnostics-ACR | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-acr | Monitoring | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Monitoring Contributor, Log Analytics Contributor | 0 | 1 (Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-diag-loganalytics)) | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy Diagnostic Settings for Cosmos DB to Log Analytics workspace | Deploy-Diagnostics-CosmosDB | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-cosmosdb | Monitoring | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Monitoring Contributor, Log Analytics Contributor | 0 | 1 (Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-diag-loganalytics)) | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy Diagnostic Settings for Data Factory to Log Analytics workspace | Deploy-Diagnostics-DataFactory | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-datafactory | Monitoring | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Monitoring Contributor, Log Analytics Contributor | 0 | 1 (Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-diag-loganalytics)) | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy Diagnostic Settings for Data Lake Analytics to Log Analytics workspace | Deploy-Diagnostics-DLAnalytics | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-dlanalytics | Monitoring | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Monitoring Contributor, Log Analytics Contributor | 0 | 1 (Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-diag-loganalytics)) | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy Diagnostic Settings for Database for MySQL to Log Analytics workspace | Deploy-Diagnostics-MySQL | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-mysql | Monitoring | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Monitoring Contributor, Log Analytics Contributor | 0 | 1 (Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-diag-loganalytics)) | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy Diagnostic Settings for Database for PostgreSQL to Log Analytics workspace | Deploy-Diagnostics-PostgreSQL | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-postgresql | Monitoring | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Monitoring Contributor, Log Analytics Contributor | 0 | 1 (Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-diag-loganalytics)) | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy Diagnostic Settings for Databricks to Log Analytics workspace | Deploy-Diagnostics-Databricks | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-databricks | Monitoring | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Monitoring Contributor, Log Analytics Contributor | 0 | 1 (Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-diag-loganalytics)) | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy Diagnostic Settings for Event Grid subscriptions to Log Analytics workspace | Deploy-Diagnostics-EventGridSub | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-eventgridsub | Monitoring | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Monitoring Contributor, Log Analytics Contributor | 0 | 1 (Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-diag-loganalytics)) | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy Diagnostic Settings for Event Grid System Topic to Log Analytics workspace | Deploy-Diagnostics-EventGridSystemTopic | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-eventgridsystemtopic | Monitoring | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Monitoring Contributor, Log Analytics Contributor | 0 | 1 (Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-diag-loganalytics)) | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy Diagnostic Settings for Event Grid Topic to Log Analytics workspace | Deploy-Diagnostics-EventGridTopic | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-eventgridtopic | Monitoring | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Monitoring Contributor, Log Analytics Contributor | 0 | 1 (Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-diag-loganalytics)) | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy Diagnostic Settings for Event Hubs to Log Analytics workspace | Deploy-Diagnostics-EventHub | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-eventhub | Monitoring | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Monitoring Contributor, Log Analytics Contributor | 0 | 1 (Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-diag-loganalytics)) | 01/10/2021 20:57:37 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy Diagnostic Settings for ExpressRoute to Log Analytics workspace | Deploy-Diagnostics-ExpressRoute | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-expressroute | Monitoring | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Monitoring Contributor, Log Analytics Contributor | 0 | 1 (Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-diag-loganalytics)) | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy Diagnostic Settings for Firewall to Log Analytics workspace | Deploy-Diagnostics-Firewall | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-firewall | Monitoring | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Monitoring Contributor, Log Analytics Contributor | 0 | 1 (Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-diag-loganalytics)) | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy Diagnostic Settings for Front Door to Log Analytics workspace | Deploy-Diagnostics-FrontDoor | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-frontdoor | Monitoring | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Monitoring Contributor, Log Analytics Contributor | 0 | 1 (Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-diag-loganalytics)) | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy Diagnostic Settings for HDInsight to Log Analytics workspace | Deploy-Diagnostics-HDInsight | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-hdinsight | Monitoring | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Monitoring Contributor, Log Analytics Contributor | 0 | 1 (Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-diag-loganalytics)) | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy Diagnostic Settings for IoT Hub to Log Analytics workspace | Deploy-Diagnostics-iotHub | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-iothub | Monitoring | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Monitoring Contributor, Log Analytics Contributor | 0 | 1 (Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-diag-loganalytics)) | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy Diagnostic Settings for Key Vault to Log Analytics workspace | Deploy-Diagnostics-KeyVault | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-keyvault | Monitoring | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Monitoring Contributor, Log Analytics Contributor | 0 | 1 (Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-diag-loganalytics)) | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy Diagnostic Settings for Kubernetes Service to Log Analytics workspace | Deploy-Diagnostics-AKS | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-aks | Monitoring | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Monitoring Contributor, Log Analytics Contributor | 0 | 1 (Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-diag-loganalytics)) | 01/10/2021 20:57:37 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy Diagnostic Settings for Load Balancer to Log Analytics workspace | Deploy-Diagnostics-LoadBalancer | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-loadbalancer | Monitoring | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Monitoring Contributor, Log Analytics Contributor | 0 | 1 (Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-diag-loganalytics)) | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy Diagnostic Settings for Logic Apps integration service environment to Log Analytics workspace | Deploy-Diagnostics-LogicAppsISE | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-logicappsise | Monitoring | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Monitoring Contributor, Log Analytics Contributor | 0 | 1 (Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-diag-loganalytics)) | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy Diagnostic Settings for Logic Apps Workflow runtime to Log Analytics workspace | Deploy-Diagnostics-LogicAppsWF | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-logicappswf | Monitoring | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Monitoring Contributor, Log Analytics Contributor | 0 | 1 (Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-diag-loganalytics)) | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy Diagnostic Settings for Machine Learning workspace to Log Analytics workspace | Deploy-Diagnostics-MlWorkspace | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-mlworkspace | Monitoring | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Monitoring Contributor, Log Analytics Contributor | 0 | 1 (Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-diag-loganalytics)) | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy Diagnostic Settings for MariaDB to Log Analytics workspace | Deploy-Diagnostics-MariaDB | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-mariadb | Monitoring | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Monitoring Contributor, Log Analytics Contributor | 0 | 1 (Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-diag-loganalytics)) | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy Diagnostic Settings for Network Interfaces to Log Analytics workspace | Deploy-Diagnostics-NIC | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-nic | Monitoring | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Monitoring Contributor, Log Analytics Contributor | 0 | 1 (Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-diag-loganalytics)) | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy Diagnostic Settings for Network Security Groups to Log Analytics workspace | Deploy-Diagnostics-NetworkSecurityGroups | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-networksecuritygroups | Monitoring | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Monitoring Contributor, Log Analytics Contributor | 0 | 1 (Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-diag-loganalytics)) | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy Diagnostic Settings for Power BI Embedded to Log Analytics workspace | Deploy-Diagnostics-PowerBIEmbedded | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-powerbiembedded | Monitoring | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Monitoring Contributor, Log Analytics Contributor | 0 | 1 (Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-diag-loganalytics)) | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy Diagnostic Settings for Public IP addresses to Log Analytics workspace | Deploy-Diagnostics-PublicIP | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-publicip | Monitoring | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Monitoring Contributor, Log Analytics Contributor | 0 | 1 (Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-diag-loganalytics)) | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy Diagnostic Settings for Recovery Services vaults to Log Analytics workspace | Deploy-Diagnostics-RecoveryVault | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-recoveryvault | Monitoring | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Monitoring Contributor, Log Analytics Contributor | 0 | 1 (Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-diag-loganalytics)) | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy Diagnostic Settings for Redis Cache to Log Analytics workspace | Deploy-Diagnostics-RedisCache | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-rediscache | Monitoring | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Monitoring Contributor, Log Analytics Contributor | 0 | 1 (Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-diag-loganalytics)) | 01/10/2021 20:57:37 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy Diagnostic Settings for Relay to Log Analytics workspace | Deploy-Diagnostics-Relay | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-relay | Monitoring | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Monitoring Contributor, Log Analytics Contributor | 0 | 1 (Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-diag-loganalytics)) | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy Diagnostic Settings for Search Services to Log Analytics workspace | Deploy-Diagnostics-SearchServices | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-searchservices | Monitoring | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Monitoring Contributor, Log Analytics Contributor | 0 | 1 (Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-diag-loganalytics)) | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy Diagnostic Settings for Service Bus namespaces to Log Analytics workspace | Deploy-Diagnostics-ServiceBus | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-servicebus | Monitoring | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Monitoring Contributor, Log Analytics Contributor | 0 | 1 (Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-diag-loganalytics)) | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy Diagnostic Settings for SignalR to Log Analytics workspace | Deploy-Diagnostics-SignalR | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-signalr | Monitoring | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Monitoring Contributor, Log Analytics Contributor | 0 | 1 (Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-diag-loganalytics)) | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy Diagnostic Settings for SQL Databases to Log Analytics workspace | Deploy-Diagnostics-SQLDBs | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-sqldbs | Monitoring | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Monitoring Contributor, Log Analytics Contributor | 0 | 1 (Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-diag-loganalytics)) | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy Diagnostic Settings for SQL Elastic Pools to Log Analytics workspace | Deploy-Diagnostics-SQLElasticPools | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-sqlelasticpools | Monitoring | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Monitoring Contributor, Log Analytics Contributor | 0 | 1 (Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-diag-loganalytics)) | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy Diagnostic Settings for SQL Managed Instances to Log Analytics workspace | Deploy-Diagnostics-SQLMI | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-sqlmi | Monitoring | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Monitoring Contributor, Log Analytics Contributor | 0 | 1 (Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-diag-loganalytics)) | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy Diagnostic Settings for Stream Analytics to Log Analytics workspace | Deploy-Diagnostics-StreamAnalytics | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-streamanalytics | Monitoring | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Monitoring Contributor, Log Analytics Contributor | 0 | 1 (Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-diag-loganalytics)) | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy Diagnostic Settings for Time Series Insights to Log Analytics workspace | Deploy-Diagnostics-TimeSeriesInsights | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-timeseriesinsights | Monitoring | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Monitoring Contributor, Log Analytics Contributor | 0 | 1 (Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-diag-loganalytics)) | 01/10/2021 20:57:37 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy Diagnostic Settings for Traffic Manager to Log Analytics workspace | Deploy-Diagnostics-TrafficManager | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-trafficmanager | Monitoring | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Monitoring Contributor, Log Analytics Contributor | 0 | 1 (Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-diag-loganalytics)) | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy Diagnostic Settings for Virtual Machine Scale Sets to Log Analytics workspace | Deploy-Diagnostics-VMSS | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-vmss | Monitoring | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Monitoring Contributor, Log Analytics Contributor | 0 | 1 (Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-diag-loganalytics)) | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy Diagnostic Settings for Virtual Machines to Log Analytics workspace | Deploy-Diagnostics-VM | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-vm | Monitoring | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Monitoring Contributor, Log Analytics Contributor | 0 | 1 (Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-diag-loganalytics)) | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy Diagnostic Settings for Virtual Network to Log Analytics workspace | Deploy-Diagnostics-VirtualNetwork | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-virtualnetwork | Monitoring | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Monitoring Contributor, Log Analytics Contributor | 0 | 1 (Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-diag-loganalytics)) | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy Diagnostic Settings for VPN Gateway to Log Analytics workspace | Deploy-Diagnostics-VNetGW | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-vnetgw | Monitoring | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Monitoring Contributor, Log Analytics Contributor | 0 | 1 (Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-diag-loganalytics)) | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy DNS Zone Group for Key Vault Private Endpoint | Deploy-DNSZoneGroup-For-KeyVault-PrivateEndpoint | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-dnszonegroup-for-keyvault-privateendpoint | Network | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Private DNS Zone Contributor | 0 | 0 | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy DNS Zone Group for SQL Private Endpoint | Deploy-DNSZoneGroup-For-Sql-PrivateEndpoint | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-dnszonegroup-for-sql-privateendpoint | Network | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Private DNS Zone Contributor | 0 | 0 | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy DNS Zone Group for Storage-Blob Private Endpoint | Deploy-DNSZoneGroup-For-Table-PrivateEndpoint | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-dnszonegroup-for-table-privateendpoint | Network | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Private DNS Zone Contributor | 0 | 0 | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy DNS Zone Group for Storage-File Private Endpoint | Deploy-DNSZoneGroup-For-File-PrivateEndpoint | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-dnszonegroup-for-file-privateendpoint | Network | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Private DNS Zone Contributor | 0 | 0 | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy DNS Zone Group for Storage-Queue Private Endpoint | Deploy-DNSZoneGroup-For-Queue-PrivateEndpoint | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-dnszonegroup-for-queue-privateendpoint | Network | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Private DNS Zone Contributor | 0 | 0 | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy DNS Zone Group for Storage-Blob Private Endpoint | Deploy-DNSZoneGroup-For-Blob-PrivateEndpoint | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-dnszonegroup-for-blob-privateendpoint | Network | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Private DNS Zone Contributor | 0 | 0 | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy spoke network with configuration to hub network based on ipam configuration object | Deploy-vNet | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-vnet | Network | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Network Contributor | 0 | 0 | 01/10/2021 20:57:36 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy SQL database auditing settings | Deploy-Sql-AuditingSettings | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-sql-auditingsettings | SQL | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | SQL Security Manager | 0 | 1 (Deploy SQL Database built-in SQL security configuration (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-sql-security)) | 01/10/2021 20:57:37 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy SQL Database security Alert Policies configuration with email admin accounts | Deploy-Sql-SecurityAlertPolicies | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-sql-securityalertpolicies | SQL | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | SQL Security Manager | 0 | 1 (Deploy SQL Database built-in SQL security configuration (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-sql-security)) | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy SQL Database Transparent Data Encryption | Deploy-Sql-Tde | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-sql-tde | SQL | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | SQL Security Manager | 0 | 1 (Deploy SQL Database built-in SQL security configuration (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-sql-security)) | 01/10/2021 20:57:37 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy SQL Database vulnerability Assessments | Deploy-Sql-vulnerabilityAssessments | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-sql-vulnerabilityassessments | SQL | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | SQL Security Manager, Monitoring Contributor | 0 | 1 (Deploy SQL Database built-in SQL security configuration (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-sql-security)) | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy the configurations to the Log Analytics in the subscription | Deploy-LA-Config | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-la-config | Monitoring | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Monitoring Contributor, Log Analytics Contributor | 0 | 0 | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy the Log Analytics in the subscription | Deploy-Log-Analytics | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-log-analytics | Monitoring | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Monitoring Contributor, Log Analytics Contributor | 1 (/providers/microsoft.management/managementgroups/esjh-management/providers/microsoft.authorization/policyassignments/deploy-log-analytics) | 0 | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy the Virtual WAN in the specific region | Deploy-vWAN | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-vwan | Network | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Network Contributor | 0 | 0 | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy Virtual Hub network with Virtual Wan and Gateway and Firewall configured. | Deploy-vHUB | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-vhub | Network | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Network Contributor | 0 | 0 | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy Virtual Network to be used as hub virtual network in desired region | Deploy-HUB | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-hub | Network | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Network Contributor | 0 | 0 | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploy Windows Domain Join Extension with keyvault configuration | Deploy-Windows-DomainJoin | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-windows-domainjoin | Guest Configuration | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Virtual Machine Contributor | 0 | 0 | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploys NSG flow logs and traffic analytics | Deploy-Nsg-FlowLogs | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-nsg-flowlogs | Monitoring | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Monitoring Contributor, Log Analytics Contributor | 0 | 0 | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Deploys virtual network peering to hub | Deploy-VNET-HubSpoke | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-vnet-hubspoke | Network | true | Fixed: deployIfNotExists | Contributor | 0 | 0 | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | 896470ca-9c6e-4176-9b38-5a655403c638 | DiagSubscriptionsDim | 68b79a92-8932-4f15-88a6-0ed2675fa157 | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/policydefinitions/68b79a92-8932-4f15-88a6-0ed2675fa157 | false | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Log Analytics Contributor | 1 (/subscriptions/a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2/providers/microsoft.authorization/policyassignments/e184b6792089442786621cfe) | 0 | 06/24/2022 14:46:59 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||
Mg | esjh | Enforce Role assignment at Subscription Scope | enforce-roleAssignment-subscriptionScope | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/enforce-roleassignment-subscriptionscope | false | Fixed: deployIfNotExists | Owner | 1 (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/enforce0) | 0 | 03/16/2022 23:18:32 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | 03/16/2022 23:26:37 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |
Mg | esjh | KeyVault SoftDelete should be enabled | Append-KV-SoftDelete | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/append-kv-softdelete | Key Vault | true | Fixed: append | n/a | 0 | 0 | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | 896470ca-9c6e-4176-9b38-5a655403c638 | My_AP_MG_raOnSub | cedae647-a6f4-4c91-bc48-e411d86f335a | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/policydefinitions/cedae647-a6f4-4c91-bc48-e411d86f335a | RBAC | false | Fixed: deployIfNotExists | 1234 RoleAssignmentSubscriptionOwner | 1 (/providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/policyassignments/abe0212187e243e89ce5a623) | 0 | 03/11/2022 07:34:09 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | 03/11/2022 09:13:52 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a |
Mg | 896470ca-9c6e-4176-9b38-5a655403c638 | myPipelinePolicy | New Pipeline Policy 3 | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/policydefinitions/new pipeline policy 3 | Cache | false | Default: Audit; Allowed: Audit,Deny | n/a | 1 (/providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/policyassignments/assmgtest01) | 0 | 10/27/2021 14:09:47 | ObjectType: SP APP INT, ObjectDisplayName: PolicyPipeline, ObjectSignInName: n/a, ObjectId: 90003bac-487c-4351-ad41-ed1f9e0446c1 | 10/27/2021 14:14:04 | ObjectType: SP APP INT, ObjectDisplayName: PolicyPipeline, ObjectSignInName: n/a, ObjectId: 90003bac-487c-4351-ad41-ed1f9e0446c1 |
Sub | 4dfa3b56-55bf-4059-802a-24e44a4fb60f | myPipelinePolicy | New Pipeline Policy 3 | /subscriptions/4dfa3b56-55bf-4059-802a-24e44a4fb60f/providers/microsoft.authorization/policydefinitions/new pipeline policy 3 | Cache | false | Default: Audit; Allowed: Audit,Deny | n/a | 0 | 0 | 10/27/2021 14:09:14 | ObjectType: SP APP INT, ObjectDisplayName: PolicyPipelineNonProd, ObjectSignInName: n/a, ObjectId: 192e9bab-be5b-4f6f-9e89-a4c80e638e43 | 10/27/2021 14:13:28 | ObjectType: SP APP INT, ObjectDisplayName: PolicyPipelineNonProd, ObjectSignInName: n/a, ObjectId: 192e9bab-be5b-4f6f-9e89-a4c80e638e43 |
Sub | f28ba982-5ed0-4033-9bdf-e45e4b5df466 | myPipelinePolicy | New Pipeline Policy 3 | /subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/providers/microsoft.authorization/policydefinitions/new pipeline policy 3 | Cache | false | Default: Audit; Allowed: Audit,Deny | n/a | 0 | 0 | 10/27/2021 14:08:41 | ObjectType: SP APP INT, ObjectDisplayName: PolicyPipelineDev, ObjectSignInName: n/a, ObjectId: 3a4c97c7-ae6d-4d5a-a9c7-2bb2e0127fb4 | 10/27/2021 14:12:59 | ObjectType: SP APP INT, ObjectDisplayName: PolicyPipelineDev, ObjectSignInName: n/a, ObjectId: 3a4c97c7-ae6d-4d5a-a9c7-2bb2e0127fb4 |
Mg | 896470ca-9c6e-4176-9b38-5a655403c638 | New Pipeline Policy | New Pipeline Policy 2 | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/policydefinitions/new pipeline policy 2 | Cache | false | Default: Audit; Allowed: Audit,Deny | n/a | 0 | 0 | 10/27/2021 14:06:22 | ObjectType: SP APP INT, ObjectDisplayName: PolicyPipeline, ObjectSignInName: n/a, ObjectId: 90003bac-487c-4351-ad41-ed1f9e0446c1 | ||
Mg | esjh | No child resources in Automation Account | Deny-AA-child-resources | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deny-aa-child-resources | true | Default: Deny; Allowed: Audit,Deny,Disabled | n/a | 0 | 0 | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | 09/22/2021 21:24:16 | ObjectType: SP APP INT, ObjectDisplayName: AzOps, ObjectSignInName: n/a, ObjectId: c295384a-33d9-475e-abaf-d2fb0274299a | |
Mg | esjh | Public network access on AKS API should be disabled | Deny-PublicEndpoint-Aks | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deny-publicendpoint-aks | Kubernetes | true | Default: Deny; Allowed: Audit,Deny,Disabled | n/a | 0 | 2 (Public network access should be disabled for PAAS services (/providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/policysetdefinitions/1234_api_mg_roleassignment_onrgmatching_(1234_rg_cust*)), Public network access should be disabled for PAAS services (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deny-publicendpoints)) | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Public network access on Azure SQL Database should be disabled | Deny-PublicEndpoint-Sql | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deny-publicendpoint-sql | SQL | true | Default: Deny; Allowed: Audit,Deny,Disabled | n/a | 0 | 2 (Public network access should be disabled for PAAS services (/providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/policysetdefinitions/1234_api_mg_roleassignment_onrgmatching_(1234_rg_cust*)), Public network access should be disabled for PAAS services (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deny-publicendpoints)) | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Public network access onStorage accounts should be disabled | Deny-PublicEndpoint-Storage | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deny-publicendpoint-storage | Storage | true | Default: Deny; Allowed: Audit,Deny,Disabled | n/a | 0 | 2 (Public network access should be disabled for PAAS services (/providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/policysetdefinitions/1234_api_mg_roleassignment_onrgmatching_(1234_rg_cust*)), Public network access should be disabled for PAAS services (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deny-publicendpoints)) | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Public network access should be disabled for CosmosDB | Deny-PublicEndpoint-CosmosDB | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deny-publicendpoint-cosmosdb | SQL | true | Default: Deny; Allowed: Audit,Deny,Disabled | n/a | 0 | 2 (Public network access should be disabled for PAAS services (/providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/policysetdefinitions/1234_api_mg_roleassignment_onrgmatching_(1234_rg_cust*)), Public network access should be disabled for PAAS services (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deny-publicendpoints)) | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | 07/15/2021 15:15:07 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a |
Mg | esjh | Public network access should be disabled for KeyVault | Deny-PublicEndpoint-KeyVault | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deny-publicendpoint-keyvault | Key Vault | true | Default: Deny; Allowed: Audit,Deny,Disabled | n/a | 0 | 2 (Public network access should be disabled for PAAS services (/providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/policysetdefinitions/1234_api_mg_roleassignment_onrgmatching_(1234_rg_cust*)), Public network access should be disabled for PAAS services (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deny-publicendpoints)) | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | cust_t5 | Public network access should be disabled for MariaDB | Deny-PublicEndpoint-MariaDB | /providers/microsoft.management/managementgroups/cust_t5/providers/microsoft.authorization/policydefinitions/deny-publicendpoint-mariadb | SQL | true | Default: Deny; Allowed: Audit,Deny,Disabled | n/a | 0 | 0 | 09/09/2022 15:09:45 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | ||
Mg | esjh | Public network access should be disabled for MariaDB | Deny-PublicEndpoint-MariaDB | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deny-publicendpoint-mariadb | SQL | true | Default: Deny; Allowed: Audit,Deny,Disabled | n/a | 0 | 2 (Public network access should be disabled for PAAS services (/providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/policysetdefinitions/1234_api_mg_roleassignment_onrgmatching_(1234_rg_cust*)), Public network access should be disabled for PAAS services (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deny-publicendpoints)) | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Public network access should be disabled for MySQL | Deny-PublicEndpoint-MySQL | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deny-publicendpoint-mysql | SQL | true | Default: Deny; Allowed: Audit,Deny,Disabled | n/a | 0 | 2 (Public network access should be disabled for PAAS services (/providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/policysetdefinitions/1234_api_mg_roleassignment_onrgmatching_(1234_rg_cust*)), Public network access should be disabled for PAAS services (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deny-publicendpoints)) | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | Public network access should be disabled for PostgreSql | Deny-PublicEndpoint-PostgreSql | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deny-publicendpoint-postgresql | SQL | true | Default: Deny; Allowed: Audit,Deny,Disabled | n/a | 0 | 2 (Public network access should be disabled for PAAS services (/providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/policysetdefinitions/1234_api_mg_roleassignment_onrgmatching_(1234_rg_cust*)), Public network access should be disabled for PAAS services (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deny-publicendpoints)) | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | esjh | RDP access from the Internet should be blocked | Deny-RDP-From-Internet | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deny-rdp-from-internet | Network | true | Default: Deny; Allowed: Audit,Deny,Disabled | n/a | 1 (/providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/policyassignments/deny-rdp-from-internet) | 0 | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | cust_t5 | SQL managed instances deploy a specific min TLS version requirement. | Deploy-SqlMi-minTLS | /providers/microsoft.management/managementgroups/cust_t5/providers/microsoft.authorization/policydefinitions/deploy-sqlmi-mintls | SQL | true | Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled | Owner | 0 | 0 | 09/09/2022 15:11:32 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | ||
Mg | esjh | Subnets should have a Network Security Group | Deny-Subnet-Without-Nsg | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deny-subnet-without-nsg | Network | true | Default: Deny; Allowed: Audit,Deny,Disabled | n/a | 1 (/providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/policyassignments/deny-subnet-without-nsg) | 0 | 01/10/2021 20:57:38 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | 896470ca-9c6e-4176-9b38-5a655403c638 | test_Deploy Diagnostic Settings for Subscription to Storage Account | e1927c7a-e9e7-4657-9996-aff37b6560ed | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/policydefinitions/e1927c7a-e9e7-4657-9996-aff37b6560ed | test_diag | false | Default: DeployIfNotExists; Allowed: DeployIfNotExists,AuditIfNotExists,Disabled | Storage Account Contributor, Monitoring Contributor | 0 | 0 | 12/31/2021 10:02:07 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | 12/31/2021 10:37:02 | ObjectType: SP APP INT, ObjectDisplayName: AzOps, ObjectSignInName: n/a, ObjectId: c295384a-33d9-475e-abaf-d2fb0274299a |
Policy DisplayName | PolicyId |
---|---|
test_Deploy Diagnostic Settings for Subscription to Storage Account | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/policydefinitions/e1927c7a-e9e7-4657-9996-aff37b6560ed |
New Pipeline Policy | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/policydefinitions/new pipeline policy 2 |
Public network access should be disabled for MariaDB | /providers/microsoft.management/managementgroups/cust_t5/providers/microsoft.authorization/policydefinitions/deny-publicendpoint-mariadb |
SQL managed instances deploy a specific min TLS version requirement. | /providers/microsoft.management/managementgroups/cust_t5/providers/microsoft.authorization/policydefinitions/deploy-sqlmi-mintls |
ALZFake | /providers/microsoft.management/managementgroups/esjh-online/providers/microsoft.authorization/policydefinitions/7a2ec127-9921-445e-a3bb-91f7099f545d |
cust2_Deploy a default budget on all subscriptions under the assigned scope | /providers/microsoft.management/managementgroups/esjh-platform/providers/microsoft.authorization/policydefinitions/4a132703-b3fd-4228-aaaa-f46ebc34a324 |
KeyVault SoftDelete should be enabled | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/append-kv-softdelete |
No child resources in Automation Account | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deny-aa-child-resources |
Application Gateway should be deployed with WAF enabled | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deny-appgw-without-waf |
Deny vNet peering | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deny-erpeering |
Deny the creation of public IP | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deny-publicip |
Deploy a default budget on subscriptions | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-budget |
Deploy an Azure DDoS Protection Standard plan | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-ddosprotection |
Deploy DNS Zone Group for Storage-Blob Private Endpoint | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-dnszonegroup-for-blob-privateendpoint |
Deploy DNS Zone Group for Storage-File Private Endpoint | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-dnszonegroup-for-file-privateendpoint |
Deploy DNS Zone Group for Key Vault Private Endpoint | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-dnszonegroup-for-keyvault-privateendpoint |
Deploy DNS Zone Group for Storage-Queue Private Endpoint | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-dnszonegroup-for-queue-privateendpoint |
Deploy DNS Zone Group for SQL Private Endpoint | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-dnszonegroup-for-sql-privateendpoint |
Deploy DNS Zone Group for Storage-Blob Private Endpoint | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-dnszonegroup-for-table-privateendpoint |
Deploy Azure Firewall Manager policy in the subscription | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-firewallpolicy |
Deploy Virtual Network to be used as hub virtual network in desired region | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-hub |
Deploy the configurations to the Log Analytics in the subscription | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-la-config |
Deploys NSG flow logs and traffic analytics | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-nsg-flowlogs |
Deploy Virtual Hub network with Virtual Wan and Gateway and Firewall configured. | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-vhub |
Deploy spoke network with configuration to hub network based on ipam configuration object | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-vnet |
Deploys virtual network peering to hub | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-vnet-hubspoke |
Deploy the Virtual WAN in the specific region | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-vwan |
Deploy Windows Domain Join Extension with keyvault configuration | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-windows-domainjoin |
cust_Deploy a default budget on all subscriptions under the assigned scope | /subscriptions/4dfa3b56-55bf-4059-802a-24e44a4fb60f/providers/microsoft.authorization/policydefinitions/1c5e347d-1d8f-4854-9d88-918455c3c983 |
myPipelinePolicy | /subscriptions/4dfa3b56-55bf-4059-802a-24e44a4fb60f/providers/microsoft.authorization/policydefinitions/new pipeline policy 3 |
Create NSG Rule | /subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/providers/microsoft.authorization/policydefinitions/4e7e976d-d94c-47a3-a534-392c641cecd8 |
myPipelinePolicy | /subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/providers/microsoft.authorization/policydefinitions/new pipeline policy 3 |
Scope | ScopeId | PolicySet DisplayName | PolicySet Name | PolicySetId | Category | ALZ | Unique assignments | Policies used in PolicySet | CreatedOn | CreatedBy | UpdatedOn | UpdatedBy |
---|---|---|---|---|---|---|---|---|---|---|---|---|
Mg | esjh | 1234_API_MG_RA_onRG_(1234_RG_CUST) | 1234_API_MG_RA_onRG_(1234_RG_CUST) | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/1234_api_mg_ra_onrg_(1234_rg_cust) | 1234_RgRoleAssignment | false | 2 (/subscriptions/4dfa3b56-55bf-4059-802a-24e44a4fb60f/providers/microsoft.authorization/policyassignments/1234_apa_sub_roleassignment_4dfa3b56-55bf-4059-802a-24e44a4fb60f, /subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/providers/microsoft.authorization/policyassignments/1234_apa_sub_roleassignment_f28ba982-5ed0-4033-9bdf-e45e4b5df466) | 2 (1234_AP_MG_RA_onRG_(1234_RG_CUST) (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/1234_ap_mg_ra_onrg_(1234_rg_cust)), 1234_AP_MG_RA_onRG_(1234_RG_CUST) (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/1234_ap_mg_ra_onrg_(1234_rg_cust))) | 09/14/2021 16:55:49 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | ||
Mg | ESJH-online | API - Deny the creation of private DNS - cust | ee6248fccddc45b59624ac8f | /providers/microsoft.management/managementgroups/esjh-online/providers/microsoft.authorization/policysetdefinitions/ee6248fccddc45b59624ac8f | Network-custom | false | 1 (/subscriptions/20217969-e578-4e91-beea-9bcf18b05a7e/resourcegroups/nsg/providers/microsoft.authorization/policyassignments/fab7aac62c1d419d87835c61) | 2 (Deny the creation of private DNS - cust (/providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/policydefinitions/53568753-a797-45d7-a552-d55f4a398bbb), Deny the creation of private DNS (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deny-private-dns-zones)) | 05/02/2022 07:07:37 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | ||
Mg | CUST_T5 | Deny or Audit resources without Encryption with a customer-managed key (CMK) | Enforce-Encryption-CMK | /providers/microsoft.management/managementgroups/cust_t5/providers/microsoft.authorization/policysetdefinitions/enforce-encryption-cmk | Encryption | true | 0 | 15 (Azure API for FHIR should use a customer-managed key to encrypt data at rest (/providers/microsoft.authorization/policydefinitions/051cba44-2429-45b9-9649-46cec11c7119), Virtual machines should encrypt temp disks, caches, and data flows between Compute and Storage resources (/providers/microsoft.authorization/policydefinitions/0961003e-5a0a-4549-abde-af6a37f2724d), [Deprecated]: SQL servers should use customer-managed keys to encrypt data at rest (/providers/microsoft.authorization/policydefinitions/0d134df8-db83-46fb-ad72-fe0c9428c8dd), PostgreSQL servers should use customer-managed keys to encrypt data at rest (/providers/microsoft.authorization/policydefinitions/18adea5e-f416-4d0f-8aa8-d24321e3e274), Azure Cosmos DB accounts should use customer-managed keys to encrypt data at rest (/providers/microsoft.authorization/policydefinitions/1f905d99-2ab7-462c-a6b0-f709acca6c8f), Container registries should be encrypted with a customer-managed key (/providers/microsoft.authorization/policydefinitions/5b9159ae-1701-4a6f-9a7a-aa9c8ddd0580), Cognitive Services accounts should enable data encryption with a customer-managed key (/providers/microsoft.authorization/policydefinitions/67121cc7-ff39-4ab8-b7e3-95b84dab487d), Storage accounts should use customer-managed key for encryption (/providers/microsoft.authorization/policydefinitions/6fac406b-40ca-413b-bf8e-0bf964659c25), Both operating systems and data disks in Azure Kubernetes Service clusters should be encrypted by customer-managed keys (/providers/microsoft.authorization/policydefinitions/7d7be79c-23ba-4033-84dd-45e2a5ccdd67), MySQL servers should use customer-managed keys to encrypt data at rest (/providers/microsoft.authorization/policydefinitions/83cef61d-dbd1-4b20-a4fc-5fbc7da10833), Azure Data Box jobs should use a customer-managed key to encrypt the device unlock password (/providers/microsoft.authorization/policydefinitions/86efb160-8de7-451d-bc08-5d475b0aadae), Azure Stream Analytics jobs should use customer-managed keys to encrypt data (/providers/microsoft.authorization/policydefinitions/87ba29ef-1ab3-4d82-b763-87fcd4f531f7), Azure Batch account should use customer-managed keys to encrypt data (/providers/microsoft.authorization/policydefinitions/99e9ccd8-3db9-4592-b0d1-14b1715a4d8a), Azure Machine Learning workspaces should be encrypted with a customer-managed key (/providers/microsoft.authorization/policydefinitions/ba769a63-b8cc-4b2d-abf6-ac33c7204be8), Azure Synapse workspaces should use customer-managed keys to encrypt data at rest (/providers/microsoft.authorization/policydefinitions/f7d52b2d-e161-4dfa-a82b-55e564167385)) | 09/09/2022 15:15:00 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | ||
Mg | ESJH | Deploy Diagnostic Settings to Azure Services | Deploy-Diag-LogAnalytics | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-diag-loganalytics | Monitoring | true | 1 (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-resource-diag) | 55 (Deploy Diagnostic Settings for Analysis Services to Log Analytics workspace (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-analysisservice), Deploy Diagnostic Settings for API Management to Log Analytics workspace (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-apimgmt), Deploy Diagnostic Settings for App Service Plan to Log Analytics workspace (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-webserverfarm), Deploy Diagnostic Settings for App Service to Log Analytics workspace (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-website), Deploy Diagnostic Settings for Application Gateway to Log Analytics workspace (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-applicationgateway), Deploy Diagnostic Settings for Automation to Log Analytics workspace (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-aa), Deploy Diagnostic Settings for Azure Data Lake Store to Log Analytics workspace (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-datalakestore), Deploy Diagnostic Settings for Azure Function App to Log Analytics workspace (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-function), Deploy Diagnostic Settings for Batch to Log Analytics workspace (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-batch), Deploy Diagnostic Settings for CDN Endpoint to Log Analytics workspace (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-cdnendpoints), Deploy Diagnostic Settings for Cognitive Services to Log Analytics workspace (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-cognitiveservices), Deploy Diagnostic Settings for Container Instances to Log Analytics workspace (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-aci), Deploy Diagnostic Settings for Container Registry to Log Analytics workspace (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-acr), Deploy Diagnostic Settings for Cosmos DB to Log Analytics workspace (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-cosmosdb), Deploy Diagnostic Settings for Data Factory to Log Analytics workspace (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-datafactory), Deploy Diagnostic Settings for Data Lake Analytics to Log Analytics workspace (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-dlanalytics), Deploy Diagnostic Settings for Database for MySQL to Log Analytics workspace (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-mysql), Deploy Diagnostic Settings for Database for PostgreSQL to Log Analytics workspace (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-postgresql), Deploy Diagnostic Settings for Databricks to Log Analytics workspace (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-databricks), Deploy Diagnostic Settings for Event Grid subscriptions to Log Analytics workspace (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-eventgridsub), Deploy Diagnostic Settings for Event Grid System Topic to Log Analytics workspace (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-eventgridsystemtopic), Deploy Diagnostic Settings for Event Grid Topic to Log Analytics workspace (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-eventgridtopic), Deploy Diagnostic Settings for Event Hubs to Log Analytics workspace (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-eventhub), Deploy Diagnostic Settings for ExpressRoute to Log Analytics workspace (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-expressroute), Deploy Diagnostic Settings for Firewall to Log Analytics workspace (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-firewall), Deploy Diagnostic Settings for Front Door to Log Analytics workspace (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-frontdoor), Deploy Diagnostic Settings for HDInsight to Log Analytics workspace (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-hdinsight), Deploy Diagnostic Settings for IoT Hub to Log Analytics workspace (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-iothub), Deploy Diagnostic Settings for Key Vault to Log Analytics workspace (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-keyvault), Deploy Diagnostic Settings for Kubernetes Service to Log Analytics workspace (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-aks), Deploy Diagnostic Settings for Load Balancer to Log Analytics workspace (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-loadbalancer), Deploy Diagnostic Settings for Logic Apps integration service environment to Log Analytics workspace (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-logicappsise), Deploy Diagnostic Settings for Logic Apps Workflow runtime to Log Analytics workspace (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-logicappswf), Deploy Diagnostic Settings for Machine Learning workspace to Log Analytics workspace (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-mlworkspace), Deploy Diagnostic Settings for MariaDB to Log Analytics workspace (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-mariadb), Deploy Diagnostic Settings for Network Interfaces to Log Analytics workspace (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-nic), Deploy Diagnostic Settings for Network Security Groups to Log Analytics workspace (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-networksecuritygroups), Deploy Diagnostic Settings for Power BI Embedded to Log Analytics workspace (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-powerbiembedded), Deploy Diagnostic Settings for Public IP addresses to Log Analytics workspace (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-publicip), Deploy Diagnostic Settings for Recovery Services vaults to Log Analytics workspace (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-recoveryvault), Deploy Diagnostic Settings for Redis Cache to Log Analytics workspace (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-rediscache), Deploy Diagnostic Settings for Relay to Log Analytics workspace (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-relay), Deploy Diagnostic Settings for Search Services to Log Analytics workspace (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-searchservices), Deploy Diagnostic Settings for Service Bus namespaces to Log Analytics workspace (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-servicebus), Deploy Diagnostic Settings for SignalR to Log Analytics workspace (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-signalr), Deploy Diagnostic Settings for SQL Databases to Log Analytics workspace (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-sqldbs), Deploy Diagnostic Settings for SQL Elastic Pools to Log Analytics workspace (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-sqlelasticpools), Deploy Diagnostic Settings for SQL Managed Instances to Log Analytics workspace (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-sqlmi), Deploy Diagnostic Settings for Stream Analytics to Log Analytics workspace (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-streamanalytics), Deploy Diagnostic Settings for Time Series Insights to Log Analytics workspace (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-timeseriesinsights), Deploy Diagnostic Settings for Traffic Manager to Log Analytics workspace (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-trafficmanager), Deploy Diagnostic Settings for Virtual Machine Scale Sets to Log Analytics workspace (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-vmss), Deploy Diagnostic Settings for Virtual Machines to Log Analytics workspace (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-vm), Deploy Diagnostic Settings for Virtual Network to Log Analytics workspace (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-virtualnetwork), Deploy Diagnostic Settings for VPN Gateway to Log Analytics workspace (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-vnetgw)) | 01/10/2021 20:57:40 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | ESJH | Deploy SQL Database built-in SQL security configuration | Deploy-Sql-Security | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-sql-security | SQL | true | 0 | 4 (Deploy SQL database auditing settings (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-sql-auditingsettings), Deploy SQL Database security Alert Policies configuration with email admin accounts (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-sql-securityalertpolicies), Deploy SQL Database Transparent Data Encryption (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-sql-tde), Deploy SQL Database vulnerability Assessments (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-sql-vulnerabilityassessments)) | 01/10/2021 20:57:40 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
Mg | ESJH-landingzones | Public network access should be disabled for PAAS services | 1234_API_MG_RoleAssignment_onRGMatching_(1234_RG_CUST*) | /providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/policysetdefinitions/1234_api_mg_roleassignment_onrgmatching_(1234_rg_cust*) | false | 0 | 8 (Public network access on AKS API should be disabled (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deny-publicendpoint-aks), Public network access on Azure SQL Database should be disabled (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deny-publicendpoint-sql), Public network access onStorage accounts should be disabled (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deny-publicendpoint-storage), Public network access should be disabled for CosmosDB (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deny-publicendpoint-cosmosdb), Public network access should be disabled for KeyVault (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deny-publicendpoint-keyvault), Public network access should be disabled for MariaDB (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deny-publicendpoint-mariadb), Public network access should be disabled for MySQL (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deny-publicendpoint-mysql), Public network access should be disabled for PostgreSql (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deny-publicendpoint-postgresql)) | 08/31/2021 15:14:21 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||
Mg | ESJH | Public network access should be disabled for PAAS services | Deny-PublicEndpoints | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deny-publicendpoints | Network | false | 0 | 8 (Public network access on AKS API should be disabled (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deny-publicendpoint-aks), Public network access on Azure SQL Database should be disabled (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deny-publicendpoint-sql), Public network access onStorage accounts should be disabled (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deny-publicendpoint-storage), Public network access should be disabled for CosmosDB (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deny-publicendpoint-cosmosdb), Public network access should be disabled for KeyVault (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deny-publicendpoint-keyvault), Public network access should be disabled for MariaDB (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deny-publicendpoint-mariadb), Public network access should be disabled for MySQL (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deny-publicendpoint-mysql), Public network access should be disabled for PostgreSql (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deny-publicendpoint-postgresql)) | 01/10/2021 20:57:40 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 |
PolicySet DisplayName | PolicySetId |
---|---|
Deny or Audit resources without Encryption with a customer-managed key (CMK) | /providers/microsoft.management/managementgroups/cust_t5/providers/microsoft.authorization/policysetdefinitions/enforce-encryption-cmk |
Public network access should be disabled for PAAS services | /providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/policysetdefinitions/1234_api_mg_roleassignment_onrgmatching_(1234_rg_cust*) |
Public network access should be disabled for PAAS services | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deny-publicendpoints |
Deploy SQL Database built-in SQL security configuration | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-sql-security |
Type | Policy Name (Id) | Policy Version | Policy Scope | Policy Scope Id | ALZ Policy Name (Id) | ALZ Policy Version | ALZ State | Exists in tenant | Detection method | AzAdvertizer Link |
---|---|---|---|---|---|---|---|---|---|---|
Policy | 4a132703-b3fd-4228-aaaa-f46ebc34a324 | n/a | Mg | esjh-platform | Deploy-Budget | 1.1.0 | potentiallyOutDated (no ver) | True | PolicyRule Hash | AzA Link |
Policy | Deny-PublicEndpoint-Aks | 1.0.0 | Mg | esjh | Deny-PublicEndpoint-Aks | obsolete | True | Policy Name | ||
Policy | Deploy-Diagnostics-MariaDB | 1.0.0 | Mg | esjh | Deploy-Diagnostics-MariaDB | 1.0.0 | upToDate | True | Policy Name | AzA Link |
Policy | Deny-Private-DNS-Zones | 1.0.0 | Mg | esjh | Deny-Private-DNS-Zones | 1.0.0 | upToDate | True | PolicyRule Hash, Policy Name | AzA Link |
Policy | Deploy-Diagnostics-EventGridSub | 1.0.0 | Mg | esjh | Deploy-Diagnostics-EventGridSub | 1.0.0 | upToDate | True | Policy Name | AzA Link |
Policy | 1c5e347d-1d8f-4854-9d88-918455c3c983 | 1.1.0 | Sub | 4dfa3b56-55bf-4059-802a-24e44a4fb60f | Deploy-Budget | 1.1.0 | upToDate | True | PolicyRule Hash | AzA Link |
Policy | Deploy-DNSZoneGroup-For-Blob-PrivateEndpoint | 1.0.0 | Mg | esjh | Deploy-DNSZoneGroup-For-Blob-PrivateEndpoint | obsolete | True | Policy Name | ||
Policy | Deploy-Diagnostics-ACR | 1.0.0 | Mg | esjh | Deploy-Diagnostics-ACR | 1.0.0 | upToDate | True | Policy Name | AzA Link |
Policy | Deploy-Windows-DomainJoin | 1.0.0 | Mg | esjh | Deploy-Windows-DomainJoin | 1.0.0 | upToDate | True | Policy Name | AzA Link |
Policy | Deploy-Nsg-FlowLogs | 1.0.0 | Mg | esjh | Deploy-Nsg-FlowLogs | 1.0.0 | upToDate | True | Policy Name | AzA Link |
Policy | Deploy-Diagnostics-RedisCache | 1.0.0 | Mg | esjh | Deploy-Diagnostics-RedisCache | 1.0.0 | upToDate | True | Policy Name | AzA Link |
Policy | Deploy-Diagnostics-Batch | 1.0.0 | Mg | esjh | Deploy-Diagnostics-Batch | obsolete | True | Policy Name | ||
Policy | Deploy-Diagnostics-Databricks | 1.0.0 | Mg | esjh | Deploy-Diagnostics-Databricks | 1.0.0 | upToDate | True | Policy Name | AzA Link |
Policy | Deploy-Diagnostics-SQLDBs | 1.0.0 | Mg | esjh | Deploy-Diagnostics-SQLDBs | obsolete | True | Policy Name | ||
Policy | Deploy-Diagnostics-PublicIP | 1.0.0 | Mg | esjh | Deploy-Diagnostics-PublicIP | obsolete | True | Policy Name | ||
Policy | Deploy-Diagnostics-MySQL | 1.0.0 | Mg | esjh | Deploy-Diagnostics-MySQL | 1.0.0 | upToDate | True | Policy Name | AzA Link |
Policy | Deny-PublicEndpoint-MariaDB | 1.0.0 | Mg | cust_t5 | Deny-PublicEndpoint-MariaDB | 1.0.0 | upToDate | True | PolicyRule Hash, Policy Name, MetaData Tag | AzA Link |
Policy | Deploy-Sql-Tde | 1.0.0 | Mg | esjh | Deploy-Sql-Tde | 1.0.0 | upToDate | True | Policy Name | AzA Link |
Policy | Deploy-Log-Analytics | 1.0.0 | Mg | esjh | Deploy-Log-Analytics | obsolete | True | Policy Name | ||
Policy | Deny-AppGW-Without-WAF | 1.0.0 | Mg | esjh | Deny-AppGW-Without-WAF | 1.0.0 | upToDate | True | PolicyRule Hash, Policy Name | AzA Link |
Policy | Deny-PublicIP | 1.0.0 | Mg | esjh | Deny-PublicIP | 1.0.0 | upToDate | True | PolicyRule Hash, Policy Name | AzA Link |
Policy | Deploy-Diagnostics-StreamAnalytics | 1.0.0 | Mg | esjh | Deploy-Diagnostics-StreamAnalytics | obsolete | True | Policy Name | ||
Policy | Deploy-Diagnostics-AKS | 1.0.0 | Mg | esjh | Deploy-Diagnostics-AKS | obsolete | True | Policy Name | ||
Policy | Deploy-Diagnostics-TimeSeriesInsights | 1.0.0 | Mg | esjh | Deploy-Diagnostics-TimeSeriesInsights | 1.0.0 | upToDate | True | Policy Name | AzA Link |
Policy | 53568753-a797-45d7-a552-d55f4a398bbb | n/a | Mg | 896470ca-9c6e-4176-9b38-5a655403c638 | Deny-Private-DNS-Zones | 1.0.0 | potentiallyOutDated (no ver) | True | PolicyRule Hash | AzA Link |
Policy | Deploy-Diagnostics-NIC | 1.0.0 | Mg | esjh | Deploy-Diagnostics-NIC | 1.0.0 | upToDate | True | Policy Name | AzA Link |
Policy | Deny-ERPeering | 1.0.0 | Mg | esjh | Deny-VNet-Peering | 1.0.1 | outDated | True | PolicyRule Hash | AzA Link |
Policy | Deny-PublicEndpoint-Storage | 1.0.0 | Mg | esjh | Deny-PublicEndpoint-Storage | obsolete | True | Policy Name | ||
Policy | Deploy-vWAN | 1.0.0 | Mg | esjh | Deploy-vWAN | obsolete | True | Policy Name | ||
Policy | Deploy-Diagnostics-LoadBalancer | 1.0.0 | Mg | esjh | Deploy-Diagnostics-LoadBalancer | 1.0.0 | upToDate | True | Policy Name | AzA Link |
Policy | Deploy-DNSZoneGroup-For-File-PrivateEndpoint | 1.0.0 | Mg | esjh | Deploy-DNSZoneGroup-For-File-PrivateEndpoint | obsolete | True | Policy Name | ||
Policy | Deny-PublicEndpoint-MySQL | 1.0.0 | Mg | esjh | Deny-PublicEndpoint-MySQL | obsolete | True | Policy Name | ||
Policy | Deploy-Diagnostics-LogicAppsWF | 1.0.0 | Mg | esjh | Deploy-Diagnostics-LogicAppsWF | obsolete | True | Policy Name | ||
Policy | Deploy-Diagnostics-Website | 1.0.0 | Mg | esjh | Deploy-Diagnostics-Website | 1.0.0 | upToDate | True | Policy Name | AzA Link |
Policy | Deploy-Diagnostics-SQLElasticPools | 1.0.0 | Mg | esjh | Deploy-Diagnostics-SQLElasticPools | 1.0.0 | upToDate | True | Policy Name | AzA Link |
Policy | Deploy-Diagnostics-DLAnalytics | 1.0.0 | Mg | esjh | Deploy-Diagnostics-DLAnalytics | 1.0.0 | upToDate | True | Policy Name | AzA Link |
Policy | Append-KV-SoftDelete | 1.0.0 | Mg | esjh | Append-KV-SoftDelete | 1.0.0 | upToDate | True | Policy Name | AzA Link |
Policy | Deploy-Diagnostics-EventHub | 1.0.0 | Mg | esjh | Deploy-Diagnostics-EventHub | obsolete | True | Policy Name | ||
Policy | Deploy-vHUB | 1.0.0 | Mg | esjh | Deploy-vHUB | obsolete | True | Policy Name | ||
Policy | Deploy-Diagnostics-SignalR | 1.0.0 | Mg | esjh | Deploy-Diagnostics-SignalR | 1.0.0 | upToDate | True | Policy Name | AzA Link |
Policy | Deploy-Diagnostics-VM | 1.0.0 | Mg | esjh | Deploy-Diagnostics-VM | 1.0.0 | upToDate | True | Policy Name | AzA Link |
Policy | Deploy-Diagnostics-TrafficManager | 1.0.0 | Mg | esjh | Deploy-Diagnostics-TrafficManager | 1.0.0 | upToDate | True | Policy Name | AzA Link |
Policy | Deploy-Sql-SecurityAlertPolicies | 1.0.0 | Mg | esjh | Deploy-Sql-SecurityAlertPolicies | 1.0.0 | upToDate | True | Policy Name | AzA Link |
Policy | Deny-AA-child-resources | n/a | Mg | esjh | Deny-AA-child-resources | 1.0.0 | potentiallyOutDated (no ver) | True | Policy Name | AzA Link |
Policy | Deploy-Diagnostics-ActivityLog | 1.0.0 | Mg | esjh | Deploy-Diagnostics-ActivityLog | obsolete | True | Policy Name | ||
Policy | Deploy-Diagnostics-AA | 1.0.0 | Mg | esjh | Deploy-Diagnostics-AA | 1.0.0 | upToDate | True | Policy Name | AzA Link |
Policy | Deploy-Diagnostics-SearchServices | 1.0.0 | Mg | esjh | Deploy-Diagnostics-SearchServices | obsolete | True | Policy Name | ||
Policy | Deploy-Diagnostics-VirtualNetwork | 1.0.0 | Mg | esjh | Deploy-Diagnostics-VirtualNetwork | 1.0.0 | upToDate | True | Policy Name | AzA Link |
Policy | Deploy-Diagnostics-ACI | 1.0.0 | Mg | esjh | Deploy-Diagnostics-ACI | 1.0.0 | upToDate | True | Policy Name | AzA Link |
Policy | Deploy-Diagnostics-EventGridSystemTopic | 1.0.0 | Mg | esjh | Deploy-Diagnostics-EventGridSystemTopic | 1.0.0 | upToDate | True | Policy Name | AzA Link |
Policy | Deploy-VNET-HubSpoke | 1.0.0 | Mg | esjh | Deploy-VNET-HubSpoke | 1.1.0 | outDated | True | Policy Name | AzA Link |
Policy | Deploy-Diagnostics-WebServerFarm | 1.0.0 | Mg | esjh | Deploy-Diagnostics-WebServerFarm | 1.0.0 | upToDate | True | Policy Name | AzA Link |
Policy | Deny-PublicEndpoint-KeyVault | 1.0.0 | Mg | esjh | Deny-PublicEndpoint-KeyVault | obsolete | True | Policy Name | ||
Policy | Deploy-Diagnostics-CognitiveServices | 1.0.0 | Mg | esjh | Deploy-Diagnostics-CognitiveServices | 1.0.0 | upToDate | True | Policy Name | AzA Link |
Policy | Deploy-Diagnostics-NetworkSecurityGroups | 1.0.0 | Mg | esjh | Deploy-Diagnostics-NetworkSecurityGroups | 1.0.0 | upToDate | True | Policy Name | AzA Link |
Policy | Deny-Subnet-Without-Nsg | 1.0.0 | Mg | esjh | Deny-Subnet-Without-Nsg | 2.0.0 | outDated | True | PolicyRule Hash, Policy Name | AzA Link |
Policy | Deploy-Diagnostics-ExpressRoute | 1.0.0 | Mg | esjh | Deploy-Diagnostics-ExpressRoute | 1.0.0 | upToDate | True | Policy Name | AzA Link |
Policy | Deploy-Diagnostics-LogicAppsISE | 1.0.0 | Mg | esjh | Deploy-Diagnostics-LogicAppsISE | 1.0.0 | upToDate | True | Policy Name | AzA Link |
Policy | 7a2ec127-9921-445e-a3bb-91f7099f545d | 1.0.0 | Mg | esjh-online | unknown | True | MetaData Tag | |||
Policy | Deploy-Diagnostics-SQLMI | 1.0.0 | Mg | esjh | Deploy-Diagnostics-SQLMI | 1.0.0 | upToDate | True | Policy Name | AzA Link |
Policy | Deploy-Diagnostics-Function | n/a | Mg | esjh | Deploy-Diagnostics-Function | 1.0.0 | potentiallyOutDated (no ver) | True | Policy Name | AzA Link |
Policy | Deploy-Diagnostics-Relay | 1.0.0 | Mg | esjh | Deploy-Diagnostics-Relay | 1.0.0 | upToDate | True | Policy Name | AzA Link |
Policy | Deploy-Diagnostics-KeyVault | 1.0.0 | Mg | esjh | Deploy-Diagnostics-KeyVault | obsolete | True | Policy Name | ||
Policy | Deploy-DDoSProtection | 1.0.0 | Mg | esjh | Deploy-DDoSProtection | 1.0.0 | upToDate | True | Policy Name | AzA Link |
Policy | Deny-PublicEndpoint-MariaDB | 1.0.0 | Mg | esjh | Deny-PublicEndpoint-MariaDB | 1.0.0 | upToDate | True | PolicyRule Hash, Policy Name | AzA Link |
Policy | Deploy-LA-Config | 1.0.0 | Mg | esjh | Deploy-LA-Config | obsolete | True | Policy Name | ||
Policy | Deploy-Diagnostics-PowerBIEmbedded | 1.0.0 | Mg | esjh | Deploy-Diagnostics-PowerBIEmbedded | 1.0.0 | upToDate | True | Policy Name | AzA Link |
Policy | Deploy-Budget | 1.0.0 | Mg | esjh | Deploy-Budget | 1.1.0 | outDated | True | Policy Name | AzA Link |
Policy | Deploy-Diagnostics-Firewall | 1.0.0 | Mg | esjh | Deploy-Diagnostics-Firewall | 1.0.0 | upToDate | True | Policy Name | AzA Link |
Policy | Deploy-Diagnostics-DataLakeStore | 1.0.0 | Mg | esjh | Deploy-Diagnostics-DataLakeStore | obsolete | True | Policy Name | ||
Policy | Deploy-Diagnostics-iotHub | 1.0.0 | Mg | esjh | Deploy-Diagnostics-iotHub | 1.0.0 | upToDate | True | Policy Name | AzA Link |
Policy | Deploy-ASC-Standard | 1.0.0 | Mg | esjh | Deploy-ASC-Standard | obsolete | True | Policy Name | ||
Policy | Deploy-Diagnostics-EventGridTopic | 1.0.0 | Mg | esjh | Deploy-Diagnostics-EventGridTopic | 1.0.0 | upToDate | True | Policy Name | AzA Link |
Policy | Deploy-Diagnostics-AnalysisService | 1.0.0 | Mg | esjh | Deploy-Diagnostics-AnalysisService | 1.0.0 | upToDate | True | Policy Name | AzA Link |
Policy | Deploy-Diagnostics-VMSS | 1.0.0 | Mg | esjh | Deploy-Diagnostics-VMSS | 1.0.0 | upToDate | True | Policy Name | AzA Link |
Policy | Deploy-Diagnostics-RecoveryVault | 1.0.0 | Mg | esjh | Deploy-Diagnostics-RecoveryVault | obsolete | True | Policy Name | ||
Policy | Deploy-Diagnostics-ServiceBus | 1.0.0 | Mg | esjh | Deploy-Diagnostics-ServiceBus | obsolete | True | Policy Name | ||
Policy | Deploy-Sql-AuditingSettings | 1.0.0 | Mg | esjh | Deploy-Sql-AuditingSettings | 1.0.0 | upToDate | True | Policy Name | AzA Link |
Policy | Deny-PublicEndpoint-PostgreSql | 1.0.0 | Mg | esjh | Deny-PublicEndpoint-PostgreSql | obsolete | True | Policy Name | ||
Policy | Deploy-Diagnostics-FrontDoor | 1.0.0 | Mg | esjh | Deploy-Diagnostics-FrontDoor | 1.0.0 | upToDate | True | Policy Name | AzA Link |
Policy | Deploy-HUB | 1.0.0 | Mg | esjh | Deploy-HUB | obsolete | True | Policy Name | ||
Policy | Deploy-SqlMi-minTLS | 1.0.0 | Mg | cust_t5 | Deploy-SqlMi-minTLS | 1.0.0 | upToDate | True | PolicyRule Hash, Policy Name, MetaData Tag | AzA Link |
Policy | Deploy-Diagnostics-PostgreSQL | 1.0.0 | Mg | esjh | Deploy-Diagnostics-PostgreSQL | 1.0.0 | upToDate | True | Policy Name | AzA Link |
Policy | Deploy-Diagnostics-CosmosDB | 1.0.0 | Mg | esjh | Deploy-Diagnostics-CosmosDB | 1.0.0 | upToDate | True | Policy Name | AzA Link |
Policy | Deny-PublicEndpoint-CosmosDB | 1.0.0 | Mg | esjh | Deny-PublicEndpoint-CosmosDB | obsolete | True | Policy Name | ||
Policy | Deny-PublicEndpoint-Sql | 1.0.0 | Mg | esjh | Deny-PublicEndpoint-Sql | obsolete | True | Policy Name | ||
Policy | Deploy-vNet | 1.0.0 | Mg | esjh | Deploy-vNet | obsolete | True | Policy Name | ||
Policy | Deploy-Sql-vulnerabilityAssessments | 1.0.0 | Mg | esjh | Deploy-Sql-vulnerabilityAssessments | 1.0.0 | upToDate | True | Policy Name | AzA Link |
Policy | Deploy-DNSZoneGroup-For-KeyVault-PrivateEndpoint | 1.0.0 | Mg | esjh | Deploy-DNSZoneGroup-For-KeyVault-PrivateEndpoint | obsolete | True | Policy Name | ||
Policy | Deploy-DNSZoneGroup-For-Queue-PrivateEndpoint | 1.0.0 | Mg | esjh | Deploy-DNSZoneGroup-For-Queue-PrivateEndpoint | obsolete | True | Policy Name | ||
Policy | Deploy-Diagnostics-APIMgmt | 1.0.0 | Mg | esjh | Deploy-Diagnostics-APIMgmt | 1.0.0 | upToDate | True | Policy Name | AzA Link |
Policy | Deploy-Diagnostics-VNetGW | 1.0.0 | Mg | esjh | Deploy-Diagnostics-VNetGW | 1.0.0 | upToDate | True | Policy Name | AzA Link |
Policy | Deploy-Diagnostics-MlWorkspace | 1.0.0 | Mg | esjh | Deploy-Diagnostics-MlWorkspace | 1.1.0 | outDated | True | Policy Name | AzA Link |
Policy | Deploy-Diagnostics-CDNEndpoints | 1.0.0 | Mg | esjh | Deploy-Diagnostics-CDNEndpoints | 1.0.0 | upToDate | True | Policy Name | AzA Link |
Policy | Deny-RDP-From-Internet | 1.0.0 | Mg | esjh | Deny-RDP-From-Internet | 1.0.0 | upToDate | True | PolicyRule Hash, Policy Name | AzA Link |
Policy | Deploy-FirewallPolicy | 1.0.0 | Mg | esjh | Deploy-FirewallPolicy | 1.0.0 | upToDate | True | Policy Name | AzA Link |
Policy | Deploy-Diagnostics-DataFactory | 1.0.0 | Mg | esjh | Deploy-Diagnostics-DataFactory | 1.0.0 | upToDate | True | Policy Name | AzA Link |
Policy | Deploy-Diagnostics-ApplicationGateway | 1.0.0 | Mg | esjh | Deploy-Diagnostics-ApplicationGateway | 1.0.0 | upToDate | True | Policy Name | AzA Link |
Policy | Deploy-DNSZoneGroup-For-Sql-PrivateEndpoint | 1.0.0 | Mg | esjh | Deploy-DNSZoneGroup-For-Sql-PrivateEndpoint | obsolete | True | Policy Name | ||
Policy | Deploy-DNSZoneGroup-For-Table-PrivateEndpoint | 1.0.0 | Mg | esjh | Deploy-DNSZoneGroup-For-Table-PrivateEndpoint | obsolete | True | Policy Name | ||
Policy | Deploy-Diagnostics-HDInsight | 1.0.0 | Mg | esjh | Deploy-Diagnostics-HDInsight | 1.0.0 | upToDate | True | Policy Name | AzA Link |
Policy | n/a | n/a | n/a | n/a | Deploy-Diagnostics-DataExplorerCluster | 1.0.0 | False | ALZ GitHub repository | AzA Link | |
Policy | n/a | n/a | n/a | n/a | Deny-SqlMi-minTLS | 1.0.0 | False | ALZ GitHub repository | AzA Link | |
Policy | n/a | n/a | n/a | n/a | Append-AppService-latestTLS | 1.0.0 | False | ALZ GitHub repository | AzA Link | |
Policy | n/a | n/a | n/a | n/a | Deploy-Diagnostics-WVDAppGroup | 1.0.1 | False | ALZ GitHub repository | AzA Link | |
Policy | n/a | n/a | n/a | n/a | Deny-Databricks-Sku | 1.0.0 | False | ALZ GitHub repository | AzA Link | |
Policy | n/a | n/a | n/a | n/a | Deploy-Custom-Route-Table | 1.0.0 | False | ALZ GitHub repository | AzA Link | |
Policy | n/a | n/a | n/a | n/a | Deny-MachineLearning-Aks | 1.0.0 | False | ALZ GitHub repository | AzA Link | |
Policy | n/a | n/a | n/a | n/a | Deploy-Nsg-FlowLogs-to-LA | 1.1.0 | False | ALZ GitHub repository | AzA Link | |
Policy | n/a | n/a | n/a | n/a | Deploy-Diagnostics-AVDScalingPlans | 1.0.0 | False | ALZ GitHub repository | AzA Link | |
Policy | n/a | n/a | n/a | n/a | Deploy-PostgreSQL-sslEnforcement | 1.0.0 | False | ALZ GitHub repository | AzA Link | |
Policy | n/a | n/a | n/a | n/a | Deny-PostgreSql-http | 1.0.1 | False | ALZ GitHub repository | AzA Link | |
Policy | n/a | n/a | n/a | n/a | Deny-AppServiceWebApp-http | 1.0.0 | False | ALZ GitHub repository | AzA Link | |
Policy | n/a | n/a | n/a | n/a | Deny-Sql-minTLS | 1.0.0 | False | ALZ GitHub repository | AzA Link | |
Policy | n/a | n/a | n/a | n/a | Deny-VNET-Peering-To-Non-Approved-VNETs | 1.0.0 | False | ALZ GitHub repository | AzA Link | |
Policy | n/a | n/a | n/a | n/a | Deploy-Diagnostics-ApiForFHIR | 1.0.0 | False | ALZ GitHub repository | AzA Link | |
Policy | n/a | n/a | n/a | n/a | Deny-MachineLearning-PublicNetworkAccess | 1.0.0 | False | ALZ GitHub repository | AzA Link | |
Policy | n/a | n/a | n/a | n/a | Append-Redis-disableNonSslPort | 1.0.0 | False | ALZ GitHub repository | AzA Link | |
Policy | n/a | n/a | n/a | n/a | Deny-Subnet-Without-UDR | 2.0.0 | False | ALZ GitHub repository | AzA Link | |
Policy | n/a | n/a | n/a | n/a | Deploy-Diagnostics-WVDHostPools | 1.1.0 | False | ALZ GitHub repository | AzA Link | |
Policy | n/a | n/a | n/a | n/a | Deny-MachineLearning-ComputeCluster-Scale | 1.0.0 | False | ALZ GitHub repository | AzA Link | |
Policy | n/a | n/a | n/a | n/a | Deny-MachineLearning-HbiWorkspace | 1.0.0 | False | ALZ GitHub repository | AzA Link | |
Policy | n/a | n/a | n/a | n/a | Audit-MachineLearning-PrivateEndpointId | 1.0.0 | False | ALZ GitHub repository | AzA Link | |
Policy | n/a | n/a | n/a | n/a | Deny-AppServiceFunctionApp-http | 1.0.0 | False | ALZ GitHub repository | AzA Link | |
Policy | n/a | n/a | n/a | n/a | Deny-Databricks-VirtualNetwork | 1.0.0 | False | ALZ GitHub repository | AzA Link | |
Policy | n/a | n/a | n/a | n/a | Append-Redis-sslEnforcement | 1.0.0 | False | ALZ GitHub repository | AzA Link | |
Policy | n/a | n/a | n/a | n/a | Deploy-MySQL-sslEnforcement | 1.0.0 | False | ALZ GitHub repository | AzA Link | |
Policy | n/a | n/a | n/a | n/a | Deploy-Diagnostics-Bastion | 1.0.0 | False | ALZ GitHub repository | AzA Link | |
Policy | n/a | n/a | n/a | n/a | Deploy-SQL-minTLS | 1.0.0 | False | ALZ GitHub repository | AzA Link | |
Policy | n/a | n/a | n/a | n/a | Deny-VNET-Peer-Cross-Sub | 1.0.1 | False | ALZ GitHub repository | AzA Link | |
Policy | n/a | n/a | n/a | n/a | Deploy-Diagnostics-MediaService | 1.0.0 | False | ALZ GitHub repository | AzA Link | |
Policy | n/a | n/a | n/a | n/a | Deny-Databricks-NoPublicIp | 1.0.0 | False | ALZ GitHub repository | AzA Link | |
Policy | n/a | n/a | n/a | n/a | Deny-MachineLearning-ComputeCluster-RemoteLoginPortPublicAccess | 1.1.0 | False | ALZ GitHub repository | AzA Link | |
Policy | n/a | n/a | n/a | n/a | Deny-Redis-http | 1.0.0 | False | ALZ GitHub repository | AzA Link | |
Policy | n/a | n/a | n/a | n/a | Deny-Storage-minTLS | 1.0.0 | False | ALZ GitHub repository | AzA Link | |
Policy | n/a | n/a | n/a | n/a | Deploy-ASC-SecurityContacts | 1.0.0 | False | ALZ GitHub repository | AzA Link | |
Policy | n/a | n/a | n/a | n/a | Deny-MachineLearning-Compute-VmSize | 1.0.0 | False | ALZ GitHub repository | AzA Link | |
Policy | n/a | n/a | n/a | n/a | Deploy-Storage-sslEnforcement | 1.1.0 | False | ALZ GitHub repository | AzA Link | |
Policy | n/a | n/a | n/a | n/a | Deny-MySql-http | 1.0.0 | False | ALZ GitHub repository | AzA Link | |
Policy | n/a | n/a | n/a | n/a | Append-AppService-httpsonly | 1.0.0 | False | ALZ GitHub repository | AzA Link | |
Policy | n/a | n/a | n/a | n/a | Deploy-Diagnostics-WVDWorkspace | 1.0.1 | False | ALZ GitHub repository | AzA Link | |
Policy | n/a | n/a | n/a | n/a | Deny-MachineLearning-PublicAccessWhenBehindVnet | 1.0.0 | False | ALZ GitHub repository | AzA Link | |
Policy | n/a | n/a | n/a | n/a | Deny-MachineLearning-Compute-SubnetId | 1.0.0 | False | ALZ GitHub repository | AzA Link | |
Policy | n/a | n/a | n/a | n/a | Deny-VNet-Peering | 1.0.1 | False | ALZ GitHub repository | AzA Link | |
Policy | n/a | n/a | n/a | n/a | Deny-AppServiceApiApp-http | 1.0.0 | False | ALZ GitHub repository | AzA Link | |
PolicySet | Enforce-Encryption-CMK | 1.0.0 | Mg | CUST_T5 | Enforce-Encryption-CMK | 1.0.0 | upToDate | True | PolicySet Name, MetaData Tag | AzA Link |
PolicySet | Deploy-Diag-LogAnalytics | 1.0.0 | Mg | ESJH | Deploy-Diag-LogAnalytics | obsolete | True | PolicySet Name | ||
PolicySet | Deploy-Sql-Security | 1.0.0 | Mg | ESJH | Deploy-Sql-Security | 1.0.0 | upToDate | True | PolicySet Name | AzA Link |
PolicySet | n/a | n/a | n/a | n/a | Deploy-Private-DNS-Zones | 1.0.0 | False | ALZ GitHub repository | AzA Link | |
PolicySet | n/a | n/a | n/a | n/a | Deploy-MDFC-Config | 3.0.0 | False | ALZ GitHub repository | AzA Link | |
PolicySet | n/a | n/a | n/a | n/a | Deny-PublicPaaSEndpoints | 1.0.0 | False | ALZ GitHub repository | AzA Link | |
PolicySet | n/a | n/a | n/a | n/a | Enforce-EncryptTransit | 1.0.0 | False | ALZ GitHub repository | AzA Link | |
PolicySet | n/a | n/a | n/a | n/a | Deploy-Diagnostics-LogAnalytics | 1.1.0 | False | ALZ GitHub repository | AzA Link |
PolicySet DisplayName | PolicySetId | Policy DisplayName | PolicyId | Deprecated Property |
---|---|---|---|---|
Deny or Audit resources without Encryption with a customer-managed key (CMK) | /providers/microsoft.management/managementgroups/cust_t5/providers/microsoft.authorization/policysetdefinitions/enforce-encryption-cmk | [Deprecated]: SQL servers should use customer-managed keys to encrypt data at rest | /providers/microsoft.authorization/policydefinitions/0d134df8-db83-46fb-ad72-fe0c9428c8dd | true |
Policy Assignment DisplayName | Policy AssignmentId | Policy/PolicySet | PolicySet DisplayName | PolicySetId | Policy DisplayName | PolicyId | Deprecated Property |
---|---|---|---|---|---|---|---|
testDeprecatedAssignment | /subscriptions/4dfa3b56-55bf-4059-802a-24e44a4fb60f/providers/microsoft.authorization/policyassignments/bcdd1466e4fc5114b6e5f13d | Policy | n/a | n/a | [Deprecated]: Function App should only be accessible over HTTPS | /providers/microsoft.authorization/policydefinitions/5df82f4f-773a-4a2d-97a2-422a806f1a55 | True |
Scope | Management Group Id | Management Group Name | SubscriptionId | Subscription Name | ResourceGroup | ResourceName / ResourceType | Exemption name | Exemption description | Category | ExpiresOn (UTC) | Exemption Id | Policy AssignmentId | Policy Type | Policy | Exempted Set Policies | CreatedBy | CreatedAt | LastModifiedBy | LastModifiedAt |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
MG | ESJH-sandboxes | ESJH-sandboxes | ESJH-sandboxes - ASC-Monitoring | Waiver | expired 02/04/2021 23:00:00 | /providers/Microsoft.Management/managementGroups/ESJH-sandboxes/providers/Microsoft.Authorization/policyExemptions/02752b36ec214097999f6b9b | /providers/Microsoft.Management/managementGroups/ESJH/providers/Microsoft.Authorization/policyAssignments/Deploy-ASC-Monitoring | PolicySet | Azure Security Benchmark | all 205 | ESDeploymentAccount@AzGovViz.onmicrosoft.com (User) | 2021-01-25 22:29:14 | ESDeploymentAccount@AzGovViz.onmicrosoft.com (User) | 2021-01-25 22:29:14 | |||||
Sub | ESJH-online | ESJH-online | 4dfa3b56-55bf-4059-802a-24e44a4fb60f | landingZone | landingZone - ASC-Monitoring | Waiver | expired 02/03/2021 23:00:00 | /subscriptions/4dfa3b56-55bf-4059-802a-24e44a4fb60f/providers/Microsoft.Authorization/policyExemptions/95e48160397b4d21ac96d7ca | /providers/Microsoft.Management/managementGroups/ESJH/providers/Microsoft.Authorization/policyAssignments/Deploy-ASC-Monitoring | PolicySet | Azure Security Benchmark | all 205 | ESDeploymentAccount@AzGovViz.onmicrosoft.com (User) | 2021-01-25 22:48:00 | ESDeploymentAccount@AzGovViz.onmicrosoft.com (User) | 2021-01-25 22:48:00 |
0 Policy assignments orphaned
Scope | Management Group Id | Management Group Name | SubscriptionId | Subscription Name | Inheritance | ScopeExcluded | Exemption applies | Policy/Set DisplayName | Policy/Set Description | Policy/SetId | Policy/Set | Type | Category | ALZ | Effect | Parameters | Enforcement | NonCompliance Message | Policies NonCmplnt | Policies Compliant | Resources NonCmplnt | Resources Compliant | Resources Conflicting | Role/Assignment | Managed Identity | Assignment DisplayName | Assignment Description | AssignmentId | AssignedBy | CreatedOn | CreatedBy | UpdatedOn | UpdatedBy |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Mg | ESJH | ESJH | thisScope Mg | false | false | Azure Security Benchmark | The Azure Security Benchmark initiative represents the policies and controls implementing security recommendations defined in Azure Security Benchmark v3, see https://aka.ms/azsecbm. This also serves as the Microsoft Defender for Cloud default policy initiative. You can directly assign this initiative, or manage its policies and compliance results within Microsoft Defender for Cloud. | /providers/microsoft.authorization/policysetdefinitions/1f3afdf9-d0c9-4c3d-847f-89da613e70a8 | PolicySet | BuiltIn | Security Center | False | n/a | Default | 45 | 9 | 26 | 2 | 0 | none | ASC-Monitoring | ASC-Monitoring | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-asc-monitoring | n/a | 01/10/2021 21:00:45 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||||
Mg | ESJH | ESJH | thisScope Mg | false | false | Deploy Azure Defender settings in Azure Security Center. | Deploys the Azure Defender settings in Azure Security Center for the specific services. | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-asc-standard | Policy | Custom | Security Center | true | DeployIfNotExists | pricingTierAppServices=Standard, pricingTierArm=Standard, pricingTierContainerRegistry=Standard, pricingTierDns=Standard, pricingTierKeyVaults=Standard, pricingTierKubernetesService=Standard, pricingTierSqlServers=Standard, pricingTierStorageAccounts=Standard, pricingTierVms=Standard | Default | 1 | 0 | 3 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/538e5329-7b5d-511f-8c05-9c7c32dab0bf) | Deploy-ASC-Security (SPObjId: 4cb4c797-237b-4e64-b2cf-66f841700442) | Deploy-ASC-Defender | Deploy-ASC-Defender | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-asc-security | n/a | 01/10/2021 21:00:47 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||
Mg | ESJH | ESJH | thisScope Mg | false | false | Deploy Diagnostic Settings for Activity Log to Log Analytics workspace | Deploys the diagnostic settings for Activity Log to stream to a Log Analytics workspace when any Activity Log which is missing this diagnostic settings is created or updated. The policy wil set the diagnostic with category enabled. | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-activitylog | Policy | Custom | Monitoring | true | DeployIfNotExists | logAnalytics=/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/resourcegroups/esjh-mgmt/providers/microsoft.operationalinsights/workspaces/esjh-la-f28ba982-5ed0-4033-9bdf-e45e4b5df466, logsEnabled=True | Default | 0 | 1 | 0 | 3 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/e5ac6b58-4f31-5956-9082-78d97ba2453e) | Deploy-AzActivity-Log (SPObjId: 1691aa06-da2e-43f0-98f9-af12494603a9) | Deploy-AzActivity-Log | Deploy-AzActivity-Log | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-azactivity-log | n/a | 01/10/2021 21:00:47 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||
Mg | ESJH | ESJH | thisScope Mg | false | false | Configure Log Analytics extension on Azure Arc enabled Linux servers. See deprecation notice below | Enable VM insights on servers and machines connected to Azure through Arc enabled servers by installing the Log Analytics virtual machine extension. VM insights uses the Log Analytics agent to collect the guest OS performance data, and provides insights into their performance. See more - https://aka.ms/vminsightsdocs. Deprecation notice: The Log Analytics agent is on a deprecation path and won't be supported after August 31, 2024. You must migrate to the replacement 'Azure Monitor agent' prior to that date | /providers/microsoft.authorization/policydefinitions/9d2b61b4-1d14-4a63-be30-d4498e7ad2cf | Policy | BuiltIn | Monitoring | False | DeployIfNotExists | logAnalytics=/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/resourcegroups/esjh-mgmt/providers/microsoft.operationalinsights/workspaces/esjh-la-f28ba982-5ed0-4033-9bdf-e45e4b5df466 | Default | 0 | 0 | 0 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/ddc0ff3c-a3d0-5d5b-ba19-116b6572acbf) | Deploy-LX-Arc-Monitoring (SPObjId: 9ed01b2b-9311-41a8-8897-0a329047be49) | Deploy-Linux-Arc-Monitoring | Deploy-Linux-Arc-Monitoring | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-lx-arc-monitoring | n/a | 01/10/2021 21:00:44 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||
Mg | ESJH | ESJH | thisScope Mg | false | false | Deploy Diagnostic Settings to Azure Services | This policy set deploys the configurations of application Azure resources to forward diagnostic logs and metrics to an Azure Log Analytics workspace. See the list of policies of the services that are included | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-diag-loganalytics | PolicySet | Custom | Monitoring | true | n/a | logAnalytics=/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/resourcegroups/esjh-mgmt/providers/microsoft.operationalinsights/workspaces/esjh-la-f28ba982-5ed0-4033-9bdf-e45e4b5df466 | Default | 3 | 4 | 3 | 12 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/45afca7b-a696-5947-a47f-960081dd1dbc) | Deploy-Resource-Diag (SPObjId: e51576ad-748d-462b-9d70-cb3b03e6c2e6) | Deploy-Resource-Diag | Deploy-Resource-Diag | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-resource-diag | n/a | 01/10/2021 21:00:44 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||
Mg | ESJH | ESJH | thisScope Mg | false | false | Legacy - Enable Azure Monitor for VMs | Legacy - Enable Azure Monitor for the virtual machines (VMs) in the specified scope (management group, subscription or resource group). Takes Log Analytics workspace as parameter. Use the new initiative named: Enable Azure Monitor for VMs with Azure Monitoring Agent(AMA) | /providers/microsoft.authorization/policysetdefinitions/55f3eceb-5573-4f18-9695-226972c6d74a | PolicySet | BuiltIn | Monitoring | False | n/a | logAnalytics_1=/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/resourcegroups/esjh-mgmt/providers/microsoft.operationalinsights/workspaces/esjh-la-f28ba982-5ed0-4033-9bdf-e45e4b5df466 | Default | 0 | 0 | 0 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/5d92332d-fe07-5cef-9c6b-33e5025d6374) | Deploy-VM-Monitoring (SPObjId: 065dde0b-5eab-4fce-80ee-ec956e94c498) | Deploy-VM-Monitoring | Deploy-VM-Monitoring v2 | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-vm-monitoring | n/a | 01/10/2021 21:00:44 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | 07/09/2021 16:04:52 | ObjectType: SP APP INT, ObjectDisplayName: AzOps, ObjectSignInName: n/a, ObjectId: c295384a-33d9-475e-abaf-d2fb0274299a | |||
Mg | ESJH | ESJH | thisScope Mg | false | false | Legacy - Enable Azure Monitor for Virtual Machine Scale Sets | Legacy - Enable Azure Monitor for the Virtual Machine Scale Sets in the specified scope (Management group, Subscription or resource group). Takes Log Analytics workspace as parameter. Use the new initiative named: Enable Azure Monitor for VMSS with Azure Monitoring Agent(AMA). Note: if your scale set upgradePolicy is set to Manual, you need to apply the extension to the all VMs in the set by calling upgrade on them. In CLI this would be az vmss update-instances. | /providers/microsoft.authorization/policysetdefinitions/75714362-cae7-409e-9b99-a8e5075b7fad | PolicySet | BuiltIn | Monitoring | False | n/a | logAnalytics_1=/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/resourcegroups/esjh-mgmt/providers/microsoft.operationalinsights/workspaces/esjh-la-f28ba982-5ed0-4033-9bdf-e45e4b5df466 | Default | 0 | 0 | 0 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/2d361fa3-7bd4-5234-9b12-1f54afa65870) | Deploy-VMSS-Monitoring (SPObjId: a3a4908f-b068-455e-a3f5-38cc5e00448f) | Deploy-VMSS-Monitoring | Deploy-VMSS-Monitoring | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-vmss-monitoring | n/a | 01/10/2021 21:00:47 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||
Mg | ESJH | ESJH | thisScope Mg | false | false | Configure Log Analytics extension on Azure Arc enabled Windows servers | Enable VM insights on servers and machines connected to Azure through Arc enabled servers by installing the Log Analytics virtual machine extension. VM insights uses the Log Analytics agent to collect the guest OS performance data, and provides insights into their performance. See more - https://aka.ms/vminsightsdocs. Deprecation notice: The Log Analytics agent is on a deprecation path and won't be supported after August 31, 2024. You must migrate to the replacement 'Azure Monitor agent' prior to that date. | /providers/microsoft.authorization/policydefinitions/69af7d4a-7b18-4044-93a9-2651498ef203 | Policy | BuiltIn | Monitoring | False | DeployIfNotExists | logAnalytics=/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/resourcegroups/esjh-mgmt/providers/microsoft.operationalinsights/workspaces/esjh-la-f28ba982-5ed0-4033-9bdf-e45e4b5df466 | Default | 0 | 0 | 0 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/38abf737-131b-52a2-90da-78943675bfed) | Deploy-WS-Arc-Monitoring (SPObjId: b0bdcb08-09c9-4d9d-957e-963d255e7220) | Deploy-Windows-Arc-Monitoring | Deploy-Windows-Arc-Monitoring | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-ws-arc-monitoring | n/a | 01/10/2021 21:00:47 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||
Mg | ESJH | ESJH | thisScope Mg | false | false | Enforce Role assignment at Subscription Scope | This Policy definition will enforce a RBAC Role assignment at Subscription scope. | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/enforce-roleassignment-subscriptionscope | Policy | Custom | n/a | false | deployIfNotExists | targetAADObjectId=862a78e3-3e64-4272-a758-c987b2410718, targetRoledefinitionId=acdd72a7-3385-48ef-bd42-f606fba81ae7 | Default | 0 | 1 | 0 | 3 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/b429c46d-6843-4a51-a74e-8a484de47815) | enforce0 (SPObjId: 79d69f2f-2fbe-409e-84c3-3e510c18fd16) | no description given | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/enforce0 | n/a | 03/16/2022 23:28:22 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | ||||||
Mg | test01 | test01 | thisScope Mg | false | false | 1234_AP_MG_RA_onSub | 1234_AP_MG_RA_onSub | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/policydefinitions/42672afc-0fc0-4dea-9f1d-95dcd2f9a21c | Policy | Custom | n/a | false | deployIfNotExists | targetRoledefinitionId=acdd72a7-3385-48ef-bd42-f606fba81ae7 | Default | 1 | 0 | 1 | 0 | 0 | 1234 RoleAssignmentSubscriptionOwner (/providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/roleassignments/ac53ad94-7450-4fc1-bc27-fd42de78a1be) | 1b5ac3236f0246ef83a14435 (SPObjId: 04b9b3f5-86a7-48cf-85fd-cce9468568db) | 1234_APA_MG_RA_onSubReader | no description given | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/policyassignments/1b5ac3236f0246ef83a14435 | Joe Dalton | 03/10/2022 15:03:08 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||
Mg | test01 | test01 | thisScope Mg | false | false | 1234_AP_MG_RA_onSub | 1234_AP_MG_RA_onSub | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/policydefinitions/42672afc-0fc0-4dea-9f1d-95dcd2f9a21c | Policy | Custom | n/a | false | deployIfNotExists | Default | 0 | 1 | 0 | 1 | 0 | 1234 RoleAssignmentSubscriptionOwner (/providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/roleassignments/3d2ad3f2-61bf-40b1-9ae5-ce752e78104a) | 5f9ec45db52f479e940fc150 (SPObjId: 84a55248-e141-4ea6-b6ad-23791f5e8980) | 1234_APA_MG_RA_onSubOwner | no description given | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/policyassignments/5f9ec45db52f479e940fc150 | Joe Dalton | 03/10/2022 13:32:29 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | ||||||
Mg | test01 | test01 | thisScope Mg | false | false | 1234_AP_MG_RA_onSub | 1234_AP_MG_RA_onSub | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/policydefinitions/42672afc-0fc0-4dea-9f1d-95dcd2f9a21c | Policy | Custom | n/a | false | deployIfNotExists | targetRoledefinitionId=b24988ac-6180-42a0-ab88-20f7382dd24c | Default | 0 | 1 | 0 | 1 | 0 | 1234 RoleAssignmentSubscriptionOwner (/providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/roleassignments/3d2ad3f2-61bf-40b1-9ae5-ce752e781054) | a2d9426ccece4000b889c72f (SPObjId: 405b7ca3-fe93-4dfa-b70a-837eef12bfe7) | 1234_APA_MG_RA_onSubContr | no description given | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/policyassignments/a2d9426ccece4000b889c72f | Joe Dalton | 03/10/2022 13:33:42 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||
Mg | test01 | test01 | thisScope Mg | false | false | My_AP_MG_raOnSub | no description given | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/policydefinitions/cedae647-a6f4-4c91-bc48-e411d86f335a | Policy | Custom | RBAC | false | deployIfNotExists | targetAADObjectId=c57f8838-1603-4932-b3c4-9572feea9173, targetRoledefinitionId=acdd72a7-3385-48ef-bd42-f606fba81ae7 | Default | 1 | 0 | 1 | 0 | 0 | 1234 RoleAssignmentSubscriptionOwner (/providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/roleassignments/3a86f501-86d7-44ea-83fb-6971a44ed3b3) | abe0212187e243e89ce5a623 (SPObjId: 41d30710-9d12-4361-ad69-ad313b2c427c) | My_AP_MG_raOnSub | no description given | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/policyassignments/abe0212187e243e89ce5a623 | Joe Dalton | 03/11/2022 07:44:46 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | 03/11/2022 08:14:11 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||
Mg | test01 | test01 | thisScope Mg | false | false | myPipelinePolicy | TEST - Policy for Monitoring whether Redis Cache has a non-SSL port enabled and the Minimum allowed TLS Version | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/policydefinitions/new pipeline policy 3 | Policy | Custom | Cache | false | Audit | effect=Audit | Default | 0 | 0 | 0 | 0 | 0 | none | assmgtest01 | TEST - Policy for Monitoring whether Redis Cache has a non-SSL port enabled and the Minimum allowed TLS Version | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/policyassignments/assmgtest01 | n/a | 10/27/2021 14:40:15 | ObjectType: SP APP INT, ObjectDisplayName: PolicyPipeline, ObjectSignInName: n/a, ObjectId: 90003bac-487c-4351-ad41-ed1f9e0446c1 | ||||||
Mg | ESJH-decommissioned | ESJH-decommissioned | inherited ESJH | false | false | Azure Security Benchmark | The Azure Security Benchmark initiative represents the policies and controls implementing security recommendations defined in Azure Security Benchmark v3, see https://aka.ms/azsecbm. This also serves as the Microsoft Defender for Cloud default policy initiative. You can directly assign this initiative, or manage its policies and compliance results within Microsoft Defender for Cloud. | /providers/microsoft.authorization/policysetdefinitions/1f3afdf9-d0c9-4c3d-847f-89da613e70a8 | PolicySet | BuiltIn | Security Center | False | n/a | Default | 0 | 0 | 0 | 0 | 0 | none | ASC-Monitoring | ASC-Monitoring | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-asc-monitoring | n/a | 01/10/2021 21:00:45 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||||
Mg | ESJH-decommissioned | ESJH-decommissioned | inherited ESJH | false | false | Deploy Azure Defender settings in Azure Security Center. | Deploys the Azure Defender settings in Azure Security Center for the specific services. | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-asc-standard | Policy | Custom | Security Center | true | DeployIfNotExists | pricingTierAppServices=Standard, pricingTierArm=Standard, pricingTierContainerRegistry=Standard, pricingTierDns=Standard, pricingTierKeyVaults=Standard, pricingTierKubernetesService=Standard, pricingTierSqlServers=Standard, pricingTierStorageAccounts=Standard, pricingTierVms=Standard | Default | 0 | 0 | 0 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/538e5329-7b5d-511f-8c05-9c7c32dab0bf) | Deploy-ASC-Security (SPObjId: 4cb4c797-237b-4e64-b2cf-66f841700442) | Deploy-ASC-Defender | Deploy-ASC-Defender | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-asc-security | n/a | 01/10/2021 21:00:47 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||
Mg | ESJH-decommissioned | ESJH-decommissioned | inherited ESJH | false | false | Deploy Diagnostic Settings for Activity Log to Log Analytics workspace | Deploys the diagnostic settings for Activity Log to stream to a Log Analytics workspace when any Activity Log which is missing this diagnostic settings is created or updated. The policy wil set the diagnostic with category enabled. | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-activitylog | Policy | Custom | Monitoring | true | DeployIfNotExists | logAnalytics=/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/resourcegroups/esjh-mgmt/providers/microsoft.operationalinsights/workspaces/esjh-la-f28ba982-5ed0-4033-9bdf-e45e4b5df466, logsEnabled=True | Default | 0 | 0 | 0 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/e5ac6b58-4f31-5956-9082-78d97ba2453e) | Deploy-AzActivity-Log (SPObjId: 1691aa06-da2e-43f0-98f9-af12494603a9) | Deploy-AzActivity-Log | Deploy-AzActivity-Log | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-azactivity-log | n/a | 01/10/2021 21:00:47 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||
Mg | ESJH-decommissioned | ESJH-decommissioned | inherited ESJH | false | false | Configure Log Analytics extension on Azure Arc enabled Linux servers. See deprecation notice below | Enable VM insights on servers and machines connected to Azure through Arc enabled servers by installing the Log Analytics virtual machine extension. VM insights uses the Log Analytics agent to collect the guest OS performance data, and provides insights into their performance. See more - https://aka.ms/vminsightsdocs. Deprecation notice: The Log Analytics agent is on a deprecation path and won't be supported after August 31, 2024. You must migrate to the replacement 'Azure Monitor agent' prior to that date | /providers/microsoft.authorization/policydefinitions/9d2b61b4-1d14-4a63-be30-d4498e7ad2cf | Policy | BuiltIn | Monitoring | False | DeployIfNotExists | logAnalytics=/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/resourcegroups/esjh-mgmt/providers/microsoft.operationalinsights/workspaces/esjh-la-f28ba982-5ed0-4033-9bdf-e45e4b5df466 | Default | 0 | 0 | 0 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/ddc0ff3c-a3d0-5d5b-ba19-116b6572acbf) | Deploy-LX-Arc-Monitoring (SPObjId: 9ed01b2b-9311-41a8-8897-0a329047be49) | Deploy-Linux-Arc-Monitoring | Deploy-Linux-Arc-Monitoring | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-lx-arc-monitoring | n/a | 01/10/2021 21:00:44 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||
Mg | ESJH-decommissioned | ESJH-decommissioned | inherited ESJH | false | false | Deploy Diagnostic Settings to Azure Services | This policy set deploys the configurations of application Azure resources to forward diagnostic logs and metrics to an Azure Log Analytics workspace. See the list of policies of the services that are included | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-diag-loganalytics | PolicySet | Custom | Monitoring | true | n/a | logAnalytics=/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/resourcegroups/esjh-mgmt/providers/microsoft.operationalinsights/workspaces/esjh-la-f28ba982-5ed0-4033-9bdf-e45e4b5df466 | Default | 0 | 0 | 0 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/45afca7b-a696-5947-a47f-960081dd1dbc) | Deploy-Resource-Diag (SPObjId: e51576ad-748d-462b-9d70-cb3b03e6c2e6) | Deploy-Resource-Diag | Deploy-Resource-Diag | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-resource-diag | n/a | 01/10/2021 21:00:44 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||
Mg | ESJH-decommissioned | ESJH-decommissioned | inherited ESJH | false | false | Legacy - Enable Azure Monitor for VMs | Legacy - Enable Azure Monitor for the virtual machines (VMs) in the specified scope (management group, subscription or resource group). Takes Log Analytics workspace as parameter. Use the new initiative named: Enable Azure Monitor for VMs with Azure Monitoring Agent(AMA) | /providers/microsoft.authorization/policysetdefinitions/55f3eceb-5573-4f18-9695-226972c6d74a | PolicySet | BuiltIn | Monitoring | False | n/a | logAnalytics_1=/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/resourcegroups/esjh-mgmt/providers/microsoft.operationalinsights/workspaces/esjh-la-f28ba982-5ed0-4033-9bdf-e45e4b5df466 | Default | 0 | 0 | 0 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/5d92332d-fe07-5cef-9c6b-33e5025d6374) | Deploy-VM-Monitoring (SPObjId: 065dde0b-5eab-4fce-80ee-ec956e94c498) | Deploy-VM-Monitoring | Deploy-VM-Monitoring v2 | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-vm-monitoring | n/a | 01/10/2021 21:00:44 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | 07/09/2021 16:04:52 | ObjectType: SP APP INT, ObjectDisplayName: AzOps, ObjectSignInName: n/a, ObjectId: c295384a-33d9-475e-abaf-d2fb0274299a | |||
Mg | ESJH-decommissioned | ESJH-decommissioned | inherited ESJH | false | false | Legacy - Enable Azure Monitor for Virtual Machine Scale Sets | Legacy - Enable Azure Monitor for the Virtual Machine Scale Sets in the specified scope (Management group, Subscription or resource group). Takes Log Analytics workspace as parameter. Use the new initiative named: Enable Azure Monitor for VMSS with Azure Monitoring Agent(AMA). Note: if your scale set upgradePolicy is set to Manual, you need to apply the extension to the all VMs in the set by calling upgrade on them. In CLI this would be az vmss update-instances. | /providers/microsoft.authorization/policysetdefinitions/75714362-cae7-409e-9b99-a8e5075b7fad | PolicySet | BuiltIn | Monitoring | False | n/a | logAnalytics_1=/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/resourcegroups/esjh-mgmt/providers/microsoft.operationalinsights/workspaces/esjh-la-f28ba982-5ed0-4033-9bdf-e45e4b5df466 | Default | 0 | 0 | 0 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/2d361fa3-7bd4-5234-9b12-1f54afa65870) | Deploy-VMSS-Monitoring (SPObjId: a3a4908f-b068-455e-a3f5-38cc5e00448f) | Deploy-VMSS-Monitoring | Deploy-VMSS-Monitoring | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-vmss-monitoring | n/a | 01/10/2021 21:00:47 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||
Mg | ESJH-decommissioned | ESJH-decommissioned | inherited ESJH | false | false | Configure Log Analytics extension on Azure Arc enabled Windows servers | Enable VM insights on servers and machines connected to Azure through Arc enabled servers by installing the Log Analytics virtual machine extension. VM insights uses the Log Analytics agent to collect the guest OS performance data, and provides insights into their performance. See more - https://aka.ms/vminsightsdocs. Deprecation notice: The Log Analytics agent is on a deprecation path and won't be supported after August 31, 2024. You must migrate to the replacement 'Azure Monitor agent' prior to that date. | /providers/microsoft.authorization/policydefinitions/69af7d4a-7b18-4044-93a9-2651498ef203 | Policy | BuiltIn | Monitoring | False | DeployIfNotExists | logAnalytics=/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/resourcegroups/esjh-mgmt/providers/microsoft.operationalinsights/workspaces/esjh-la-f28ba982-5ed0-4033-9bdf-e45e4b5df466 | Default | 0 | 0 | 0 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/38abf737-131b-52a2-90da-78943675bfed) | Deploy-WS-Arc-Monitoring (SPObjId: b0bdcb08-09c9-4d9d-957e-963d255e7220) | Deploy-Windows-Arc-Monitoring | Deploy-Windows-Arc-Monitoring | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-ws-arc-monitoring | n/a | 01/10/2021 21:00:47 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||
Mg | ESJH-decommissioned | ESJH-decommissioned | inherited ESJH | false | false | Enforce Role assignment at Subscription Scope | This Policy definition will enforce a RBAC Role assignment at Subscription scope. | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/enforce-roleassignment-subscriptionscope | Policy | Custom | n/a | false | deployIfNotExists | targetAADObjectId=862a78e3-3e64-4272-a758-c987b2410718, targetRoledefinitionId=acdd72a7-3385-48ef-bd42-f606fba81ae7 | Default | 0 | 0 | 0 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/b429c46d-6843-4a51-a74e-8a484de47815) | enforce0 (SPObjId: 79d69f2f-2fbe-409e-84c3-3e510c18fd16) | no description given | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/enforce0 | n/a | 03/16/2022 23:28:22 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | ||||||
Mg | ESJH-landingzones | ESJH-landingzones | thisScope Mg | false | false | Network interfaces should disable IP forwarding | This policy denies the network interfaces which enabled IP forwarding. The setting of IP forwarding disables Azure's check of the source and destination for a network interface. This should be reviewed by the network security team. | /providers/microsoft.authorization/policydefinitions/88c0b9da-ce96-4b03-9635-f29a937e2900 | Policy | BuiltIn | Network | False | deny | Default | 0 | 0 | 0 | 0 | 0 | none | Deny-IP-Forwarding | Deny-IP-Forwarding | /providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/policyassignments/deny-ip-forwarding | n/a | 01/10/2021 20:58:32 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||||
Mg | ESJH-landingzones | ESJH-landingzones | thisScope Mg | false | false | Kubernetes clusters should not allow container privilege escalation | Do not allow containers to run with privilege escalation to root in a Kubernetes cluster. This recommendation is part of CIS 5.2.5 which is intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. | /providers/microsoft.authorization/policydefinitions/1c6e92c9-99f0-4e55-9cf2-0c234dc48f99 | Policy | BuiltIn | Kubernetes | False | deny | effect=deny | Default | 0 | 0 | 0 | 0 | 0 | none | Deny-Privileged-Escalations-AKS | Deny-Privileged-Escalations-AKS | /providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/policyassignments/deny-priv-esc-aks | n/a | 01/10/2021 20:58:33 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||||||
Mg | ESJH-landingzones | ESJH-landingzones | thisScope Mg | false | false | Kubernetes cluster should not allow privileged containers | Do not allow privileged containers creation in a Kubernetes cluster. This recommendation is part of CIS 5.2.1 which is intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. | /providers/microsoft.authorization/policydefinitions/95edb821-ddaf-4404-9732-666045e056b4 | Policy | BuiltIn | Kubernetes | False | deny | effect=deny | Default | 0 | 0 | 0 | 0 | 0 | none | Deny-Privileged-Containers-AKS | Deny-Privileged-Containers-AKS | /providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/policyassignments/deny-privileged-aks | n/a | 01/10/2021 20:58:33 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||||||
Mg | ESJH-landingzones | ESJH-landingzones | thisScope Mg | false | false | RDP access from the Internet should be blocked | This policy denies any network security rule that allows RDP access from Internet | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deny-rdp-from-internet | Policy | Custom | Network | true | Deny | Default | 0 | 0 | 0 | 0 | 0 | none | Deny-RDP-from-Internet | Deny-RDP-from-Internet | /providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/policyassignments/deny-rdp-from-internet | n/a | 01/10/2021 20:58:32 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||||
Mg | ESJH-landingzones | ESJH-landingzones | thisScope Mg | false | false | Secure transfer to storage accounts should be enabled | Audit requirement of Secure transfer in your storage account. Secure transfer is an option that forces your storage account to accept requests only from secure connections (HTTPS). Use of HTTPS ensures authentication between the server and the service and protects data in transit from network layer attacks such as man-in-the-middle, eavesdropping, and session-hijacking | /providers/microsoft.authorization/policydefinitions/404c3081-a854-4457-ae30-26a93ef643f9 | Policy | BuiltIn | Storage | False | Audit | Default | 0 | 0 | 0 | 0 | 0 | none | Enforce-Secure-Storage | Enforce-Secure-Storage | /providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/policyassignments/deny-storage-http | n/a | 01/10/2021 20:58:32 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | 01/25/2021 22:26:59 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||
Mg | ESJH-landingzones | ESJH-landingzones | thisScope Mg | false | false | Subnets should have a Network Security Group | This policy denies the creation of a subsnet with out an Network Security Group. NSG help to protect traffic across subnet-level. | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deny-subnet-without-nsg | Policy | Custom | Network | true | Deny | Default | 1 | 0 | 1 | 0 | 0 | none | Deny-Subnet-Without-Nsg | Deny-Subnet-Without-Nsg | /providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/policyassignments/deny-subnet-without-nsg | n/a | 01/10/2021 20:58:32 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||||
Mg | ESJH-landingzones | ESJH-landingzones | thisScope Mg | false | false | Deploy Azure Policy Add-on to Azure Kubernetes Service clusters | Use Azure Policy Add-on to manage and report on the compliance state of your Azure Kubernetes Service (AKS) clusters. For more information, see https://aka.ms/akspolicydoc. | /providers/microsoft.authorization/policydefinitions/a8eff44f-8c92-45c3-a3fb-9880802d67a7 | Policy | BuiltIn | Kubernetes | False | DeployIfNotExists | Default | 0 | 0 | 0 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/roleassignments/4f80e55d-446d-5743-a173-5d189d196345) | Deploy-AKS-Policy (SPObjId: fb0a7498-393f-434d-aa93-2acd144f489f) | Deploy-AKS-Policy | Deploy-AKS-Policy | /providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/policyassignments/deploy-aks-policy | n/a | 01/10/2021 20:58:37 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||||||
Mg | ESJH-landingzones | ESJH-landingzones | thisScope Mg | false | false | Auditing on SQL server should be enabled | Auditing on your SQL Server should be enabled to track database activities across all databases on the server and save them in an audit log. | /providers/microsoft.authorization/policydefinitions/a6fb4358-5bf4-4ad7-ba82-2cd2f41ce5e9 | Policy | BuiltIn | SQL | False | AuditIfNotExists | Default | 0 | 0 | 0 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/roleassignments/8085d5e6-c291-571e-bd96-a2eb4769f9e6) | Deploy-SQL-DB-Auditing (SPObjId: 4f3a2551-ea2f-43c6-9623-8950156d19b7) | Deploy-SQL-Audit | Deploy-SQL-Audit | /providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/policyassignments/deploy-sql-db-auditing | n/a | 01/10/2021 20:58:36 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||||||
Mg | ESJH-landingzones | ESJH-landingzones | thisScope Mg | false | false | Configure backup on virtual machines without a given tag to a new recovery services vault with a default policy | Enforce backup for all virtual machines by deploying a recovery services vault in the same location and resource group as the virtual machine. Doing this is useful when different application teams in your organization are allocated separate resource groups and need to manage their own backups and restores. You can optionally exclude virtual machines containing a specified tag to control the scope of assignment. See https://aka.ms/AzureVMAppCentricBackupExcludeTag. | /providers/microsoft.authorization/policydefinitions/98d0b9f8-fd90-49c9-88e2-d3baf3b0dd86 | Policy | BuiltIn | Backup | False | DeployIfNotExists | Default | 0 | 0 | 0 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/roleassignments/70486d4a-1ee2-5f70-bb58-b3bd79840ae5) | Deploy-VM-Backup (SPObjId: e2511ca5-bcb3-4dbd-9d91-c18590c2a9d2) | Deploy-VM-Backup | Deploy-VM-Backup | /providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/policyassignments/deploy-vm-backup | n/a | 01/10/2021 20:58:34 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||||||
Mg | ESJH-landingzones | ESJH-landingzones | thisScope Mg | false | false | Kubernetes clusters should be accessible only over HTTPS | Use of HTTPS ensures authentication and protects data in transit from network layer eavesdropping attacks. This capability is currently generally available for Kubernetes Service (AKS), and in preview for Azure Arc enabled Kubernetes. For more info, visit https://aka.ms/kubepolicydoc | /providers/microsoft.authorization/policydefinitions/1a5b4dca-0b6f-4cf5-907c-56316bc1bf3d | Policy | BuiltIn | Kubernetes | False | deny | effect=deny | Default | 0 | 0 | 0 | 0 | 0 | none | Enforce-Https-Ingress-AKS | Enforce-Https-Ingress-AKS | /providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/policyassignments/enforce-aks-https | n/a | 01/10/2021 20:58:33 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||||||
Mg | ESJH-landingzones | ESJH-landingzones | thisScope Mg | false | false | Deploy SQL DB transparent data encryption | Enables transparent data encryption on SQL databases | /providers/microsoft.authorization/policydefinitions/86a912f6-9a06-4e26-b447-11b16ba8659f | Policy | BuiltIn | SQL | False | DeployIfNotExists | Default | 0 | 0 | 0 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/roleassignments/3df334e6-61c3-543a-b548-97586caf6d4f) | Enforce-SQL-Encryption (SPObjId: 34520a11-7b14-46a8-ac34-7d766959460a) | Deploy-SQL-Security | Deploy-SQL-Security | /providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/policyassignments/enforce-sql-encryption | n/a | 01/10/2021 20:58:33 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||||||
Mg | ESJH-landingzones | ESJH-landingzones | inherited ESJH | false | false | Azure Security Benchmark | The Azure Security Benchmark initiative represents the policies and controls implementing security recommendations defined in Azure Security Benchmark v3, see https://aka.ms/azsecbm. This also serves as the Microsoft Defender for Cloud default policy initiative. You can directly assign this initiative, or manage its policies and compliance results within Microsoft Defender for Cloud. | /providers/microsoft.authorization/policysetdefinitions/1f3afdf9-d0c9-4c3d-847f-89da613e70a8 | PolicySet | BuiltIn | Security Center | False | n/a | Default | 45 | 9 | 17 | 1 | 0 | none | ASC-Monitoring | ASC-Monitoring | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-asc-monitoring | n/a | 01/10/2021 21:00:45 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||||
Mg | ESJH-landingzones | ESJH-landingzones | inherited ESJH | false | false | Deploy Azure Defender settings in Azure Security Center. | Deploys the Azure Defender settings in Azure Security Center for the specific services. | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-asc-standard | Policy | Custom | Security Center | true | DeployIfNotExists | pricingTierAppServices=Standard, pricingTierArm=Standard, pricingTierContainerRegistry=Standard, pricingTierDns=Standard, pricingTierKeyVaults=Standard, pricingTierKubernetesService=Standard, pricingTierSqlServers=Standard, pricingTierStorageAccounts=Standard, pricingTierVms=Standard | Default | 1 | 0 | 2 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/538e5329-7b5d-511f-8c05-9c7c32dab0bf) | Deploy-ASC-Security (SPObjId: 4cb4c797-237b-4e64-b2cf-66f841700442) | Deploy-ASC-Defender | Deploy-ASC-Defender | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-asc-security | n/a | 01/10/2021 21:00:47 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||
Mg | ESJH-landingzones | ESJH-landingzones | inherited ESJH | false | false | Deploy Diagnostic Settings for Activity Log to Log Analytics workspace | Deploys the diagnostic settings for Activity Log to stream to a Log Analytics workspace when any Activity Log which is missing this diagnostic settings is created or updated. The policy wil set the diagnostic with category enabled. | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-activitylog | Policy | Custom | Monitoring | true | DeployIfNotExists | logAnalytics=/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/resourcegroups/esjh-mgmt/providers/microsoft.operationalinsights/workspaces/esjh-la-f28ba982-5ed0-4033-9bdf-e45e4b5df466, logsEnabled=True | Default | 0 | 1 | 0 | 2 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/e5ac6b58-4f31-5956-9082-78d97ba2453e) | Deploy-AzActivity-Log (SPObjId: 1691aa06-da2e-43f0-98f9-af12494603a9) | Deploy-AzActivity-Log | Deploy-AzActivity-Log | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-azactivity-log | n/a | 01/10/2021 21:00:47 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||
Mg | ESJH-landingzones | ESJH-landingzones | inherited ESJH | false | false | Configure Log Analytics extension on Azure Arc enabled Linux servers. See deprecation notice below | Enable VM insights on servers and machines connected to Azure through Arc enabled servers by installing the Log Analytics virtual machine extension. VM insights uses the Log Analytics agent to collect the guest OS performance data, and provides insights into their performance. See more - https://aka.ms/vminsightsdocs. Deprecation notice: The Log Analytics agent is on a deprecation path and won't be supported after August 31, 2024. You must migrate to the replacement 'Azure Monitor agent' prior to that date | /providers/microsoft.authorization/policydefinitions/9d2b61b4-1d14-4a63-be30-d4498e7ad2cf | Policy | BuiltIn | Monitoring | False | DeployIfNotExists | logAnalytics=/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/resourcegroups/esjh-mgmt/providers/microsoft.operationalinsights/workspaces/esjh-la-f28ba982-5ed0-4033-9bdf-e45e4b5df466 | Default | 0 | 0 | 0 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/ddc0ff3c-a3d0-5d5b-ba19-116b6572acbf) | Deploy-LX-Arc-Monitoring (SPObjId: 9ed01b2b-9311-41a8-8897-0a329047be49) | Deploy-Linux-Arc-Monitoring | Deploy-Linux-Arc-Monitoring | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-lx-arc-monitoring | n/a | 01/10/2021 21:00:44 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||
Mg | ESJH-landingzones | ESJH-landingzones | inherited ESJH | false | false | Deploy Diagnostic Settings to Azure Services | This policy set deploys the configurations of application Azure resources to forward diagnostic logs and metrics to an Azure Log Analytics workspace. See the list of policies of the services that are included | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-diag-loganalytics | PolicySet | Custom | Monitoring | true | n/a | logAnalytics=/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/resourcegroups/esjh-mgmt/providers/microsoft.operationalinsights/workspaces/esjh-la-f28ba982-5ed0-4033-9bdf-e45e4b5df466 | Default | 2 | 4 | 2 | 8 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/45afca7b-a696-5947-a47f-960081dd1dbc) | Deploy-Resource-Diag (SPObjId: e51576ad-748d-462b-9d70-cb3b03e6c2e6) | Deploy-Resource-Diag | Deploy-Resource-Diag | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-resource-diag | n/a | 01/10/2021 21:00:44 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||
Mg | ESJH-landingzones | ESJH-landingzones | inherited ESJH | false | false | Legacy - Enable Azure Monitor for VMs | Legacy - Enable Azure Monitor for the virtual machines (VMs) in the specified scope (management group, subscription or resource group). Takes Log Analytics workspace as parameter. Use the new initiative named: Enable Azure Monitor for VMs with Azure Monitoring Agent(AMA) | /providers/microsoft.authorization/policysetdefinitions/55f3eceb-5573-4f18-9695-226972c6d74a | PolicySet | BuiltIn | Monitoring | False | n/a | logAnalytics_1=/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/resourcegroups/esjh-mgmt/providers/microsoft.operationalinsights/workspaces/esjh-la-f28ba982-5ed0-4033-9bdf-e45e4b5df466 | Default | 0 | 0 | 0 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/5d92332d-fe07-5cef-9c6b-33e5025d6374) | Deploy-VM-Monitoring (SPObjId: 065dde0b-5eab-4fce-80ee-ec956e94c498) | Deploy-VM-Monitoring | Deploy-VM-Monitoring v2 | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-vm-monitoring | n/a | 01/10/2021 21:00:44 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | 07/09/2021 16:04:52 | ObjectType: SP APP INT, ObjectDisplayName: AzOps, ObjectSignInName: n/a, ObjectId: c295384a-33d9-475e-abaf-d2fb0274299a | |||
Mg | ESJH-landingzones | ESJH-landingzones | inherited ESJH | false | false | Legacy - Enable Azure Monitor for Virtual Machine Scale Sets | Legacy - Enable Azure Monitor for the Virtual Machine Scale Sets in the specified scope (Management group, Subscription or resource group). Takes Log Analytics workspace as parameter. Use the new initiative named: Enable Azure Monitor for VMSS with Azure Monitoring Agent(AMA). Note: if your scale set upgradePolicy is set to Manual, you need to apply the extension to the all VMs in the set by calling upgrade on them. In CLI this would be az vmss update-instances. | /providers/microsoft.authorization/policysetdefinitions/75714362-cae7-409e-9b99-a8e5075b7fad | PolicySet | BuiltIn | Monitoring | False | n/a | logAnalytics_1=/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/resourcegroups/esjh-mgmt/providers/microsoft.operationalinsights/workspaces/esjh-la-f28ba982-5ed0-4033-9bdf-e45e4b5df466 | Default | 0 | 0 | 0 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/2d361fa3-7bd4-5234-9b12-1f54afa65870) | Deploy-VMSS-Monitoring (SPObjId: a3a4908f-b068-455e-a3f5-38cc5e00448f) | Deploy-VMSS-Monitoring | Deploy-VMSS-Monitoring | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-vmss-monitoring | n/a | 01/10/2021 21:00:47 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||
Mg | ESJH-landingzones | ESJH-landingzones | inherited ESJH | false | false | Configure Log Analytics extension on Azure Arc enabled Windows servers | Enable VM insights on servers and machines connected to Azure through Arc enabled servers by installing the Log Analytics virtual machine extension. VM insights uses the Log Analytics agent to collect the guest OS performance data, and provides insights into their performance. See more - https://aka.ms/vminsightsdocs. Deprecation notice: The Log Analytics agent is on a deprecation path and won't be supported after August 31, 2024. You must migrate to the replacement 'Azure Monitor agent' prior to that date. | /providers/microsoft.authorization/policydefinitions/69af7d4a-7b18-4044-93a9-2651498ef203 | Policy | BuiltIn | Monitoring | False | DeployIfNotExists | logAnalytics=/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/resourcegroups/esjh-mgmt/providers/microsoft.operationalinsights/workspaces/esjh-la-f28ba982-5ed0-4033-9bdf-e45e4b5df466 | Default | 0 | 0 | 0 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/38abf737-131b-52a2-90da-78943675bfed) | Deploy-WS-Arc-Monitoring (SPObjId: b0bdcb08-09c9-4d9d-957e-963d255e7220) | Deploy-Windows-Arc-Monitoring | Deploy-Windows-Arc-Monitoring | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-ws-arc-monitoring | n/a | 01/10/2021 21:00:47 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||
Mg | ESJH-landingzones | ESJH-landingzones | inherited ESJH | false | false | Enforce Role assignment at Subscription Scope | This Policy definition will enforce a RBAC Role assignment at Subscription scope. | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/enforce-roleassignment-subscriptionscope | Policy | Custom | n/a | false | deployIfNotExists | targetAADObjectId=862a78e3-3e64-4272-a758-c987b2410718, targetRoledefinitionId=acdd72a7-3385-48ef-bd42-f606fba81ae7 | Default | 0 | 1 | 0 | 2 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/b429c46d-6843-4a51-a74e-8a484de47815) | enforce0 (SPObjId: 79d69f2f-2fbe-409e-84c3-3e510c18fd16) | no description given | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/enforce0 | n/a | 03/16/2022 23:28:22 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | ||||||
Mg | ESJH-platform | ESJH-platform | inherited ESJH | false | false | Azure Security Benchmark | The Azure Security Benchmark initiative represents the policies and controls implementing security recommendations defined in Azure Security Benchmark v3, see https://aka.ms/azsecbm. This also serves as the Microsoft Defender for Cloud default policy initiative. You can directly assign this initiative, or manage its policies and compliance results within Microsoft Defender for Cloud. | /providers/microsoft.authorization/policysetdefinitions/1f3afdf9-d0c9-4c3d-847f-89da613e70a8 | PolicySet | BuiltIn | Security Center | False | n/a | Default | 34 | 7 | 9 | 1 | 0 | none | ASC-Monitoring | ASC-Monitoring | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-asc-monitoring | n/a | 01/10/2021 21:00:45 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||||
Mg | ESJH-platform | ESJH-platform | inherited ESJH | false | false | Deploy Azure Defender settings in Azure Security Center. | Deploys the Azure Defender settings in Azure Security Center for the specific services. | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-asc-standard | Policy | Custom | Security Center | true | DeployIfNotExists | pricingTierAppServices=Standard, pricingTierArm=Standard, pricingTierContainerRegistry=Standard, pricingTierDns=Standard, pricingTierKeyVaults=Standard, pricingTierKubernetesService=Standard, pricingTierSqlServers=Standard, pricingTierStorageAccounts=Standard, pricingTierVms=Standard | Default | 1 | 0 | 1 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/538e5329-7b5d-511f-8c05-9c7c32dab0bf) | Deploy-ASC-Security (SPObjId: 4cb4c797-237b-4e64-b2cf-66f841700442) | Deploy-ASC-Defender | Deploy-ASC-Defender | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-asc-security | n/a | 01/10/2021 21:00:47 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||
Mg | ESJH-platform | ESJH-platform | inherited ESJH | false | false | Deploy Diagnostic Settings for Activity Log to Log Analytics workspace | Deploys the diagnostic settings for Activity Log to stream to a Log Analytics workspace when any Activity Log which is missing this diagnostic settings is created or updated. The policy wil set the diagnostic with category enabled. | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-activitylog | Policy | Custom | Monitoring | true | DeployIfNotExists | logAnalytics=/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/resourcegroups/esjh-mgmt/providers/microsoft.operationalinsights/workspaces/esjh-la-f28ba982-5ed0-4033-9bdf-e45e4b5df466, logsEnabled=True | Default | 0 | 1 | 0 | 1 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/e5ac6b58-4f31-5956-9082-78d97ba2453e) | Deploy-AzActivity-Log (SPObjId: 1691aa06-da2e-43f0-98f9-af12494603a9) | Deploy-AzActivity-Log | Deploy-AzActivity-Log | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-azactivity-log | n/a | 01/10/2021 21:00:47 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||
Mg | ESJH-platform | ESJH-platform | inherited ESJH | false | false | Configure Log Analytics extension on Azure Arc enabled Linux servers. See deprecation notice below | Enable VM insights on servers and machines connected to Azure through Arc enabled servers by installing the Log Analytics virtual machine extension. VM insights uses the Log Analytics agent to collect the guest OS performance data, and provides insights into their performance. See more - https://aka.ms/vminsightsdocs. Deprecation notice: The Log Analytics agent is on a deprecation path and won't be supported after August 31, 2024. You must migrate to the replacement 'Azure Monitor agent' prior to that date | /providers/microsoft.authorization/policydefinitions/9d2b61b4-1d14-4a63-be30-d4498e7ad2cf | Policy | BuiltIn | Monitoring | False | DeployIfNotExists | logAnalytics=/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/resourcegroups/esjh-mgmt/providers/microsoft.operationalinsights/workspaces/esjh-la-f28ba982-5ed0-4033-9bdf-e45e4b5df466 | Default | 0 | 0 | 0 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/ddc0ff3c-a3d0-5d5b-ba19-116b6572acbf) | Deploy-LX-Arc-Monitoring (SPObjId: 9ed01b2b-9311-41a8-8897-0a329047be49) | Deploy-Linux-Arc-Monitoring | Deploy-Linux-Arc-Monitoring | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-lx-arc-monitoring | n/a | 01/10/2021 21:00:44 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||
Mg | ESJH-platform | ESJH-platform | inherited ESJH | false | false | Deploy Diagnostic Settings to Azure Services | This policy set deploys the configurations of application Azure resources to forward diagnostic logs and metrics to an Azure Log Analytics workspace. See the list of policies of the services that are included | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-diag-loganalytics | PolicySet | Custom | Monitoring | true | n/a | logAnalytics=/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/resourcegroups/esjh-mgmt/providers/microsoft.operationalinsights/workspaces/esjh-la-f28ba982-5ed0-4033-9bdf-e45e4b5df466 | Default | 1 | 3 | 1 | 4 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/45afca7b-a696-5947-a47f-960081dd1dbc) | Deploy-Resource-Diag (SPObjId: e51576ad-748d-462b-9d70-cb3b03e6c2e6) | Deploy-Resource-Diag | Deploy-Resource-Diag | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-resource-diag | n/a | 01/10/2021 21:00:44 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||
Mg | ESJH-platform | ESJH-platform | inherited ESJH | false | false | Legacy - Enable Azure Monitor for VMs | Legacy - Enable Azure Monitor for the virtual machines (VMs) in the specified scope (management group, subscription or resource group). Takes Log Analytics workspace as parameter. Use the new initiative named: Enable Azure Monitor for VMs with Azure Monitoring Agent(AMA) | /providers/microsoft.authorization/policysetdefinitions/55f3eceb-5573-4f18-9695-226972c6d74a | PolicySet | BuiltIn | Monitoring | False | n/a | logAnalytics_1=/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/resourcegroups/esjh-mgmt/providers/microsoft.operationalinsights/workspaces/esjh-la-f28ba982-5ed0-4033-9bdf-e45e4b5df466 | Default | 0 | 0 | 0 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/5d92332d-fe07-5cef-9c6b-33e5025d6374) | Deploy-VM-Monitoring (SPObjId: 065dde0b-5eab-4fce-80ee-ec956e94c498) | Deploy-VM-Monitoring | Deploy-VM-Monitoring v2 | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-vm-monitoring | n/a | 01/10/2021 21:00:44 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | 07/09/2021 16:04:52 | ObjectType: SP APP INT, ObjectDisplayName: AzOps, ObjectSignInName: n/a, ObjectId: c295384a-33d9-475e-abaf-d2fb0274299a | |||
Mg | ESJH-platform | ESJH-platform | inherited ESJH | false | false | Legacy - Enable Azure Monitor for Virtual Machine Scale Sets | Legacy - Enable Azure Monitor for the Virtual Machine Scale Sets in the specified scope (Management group, Subscription or resource group). Takes Log Analytics workspace as parameter. Use the new initiative named: Enable Azure Monitor for VMSS with Azure Monitoring Agent(AMA). Note: if your scale set upgradePolicy is set to Manual, you need to apply the extension to the all VMs in the set by calling upgrade on them. In CLI this would be az vmss update-instances. | /providers/microsoft.authorization/policysetdefinitions/75714362-cae7-409e-9b99-a8e5075b7fad | PolicySet | BuiltIn | Monitoring | False | n/a | logAnalytics_1=/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/resourcegroups/esjh-mgmt/providers/microsoft.operationalinsights/workspaces/esjh-la-f28ba982-5ed0-4033-9bdf-e45e4b5df466 | Default | 0 | 0 | 0 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/2d361fa3-7bd4-5234-9b12-1f54afa65870) | Deploy-VMSS-Monitoring (SPObjId: a3a4908f-b068-455e-a3f5-38cc5e00448f) | Deploy-VMSS-Monitoring | Deploy-VMSS-Monitoring | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-vmss-monitoring | n/a | 01/10/2021 21:00:47 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||
Mg | ESJH-platform | ESJH-platform | inherited ESJH | false | false | Configure Log Analytics extension on Azure Arc enabled Windows servers | Enable VM insights on servers and machines connected to Azure through Arc enabled servers by installing the Log Analytics virtual machine extension. VM insights uses the Log Analytics agent to collect the guest OS performance data, and provides insights into their performance. See more - https://aka.ms/vminsightsdocs. Deprecation notice: The Log Analytics agent is on a deprecation path and won't be supported after August 31, 2024. You must migrate to the replacement 'Azure Monitor agent' prior to that date. | /providers/microsoft.authorization/policydefinitions/69af7d4a-7b18-4044-93a9-2651498ef203 | Policy | BuiltIn | Monitoring | False | DeployIfNotExists | logAnalytics=/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/resourcegroups/esjh-mgmt/providers/microsoft.operationalinsights/workspaces/esjh-la-f28ba982-5ed0-4033-9bdf-e45e4b5df466 | Default | 0 | 0 | 0 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/38abf737-131b-52a2-90da-78943675bfed) | Deploy-WS-Arc-Monitoring (SPObjId: b0bdcb08-09c9-4d9d-957e-963d255e7220) | Deploy-Windows-Arc-Monitoring | Deploy-Windows-Arc-Monitoring | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-ws-arc-monitoring | n/a | 01/10/2021 21:00:47 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||
Mg | ESJH-platform | ESJH-platform | inherited ESJH | false | false | Enforce Role assignment at Subscription Scope | This Policy definition will enforce a RBAC Role assignment at Subscription scope. | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/enforce-roleassignment-subscriptionscope | Policy | Custom | n/a | false | deployIfNotExists | targetAADObjectId=862a78e3-3e64-4272-a758-c987b2410718, targetRoledefinitionId=acdd72a7-3385-48ef-bd42-f606fba81ae7 | Default | 0 | 1 | 0 | 1 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/b429c46d-6843-4a51-a74e-8a484de47815) | enforce0 (SPObjId: 79d69f2f-2fbe-409e-84c3-3e510c18fd16) | no description given | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/enforce0 | n/a | 03/16/2022 23:28:22 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | ||||||
Mg | ESJH-sandboxes | ESJH-sandboxes | thisScope Mg | false | false | Audit VMs that do not use managed disks | This policy audits VMs that do not use managed disks | /providers/microsoft.authorization/policydefinitions/06a78e20-9358-41c9-923c-fb736d382a4d | Policy | BuiltIn | Compute | False | audit | Default | 0 | 0 | 0 | 0 | 0 | none | Audit VMs that do not use managed disks | no description given | /providers/microsoft.management/managementgroups/esjh-sandboxes/providers/microsoft.authorization/policyassignments/8d73a6aa8a0a4ea2b58de2b1 | Joe Dalton | 05/05/2021 19:52:10 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH-sandboxes | ESJH-sandboxes | thisScope Mg | false | false | Audit VMs that do not use managed disks | This policy audits VMs that do not use managed disks | /providers/microsoft.authorization/policydefinitions/06a78e20-9358-41c9-923c-fb736d382a4d | Policy | BuiltIn | Compute | False | audit | Default | 0 | 0 | 0 | 0 | 0 | none | APA Audit VMs that do not use managed disks | no description given | /providers/microsoft.management/managementgroups/esjh-sandboxes/providers/microsoft.authorization/policyassignments/8d73a6aa8a0a4ea2b58de2b2 | n/a | 07/06/2021 09:42:48 | ObjectType: SP APP INT, ObjectDisplayName: AzOps, ObjectSignInName: n/a, ObjectId: c295384a-33d9-475e-abaf-d2fb0274299a | |||||||
Mg | ESJH-sandboxes | ESJH-sandboxes | thisScope Mg | false | false | Audit VMs that do not use managed disks | This policy audits VMs that do not use managed disks | /providers/microsoft.authorization/policydefinitions/06a78e20-9358-41c9-923c-fb736d382a4d | Policy | BuiltIn | Compute | False | audit | Default | 0 | 0 | 0 | 0 | 0 | none | APA2 Audit VMs that do not use managed disks | no description given | /providers/microsoft.management/managementgroups/esjh-sandboxes/providers/microsoft.authorization/policyassignments/8d73a6aa8a0a4ea2b58de2b3 | n/a | 07/06/2021 10:32:34 | ObjectType: SP APP INT, ObjectDisplayName: AzOps, ObjectSignInName: n/a, ObjectId: c295384a-33d9-475e-abaf-d2fb0274299a | |||||||
Mg | ESJH-sandboxes | ESJH-sandboxes | thisScope Mg | false | false | Audit VMs that do not use managed disks | This policy audits VMs that do not use managed disks | /providers/microsoft.authorization/policydefinitions/06a78e20-9358-41c9-923c-fb736d382a4d | Policy | BuiltIn | Compute | False | audit | Default | 0 | 0 | 0 | 0 | 0 | none | APA3 Audit VMs that do not use managed disks | no description given | /providers/microsoft.management/managementgroups/esjh-sandboxes/providers/microsoft.authorization/policyassignments/8d73a6aa8a0a4ea2b58de2b4 | n/a | 07/06/2021 11:59:31 | ObjectType: SP APP INT, ObjectDisplayName: AzOps, ObjectSignInName: n/a, ObjectId: c295384a-33d9-475e-abaf-d2fb0274299a | |||||||
Mg | ESJH-sandboxes | ESJH-sandboxes | inherited ESJH | false | false | Azure Security Benchmark | The Azure Security Benchmark initiative represents the policies and controls implementing security recommendations defined in Azure Security Benchmark v3, see https://aka.ms/azsecbm. This also serves as the Microsoft Defender for Cloud default policy initiative. You can directly assign this initiative, or manage its policies and compliance results within Microsoft Defender for Cloud. | /providers/microsoft.authorization/policysetdefinitions/1f3afdf9-d0c9-4c3d-847f-89da613e70a8 | PolicySet | BuiltIn | Security Center | False | n/a | Default | 0 | 0 | 0 | 0 | 0 | none | ASC-Monitoring | ASC-Monitoring | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-asc-monitoring | n/a | 01/10/2021 21:00:45 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||||
Mg | ESJH-sandboxes | ESJH-sandboxes | inherited ESJH | false | false | Deploy Azure Defender settings in Azure Security Center. | Deploys the Azure Defender settings in Azure Security Center for the specific services. | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-asc-standard | Policy | Custom | Security Center | true | DeployIfNotExists | pricingTierAppServices=Standard, pricingTierArm=Standard, pricingTierContainerRegistry=Standard, pricingTierDns=Standard, pricingTierKeyVaults=Standard, pricingTierKubernetesService=Standard, pricingTierSqlServers=Standard, pricingTierStorageAccounts=Standard, pricingTierVms=Standard | Default | 0 | 0 | 0 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/538e5329-7b5d-511f-8c05-9c7c32dab0bf) | Deploy-ASC-Security (SPObjId: 4cb4c797-237b-4e64-b2cf-66f841700442) | Deploy-ASC-Defender | Deploy-ASC-Defender | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-asc-security | n/a | 01/10/2021 21:00:47 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||
Mg | ESJH-sandboxes | ESJH-sandboxes | inherited ESJH | false | false | Deploy Diagnostic Settings for Activity Log to Log Analytics workspace | Deploys the diagnostic settings for Activity Log to stream to a Log Analytics workspace when any Activity Log which is missing this diagnostic settings is created or updated. The policy wil set the diagnostic with category enabled. | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-activitylog | Policy | Custom | Monitoring | true | DeployIfNotExists | logAnalytics=/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/resourcegroups/esjh-mgmt/providers/microsoft.operationalinsights/workspaces/esjh-la-f28ba982-5ed0-4033-9bdf-e45e4b5df466, logsEnabled=True | Default | 0 | 0 | 0 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/e5ac6b58-4f31-5956-9082-78d97ba2453e) | Deploy-AzActivity-Log (SPObjId: 1691aa06-da2e-43f0-98f9-af12494603a9) | Deploy-AzActivity-Log | Deploy-AzActivity-Log | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-azactivity-log | n/a | 01/10/2021 21:00:47 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||
Mg | ESJH-sandboxes | ESJH-sandboxes | inherited ESJH | false | false | Configure Log Analytics extension on Azure Arc enabled Linux servers. See deprecation notice below | Enable VM insights on servers and machines connected to Azure through Arc enabled servers by installing the Log Analytics virtual machine extension. VM insights uses the Log Analytics agent to collect the guest OS performance data, and provides insights into their performance. See more - https://aka.ms/vminsightsdocs. Deprecation notice: The Log Analytics agent is on a deprecation path and won't be supported after August 31, 2024. You must migrate to the replacement 'Azure Monitor agent' prior to that date | /providers/microsoft.authorization/policydefinitions/9d2b61b4-1d14-4a63-be30-d4498e7ad2cf | Policy | BuiltIn | Monitoring | False | DeployIfNotExists | logAnalytics=/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/resourcegroups/esjh-mgmt/providers/microsoft.operationalinsights/workspaces/esjh-la-f28ba982-5ed0-4033-9bdf-e45e4b5df466 | Default | 0 | 0 | 0 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/ddc0ff3c-a3d0-5d5b-ba19-116b6572acbf) | Deploy-LX-Arc-Monitoring (SPObjId: 9ed01b2b-9311-41a8-8897-0a329047be49) | Deploy-Linux-Arc-Monitoring | Deploy-Linux-Arc-Monitoring | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-lx-arc-monitoring | n/a | 01/10/2021 21:00:44 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||
Mg | ESJH-sandboxes | ESJH-sandboxes | inherited ESJH | false | false | Deploy Diagnostic Settings to Azure Services | This policy set deploys the configurations of application Azure resources to forward diagnostic logs and metrics to an Azure Log Analytics workspace. See the list of policies of the services that are included | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-diag-loganalytics | PolicySet | Custom | Monitoring | true | n/a | logAnalytics=/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/resourcegroups/esjh-mgmt/providers/microsoft.operationalinsights/workspaces/esjh-la-f28ba982-5ed0-4033-9bdf-e45e4b5df466 | Default | 0 | 0 | 0 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/45afca7b-a696-5947-a47f-960081dd1dbc) | Deploy-Resource-Diag (SPObjId: e51576ad-748d-462b-9d70-cb3b03e6c2e6) | Deploy-Resource-Diag | Deploy-Resource-Diag | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-resource-diag | n/a | 01/10/2021 21:00:44 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||
Mg | ESJH-sandboxes | ESJH-sandboxes | inherited ESJH | false | false | Legacy - Enable Azure Monitor for VMs | Legacy - Enable Azure Monitor for the virtual machines (VMs) in the specified scope (management group, subscription or resource group). Takes Log Analytics workspace as parameter. Use the new initiative named: Enable Azure Monitor for VMs with Azure Monitoring Agent(AMA) | /providers/microsoft.authorization/policysetdefinitions/55f3eceb-5573-4f18-9695-226972c6d74a | PolicySet | BuiltIn | Monitoring | False | n/a | logAnalytics_1=/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/resourcegroups/esjh-mgmt/providers/microsoft.operationalinsights/workspaces/esjh-la-f28ba982-5ed0-4033-9bdf-e45e4b5df466 | Default | 0 | 0 | 0 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/5d92332d-fe07-5cef-9c6b-33e5025d6374) | Deploy-VM-Monitoring (SPObjId: 065dde0b-5eab-4fce-80ee-ec956e94c498) | Deploy-VM-Monitoring | Deploy-VM-Monitoring v2 | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-vm-monitoring | n/a | 01/10/2021 21:00:44 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | 07/09/2021 16:04:52 | ObjectType: SP APP INT, ObjectDisplayName: AzOps, ObjectSignInName: n/a, ObjectId: c295384a-33d9-475e-abaf-d2fb0274299a | |||
Mg | ESJH-sandboxes | ESJH-sandboxes | inherited ESJH | false | false | Legacy - Enable Azure Monitor for Virtual Machine Scale Sets | Legacy - Enable Azure Monitor for the Virtual Machine Scale Sets in the specified scope (Management group, Subscription or resource group). Takes Log Analytics workspace as parameter. Use the new initiative named: Enable Azure Monitor for VMSS with Azure Monitoring Agent(AMA). Note: if your scale set upgradePolicy is set to Manual, you need to apply the extension to the all VMs in the set by calling upgrade on them. In CLI this would be az vmss update-instances. | /providers/microsoft.authorization/policysetdefinitions/75714362-cae7-409e-9b99-a8e5075b7fad | PolicySet | BuiltIn | Monitoring | False | n/a | logAnalytics_1=/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/resourcegroups/esjh-mgmt/providers/microsoft.operationalinsights/workspaces/esjh-la-f28ba982-5ed0-4033-9bdf-e45e4b5df466 | Default | 0 | 0 | 0 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/2d361fa3-7bd4-5234-9b12-1f54afa65870) | Deploy-VMSS-Monitoring (SPObjId: a3a4908f-b068-455e-a3f5-38cc5e00448f) | Deploy-VMSS-Monitoring | Deploy-VMSS-Monitoring | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-vmss-monitoring | n/a | 01/10/2021 21:00:47 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||
Mg | ESJH-sandboxes | ESJH-sandboxes | inherited ESJH | false | false | Configure Log Analytics extension on Azure Arc enabled Windows servers | Enable VM insights on servers and machines connected to Azure through Arc enabled servers by installing the Log Analytics virtual machine extension. VM insights uses the Log Analytics agent to collect the guest OS performance data, and provides insights into their performance. See more - https://aka.ms/vminsightsdocs. Deprecation notice: The Log Analytics agent is on a deprecation path and won't be supported after August 31, 2024. You must migrate to the replacement 'Azure Monitor agent' prior to that date. | /providers/microsoft.authorization/policydefinitions/69af7d4a-7b18-4044-93a9-2651498ef203 | Policy | BuiltIn | Monitoring | False | DeployIfNotExists | logAnalytics=/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/resourcegroups/esjh-mgmt/providers/microsoft.operationalinsights/workspaces/esjh-la-f28ba982-5ed0-4033-9bdf-e45e4b5df466 | Default | 0 | 0 | 0 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/38abf737-131b-52a2-90da-78943675bfed) | Deploy-WS-Arc-Monitoring (SPObjId: b0bdcb08-09c9-4d9d-957e-963d255e7220) | Deploy-Windows-Arc-Monitoring | Deploy-Windows-Arc-Monitoring | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-ws-arc-monitoring | n/a | 01/10/2021 21:00:47 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||
Mg | ESJH-sandboxes | ESJH-sandboxes | inherited ESJH | false | false | Enforce Role assignment at Subscription Scope | This Policy definition will enforce a RBAC Role assignment at Subscription scope. | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/enforce-roleassignment-subscriptionscope | Policy | Custom | n/a | false | deployIfNotExists | targetAADObjectId=862a78e3-3e64-4272-a758-c987b2410718, targetRoledefinitionId=acdd72a7-3385-48ef-bd42-f606fba81ae7 | Default | 0 | 0 | 0 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/b429c46d-6843-4a51-a74e-8a484de47815) | enforce0 (SPObjId: 79d69f2f-2fbe-409e-84c3-3e510c18fd16) | no description given | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/enforce0 | n/a | 03/16/2022 23:28:22 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | ||||||
Mg | test01-APAC_ID | test01-APAC | inherited test01 | false | false | 1234_AP_MG_RA_onSub | 1234_AP_MG_RA_onSub | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/policydefinitions/42672afc-0fc0-4dea-9f1d-95dcd2f9a21c | Policy | Custom | n/a | false | deployIfNotExists | targetRoledefinitionId=acdd72a7-3385-48ef-bd42-f606fba81ae7 | Default | 0 | 0 | 0 | 0 | 0 | 1234 RoleAssignmentSubscriptionOwner (/providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/roleassignments/ac53ad94-7450-4fc1-bc27-fd42de78a1be) | 1b5ac3236f0246ef83a14435 (SPObjId: 04b9b3f5-86a7-48cf-85fd-cce9468568db) | 1234_APA_MG_RA_onSubReader | no description given | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/policyassignments/1b5ac3236f0246ef83a14435 | Joe Dalton | 03/10/2022 15:03:08 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||
Mg | test01-APAC_ID | test01-APAC | inherited test01 | false | false | 1234_AP_MG_RA_onSub | 1234_AP_MG_RA_onSub | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/policydefinitions/42672afc-0fc0-4dea-9f1d-95dcd2f9a21c | Policy | Custom | n/a | false | deployIfNotExists | Default | 0 | 0 | 0 | 0 | 0 | 1234 RoleAssignmentSubscriptionOwner (/providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/roleassignments/3d2ad3f2-61bf-40b1-9ae5-ce752e78104a) | 5f9ec45db52f479e940fc150 (SPObjId: 84a55248-e141-4ea6-b6ad-23791f5e8980) | 1234_APA_MG_RA_onSubOwner | no description given | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/policyassignments/5f9ec45db52f479e940fc150 | Joe Dalton | 03/10/2022 13:32:29 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | ||||||
Mg | test01-APAC_ID | test01-APAC | inherited test01 | false | false | 1234_AP_MG_RA_onSub | 1234_AP_MG_RA_onSub | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/policydefinitions/42672afc-0fc0-4dea-9f1d-95dcd2f9a21c | Policy | Custom | n/a | false | deployIfNotExists | targetRoledefinitionId=b24988ac-6180-42a0-ab88-20f7382dd24c | Default | 0 | 0 | 0 | 0 | 0 | 1234 RoleAssignmentSubscriptionOwner (/providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/roleassignments/3d2ad3f2-61bf-40b1-9ae5-ce752e781054) | a2d9426ccece4000b889c72f (SPObjId: 405b7ca3-fe93-4dfa-b70a-837eef12bfe7) | 1234_APA_MG_RA_onSubContr | no description given | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/policyassignments/a2d9426ccece4000b889c72f | Joe Dalton | 03/10/2022 13:33:42 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||
Mg | test01-APAC_ID | test01-APAC | inherited test01 | false | false | My_AP_MG_raOnSub | no description given | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/policydefinitions/cedae647-a6f4-4c91-bc48-e411d86f335a | Policy | Custom | RBAC | false | deployIfNotExists | targetAADObjectId=c57f8838-1603-4932-b3c4-9572feea9173, targetRoledefinitionId=acdd72a7-3385-48ef-bd42-f606fba81ae7 | Default | 0 | 0 | 0 | 0 | 0 | 1234 RoleAssignmentSubscriptionOwner (/providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/roleassignments/3a86f501-86d7-44ea-83fb-6971a44ed3b3) | abe0212187e243e89ce5a623 (SPObjId: 41d30710-9d12-4361-ad69-ad313b2c427c) | My_AP_MG_raOnSub | no description given | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/policyassignments/abe0212187e243e89ce5a623 | Joe Dalton | 03/11/2022 07:44:46 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | 03/11/2022 08:14:11 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||
Mg | test01-APAC_ID | test01-APAC | inherited test01 | false | false | myPipelinePolicy | TEST - Policy for Monitoring whether Redis Cache has a non-SSL port enabled and the Minimum allowed TLS Version | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/policydefinitions/new pipeline policy 3 | Policy | Custom | Cache | false | Audit | effect=Audit | Default | 0 | 0 | 0 | 0 | 0 | none | assmgtest01 | TEST - Policy for Monitoring whether Redis Cache has a non-SSL port enabled and the Minimum allowed TLS Version | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/policyassignments/assmgtest01 | n/a | 10/27/2021 14:40:15 | ObjectType: SP APP INT, ObjectDisplayName: PolicyPipeline, ObjectSignInName: n/a, ObjectId: 90003bac-487c-4351-ad41-ed1f9e0446c1 | ||||||
Mg | test01-EMEA_ID | test01-EMEA | inherited test01 | false | false | 1234_AP_MG_RA_onSub | 1234_AP_MG_RA_onSub | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/policydefinitions/42672afc-0fc0-4dea-9f1d-95dcd2f9a21c | Policy | Custom | n/a | false | deployIfNotExists | targetRoledefinitionId=acdd72a7-3385-48ef-bd42-f606fba81ae7 | Default | 1 | 0 | 1 | 0 | 0 | 1234 RoleAssignmentSubscriptionOwner (/providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/roleassignments/ac53ad94-7450-4fc1-bc27-fd42de78a1be) | 1b5ac3236f0246ef83a14435 (SPObjId: 04b9b3f5-86a7-48cf-85fd-cce9468568db) | 1234_APA_MG_RA_onSubReader | no description given | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/policyassignments/1b5ac3236f0246ef83a14435 | Joe Dalton | 03/10/2022 15:03:08 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||
Mg | test01-EMEA_ID | test01-EMEA | inherited test01 | false | false | 1234_AP_MG_RA_onSub | 1234_AP_MG_RA_onSub | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/policydefinitions/42672afc-0fc0-4dea-9f1d-95dcd2f9a21c | Policy | Custom | n/a | false | deployIfNotExists | Default | 0 | 1 | 0 | 1 | 0 | 1234 RoleAssignmentSubscriptionOwner (/providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/roleassignments/3d2ad3f2-61bf-40b1-9ae5-ce752e78104a) | 5f9ec45db52f479e940fc150 (SPObjId: 84a55248-e141-4ea6-b6ad-23791f5e8980) | 1234_APA_MG_RA_onSubOwner | no description given | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/policyassignments/5f9ec45db52f479e940fc150 | Joe Dalton | 03/10/2022 13:32:29 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | ||||||
Mg | test01-EMEA_ID | test01-EMEA | inherited test01 | false | false | 1234_AP_MG_RA_onSub | 1234_AP_MG_RA_onSub | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/policydefinitions/42672afc-0fc0-4dea-9f1d-95dcd2f9a21c | Policy | Custom | n/a | false | deployIfNotExists | targetRoledefinitionId=b24988ac-6180-42a0-ab88-20f7382dd24c | Default | 0 | 1 | 0 | 1 | 0 | 1234 RoleAssignmentSubscriptionOwner (/providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/roleassignments/3d2ad3f2-61bf-40b1-9ae5-ce752e781054) | a2d9426ccece4000b889c72f (SPObjId: 405b7ca3-fe93-4dfa-b70a-837eef12bfe7) | 1234_APA_MG_RA_onSubContr | no description given | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/policyassignments/a2d9426ccece4000b889c72f | Joe Dalton | 03/10/2022 13:33:42 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||
Mg | test01-EMEA_ID | test01-EMEA | inherited test01 | false | false | My_AP_MG_raOnSub | no description given | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/policydefinitions/cedae647-a6f4-4c91-bc48-e411d86f335a | Policy | Custom | RBAC | false | deployIfNotExists | targetAADObjectId=c57f8838-1603-4932-b3c4-9572feea9173, targetRoledefinitionId=acdd72a7-3385-48ef-bd42-f606fba81ae7 | Default | 1 | 0 | 1 | 0 | 0 | 1234 RoleAssignmentSubscriptionOwner (/providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/roleassignments/3a86f501-86d7-44ea-83fb-6971a44ed3b3) | abe0212187e243e89ce5a623 (SPObjId: 41d30710-9d12-4361-ad69-ad313b2c427c) | My_AP_MG_raOnSub | no description given | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/policyassignments/abe0212187e243e89ce5a623 | Joe Dalton | 03/11/2022 07:44:46 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | 03/11/2022 08:14:11 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||
Mg | test01-EMEA_ID | test01-EMEA | inherited test01 | false | false | myPipelinePolicy | TEST - Policy for Monitoring whether Redis Cache has a non-SSL port enabled and the Minimum allowed TLS Version | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/policydefinitions/new pipeline policy 3 | Policy | Custom | Cache | false | Audit | effect=Audit | Default | 0 | 0 | 0 | 0 | 0 | none | assmgtest01 | TEST - Policy for Monitoring whether Redis Cache has a non-SSL port enabled and the Minimum allowed TLS Version | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/policyassignments/assmgtest01 | n/a | 10/27/2021 14:40:15 | ObjectType: SP APP INT, ObjectDisplayName: PolicyPipeline, ObjectSignInName: n/a, ObjectId: 90003bac-487c-4351-ad41-ed1f9e0446c1 | ||||||
Sub | test01-EMEA_ID | test01-EMEA | a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2 | payg0 | inherited test01 | false | false | 1234_AP_MG_RA_onSub | 1234_AP_MG_RA_onSub | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/policydefinitions/42672afc-0fc0-4dea-9f1d-95dcd2f9a21c | Policy | Custom | n/a | false | deployIfNotExists | targetRoledefinitionId=acdd72a7-3385-48ef-bd42-f606fba81ae7 | Default | 1 | 0 | 1 | 0 | 0 | 1234 RoleAssignmentSubscriptionOwner (/providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/roleassignments/ac53ad94-7450-4fc1-bc27-fd42de78a1be) | 1b5ac3236f0246ef83a14435 (SPObjId: 04b9b3f5-86a7-48cf-85fd-cce9468568db) | 1234_APA_MG_RA_onSubReader | no description given | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/policyassignments/1b5ac3236f0246ef83a14435 | Joe Dalton | 03/10/2022 15:03:08 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||
Sub | test01-EMEA_ID | test01-EMEA | a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2 | payg0 | inherited test01 | false | false | 1234_AP_MG_RA_onSub | 1234_AP_MG_RA_onSub | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/policydefinitions/42672afc-0fc0-4dea-9f1d-95dcd2f9a21c | Policy | Custom | n/a | false | deployIfNotExists | Default | 0 | 1 | 0 | 1 | 0 | 1234 RoleAssignmentSubscriptionOwner (/providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/roleassignments/3d2ad3f2-61bf-40b1-9ae5-ce752e78104a) | 5f9ec45db52f479e940fc150 (SPObjId: 84a55248-e141-4ea6-b6ad-23791f5e8980) | 1234_APA_MG_RA_onSubOwner | no description given | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/policyassignments/5f9ec45db52f479e940fc150 | Joe Dalton | 03/10/2022 13:32:29 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | ||||
Sub | test01-EMEA_ID | test01-EMEA | a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2 | payg0 | inherited test01 | false | false | 1234_AP_MG_RA_onSub | 1234_AP_MG_RA_onSub | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/policydefinitions/42672afc-0fc0-4dea-9f1d-95dcd2f9a21c | Policy | Custom | n/a | false | deployIfNotExists | targetRoledefinitionId=b24988ac-6180-42a0-ab88-20f7382dd24c | Default | 0 | 1 | 0 | 1 | 0 | 1234 RoleAssignmentSubscriptionOwner (/providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/roleassignments/3d2ad3f2-61bf-40b1-9ae5-ce752e781054) | a2d9426ccece4000b889c72f (SPObjId: 405b7ca3-fe93-4dfa-b70a-837eef12bfe7) | 1234_APA_MG_RA_onSubContr | no description given | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/policyassignments/a2d9426ccece4000b889c72f | Joe Dalton | 03/10/2022 13:33:42 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||
Sub | test01-EMEA_ID | test01-EMEA | a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2 | payg0 | inherited test01 | false | false | My_AP_MG_raOnSub | no description given | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/policydefinitions/cedae647-a6f4-4c91-bc48-e411d86f335a | Policy | Custom | RBAC | false | deployIfNotExists | targetAADObjectId=c57f8838-1603-4932-b3c4-9572feea9173, targetRoledefinitionId=acdd72a7-3385-48ef-bd42-f606fba81ae7 | Default | 1 | 0 | 1 | 0 | 0 | 1234 RoleAssignmentSubscriptionOwner (/providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/roleassignments/3a86f501-86d7-44ea-83fb-6971a44ed3b3) | abe0212187e243e89ce5a623 (SPObjId: 41d30710-9d12-4361-ad69-ad313b2c427c) | My_AP_MG_raOnSub | no description given | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/policyassignments/abe0212187e243e89ce5a623 | Joe Dalton | 03/11/2022 07:44:46 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | 03/11/2022 08:14:11 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |
Sub | test01-EMEA_ID | test01-EMEA | a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2 | payg0 | inherited test01 | false | false | myPipelinePolicy | TEST - Policy for Monitoring whether Redis Cache has a non-SSL port enabled and the Minimum allowed TLS Version | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/policydefinitions/new pipeline policy 3 | Policy | Custom | Cache | false | Audit | effect=Audit | Default | 0 | 0 | 0 | 0 | 0 | none | assmgtest01 | TEST - Policy for Monitoring whether Redis Cache has a non-SSL port enabled and the Minimum allowed TLS Version | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/policyassignments/assmgtest01 | n/a | 10/27/2021 14:40:15 | ObjectType: SP APP INT, ObjectDisplayName: PolicyPipeline, ObjectSignInName: n/a, ObjectId: 90003bac-487c-4351-ad41-ed1f9e0446c1 | ||||
Sub | test01-EMEA_ID | test01-EMEA | a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2 | payg0 | thisScope Sub | false | false | Audit VMs that do not use managed disks | This policy audits VMs that do not use managed disks | /providers/microsoft.authorization/policydefinitions/06a78e20-9358-41c9-923c-fb736d382a4d | Policy | BuiltIn | Compute | False | audit | Default | VM should have a managed disk | 0 | 0 | 0 | 0 | 0 | none | Audit VMs that do not use managed disks | auditing that virtual machines use managed disk(s) | /subscriptions/a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2/providers/microsoft.authorization/policyassignments/988739f361d84a989dfa087e | n/a | 12/31/2021 10:03:35 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | 12/31/2021 10:36:38 | ObjectType: SP APP INT, ObjectDisplayName: AzOps, ObjectSignInName: n/a, ObjectId: c295384a-33d9-475e-abaf-d2fb0274299a | ||
Sub | test01-EMEA_ID | test01-EMEA | a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2 | payg0 | thisScope Sub | false | false | Configure Azure Defender to be enabled on SQL Servers and SQL Managed Instances | Enable Azure Defender on your SQL Servers and SQL Managed Instances to detect anomalous activities indicating unusual and potentially harmful attempts to access or exploit databases. | /providers/microsoft.authorization/policysetdefinitions/9cb3cc7a-b39b-4b82-bc89-e5a5d9ff7b97 | PolicySet | BuiltIn | Security Center | False | n/a | Default | 0 | 0 | 0 | 0 | 0 | none | ASC DataProtection (subscription: a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2) | This policy assignment was automatically created by Azure Security Center | /subscriptions/a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2/providers/microsoft.authorization/policyassignments/dataprotectionsecuritycenter | Security Center | 11/04/2021 06:36:03 | ObjectType: SP App EXT, ObjectDisplayName: Windows Azure Security Resource Provider, ObjectSignInName: n/a, ObjectId: 9ac4e379-ffb1-4e2c-ac89-3752d019abfd (rp) | |||||
Sub | test01-EMEA_ID | test01-EMEA | a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2 | payg0 | thisScope Sub | false | false | DiagSubscriptionsDim | no description given | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/policydefinitions/68b79a92-8932-4f15-88a6-0ed2675fa157 | Policy | Custom | n/a | false | DeployIfNotExists | Alert=False, Autoscale=False, Policy=False, Recommendation=False, ResourceHealth=False, ServiceHealth=False, workspaceId=/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/resourcegroups/esjh-mgmt/providers/microsoft.operationalinsights/workspaces/esjh-la-f28ba982-5ed0-4033-9bdf-e45e4b5df466 | Default | 0 | 1 | 0 | 1 | 0 | Log Analytics Contributor (/subscriptions/a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2/providers/microsoft.authorization/roleassignments/a11b5e6d-bb3d-43ea-8009-733bc510f16b), Log Analytics Contributor (/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/resourcegroups/esjh-mgmt/providers/microsoft.operationalinsights/workspaces/esjh-la-f28ba982-5ed0-4033-9bdf-e45e4b5df466/providers/microsoft.authorization/roleassignments/8a2c62a5-a882-4427-af78-6c7af11325fa) | e184b6792089442786621cfe (SPObjId: 71f8ba53-97da-4880-8d02-8b22176c9317) | DiagSubscriptionsDim | no description given | /subscriptions/a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2/providers/microsoft.authorization/policyassignments/e184b6792089442786621cfe | Joe Dalton | 06/24/2022 15:46:25 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||
RG | test01-EMEA_ID | test01-EMEA | a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2 | payg0 | thisScope Sub RG | false | false | Flow logs should be enabled for every network security group | Audit for flow log resources to verify if flow log status is enabled. Enabling flow logs allows to log information about IP traffic flowing through network security group. It can be used for optimizing network flows, monitoring throughput, verifying compliance, detecting intrusions and more. | /providers/microsoft.authorization/policydefinitions/27960feb-a23c-4577-8d36-ef8b5f35e0be | Policy | BuiltIn | Network | False | Audit | Default | flow logs should be enabled | 0 | 0 | 0 | 0 | 0 | none | Flow logs should be enabled for every network security group | no description given | /subscriptions/a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2/resourcegroups/prod_p1/providers/microsoft.authorization/policyassignments/f43bb064dd1e4745814be533 | Joe Dalton | 12/31/2021 13:58:35 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | ||||
Mg | CUST_T5 | CUST_T5 atz | thisScope Mg | false | false | Audit VMs that do not use managed disks | This policy audits VMs that do not use managed disks | /providers/microsoft.authorization/policydefinitions/06a78e20-9358-41c9-923c-fb736d382a4d | Policy | BuiltIn | Compute | False | audit | Default | 0 | 0 | 0 | 0 | 0 | none | APA Audit VMs that do not use managed disks | no description given | /providers/microsoft.management/managementgroups/cust_t5/providers/microsoft.authorization/policyassignments/aa4f4fdfd3b04fb3962a9da9 | Joe Dalton | 07/15/2021 15:16:07 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | CUST_T5 | CUST_T5 atz | inherited ESJH-sandboxes | false | false | Audit VMs that do not use managed disks | This policy audits VMs that do not use managed disks | /providers/microsoft.authorization/policydefinitions/06a78e20-9358-41c9-923c-fb736d382a4d | Policy | BuiltIn | Compute | False | audit | Default | 0 | 0 | 0 | 0 | 0 | none | Audit VMs that do not use managed disks | no description given | /providers/microsoft.management/managementgroups/esjh-sandboxes/providers/microsoft.authorization/policyassignments/8d73a6aa8a0a4ea2b58de2b1 | Joe Dalton | 05/05/2021 19:52:10 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | CUST_T5 | CUST_T5 atz | inherited ESJH-sandboxes | false | false | Audit VMs that do not use managed disks | This policy audits VMs that do not use managed disks | /providers/microsoft.authorization/policydefinitions/06a78e20-9358-41c9-923c-fb736d382a4d | Policy | BuiltIn | Compute | False | audit | Default | 0 | 0 | 0 | 0 | 0 | none | APA Audit VMs that do not use managed disks | no description given | /providers/microsoft.management/managementgroups/esjh-sandboxes/providers/microsoft.authorization/policyassignments/8d73a6aa8a0a4ea2b58de2b2 | n/a | 07/06/2021 09:42:48 | ObjectType: SP APP INT, ObjectDisplayName: AzOps, ObjectSignInName: n/a, ObjectId: c295384a-33d9-475e-abaf-d2fb0274299a | |||||||
Mg | CUST_T5 | CUST_T5 atz | inherited ESJH-sandboxes | false | false | Audit VMs that do not use managed disks | This policy audits VMs that do not use managed disks | /providers/microsoft.authorization/policydefinitions/06a78e20-9358-41c9-923c-fb736d382a4d | Policy | BuiltIn | Compute | False | audit | Default | 0 | 0 | 0 | 0 | 0 | none | APA2 Audit VMs that do not use managed disks | no description given | /providers/microsoft.management/managementgroups/esjh-sandboxes/providers/microsoft.authorization/policyassignments/8d73a6aa8a0a4ea2b58de2b3 | n/a | 07/06/2021 10:32:34 | ObjectType: SP APP INT, ObjectDisplayName: AzOps, ObjectSignInName: n/a, ObjectId: c295384a-33d9-475e-abaf-d2fb0274299a | |||||||
Mg | CUST_T5 | CUST_T5 atz | inherited ESJH-sandboxes | false | false | Audit VMs that do not use managed disks | This policy audits VMs that do not use managed disks | /providers/microsoft.authorization/policydefinitions/06a78e20-9358-41c9-923c-fb736d382a4d | Policy | BuiltIn | Compute | False | audit | Default | 0 | 0 | 0 | 0 | 0 | none | APA3 Audit VMs that do not use managed disks | no description given | /providers/microsoft.management/managementgroups/esjh-sandboxes/providers/microsoft.authorization/policyassignments/8d73a6aa8a0a4ea2b58de2b4 | n/a | 07/06/2021 11:59:31 | ObjectType: SP APP INT, ObjectDisplayName: AzOps, ObjectSignInName: n/a, ObjectId: c295384a-33d9-475e-abaf-d2fb0274299a | |||||||
Mg | CUST_T5 | CUST_T5 atz | inherited ESJH | false | false | Azure Security Benchmark | The Azure Security Benchmark initiative represents the policies and controls implementing security recommendations defined in Azure Security Benchmark v3, see https://aka.ms/azsecbm. This also serves as the Microsoft Defender for Cloud default policy initiative. You can directly assign this initiative, or manage its policies and compliance results within Microsoft Defender for Cloud. | /providers/microsoft.authorization/policysetdefinitions/1f3afdf9-d0c9-4c3d-847f-89da613e70a8 | PolicySet | BuiltIn | Security Center | False | n/a | Default | 0 | 0 | 0 | 0 | 0 | none | ASC-Monitoring | ASC-Monitoring | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-asc-monitoring | n/a | 01/10/2021 21:00:45 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||||
Mg | CUST_T5 | CUST_T5 atz | inherited ESJH | false | false | Deploy Azure Defender settings in Azure Security Center. | Deploys the Azure Defender settings in Azure Security Center for the specific services. | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-asc-standard | Policy | Custom | Security Center | true | DeployIfNotExists | pricingTierAppServices=Standard, pricingTierArm=Standard, pricingTierContainerRegistry=Standard, pricingTierDns=Standard, pricingTierKeyVaults=Standard, pricingTierKubernetesService=Standard, pricingTierSqlServers=Standard, pricingTierStorageAccounts=Standard, pricingTierVms=Standard | Default | 0 | 0 | 0 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/538e5329-7b5d-511f-8c05-9c7c32dab0bf) | Deploy-ASC-Security (SPObjId: 4cb4c797-237b-4e64-b2cf-66f841700442) | Deploy-ASC-Defender | Deploy-ASC-Defender | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-asc-security | n/a | 01/10/2021 21:00:47 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||
Mg | CUST_T5 | CUST_T5 atz | inherited ESJH | false | false | Deploy Diagnostic Settings for Activity Log to Log Analytics workspace | Deploys the diagnostic settings for Activity Log to stream to a Log Analytics workspace when any Activity Log which is missing this diagnostic settings is created or updated. The policy wil set the diagnostic with category enabled. | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-activitylog | Policy | Custom | Monitoring | true | DeployIfNotExists | logAnalytics=/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/resourcegroups/esjh-mgmt/providers/microsoft.operationalinsights/workspaces/esjh-la-f28ba982-5ed0-4033-9bdf-e45e4b5df466, logsEnabled=True | Default | 0 | 0 | 0 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/e5ac6b58-4f31-5956-9082-78d97ba2453e) | Deploy-AzActivity-Log (SPObjId: 1691aa06-da2e-43f0-98f9-af12494603a9) | Deploy-AzActivity-Log | Deploy-AzActivity-Log | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-azactivity-log | n/a | 01/10/2021 21:00:47 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||
Mg | CUST_T5 | CUST_T5 atz | inherited ESJH | false | false | Configure Log Analytics extension on Azure Arc enabled Linux servers. See deprecation notice below | Enable VM insights on servers and machines connected to Azure through Arc enabled servers by installing the Log Analytics virtual machine extension. VM insights uses the Log Analytics agent to collect the guest OS performance data, and provides insights into their performance. See more - https://aka.ms/vminsightsdocs. Deprecation notice: The Log Analytics agent is on a deprecation path and won't be supported after August 31, 2024. You must migrate to the replacement 'Azure Monitor agent' prior to that date | /providers/microsoft.authorization/policydefinitions/9d2b61b4-1d14-4a63-be30-d4498e7ad2cf | Policy | BuiltIn | Monitoring | False | DeployIfNotExists | logAnalytics=/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/resourcegroups/esjh-mgmt/providers/microsoft.operationalinsights/workspaces/esjh-la-f28ba982-5ed0-4033-9bdf-e45e4b5df466 | Default | 0 | 0 | 0 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/ddc0ff3c-a3d0-5d5b-ba19-116b6572acbf) | Deploy-LX-Arc-Monitoring (SPObjId: 9ed01b2b-9311-41a8-8897-0a329047be49) | Deploy-Linux-Arc-Monitoring | Deploy-Linux-Arc-Monitoring | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-lx-arc-monitoring | n/a | 01/10/2021 21:00:44 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||
Mg | CUST_T5 | CUST_T5 atz | inherited ESJH | false | false | Deploy Diagnostic Settings to Azure Services | This policy set deploys the configurations of application Azure resources to forward diagnostic logs and metrics to an Azure Log Analytics workspace. See the list of policies of the services that are included | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-diag-loganalytics | PolicySet | Custom | Monitoring | true | n/a | logAnalytics=/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/resourcegroups/esjh-mgmt/providers/microsoft.operationalinsights/workspaces/esjh-la-f28ba982-5ed0-4033-9bdf-e45e4b5df466 | Default | 0 | 0 | 0 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/45afca7b-a696-5947-a47f-960081dd1dbc) | Deploy-Resource-Diag (SPObjId: e51576ad-748d-462b-9d70-cb3b03e6c2e6) | Deploy-Resource-Diag | Deploy-Resource-Diag | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-resource-diag | n/a | 01/10/2021 21:00:44 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||
Mg | CUST_T5 | CUST_T5 atz | inherited ESJH | false | false | Legacy - Enable Azure Monitor for VMs | Legacy - Enable Azure Monitor for the virtual machines (VMs) in the specified scope (management group, subscription or resource group). Takes Log Analytics workspace as parameter. Use the new initiative named: Enable Azure Monitor for VMs with Azure Monitoring Agent(AMA) | /providers/microsoft.authorization/policysetdefinitions/55f3eceb-5573-4f18-9695-226972c6d74a | PolicySet | BuiltIn | Monitoring | False | n/a | logAnalytics_1=/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/resourcegroups/esjh-mgmt/providers/microsoft.operationalinsights/workspaces/esjh-la-f28ba982-5ed0-4033-9bdf-e45e4b5df466 | Default | 0 | 0 | 0 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/5d92332d-fe07-5cef-9c6b-33e5025d6374) | Deploy-VM-Monitoring (SPObjId: 065dde0b-5eab-4fce-80ee-ec956e94c498) | Deploy-VM-Monitoring | Deploy-VM-Monitoring v2 | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-vm-monitoring | n/a | 01/10/2021 21:00:44 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | 07/09/2021 16:04:52 | ObjectType: SP APP INT, ObjectDisplayName: AzOps, ObjectSignInName: n/a, ObjectId: c295384a-33d9-475e-abaf-d2fb0274299a | |||
Mg | CUST_T5 | CUST_T5 atz | inherited ESJH | false | false | Legacy - Enable Azure Monitor for Virtual Machine Scale Sets | Legacy - Enable Azure Monitor for the Virtual Machine Scale Sets in the specified scope (Management group, Subscription or resource group). Takes Log Analytics workspace as parameter. Use the new initiative named: Enable Azure Monitor for VMSS with Azure Monitoring Agent(AMA). Note: if your scale set upgradePolicy is set to Manual, you need to apply the extension to the all VMs in the set by calling upgrade on them. In CLI this would be az vmss update-instances. | /providers/microsoft.authorization/policysetdefinitions/75714362-cae7-409e-9b99-a8e5075b7fad | PolicySet | BuiltIn | Monitoring | False | n/a | logAnalytics_1=/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/resourcegroups/esjh-mgmt/providers/microsoft.operationalinsights/workspaces/esjh-la-f28ba982-5ed0-4033-9bdf-e45e4b5df466 | Default | 0 | 0 | 0 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/2d361fa3-7bd4-5234-9b12-1f54afa65870) | Deploy-VMSS-Monitoring (SPObjId: a3a4908f-b068-455e-a3f5-38cc5e00448f) | Deploy-VMSS-Monitoring | Deploy-VMSS-Monitoring | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-vmss-monitoring | n/a | 01/10/2021 21:00:47 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||
Mg | CUST_T5 | CUST_T5 atz | inherited ESJH | false | false | Configure Log Analytics extension on Azure Arc enabled Windows servers | Enable VM insights on servers and machines connected to Azure through Arc enabled servers by installing the Log Analytics virtual machine extension. VM insights uses the Log Analytics agent to collect the guest OS performance data, and provides insights into their performance. See more - https://aka.ms/vminsightsdocs. Deprecation notice: The Log Analytics agent is on a deprecation path and won't be supported after August 31, 2024. You must migrate to the replacement 'Azure Monitor agent' prior to that date. | /providers/microsoft.authorization/policydefinitions/69af7d4a-7b18-4044-93a9-2651498ef203 | Policy | BuiltIn | Monitoring | False | DeployIfNotExists | logAnalytics=/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/resourcegroups/esjh-mgmt/providers/microsoft.operationalinsights/workspaces/esjh-la-f28ba982-5ed0-4033-9bdf-e45e4b5df466 | Default | 0 | 0 | 0 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/38abf737-131b-52a2-90da-78943675bfed) | Deploy-WS-Arc-Monitoring (SPObjId: b0bdcb08-09c9-4d9d-957e-963d255e7220) | Deploy-Windows-Arc-Monitoring | Deploy-Windows-Arc-Monitoring | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-ws-arc-monitoring | n/a | 01/10/2021 21:00:47 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||
Mg | CUST_T5 | CUST_T5 atz | inherited ESJH | false | false | Enforce Role assignment at Subscription Scope | This Policy definition will enforce a RBAC Role assignment at Subscription scope. | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/enforce-roleassignment-subscriptionscope | Policy | Custom | n/a | false | deployIfNotExists | targetAADObjectId=862a78e3-3e64-4272-a758-c987b2410718, targetRoledefinitionId=acdd72a7-3385-48ef-bd42-f606fba81ae7 | Default | 0 | 0 | 0 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/b429c46d-6843-4a51-a74e-8a484de47815) | enforce0 (SPObjId: 79d69f2f-2fbe-409e-84c3-3e510c18fd16) | no description given | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/enforce0 | n/a | 03/16/2022 23:28:22 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | ||||||
Mg | ESJH-management | ESJH-management | thisScope Mg | false | false | Deploy the Log Analytics in the subscription | Deploys Log Analytics and Automation account to the subscription where the policy is assigned. | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-log-analytics | Policy | Custom | Monitoring | true | DeployIfNotExists | automationAccountName=ESJH-a-f28ba982-5ed0-4033-9bdf-e45e4b5df466, automationRegion=westeurope, retentionInDays=30, rgName=ESJH-mgmt, workspaceName=ESJH-la-f28ba982-5ed0-4033-9bdf-e45e4b5df466, workspaceRegion=westeurope | Default | 0 | 1 | 0 | 1 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh-management/providers/microsoft.authorization/roleassignments/b95d2309-e3d0-5961-bef8-a3e75deca49a) | Deploy-Log-Analytics (SPObjId: 2f3b9d0b-e8eb-4197-9cdf-ca6bde5dd3e5) | Deploy-Log-Analytics | Deploy-Log-Analytics | /providers/microsoft.management/managementgroups/esjh-management/providers/microsoft.authorization/policyassignments/deploy-log-analytics | n/a | 01/10/2021 20:58:37 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||
Mg | ESJH-management | ESJH-management | inherited ESJH | false | false | Azure Security Benchmark | The Azure Security Benchmark initiative represents the policies and controls implementing security recommendations defined in Azure Security Benchmark v3, see https://aka.ms/azsecbm. This also serves as the Microsoft Defender for Cloud default policy initiative. You can directly assign this initiative, or manage its policies and compliance results within Microsoft Defender for Cloud. | /providers/microsoft.authorization/policysetdefinitions/1f3afdf9-d0c9-4c3d-847f-89da613e70a8 | PolicySet | BuiltIn | Security Center | False | n/a | Default | 34 | 7 | 9 | 1 | 0 | none | ASC-Monitoring | ASC-Monitoring | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-asc-monitoring | n/a | 01/10/2021 21:00:45 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||||
Mg | ESJH-management | ESJH-management | inherited ESJH | false | false | Deploy Azure Defender settings in Azure Security Center. | Deploys the Azure Defender settings in Azure Security Center for the specific services. | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-asc-standard | Policy | Custom | Security Center | true | DeployIfNotExists | pricingTierAppServices=Standard, pricingTierArm=Standard, pricingTierContainerRegistry=Standard, pricingTierDns=Standard, pricingTierKeyVaults=Standard, pricingTierKubernetesService=Standard, pricingTierSqlServers=Standard, pricingTierStorageAccounts=Standard, pricingTierVms=Standard | Default | 1 | 0 | 1 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/538e5329-7b5d-511f-8c05-9c7c32dab0bf) | Deploy-ASC-Security (SPObjId: 4cb4c797-237b-4e64-b2cf-66f841700442) | Deploy-ASC-Defender | Deploy-ASC-Defender | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-asc-security | n/a | 01/10/2021 21:00:47 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||
Mg | ESJH-management | ESJH-management | inherited ESJH | false | false | Deploy Diagnostic Settings for Activity Log to Log Analytics workspace | Deploys the diagnostic settings for Activity Log to stream to a Log Analytics workspace when any Activity Log which is missing this diagnostic settings is created or updated. The policy wil set the diagnostic with category enabled. | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-activitylog | Policy | Custom | Monitoring | true | DeployIfNotExists | logAnalytics=/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/resourcegroups/esjh-mgmt/providers/microsoft.operationalinsights/workspaces/esjh-la-f28ba982-5ed0-4033-9bdf-e45e4b5df466, logsEnabled=True | Default | 0 | 1 | 0 | 1 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/e5ac6b58-4f31-5956-9082-78d97ba2453e) | Deploy-AzActivity-Log (SPObjId: 1691aa06-da2e-43f0-98f9-af12494603a9) | Deploy-AzActivity-Log | Deploy-AzActivity-Log | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-azactivity-log | n/a | 01/10/2021 21:00:47 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||
Mg | ESJH-management | ESJH-management | inherited ESJH | false | false | Configure Log Analytics extension on Azure Arc enabled Linux servers. See deprecation notice below | Enable VM insights on servers and machines connected to Azure through Arc enabled servers by installing the Log Analytics virtual machine extension. VM insights uses the Log Analytics agent to collect the guest OS performance data, and provides insights into their performance. See more - https://aka.ms/vminsightsdocs. Deprecation notice: The Log Analytics agent is on a deprecation path and won't be supported after August 31, 2024. You must migrate to the replacement 'Azure Monitor agent' prior to that date | /providers/microsoft.authorization/policydefinitions/9d2b61b4-1d14-4a63-be30-d4498e7ad2cf | Policy | BuiltIn | Monitoring | False | DeployIfNotExists | logAnalytics=/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/resourcegroups/esjh-mgmt/providers/microsoft.operationalinsights/workspaces/esjh-la-f28ba982-5ed0-4033-9bdf-e45e4b5df466 | Default | 0 | 0 | 0 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/ddc0ff3c-a3d0-5d5b-ba19-116b6572acbf) | Deploy-LX-Arc-Monitoring (SPObjId: 9ed01b2b-9311-41a8-8897-0a329047be49) | Deploy-Linux-Arc-Monitoring | Deploy-Linux-Arc-Monitoring | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-lx-arc-monitoring | n/a | 01/10/2021 21:00:44 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||
Mg | ESJH-management | ESJH-management | inherited ESJH | false | false | Deploy Diagnostic Settings to Azure Services | This policy set deploys the configurations of application Azure resources to forward diagnostic logs and metrics to an Azure Log Analytics workspace. See the list of policies of the services that are included | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-diag-loganalytics | PolicySet | Custom | Monitoring | true | n/a | logAnalytics=/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/resourcegroups/esjh-mgmt/providers/microsoft.operationalinsights/workspaces/esjh-la-f28ba982-5ed0-4033-9bdf-e45e4b5df466 | Default | 1 | 3 | 1 | 4 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/45afca7b-a696-5947-a47f-960081dd1dbc) | Deploy-Resource-Diag (SPObjId: e51576ad-748d-462b-9d70-cb3b03e6c2e6) | Deploy-Resource-Diag | Deploy-Resource-Diag | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-resource-diag | n/a | 01/10/2021 21:00:44 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||
Mg | ESJH-management | ESJH-management | inherited ESJH | false | false | Legacy - Enable Azure Monitor for VMs | Legacy - Enable Azure Monitor for the virtual machines (VMs) in the specified scope (management group, subscription or resource group). Takes Log Analytics workspace as parameter. Use the new initiative named: Enable Azure Monitor for VMs with Azure Monitoring Agent(AMA) | /providers/microsoft.authorization/policysetdefinitions/55f3eceb-5573-4f18-9695-226972c6d74a | PolicySet | BuiltIn | Monitoring | False | n/a | logAnalytics_1=/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/resourcegroups/esjh-mgmt/providers/microsoft.operationalinsights/workspaces/esjh-la-f28ba982-5ed0-4033-9bdf-e45e4b5df466 | Default | 0 | 0 | 0 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/5d92332d-fe07-5cef-9c6b-33e5025d6374) | Deploy-VM-Monitoring (SPObjId: 065dde0b-5eab-4fce-80ee-ec956e94c498) | Deploy-VM-Monitoring | Deploy-VM-Monitoring v2 | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-vm-monitoring | n/a | 01/10/2021 21:00:44 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | 07/09/2021 16:04:52 | ObjectType: SP APP INT, ObjectDisplayName: AzOps, ObjectSignInName: n/a, ObjectId: c295384a-33d9-475e-abaf-d2fb0274299a | |||
Mg | ESJH-management | ESJH-management | inherited ESJH | false | false | Legacy - Enable Azure Monitor for Virtual Machine Scale Sets | Legacy - Enable Azure Monitor for the Virtual Machine Scale Sets in the specified scope (Management group, Subscription or resource group). Takes Log Analytics workspace as parameter. Use the new initiative named: Enable Azure Monitor for VMSS with Azure Monitoring Agent(AMA). Note: if your scale set upgradePolicy is set to Manual, you need to apply the extension to the all VMs in the set by calling upgrade on them. In CLI this would be az vmss update-instances. | /providers/microsoft.authorization/policysetdefinitions/75714362-cae7-409e-9b99-a8e5075b7fad | PolicySet | BuiltIn | Monitoring | False | n/a | logAnalytics_1=/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/resourcegroups/esjh-mgmt/providers/microsoft.operationalinsights/workspaces/esjh-la-f28ba982-5ed0-4033-9bdf-e45e4b5df466 | Default | 0 | 0 | 0 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/2d361fa3-7bd4-5234-9b12-1f54afa65870) | Deploy-VMSS-Monitoring (SPObjId: a3a4908f-b068-455e-a3f5-38cc5e00448f) | Deploy-VMSS-Monitoring | Deploy-VMSS-Monitoring | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-vmss-monitoring | n/a | 01/10/2021 21:00:47 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||
Mg | ESJH-management | ESJH-management | inherited ESJH | false | false | Configure Log Analytics extension on Azure Arc enabled Windows servers | Enable VM insights on servers and machines connected to Azure through Arc enabled servers by installing the Log Analytics virtual machine extension. VM insights uses the Log Analytics agent to collect the guest OS performance data, and provides insights into their performance. See more - https://aka.ms/vminsightsdocs. Deprecation notice: The Log Analytics agent is on a deprecation path and won't be supported after August 31, 2024. You must migrate to the replacement 'Azure Monitor agent' prior to that date. | /providers/microsoft.authorization/policydefinitions/69af7d4a-7b18-4044-93a9-2651498ef203 | Policy | BuiltIn | Monitoring | False | DeployIfNotExists | logAnalytics=/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/resourcegroups/esjh-mgmt/providers/microsoft.operationalinsights/workspaces/esjh-la-f28ba982-5ed0-4033-9bdf-e45e4b5df466 | Default | 0 | 0 | 0 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/38abf737-131b-52a2-90da-78943675bfed) | Deploy-WS-Arc-Monitoring (SPObjId: b0bdcb08-09c9-4d9d-957e-963d255e7220) | Deploy-Windows-Arc-Monitoring | Deploy-Windows-Arc-Monitoring | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-ws-arc-monitoring | n/a | 01/10/2021 21:00:47 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||
Mg | ESJH-management | ESJH-management | inherited ESJH | false | false | Enforce Role assignment at Subscription Scope | This Policy definition will enforce a RBAC Role assignment at Subscription scope. | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/enforce-roleassignment-subscriptionscope | Policy | Custom | n/a | false | deployIfNotExists | targetAADObjectId=862a78e3-3e64-4272-a758-c987b2410718, targetRoledefinitionId=acdd72a7-3385-48ef-bd42-f606fba81ae7 | Default | 0 | 1 | 0 | 1 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/b429c46d-6843-4a51-a74e-8a484de47815) | enforce0 (SPObjId: 79d69f2f-2fbe-409e-84c3-3e510c18fd16) | no description given | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/enforce0 | n/a | 03/16/2022 23:28:22 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | ||||||
Sub | ESJH-management | ESJH-management | f28ba982-5ed0-4033-9bdf-e45e4b5df466 | management | inherited ESJH-management | false | false | Deploy the Log Analytics in the subscription | Deploys Log Analytics and Automation account to the subscription where the policy is assigned. | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-log-analytics | Policy | Custom | Monitoring | true | DeployIfNotExists | automationAccountName=ESJH-a-f28ba982-5ed0-4033-9bdf-e45e4b5df466, automationRegion=westeurope, retentionInDays=30, rgName=ESJH-mgmt, workspaceName=ESJH-la-f28ba982-5ed0-4033-9bdf-e45e4b5df466, workspaceRegion=westeurope | Default | 0 | 1 | 0 | 1 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh-management/providers/microsoft.authorization/roleassignments/b95d2309-e3d0-5961-bef8-a3e75deca49a) | Deploy-Log-Analytics (SPObjId: 2f3b9d0b-e8eb-4197-9cdf-ca6bde5dd3e5) | Deploy-Log-Analytics | Deploy-Log-Analytics | /providers/microsoft.management/managementgroups/esjh-management/providers/microsoft.authorization/policyassignments/deploy-log-analytics | n/a | 01/10/2021 20:58:37 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||
Sub | ESJH-management | ESJH-management | f28ba982-5ed0-4033-9bdf-e45e4b5df466 | management | inherited ESJH | false | false | Azure Security Benchmark | The Azure Security Benchmark initiative represents the policies and controls implementing security recommendations defined in Azure Security Benchmark v3, see https://aka.ms/azsecbm. This also serves as the Microsoft Defender for Cloud default policy initiative. You can directly assign this initiative, or manage its policies and compliance results within Microsoft Defender for Cloud. | /providers/microsoft.authorization/policysetdefinitions/1f3afdf9-d0c9-4c3d-847f-89da613e70a8 | PolicySet | BuiltIn | Security Center | False | n/a | Default | 34 | 7 | 9 | 1 | 0 | none | ASC-Monitoring | ASC-Monitoring | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-asc-monitoring | n/a | 01/10/2021 21:00:45 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||
Sub | ESJH-management | ESJH-management | f28ba982-5ed0-4033-9bdf-e45e4b5df466 | management | inherited ESJH | false | false | Deploy Azure Defender settings in Azure Security Center. | Deploys the Azure Defender settings in Azure Security Center for the specific services. | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-asc-standard | Policy | Custom | Security Center | true | DeployIfNotExists | pricingTierAppServices=Standard, pricingTierArm=Standard, pricingTierContainerRegistry=Standard, pricingTierDns=Standard, pricingTierKeyVaults=Standard, pricingTierKubernetesService=Standard, pricingTierSqlServers=Standard, pricingTierStorageAccounts=Standard, pricingTierVms=Standard | Default | 1 | 0 | 1 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/538e5329-7b5d-511f-8c05-9c7c32dab0bf) | Deploy-ASC-Security (SPObjId: 4cb4c797-237b-4e64-b2cf-66f841700442) | Deploy-ASC-Defender | Deploy-ASC-Defender | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-asc-security | n/a | 01/10/2021 21:00:47 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||
Sub | ESJH-management | ESJH-management | f28ba982-5ed0-4033-9bdf-e45e4b5df466 | management | inherited ESJH | false | false | Deploy Diagnostic Settings for Activity Log to Log Analytics workspace | Deploys the diagnostic settings for Activity Log to stream to a Log Analytics workspace when any Activity Log which is missing this diagnostic settings is created or updated. The policy wil set the diagnostic with category enabled. | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-activitylog | Policy | Custom | Monitoring | true | DeployIfNotExists | logAnalytics=/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/resourcegroups/esjh-mgmt/providers/microsoft.operationalinsights/workspaces/esjh-la-f28ba982-5ed0-4033-9bdf-e45e4b5df466, logsEnabled=True | Default | 0 | 1 | 0 | 1 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/e5ac6b58-4f31-5956-9082-78d97ba2453e) | Deploy-AzActivity-Log (SPObjId: 1691aa06-da2e-43f0-98f9-af12494603a9) | Deploy-AzActivity-Log | Deploy-AzActivity-Log | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-azactivity-log | n/a | 01/10/2021 21:00:47 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||
Sub | ESJH-management | ESJH-management | f28ba982-5ed0-4033-9bdf-e45e4b5df466 | management | inherited ESJH | false | false | Configure Log Analytics extension on Azure Arc enabled Linux servers. See deprecation notice below | Enable VM insights on servers and machines connected to Azure through Arc enabled servers by installing the Log Analytics virtual machine extension. VM insights uses the Log Analytics agent to collect the guest OS performance data, and provides insights into their performance. See more - https://aka.ms/vminsightsdocs. Deprecation notice: The Log Analytics agent is on a deprecation path and won't be supported after August 31, 2024. You must migrate to the replacement 'Azure Monitor agent' prior to that date | /providers/microsoft.authorization/policydefinitions/9d2b61b4-1d14-4a63-be30-d4498e7ad2cf | Policy | BuiltIn | Monitoring | False | DeployIfNotExists | logAnalytics=/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/resourcegroups/esjh-mgmt/providers/microsoft.operationalinsights/workspaces/esjh-la-f28ba982-5ed0-4033-9bdf-e45e4b5df466 | Default | 0 | 0 | 0 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/ddc0ff3c-a3d0-5d5b-ba19-116b6572acbf) | Deploy-LX-Arc-Monitoring (SPObjId: 9ed01b2b-9311-41a8-8897-0a329047be49) | Deploy-Linux-Arc-Monitoring | Deploy-Linux-Arc-Monitoring | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-lx-arc-monitoring | n/a | 01/10/2021 21:00:44 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||
Sub | ESJH-management | ESJH-management | f28ba982-5ed0-4033-9bdf-e45e4b5df466 | management | inherited ESJH | false | false | Deploy Diagnostic Settings to Azure Services | This policy set deploys the configurations of application Azure resources to forward diagnostic logs and metrics to an Azure Log Analytics workspace. See the list of policies of the services that are included | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-diag-loganalytics | PolicySet | Custom | Monitoring | true | n/a | logAnalytics=/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/resourcegroups/esjh-mgmt/providers/microsoft.operationalinsights/workspaces/esjh-la-f28ba982-5ed0-4033-9bdf-e45e4b5df466 | Default | 1 | 3 | 1 | 4 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/45afca7b-a696-5947-a47f-960081dd1dbc) | Deploy-Resource-Diag (SPObjId: e51576ad-748d-462b-9d70-cb3b03e6c2e6) | Deploy-Resource-Diag | Deploy-Resource-Diag | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-resource-diag | n/a | 01/10/2021 21:00:44 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||
Sub | ESJH-management | ESJH-management | f28ba982-5ed0-4033-9bdf-e45e4b5df466 | management | inherited ESJH | false | false | Legacy - Enable Azure Monitor for VMs | Legacy - Enable Azure Monitor for the virtual machines (VMs) in the specified scope (management group, subscription or resource group). Takes Log Analytics workspace as parameter. Use the new initiative named: Enable Azure Monitor for VMs with Azure Monitoring Agent(AMA) | /providers/microsoft.authorization/policysetdefinitions/55f3eceb-5573-4f18-9695-226972c6d74a | PolicySet | BuiltIn | Monitoring | False | n/a | logAnalytics_1=/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/resourcegroups/esjh-mgmt/providers/microsoft.operationalinsights/workspaces/esjh-la-f28ba982-5ed0-4033-9bdf-e45e4b5df466 | Default | 0 | 0 | 0 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/5d92332d-fe07-5cef-9c6b-33e5025d6374) | Deploy-VM-Monitoring (SPObjId: 065dde0b-5eab-4fce-80ee-ec956e94c498) | Deploy-VM-Monitoring | Deploy-VM-Monitoring v2 | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-vm-monitoring | n/a | 01/10/2021 21:00:44 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | 07/09/2021 16:04:52 | ObjectType: SP APP INT, ObjectDisplayName: AzOps, ObjectSignInName: n/a, ObjectId: c295384a-33d9-475e-abaf-d2fb0274299a | |
Sub | ESJH-management | ESJH-management | f28ba982-5ed0-4033-9bdf-e45e4b5df466 | management | inherited ESJH | false | false | Legacy - Enable Azure Monitor for Virtual Machine Scale Sets | Legacy - Enable Azure Monitor for the Virtual Machine Scale Sets in the specified scope (Management group, Subscription or resource group). Takes Log Analytics workspace as parameter. Use the new initiative named: Enable Azure Monitor for VMSS with Azure Monitoring Agent(AMA). Note: if your scale set upgradePolicy is set to Manual, you need to apply the extension to the all VMs in the set by calling upgrade on them. In CLI this would be az vmss update-instances. | /providers/microsoft.authorization/policysetdefinitions/75714362-cae7-409e-9b99-a8e5075b7fad | PolicySet | BuiltIn | Monitoring | False | n/a | logAnalytics_1=/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/resourcegroups/esjh-mgmt/providers/microsoft.operationalinsights/workspaces/esjh-la-f28ba982-5ed0-4033-9bdf-e45e4b5df466 | Default | 0 | 0 | 0 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/2d361fa3-7bd4-5234-9b12-1f54afa65870) | Deploy-VMSS-Monitoring (SPObjId: a3a4908f-b068-455e-a3f5-38cc5e00448f) | Deploy-VMSS-Monitoring | Deploy-VMSS-Monitoring | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-vmss-monitoring | n/a | 01/10/2021 21:00:47 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||
Sub | ESJH-management | ESJH-management | f28ba982-5ed0-4033-9bdf-e45e4b5df466 | management | inherited ESJH | false | false | Configure Log Analytics extension on Azure Arc enabled Windows servers | Enable VM insights on servers and machines connected to Azure through Arc enabled servers by installing the Log Analytics virtual machine extension. VM insights uses the Log Analytics agent to collect the guest OS performance data, and provides insights into their performance. See more - https://aka.ms/vminsightsdocs. Deprecation notice: The Log Analytics agent is on a deprecation path and won't be supported after August 31, 2024. You must migrate to the replacement 'Azure Monitor agent' prior to that date. | /providers/microsoft.authorization/policydefinitions/69af7d4a-7b18-4044-93a9-2651498ef203 | Policy | BuiltIn | Monitoring | False | DeployIfNotExists | logAnalytics=/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/resourcegroups/esjh-mgmt/providers/microsoft.operationalinsights/workspaces/esjh-la-f28ba982-5ed0-4033-9bdf-e45e4b5df466 | Default | 0 | 0 | 0 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/38abf737-131b-52a2-90da-78943675bfed) | Deploy-WS-Arc-Monitoring (SPObjId: b0bdcb08-09c9-4d9d-957e-963d255e7220) | Deploy-Windows-Arc-Monitoring | Deploy-Windows-Arc-Monitoring | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-ws-arc-monitoring | n/a | 01/10/2021 21:00:47 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||
Sub | ESJH-management | ESJH-management | f28ba982-5ed0-4033-9bdf-e45e4b5df466 | management | inherited ESJH | false | false | Enforce Role assignment at Subscription Scope | This Policy definition will enforce a RBAC Role assignment at Subscription scope. | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/enforce-roleassignment-subscriptionscope | Policy | Custom | n/a | false | deployIfNotExists | targetAADObjectId=862a78e3-3e64-4272-a758-c987b2410718, targetRoledefinitionId=acdd72a7-3385-48ef-bd42-f606fba81ae7 | Default | 0 | 1 | 0 | 1 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/b429c46d-6843-4a51-a74e-8a484de47815) | enforce0 (SPObjId: 79d69f2f-2fbe-409e-84c3-3e510c18fd16) | no description given | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/enforce0 | n/a | 03/16/2022 23:28:22 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | ||||
Sub | ESJH-management | ESJH-management | f28ba982-5ed0-4033-9bdf-e45e4b5df466 | management | thisScope Sub | false | false | 1234_API_MG_RA_onRG_(1234_RG_CUST) | Creates RoleAssigment on RG | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/1234_api_mg_ra_onrg_(1234_rg_cust) | PolicySet | Custom | 1234_RgRoleAssignment | false | n/a | aadObjectIdGroup=2aa667c2-7395-404a-8000-3f7b675680d4, aadObjectIdServicePrincipal=506ae68a-a1f7-42f7-9285-c54ef56a3006, roleDefinitionIdGroup=/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/providers/Microsoft.Authorization/roleDefinitions/b24988ac-6180-42a0-ab88-20f7382dd24c, roleDefinitionIdServicePrincipal=/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/providers/Microsoft.Authorization/roleDefinitions/acdd72a7-3385-48ef-bd42-f606fba81ae7 | Default | 0 | 0 | 0 | 0 | 0 | Owner (/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/providers/microsoft.authorization/roleassignments/bd05d68a-7876-4d09-88c9-65c5509b64e9) | 1234_APA_Sub_RoleAssignment_f28ba982-5ed0-4033-9bdf-e45e4b5df466 (SPObjId: 266be8b1-7aa5-466c-b0d0-8010d97473c4) | no description given | /subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/providers/microsoft.authorization/policyassignments/1234_apa_sub_roleassignment_f28ba982-5ed0-4033-9bdf-e45e4b5df466 | n/a | 09/15/2021 12:33:38 | ObjectType: SP APP INT, ObjectDisplayName: AzOps, ObjectSignInName: n/a, ObjectId: c295384a-33d9-475e-abaf-d2fb0274299a | ||||
Mg | ESJH-online | ESJH-online | inherited ESJH-landingzones | false | false | Network interfaces should disable IP forwarding | This policy denies the network interfaces which enabled IP forwarding. The setting of IP forwarding disables Azure's check of the source and destination for a network interface. This should be reviewed by the network security team. | /providers/microsoft.authorization/policydefinitions/88c0b9da-ce96-4b03-9635-f29a937e2900 | Policy | BuiltIn | Network | False | deny | Default | 0 | 0 | 0 | 0 | 0 | none | Deny-IP-Forwarding | Deny-IP-Forwarding | /providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/policyassignments/deny-ip-forwarding | n/a | 01/10/2021 20:58:32 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||||
Mg | ESJH-online | ESJH-online | inherited ESJH-landingzones | false | false | Kubernetes clusters should not allow container privilege escalation | Do not allow containers to run with privilege escalation to root in a Kubernetes cluster. This recommendation is part of CIS 5.2.5 which is intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. | /providers/microsoft.authorization/policydefinitions/1c6e92c9-99f0-4e55-9cf2-0c234dc48f99 | Policy | BuiltIn | Kubernetes | False | deny | effect=deny | Default | 0 | 0 | 0 | 0 | 0 | none | Deny-Privileged-Escalations-AKS | Deny-Privileged-Escalations-AKS | /providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/policyassignments/deny-priv-esc-aks | n/a | 01/10/2021 20:58:33 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||||||
Mg | ESJH-online | ESJH-online | inherited ESJH-landingzones | false | false | Kubernetes cluster should not allow privileged containers | Do not allow privileged containers creation in a Kubernetes cluster. This recommendation is part of CIS 5.2.1 which is intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. | /providers/microsoft.authorization/policydefinitions/95edb821-ddaf-4404-9732-666045e056b4 | Policy | BuiltIn | Kubernetes | False | deny | effect=deny | Default | 0 | 0 | 0 | 0 | 0 | none | Deny-Privileged-Containers-AKS | Deny-Privileged-Containers-AKS | /providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/policyassignments/deny-privileged-aks | n/a | 01/10/2021 20:58:33 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||||||
Mg | ESJH-online | ESJH-online | inherited ESJH-landingzones | false | false | RDP access from the Internet should be blocked | This policy denies any network security rule that allows RDP access from Internet | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deny-rdp-from-internet | Policy | Custom | Network | true | Deny | Default | 0 | 0 | 0 | 0 | 0 | none | Deny-RDP-from-Internet | Deny-RDP-from-Internet | /providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/policyassignments/deny-rdp-from-internet | n/a | 01/10/2021 20:58:32 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||||
Mg | ESJH-online | ESJH-online | inherited ESJH-landingzones | false | false | Secure transfer to storage accounts should be enabled | Audit requirement of Secure transfer in your storage account. Secure transfer is an option that forces your storage account to accept requests only from secure connections (HTTPS). Use of HTTPS ensures authentication between the server and the service and protects data in transit from network layer attacks such as man-in-the-middle, eavesdropping, and session-hijacking | /providers/microsoft.authorization/policydefinitions/404c3081-a854-4457-ae30-26a93ef643f9 | Policy | BuiltIn | Storage | False | Audit | Default | 0 | 0 | 0 | 0 | 0 | none | Enforce-Secure-Storage | Enforce-Secure-Storage | /providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/policyassignments/deny-storage-http | n/a | 01/10/2021 20:58:32 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | 01/25/2021 22:26:59 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||
Mg | ESJH-online | ESJH-online | inherited ESJH-landingzones | false | false | Subnets should have a Network Security Group | This policy denies the creation of a subsnet with out an Network Security Group. NSG help to protect traffic across subnet-level. | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deny-subnet-without-nsg | Policy | Custom | Network | true | Deny | Default | 1 | 0 | 1 | 0 | 0 | none | Deny-Subnet-Without-Nsg | Deny-Subnet-Without-Nsg | /providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/policyassignments/deny-subnet-without-nsg | n/a | 01/10/2021 20:58:32 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||||
Mg | ESJH-online | ESJH-online | inherited ESJH-landingzones | false | false | Deploy Azure Policy Add-on to Azure Kubernetes Service clusters | Use Azure Policy Add-on to manage and report on the compliance state of your Azure Kubernetes Service (AKS) clusters. For more information, see https://aka.ms/akspolicydoc. | /providers/microsoft.authorization/policydefinitions/a8eff44f-8c92-45c3-a3fb-9880802d67a7 | Policy | BuiltIn | Kubernetes | False | DeployIfNotExists | Default | 0 | 0 | 0 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/roleassignments/4f80e55d-446d-5743-a173-5d189d196345) | Deploy-AKS-Policy (SPObjId: fb0a7498-393f-434d-aa93-2acd144f489f) | Deploy-AKS-Policy | Deploy-AKS-Policy | /providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/policyassignments/deploy-aks-policy | n/a | 01/10/2021 20:58:37 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||||||
Mg | ESJH-online | ESJH-online | inherited ESJH-landingzones | false | false | Auditing on SQL server should be enabled | Auditing on your SQL Server should be enabled to track database activities across all databases on the server and save them in an audit log. | /providers/microsoft.authorization/policydefinitions/a6fb4358-5bf4-4ad7-ba82-2cd2f41ce5e9 | Policy | BuiltIn | SQL | False | AuditIfNotExists | Default | 0 | 0 | 0 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/roleassignments/8085d5e6-c291-571e-bd96-a2eb4769f9e6) | Deploy-SQL-DB-Auditing (SPObjId: 4f3a2551-ea2f-43c6-9623-8950156d19b7) | Deploy-SQL-Audit | Deploy-SQL-Audit | /providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/policyassignments/deploy-sql-db-auditing | n/a | 01/10/2021 20:58:36 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||||||
Mg | ESJH-online | ESJH-online | inherited ESJH-landingzones | false | false | Configure backup on virtual machines without a given tag to a new recovery services vault with a default policy | Enforce backup for all virtual machines by deploying a recovery services vault in the same location and resource group as the virtual machine. Doing this is useful when different application teams in your organization are allocated separate resource groups and need to manage their own backups and restores. You can optionally exclude virtual machines containing a specified tag to control the scope of assignment. See https://aka.ms/AzureVMAppCentricBackupExcludeTag. | /providers/microsoft.authorization/policydefinitions/98d0b9f8-fd90-49c9-88e2-d3baf3b0dd86 | Policy | BuiltIn | Backup | False | DeployIfNotExists | Default | 0 | 0 | 0 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/roleassignments/70486d4a-1ee2-5f70-bb58-b3bd79840ae5) | Deploy-VM-Backup (SPObjId: e2511ca5-bcb3-4dbd-9d91-c18590c2a9d2) | Deploy-VM-Backup | Deploy-VM-Backup | /providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/policyassignments/deploy-vm-backup | n/a | 01/10/2021 20:58:34 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||||||
Mg | ESJH-online | ESJH-online | inherited ESJH-landingzones | false | false | Kubernetes clusters should be accessible only over HTTPS | Use of HTTPS ensures authentication and protects data in transit from network layer eavesdropping attacks. This capability is currently generally available for Kubernetes Service (AKS), and in preview for Azure Arc enabled Kubernetes. For more info, visit https://aka.ms/kubepolicydoc | /providers/microsoft.authorization/policydefinitions/1a5b4dca-0b6f-4cf5-907c-56316bc1bf3d | Policy | BuiltIn | Kubernetes | False | deny | effect=deny | Default | 0 | 0 | 0 | 0 | 0 | none | Enforce-Https-Ingress-AKS | Enforce-Https-Ingress-AKS | /providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/policyassignments/enforce-aks-https | n/a | 01/10/2021 20:58:33 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||||||
Mg | ESJH-online | ESJH-online | inherited ESJH-landingzones | false | false | Deploy SQL DB transparent data encryption | Enables transparent data encryption on SQL databases | /providers/microsoft.authorization/policydefinitions/86a912f6-9a06-4e26-b447-11b16ba8659f | Policy | BuiltIn | SQL | False | DeployIfNotExists | Default | 0 | 0 | 0 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/roleassignments/3df334e6-61c3-543a-b548-97586caf6d4f) | Enforce-SQL-Encryption (SPObjId: 34520a11-7b14-46a8-ac34-7d766959460a) | Deploy-SQL-Security | Deploy-SQL-Security | /providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/policyassignments/enforce-sql-encryption | n/a | 01/10/2021 20:58:33 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||||||
Mg | ESJH-online | ESJH-online | inherited ESJH | false | false | Azure Security Benchmark | The Azure Security Benchmark initiative represents the policies and controls implementing security recommendations defined in Azure Security Benchmark v3, see https://aka.ms/azsecbm. This also serves as the Microsoft Defender for Cloud default policy initiative. You can directly assign this initiative, or manage its policies and compliance results within Microsoft Defender for Cloud. | /providers/microsoft.authorization/policysetdefinitions/1f3afdf9-d0c9-4c3d-847f-89da613e70a8 | PolicySet | BuiltIn | Security Center | False | n/a | Default | 45 | 9 | 17 | 1 | 0 | none | ASC-Monitoring | ASC-Monitoring | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-asc-monitoring | n/a | 01/10/2021 21:00:45 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||||
Mg | ESJH-online | ESJH-online | inherited ESJH | false | false | Deploy Azure Defender settings in Azure Security Center. | Deploys the Azure Defender settings in Azure Security Center for the specific services. | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-asc-standard | Policy | Custom | Security Center | true | DeployIfNotExists | pricingTierAppServices=Standard, pricingTierArm=Standard, pricingTierContainerRegistry=Standard, pricingTierDns=Standard, pricingTierKeyVaults=Standard, pricingTierKubernetesService=Standard, pricingTierSqlServers=Standard, pricingTierStorageAccounts=Standard, pricingTierVms=Standard | Default | 1 | 0 | 2 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/538e5329-7b5d-511f-8c05-9c7c32dab0bf) | Deploy-ASC-Security (SPObjId: 4cb4c797-237b-4e64-b2cf-66f841700442) | Deploy-ASC-Defender | Deploy-ASC-Defender | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-asc-security | n/a | 01/10/2021 21:00:47 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||
Mg | ESJH-online | ESJH-online | inherited ESJH | false | false | Deploy Diagnostic Settings for Activity Log to Log Analytics workspace | Deploys the diagnostic settings for Activity Log to stream to a Log Analytics workspace when any Activity Log which is missing this diagnostic settings is created or updated. The policy wil set the diagnostic with category enabled. | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-activitylog | Policy | Custom | Monitoring | true | DeployIfNotExists | logAnalytics=/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/resourcegroups/esjh-mgmt/providers/microsoft.operationalinsights/workspaces/esjh-la-f28ba982-5ed0-4033-9bdf-e45e4b5df466, logsEnabled=True | Default | 0 | 1 | 0 | 2 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/e5ac6b58-4f31-5956-9082-78d97ba2453e) | Deploy-AzActivity-Log (SPObjId: 1691aa06-da2e-43f0-98f9-af12494603a9) | Deploy-AzActivity-Log | Deploy-AzActivity-Log | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-azactivity-log | n/a | 01/10/2021 21:00:47 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||
Mg | ESJH-online | ESJH-online | inherited ESJH | false | false | Configure Log Analytics extension on Azure Arc enabled Linux servers. See deprecation notice below | Enable VM insights on servers and machines connected to Azure through Arc enabled servers by installing the Log Analytics virtual machine extension. VM insights uses the Log Analytics agent to collect the guest OS performance data, and provides insights into their performance. See more - https://aka.ms/vminsightsdocs. Deprecation notice: The Log Analytics agent is on a deprecation path and won't be supported after August 31, 2024. You must migrate to the replacement 'Azure Monitor agent' prior to that date | /providers/microsoft.authorization/policydefinitions/9d2b61b4-1d14-4a63-be30-d4498e7ad2cf | Policy | BuiltIn | Monitoring | False | DeployIfNotExists | logAnalytics=/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/resourcegroups/esjh-mgmt/providers/microsoft.operationalinsights/workspaces/esjh-la-f28ba982-5ed0-4033-9bdf-e45e4b5df466 | Default | 0 | 0 | 0 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/ddc0ff3c-a3d0-5d5b-ba19-116b6572acbf) | Deploy-LX-Arc-Monitoring (SPObjId: 9ed01b2b-9311-41a8-8897-0a329047be49) | Deploy-Linux-Arc-Monitoring | Deploy-Linux-Arc-Monitoring | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-lx-arc-monitoring | n/a | 01/10/2021 21:00:44 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||
Mg | ESJH-online | ESJH-online | inherited ESJH | false | false | Deploy Diagnostic Settings to Azure Services | This policy set deploys the configurations of application Azure resources to forward diagnostic logs and metrics to an Azure Log Analytics workspace. See the list of policies of the services that are included | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-diag-loganalytics | PolicySet | Custom | Monitoring | true | n/a | logAnalytics=/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/resourcegroups/esjh-mgmt/providers/microsoft.operationalinsights/workspaces/esjh-la-f28ba982-5ed0-4033-9bdf-e45e4b5df466 | Default | 2 | 4 | 2 | 8 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/45afca7b-a696-5947-a47f-960081dd1dbc) | Deploy-Resource-Diag (SPObjId: e51576ad-748d-462b-9d70-cb3b03e6c2e6) | Deploy-Resource-Diag | Deploy-Resource-Diag | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-resource-diag | n/a | 01/10/2021 21:00:44 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||
Mg | ESJH-online | ESJH-online | inherited ESJH | false | false | Legacy - Enable Azure Monitor for VMs | Legacy - Enable Azure Monitor for the virtual machines (VMs) in the specified scope (management group, subscription or resource group). Takes Log Analytics workspace as parameter. Use the new initiative named: Enable Azure Monitor for VMs with Azure Monitoring Agent(AMA) | /providers/microsoft.authorization/policysetdefinitions/55f3eceb-5573-4f18-9695-226972c6d74a | PolicySet | BuiltIn | Monitoring | False | n/a | logAnalytics_1=/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/resourcegroups/esjh-mgmt/providers/microsoft.operationalinsights/workspaces/esjh-la-f28ba982-5ed0-4033-9bdf-e45e4b5df466 | Default | 0 | 0 | 0 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/5d92332d-fe07-5cef-9c6b-33e5025d6374) | Deploy-VM-Monitoring (SPObjId: 065dde0b-5eab-4fce-80ee-ec956e94c498) | Deploy-VM-Monitoring | Deploy-VM-Monitoring v2 | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-vm-monitoring | n/a | 01/10/2021 21:00:44 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | 07/09/2021 16:04:52 | ObjectType: SP APP INT, ObjectDisplayName: AzOps, ObjectSignInName: n/a, ObjectId: c295384a-33d9-475e-abaf-d2fb0274299a | |||
Mg | ESJH-online | ESJH-online | inherited ESJH | false | false | Legacy - Enable Azure Monitor for Virtual Machine Scale Sets | Legacy - Enable Azure Monitor for the Virtual Machine Scale Sets in the specified scope (Management group, Subscription or resource group). Takes Log Analytics workspace as parameter. Use the new initiative named: Enable Azure Monitor for VMSS with Azure Monitoring Agent(AMA). Note: if your scale set upgradePolicy is set to Manual, you need to apply the extension to the all VMs in the set by calling upgrade on them. In CLI this would be az vmss update-instances. | /providers/microsoft.authorization/policysetdefinitions/75714362-cae7-409e-9b99-a8e5075b7fad | PolicySet | BuiltIn | Monitoring | False | n/a | logAnalytics_1=/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/resourcegroups/esjh-mgmt/providers/microsoft.operationalinsights/workspaces/esjh-la-f28ba982-5ed0-4033-9bdf-e45e4b5df466 | Default | 0 | 0 | 0 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/2d361fa3-7bd4-5234-9b12-1f54afa65870) | Deploy-VMSS-Monitoring (SPObjId: a3a4908f-b068-455e-a3f5-38cc5e00448f) | Deploy-VMSS-Monitoring | Deploy-VMSS-Monitoring | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-vmss-monitoring | n/a | 01/10/2021 21:00:47 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||
Mg | ESJH-online | ESJH-online | inherited ESJH | false | false | Configure Log Analytics extension on Azure Arc enabled Windows servers | Enable VM insights on servers and machines connected to Azure through Arc enabled servers by installing the Log Analytics virtual machine extension. VM insights uses the Log Analytics agent to collect the guest OS performance data, and provides insights into their performance. See more - https://aka.ms/vminsightsdocs. Deprecation notice: The Log Analytics agent is on a deprecation path and won't be supported after August 31, 2024. You must migrate to the replacement 'Azure Monitor agent' prior to that date. | /providers/microsoft.authorization/policydefinitions/69af7d4a-7b18-4044-93a9-2651498ef203 | Policy | BuiltIn | Monitoring | False | DeployIfNotExists | logAnalytics=/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/resourcegroups/esjh-mgmt/providers/microsoft.operationalinsights/workspaces/esjh-la-f28ba982-5ed0-4033-9bdf-e45e4b5df466 | Default | 0 | 0 | 0 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/38abf737-131b-52a2-90da-78943675bfed) | Deploy-WS-Arc-Monitoring (SPObjId: b0bdcb08-09c9-4d9d-957e-963d255e7220) | Deploy-Windows-Arc-Monitoring | Deploy-Windows-Arc-Monitoring | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-ws-arc-monitoring | n/a | 01/10/2021 21:00:47 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||
Mg | ESJH-online | ESJH-online | inherited ESJH | false | false | Enforce Role assignment at Subscription Scope | This Policy definition will enforce a RBAC Role assignment at Subscription scope. | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/enforce-roleassignment-subscriptionscope | Policy | Custom | n/a | false | deployIfNotExists | targetAADObjectId=862a78e3-3e64-4272-a758-c987b2410718, targetRoledefinitionId=acdd72a7-3385-48ef-bd42-f606fba81ae7 | Default | 0 | 1 | 0 | 2 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/b429c46d-6843-4a51-a74e-8a484de47815) | enforce0 (SPObjId: 79d69f2f-2fbe-409e-84c3-3e510c18fd16) | no description given | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/enforce0 | n/a | 03/16/2022 23:28:22 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | ||||||
Sub | ESJH-online | ESJH-online | 4dfa3b56-55bf-4059-802a-24e44a4fb60f | landingZone | inherited ESJH-landingzones | false | false | Network interfaces should disable IP forwarding | This policy denies the network interfaces which enabled IP forwarding. The setting of IP forwarding disables Azure's check of the source and destination for a network interface. This should be reviewed by the network security team. | /providers/microsoft.authorization/policydefinitions/88c0b9da-ce96-4b03-9635-f29a937e2900 | Policy | BuiltIn | Network | False | deny | Default | 0 | 0 | 0 | 0 | 0 | none | Deny-IP-Forwarding | Deny-IP-Forwarding | /providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/policyassignments/deny-ip-forwarding | n/a | 01/10/2021 20:58:32 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||
Sub | ESJH-online | ESJH-online | 4dfa3b56-55bf-4059-802a-24e44a4fb60f | landingZone | inherited ESJH-landingzones | false | false | Kubernetes clusters should not allow container privilege escalation | Do not allow containers to run with privilege escalation to root in a Kubernetes cluster. This recommendation is part of CIS 5.2.5 which is intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. | /providers/microsoft.authorization/policydefinitions/1c6e92c9-99f0-4e55-9cf2-0c234dc48f99 | Policy | BuiltIn | Kubernetes | False | deny | effect=deny | Default | 0 | 0 | 0 | 0 | 0 | none | Deny-Privileged-Escalations-AKS | Deny-Privileged-Escalations-AKS | /providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/policyassignments/deny-priv-esc-aks | n/a | 01/10/2021 20:58:33 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||||
Sub | ESJH-online | ESJH-online | 4dfa3b56-55bf-4059-802a-24e44a4fb60f | landingZone | inherited ESJH-landingzones | false | false | Kubernetes cluster should not allow privileged containers | Do not allow privileged containers creation in a Kubernetes cluster. This recommendation is part of CIS 5.2.1 which is intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. | /providers/microsoft.authorization/policydefinitions/95edb821-ddaf-4404-9732-666045e056b4 | Policy | BuiltIn | Kubernetes | False | deny | effect=deny | Default | 0 | 0 | 0 | 0 | 0 | none | Deny-Privileged-Containers-AKS | Deny-Privileged-Containers-AKS | /providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/policyassignments/deny-privileged-aks | n/a | 01/10/2021 20:58:33 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||||
Sub | ESJH-online | ESJH-online | 4dfa3b56-55bf-4059-802a-24e44a4fb60f | landingZone | inherited ESJH-landingzones | false | false | RDP access from the Internet should be blocked | This policy denies any network security rule that allows RDP access from Internet | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deny-rdp-from-internet | Policy | Custom | Network | true | Deny | Default | 0 | 0 | 0 | 0 | 0 | none | Deny-RDP-from-Internet | Deny-RDP-from-Internet | /providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/policyassignments/deny-rdp-from-internet | n/a | 01/10/2021 20:58:32 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||
Sub | ESJH-online | ESJH-online | 4dfa3b56-55bf-4059-802a-24e44a4fb60f | landingZone | inherited ESJH-landingzones | true | false | Secure transfer to storage accounts should be enabled | Audit requirement of Secure transfer in your storage account. Secure transfer is an option that forces your storage account to accept requests only from secure connections (HTTPS). Use of HTTPS ensures authentication between the server and the service and protects data in transit from network layer attacks such as man-in-the-middle, eavesdropping, and session-hijacking | /providers/microsoft.authorization/policydefinitions/404c3081-a854-4457-ae30-26a93ef643f9 | Policy | BuiltIn | Storage | False | Audit | Default | 0 | 0 | 0 | 0 | 0 | none | Enforce-Secure-Storage | Enforce-Secure-Storage | /providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/policyassignments/deny-storage-http | n/a | 01/10/2021 20:58:32 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | 01/25/2021 22:26:59 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||
Sub | ESJH-online | ESJH-online | 4dfa3b56-55bf-4059-802a-24e44a4fb60f | landingZone | inherited ESJH-landingzones | false | false | Subnets should have a Network Security Group | This policy denies the creation of a subsnet with out an Network Security Group. NSG help to protect traffic across subnet-level. | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deny-subnet-without-nsg | Policy | Custom | Network | true | Deny | Default | 0 | 0 | 0 | 0 | 0 | none | Deny-Subnet-Without-Nsg | Deny-Subnet-Without-Nsg | /providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/policyassignments/deny-subnet-without-nsg | n/a | 01/10/2021 20:58:32 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||
Sub | ESJH-online | ESJH-online | 4dfa3b56-55bf-4059-802a-24e44a4fb60f | landingZone | inherited ESJH-landingzones | false | false | Deploy Azure Policy Add-on to Azure Kubernetes Service clusters | Use Azure Policy Add-on to manage and report on the compliance state of your Azure Kubernetes Service (AKS) clusters. For more information, see https://aka.ms/akspolicydoc. | /providers/microsoft.authorization/policydefinitions/a8eff44f-8c92-45c3-a3fb-9880802d67a7 | Policy | BuiltIn | Kubernetes | False | DeployIfNotExists | Default | 0 | 0 | 0 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/roleassignments/4f80e55d-446d-5743-a173-5d189d196345) | Deploy-AKS-Policy (SPObjId: fb0a7498-393f-434d-aa93-2acd144f489f) | Deploy-AKS-Policy | Deploy-AKS-Policy | /providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/policyassignments/deploy-aks-policy | n/a | 01/10/2021 20:58:37 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||||
Sub | ESJH-online | ESJH-online | 4dfa3b56-55bf-4059-802a-24e44a4fb60f | landingZone | inherited ESJH-landingzones | false | false | Auditing on SQL server should be enabled | Auditing on your SQL Server should be enabled to track database activities across all databases on the server and save them in an audit log. | /providers/microsoft.authorization/policydefinitions/a6fb4358-5bf4-4ad7-ba82-2cd2f41ce5e9 | Policy | BuiltIn | SQL | False | AuditIfNotExists | Default | 0 | 0 | 0 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/roleassignments/8085d5e6-c291-571e-bd96-a2eb4769f9e6) | Deploy-SQL-DB-Auditing (SPObjId: 4f3a2551-ea2f-43c6-9623-8950156d19b7) | Deploy-SQL-Audit | Deploy-SQL-Audit | /providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/policyassignments/deploy-sql-db-auditing | n/a | 01/10/2021 20:58:36 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||||
Sub | ESJH-online | ESJH-online | 4dfa3b56-55bf-4059-802a-24e44a4fb60f | landingZone | inherited ESJH-landingzones | false | false | Configure backup on virtual machines without a given tag to a new recovery services vault with a default policy | Enforce backup for all virtual machines by deploying a recovery services vault in the same location and resource group as the virtual machine. Doing this is useful when different application teams in your organization are allocated separate resource groups and need to manage their own backups and restores. You can optionally exclude virtual machines containing a specified tag to control the scope of assignment. See https://aka.ms/AzureVMAppCentricBackupExcludeTag. | /providers/microsoft.authorization/policydefinitions/98d0b9f8-fd90-49c9-88e2-d3baf3b0dd86 | Policy | BuiltIn | Backup | False | DeployIfNotExists | Default | 0 | 0 | 0 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/roleassignments/70486d4a-1ee2-5f70-bb58-b3bd79840ae5) | Deploy-VM-Backup (SPObjId: e2511ca5-bcb3-4dbd-9d91-c18590c2a9d2) | Deploy-VM-Backup | Deploy-VM-Backup | /providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/policyassignments/deploy-vm-backup | n/a | 01/10/2021 20:58:34 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||||
Sub | ESJH-online | ESJH-online | 4dfa3b56-55bf-4059-802a-24e44a4fb60f | landingZone | inherited ESJH-landingzones | false | false | Kubernetes clusters should be accessible only over HTTPS | Use of HTTPS ensures authentication and protects data in transit from network layer eavesdropping attacks. This capability is currently generally available for Kubernetes Service (AKS), and in preview for Azure Arc enabled Kubernetes. For more info, visit https://aka.ms/kubepolicydoc | /providers/microsoft.authorization/policydefinitions/1a5b4dca-0b6f-4cf5-907c-56316bc1bf3d | Policy | BuiltIn | Kubernetes | False | deny | effect=deny | Default | 0 | 0 | 0 | 0 | 0 | none | Enforce-Https-Ingress-AKS | Enforce-Https-Ingress-AKS | /providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/policyassignments/enforce-aks-https | n/a | 01/10/2021 20:58:33 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||||
Sub | ESJH-online | ESJH-online | 4dfa3b56-55bf-4059-802a-24e44a4fb60f | landingZone | inherited ESJH-landingzones | false | false | Deploy SQL DB transparent data encryption | Enables transparent data encryption on SQL databases | /providers/microsoft.authorization/policydefinitions/86a912f6-9a06-4e26-b447-11b16ba8659f | Policy | BuiltIn | SQL | False | DeployIfNotExists | Default | 0 | 0 | 0 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/roleassignments/3df334e6-61c3-543a-b548-97586caf6d4f) | Enforce-SQL-Encryption (SPObjId: 34520a11-7b14-46a8-ac34-7d766959460a) | Deploy-SQL-Security | Deploy-SQL-Security | /providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/policyassignments/enforce-sql-encryption | n/a | 01/10/2021 20:58:33 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||||
Sub | ESJH-online | ESJH-online | 4dfa3b56-55bf-4059-802a-24e44a4fb60f | landingZone | inherited ESJH | false | false | Azure Security Benchmark | The Azure Security Benchmark initiative represents the policies and controls implementing security recommendations defined in Azure Security Benchmark v3, see https://aka.ms/azsecbm. This also serves as the Microsoft Defender for Cloud default policy initiative. You can directly assign this initiative, or manage its policies and compliance results within Microsoft Defender for Cloud. | /providers/microsoft.authorization/policysetdefinitions/1f3afdf9-d0c9-4c3d-847f-89da613e70a8 | PolicySet | BuiltIn | Security Center | False | n/a | Default | 37 | 7 | 10 | 1 | 0 | none | ASC-Monitoring | ASC-Monitoring | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-asc-monitoring | n/a | 01/10/2021 21:00:45 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||
Sub | ESJH-online | ESJH-online | 4dfa3b56-55bf-4059-802a-24e44a4fb60f | landingZone | inherited ESJH | false | false | Deploy Azure Defender settings in Azure Security Center. | Deploys the Azure Defender settings in Azure Security Center for the specific services. | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-asc-standard | Policy | Custom | Security Center | true | DeployIfNotExists | pricingTierAppServices=Standard, pricingTierArm=Standard, pricingTierContainerRegistry=Standard, pricingTierDns=Standard, pricingTierKeyVaults=Standard, pricingTierKubernetesService=Standard, pricingTierSqlServers=Standard, pricingTierStorageAccounts=Standard, pricingTierVms=Standard | Default | 1 | 0 | 1 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/538e5329-7b5d-511f-8c05-9c7c32dab0bf) | Deploy-ASC-Security (SPObjId: 4cb4c797-237b-4e64-b2cf-66f841700442) | Deploy-ASC-Defender | Deploy-ASC-Defender | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-asc-security | n/a | 01/10/2021 21:00:47 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||
Sub | ESJH-online | ESJH-online | 4dfa3b56-55bf-4059-802a-24e44a4fb60f | landingZone | inherited ESJH | false | false | Deploy Diagnostic Settings for Activity Log to Log Analytics workspace | Deploys the diagnostic settings for Activity Log to stream to a Log Analytics workspace when any Activity Log which is missing this diagnostic settings is created or updated. The policy wil set the diagnostic with category enabled. | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-activitylog | Policy | Custom | Monitoring | true | DeployIfNotExists | logAnalytics=/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/resourcegroups/esjh-mgmt/providers/microsoft.operationalinsights/workspaces/esjh-la-f28ba982-5ed0-4033-9bdf-e45e4b5df466, logsEnabled=True | Default | 0 | 1 | 0 | 1 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/e5ac6b58-4f31-5956-9082-78d97ba2453e) | Deploy-AzActivity-Log (SPObjId: 1691aa06-da2e-43f0-98f9-af12494603a9) | Deploy-AzActivity-Log | Deploy-AzActivity-Log | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-azactivity-log | n/a | 01/10/2021 21:00:47 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||
Sub | ESJH-online | ESJH-online | 4dfa3b56-55bf-4059-802a-24e44a4fb60f | landingZone | inherited ESJH | false | false | Configure Log Analytics extension on Azure Arc enabled Linux servers. See deprecation notice below | Enable VM insights on servers and machines connected to Azure through Arc enabled servers by installing the Log Analytics virtual machine extension. VM insights uses the Log Analytics agent to collect the guest OS performance data, and provides insights into their performance. See more - https://aka.ms/vminsightsdocs. Deprecation notice: The Log Analytics agent is on a deprecation path and won't be supported after August 31, 2024. You must migrate to the replacement 'Azure Monitor agent' prior to that date | /providers/microsoft.authorization/policydefinitions/9d2b61b4-1d14-4a63-be30-d4498e7ad2cf | Policy | BuiltIn | Monitoring | False | DeployIfNotExists | logAnalytics=/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/resourcegroups/esjh-mgmt/providers/microsoft.operationalinsights/workspaces/esjh-la-f28ba982-5ed0-4033-9bdf-e45e4b5df466 | Default | 0 | 0 | 0 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/ddc0ff3c-a3d0-5d5b-ba19-116b6572acbf) | Deploy-LX-Arc-Monitoring (SPObjId: 9ed01b2b-9311-41a8-8897-0a329047be49) | Deploy-Linux-Arc-Monitoring | Deploy-Linux-Arc-Monitoring | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-lx-arc-monitoring | n/a | 01/10/2021 21:00:44 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||
Sub | ESJH-online | ESJH-online | 4dfa3b56-55bf-4059-802a-24e44a4fb60f | landingZone | inherited ESJH | false | false | Deploy Diagnostic Settings to Azure Services | This policy set deploys the configurations of application Azure resources to forward diagnostic logs and metrics to an Azure Log Analytics workspace. See the list of policies of the services that are included | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-diag-loganalytics | PolicySet | Custom | Monitoring | true | n/a | logAnalytics=/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/resourcegroups/esjh-mgmt/providers/microsoft.operationalinsights/workspaces/esjh-la-f28ba982-5ed0-4033-9bdf-e45e4b5df466 | Default | 1 | 2 | 1 | 3 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/45afca7b-a696-5947-a47f-960081dd1dbc) | Deploy-Resource-Diag (SPObjId: e51576ad-748d-462b-9d70-cb3b03e6c2e6) | Deploy-Resource-Diag | Deploy-Resource-Diag | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-resource-diag | n/a | 01/10/2021 21:00:44 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||
Sub | ESJH-online | ESJH-online | 4dfa3b56-55bf-4059-802a-24e44a4fb60f | landingZone | inherited ESJH | false | false | Legacy - Enable Azure Monitor for VMs | Legacy - Enable Azure Monitor for the virtual machines (VMs) in the specified scope (management group, subscription or resource group). Takes Log Analytics workspace as parameter. Use the new initiative named: Enable Azure Monitor for VMs with Azure Monitoring Agent(AMA) | /providers/microsoft.authorization/policysetdefinitions/55f3eceb-5573-4f18-9695-226972c6d74a | PolicySet | BuiltIn | Monitoring | False | n/a | logAnalytics_1=/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/resourcegroups/esjh-mgmt/providers/microsoft.operationalinsights/workspaces/esjh-la-f28ba982-5ed0-4033-9bdf-e45e4b5df466 | Default | 0 | 0 | 0 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/5d92332d-fe07-5cef-9c6b-33e5025d6374) | Deploy-VM-Monitoring (SPObjId: 065dde0b-5eab-4fce-80ee-ec956e94c498) | Deploy-VM-Monitoring | Deploy-VM-Monitoring v2 | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-vm-monitoring | n/a | 01/10/2021 21:00:44 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | 07/09/2021 16:04:52 | ObjectType: SP APP INT, ObjectDisplayName: AzOps, ObjectSignInName: n/a, ObjectId: c295384a-33d9-475e-abaf-d2fb0274299a | |
Sub | ESJH-online | ESJH-online | 4dfa3b56-55bf-4059-802a-24e44a4fb60f | landingZone | inherited ESJH | false | false | Legacy - Enable Azure Monitor for Virtual Machine Scale Sets | Legacy - Enable Azure Monitor for the Virtual Machine Scale Sets in the specified scope (Management group, Subscription or resource group). Takes Log Analytics workspace as parameter. Use the new initiative named: Enable Azure Monitor for VMSS with Azure Monitoring Agent(AMA). Note: if your scale set upgradePolicy is set to Manual, you need to apply the extension to the all VMs in the set by calling upgrade on them. In CLI this would be az vmss update-instances. | /providers/microsoft.authorization/policysetdefinitions/75714362-cae7-409e-9b99-a8e5075b7fad | PolicySet | BuiltIn | Monitoring | False | n/a | logAnalytics_1=/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/resourcegroups/esjh-mgmt/providers/microsoft.operationalinsights/workspaces/esjh-la-f28ba982-5ed0-4033-9bdf-e45e4b5df466 | Default | 0 | 0 | 0 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/2d361fa3-7bd4-5234-9b12-1f54afa65870) | Deploy-VMSS-Monitoring (SPObjId: a3a4908f-b068-455e-a3f5-38cc5e00448f) | Deploy-VMSS-Monitoring | Deploy-VMSS-Monitoring | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-vmss-monitoring | n/a | 01/10/2021 21:00:47 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||
Sub | ESJH-online | ESJH-online | 4dfa3b56-55bf-4059-802a-24e44a4fb60f | landingZone | inherited ESJH | false | false | Configure Log Analytics extension on Azure Arc enabled Windows servers | Enable VM insights on servers and machines connected to Azure through Arc enabled servers by installing the Log Analytics virtual machine extension. VM insights uses the Log Analytics agent to collect the guest OS performance data, and provides insights into their performance. See more - https://aka.ms/vminsightsdocs. Deprecation notice: The Log Analytics agent is on a deprecation path and won't be supported after August 31, 2024. You must migrate to the replacement 'Azure Monitor agent' prior to that date. | /providers/microsoft.authorization/policydefinitions/69af7d4a-7b18-4044-93a9-2651498ef203 | Policy | BuiltIn | Monitoring | False | DeployIfNotExists | logAnalytics=/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/resourcegroups/esjh-mgmt/providers/microsoft.operationalinsights/workspaces/esjh-la-f28ba982-5ed0-4033-9bdf-e45e4b5df466 | Default | 0 | 0 | 0 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/38abf737-131b-52a2-90da-78943675bfed) | Deploy-WS-Arc-Monitoring (SPObjId: b0bdcb08-09c9-4d9d-957e-963d255e7220) | Deploy-Windows-Arc-Monitoring | Deploy-Windows-Arc-Monitoring | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-ws-arc-monitoring | n/a | 01/10/2021 21:00:47 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||
Sub | ESJH-online | ESJH-online | 4dfa3b56-55bf-4059-802a-24e44a4fb60f | landingZone | inherited ESJH | false | false | Enforce Role assignment at Subscription Scope | This Policy definition will enforce a RBAC Role assignment at Subscription scope. | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/enforce-roleassignment-subscriptionscope | Policy | Custom | n/a | false | deployIfNotExists | targetAADObjectId=862a78e3-3e64-4272-a758-c987b2410718, targetRoledefinitionId=acdd72a7-3385-48ef-bd42-f606fba81ae7 | Default | 0 | 1 | 0 | 1 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/b429c46d-6843-4a51-a74e-8a484de47815) | enforce0 (SPObjId: 79d69f2f-2fbe-409e-84c3-3e510c18fd16) | no description given | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/enforce0 | n/a | 03/16/2022 23:28:22 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | ||||
Sub | ESJH-online | ESJH-online | 4dfa3b56-55bf-4059-802a-24e44a4fb60f | landingZone | thisScope Sub | false | false | 1234_API_MG_RA_onRG_(1234_RG_CUST) | Creates RoleAssigment on RG | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/1234_api_mg_ra_onrg_(1234_rg_cust) | PolicySet | Custom | 1234_RgRoleAssignment | false | n/a | aadObjectIdGroup=2aa667c2-7395-404a-8000-3f7b675680d4, aadObjectIdServicePrincipal=506ae68a-a1f7-42f7-9285-c54ef56a3006, roleDefinitionIdGroup=/subscriptions/4dfa3b56-55bf-4059-802a-24e44a4fb60f/providers/Microsoft.Authorization/roleDefinitions/b24988ac-6180-42a0-ab88-20f7382dd24c, roleDefinitionIdServicePrincipal=/subscriptions/4dfa3b56-55bf-4059-802a-24e44a4fb60f/providers/Microsoft.Authorization/roleDefinitions/acdd72a7-3385-48ef-bd42-f606fba81ae7 | Default | 0 | 2 | 0 | 1 | 0 | Owner (/subscriptions/4dfa3b56-55bf-4059-802a-24e44a4fb60f/providers/microsoft.authorization/roleassignments/bd05d68a-7876-4d09-88c9-65c5509b64e8) | 1234_APA_Sub_RoleAssignment_4dfa3b56-55bf-4059-802a-24e44a4fb60f (SPObjId: 06683a54-86ee-4248-9c50-4b3c47b855be) | no description given | /subscriptions/4dfa3b56-55bf-4059-802a-24e44a4fb60f/providers/microsoft.authorization/policyassignments/1234_apa_sub_roleassignment_4dfa3b56-55bf-4059-802a-24e44a4fb60f | n/a | 09/14/2021 16:55:57 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | ||||
Sub | ESJH-online | ESJH-online | 4dfa3b56-55bf-4059-802a-24e44a4fb60f | landingZone | thisScope Sub | false | false | [Deprecated]: Function App should only be accessible over HTTPS | Use of HTTPS ensures server/service authentication and protects data in transit from network layer eavesdropping attacks. | /providers/microsoft.authorization/policydefinitions/5df82f4f-773a-4a2d-97a2-422a806f1a55 | Policy | BuiltIn | Security Center | False | AuditIfNotExists | Default | 0 | 0 | 0 | 0 | 0 | none | testDeprecatedAssignment | no description given | /subscriptions/4dfa3b56-55bf-4059-802a-24e44a4fb60f/providers/microsoft.authorization/policyassignments/bcdd1466e4fc5114b6e5f13d | n/a | 07/18/2021 15:09:28 | ObjectType: SP APP INT, ObjectDisplayName: AzOps, ObjectSignInName: n/a, ObjectId: c295384a-33d9-475e-abaf-d2fb0274299a | |||||
Sub | ESJH-online | ESJH-online | 4dfa3b56-55bf-4059-802a-24e44a4fb60f | landingZone | thisScope Sub | false | false | Audit virtual machines without disaster recovery configured | Audit virtual machines which do not have disaster recovery configured. To learn more about disaster recovery, visit https://aka.ms/asr-doc. | /providers/microsoft.authorization/policydefinitions/0015ea4d-51ff-4ce3-8d8c-f3f8f0179a56 | Policy | BuiltIn | Compute | False | auditIfNotExists | Default | 0 | 0 | 0 | 0 | 0 | none | Audit virtual machines without disaster recovery configured | no description given | /subscriptions/4dfa3b56-55bf-4059-802a-24e44a4fb60f/providers/microsoft.authorization/policyassignments/bcee1466e4fc4114b5e5f03d | Joe Dalton | 06/16/2021 16:07:53 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||
Sub | ESJH-online | ESJH-online | 20217969-e578-4e91-beea-9bcf18b05a7e | payg1 | inherited ESJH-landingzones | false | false | Network interfaces should disable IP forwarding | This policy denies the network interfaces which enabled IP forwarding. The setting of IP forwarding disables Azure's check of the source and destination for a network interface. This should be reviewed by the network security team. | /providers/microsoft.authorization/policydefinitions/88c0b9da-ce96-4b03-9635-f29a937e2900 | Policy | BuiltIn | Network | False | deny | Default | 0 | 0 | 0 | 0 | 0 | none | Deny-IP-Forwarding | Deny-IP-Forwarding | /providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/policyassignments/deny-ip-forwarding | n/a | 01/10/2021 20:58:32 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||
Sub | ESJH-online | ESJH-online | 20217969-e578-4e91-beea-9bcf18b05a7e | payg1 | inherited ESJH-landingzones | false | false | Kubernetes clusters should not allow container privilege escalation | Do not allow containers to run with privilege escalation to root in a Kubernetes cluster. This recommendation is part of CIS 5.2.5 which is intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. | /providers/microsoft.authorization/policydefinitions/1c6e92c9-99f0-4e55-9cf2-0c234dc48f99 | Policy | BuiltIn | Kubernetes | False | deny | effect=deny | Default | 0 | 0 | 0 | 0 | 0 | none | Deny-Privileged-Escalations-AKS | Deny-Privileged-Escalations-AKS | /providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/policyassignments/deny-priv-esc-aks | n/a | 01/10/2021 20:58:33 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||||
Sub | ESJH-online | ESJH-online | 20217969-e578-4e91-beea-9bcf18b05a7e | payg1 | inherited ESJH-landingzones | false | false | Kubernetes cluster should not allow privileged containers | Do not allow privileged containers creation in a Kubernetes cluster. This recommendation is part of CIS 5.2.1 which is intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. | /providers/microsoft.authorization/policydefinitions/95edb821-ddaf-4404-9732-666045e056b4 | Policy | BuiltIn | Kubernetes | False | deny | effect=deny | Default | 0 | 0 | 0 | 0 | 0 | none | Deny-Privileged-Containers-AKS | Deny-Privileged-Containers-AKS | /providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/policyassignments/deny-privileged-aks | n/a | 01/10/2021 20:58:33 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||||
Sub | ESJH-online | ESJH-online | 20217969-e578-4e91-beea-9bcf18b05a7e | payg1 | inherited ESJH-landingzones | false | false | RDP access from the Internet should be blocked | This policy denies any network security rule that allows RDP access from Internet | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deny-rdp-from-internet | Policy | Custom | Network | true | Deny | Default | 0 | 0 | 0 | 0 | 0 | none | Deny-RDP-from-Internet | Deny-RDP-from-Internet | /providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/policyassignments/deny-rdp-from-internet | n/a | 01/10/2021 20:58:32 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||
Sub | ESJH-online | ESJH-online | 20217969-e578-4e91-beea-9bcf18b05a7e | payg1 | inherited ESJH-landingzones | false | false | Secure transfer to storage accounts should be enabled | Audit requirement of Secure transfer in your storage account. Secure transfer is an option that forces your storage account to accept requests only from secure connections (HTTPS). Use of HTTPS ensures authentication between the server and the service and protects data in transit from network layer attacks such as man-in-the-middle, eavesdropping, and session-hijacking | /providers/microsoft.authorization/policydefinitions/404c3081-a854-4457-ae30-26a93ef643f9 | Policy | BuiltIn | Storage | False | Audit | Default | 0 | 0 | 0 | 0 | 0 | none | Enforce-Secure-Storage | Enforce-Secure-Storage | /providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/policyassignments/deny-storage-http | n/a | 01/10/2021 20:58:32 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | 01/25/2021 22:26:59 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||
Sub | ESJH-online | ESJH-online | 20217969-e578-4e91-beea-9bcf18b05a7e | payg1 | inherited ESJH-landingzones | false | false | Subnets should have a Network Security Group | This policy denies the creation of a subsnet with out an Network Security Group. NSG help to protect traffic across subnet-level. | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deny-subnet-without-nsg | Policy | Custom | Network | true | Deny | Default | 1 | 0 | 1 | 0 | 0 | none | Deny-Subnet-Without-Nsg | Deny-Subnet-Without-Nsg | /providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/policyassignments/deny-subnet-without-nsg | n/a | 01/10/2021 20:58:32 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||
Sub | ESJH-online | ESJH-online | 20217969-e578-4e91-beea-9bcf18b05a7e | payg1 | inherited ESJH-landingzones | false | false | Deploy Azure Policy Add-on to Azure Kubernetes Service clusters | Use Azure Policy Add-on to manage and report on the compliance state of your Azure Kubernetes Service (AKS) clusters. For more information, see https://aka.ms/akspolicydoc. | /providers/microsoft.authorization/policydefinitions/a8eff44f-8c92-45c3-a3fb-9880802d67a7 | Policy | BuiltIn | Kubernetes | False | DeployIfNotExists | Default | 0 | 0 | 0 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/roleassignments/4f80e55d-446d-5743-a173-5d189d196345) | Deploy-AKS-Policy (SPObjId: fb0a7498-393f-434d-aa93-2acd144f489f) | Deploy-AKS-Policy | Deploy-AKS-Policy | /providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/policyassignments/deploy-aks-policy | n/a | 01/10/2021 20:58:37 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||||
Sub | ESJH-online | ESJH-online | 20217969-e578-4e91-beea-9bcf18b05a7e | payg1 | inherited ESJH-landingzones | false | false | Auditing on SQL server should be enabled | Auditing on your SQL Server should be enabled to track database activities across all databases on the server and save them in an audit log. | /providers/microsoft.authorization/policydefinitions/a6fb4358-5bf4-4ad7-ba82-2cd2f41ce5e9 | Policy | BuiltIn | SQL | False | AuditIfNotExists | Default | 0 | 0 | 0 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/roleassignments/8085d5e6-c291-571e-bd96-a2eb4769f9e6) | Deploy-SQL-DB-Auditing (SPObjId: 4f3a2551-ea2f-43c6-9623-8950156d19b7) | Deploy-SQL-Audit | Deploy-SQL-Audit | /providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/policyassignments/deploy-sql-db-auditing | n/a | 01/10/2021 20:58:36 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||||
Sub | ESJH-online | ESJH-online | 20217969-e578-4e91-beea-9bcf18b05a7e | payg1 | inherited ESJH-landingzones | false | false | Configure backup on virtual machines without a given tag to a new recovery services vault with a default policy | Enforce backup for all virtual machines by deploying a recovery services vault in the same location and resource group as the virtual machine. Doing this is useful when different application teams in your organization are allocated separate resource groups and need to manage their own backups and restores. You can optionally exclude virtual machines containing a specified tag to control the scope of assignment. See https://aka.ms/AzureVMAppCentricBackupExcludeTag. | /providers/microsoft.authorization/policydefinitions/98d0b9f8-fd90-49c9-88e2-d3baf3b0dd86 | Policy | BuiltIn | Backup | False | DeployIfNotExists | Default | 0 | 0 | 0 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/roleassignments/70486d4a-1ee2-5f70-bb58-b3bd79840ae5) | Deploy-VM-Backup (SPObjId: e2511ca5-bcb3-4dbd-9d91-c18590c2a9d2) | Deploy-VM-Backup | Deploy-VM-Backup | /providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/policyassignments/deploy-vm-backup | n/a | 01/10/2021 20:58:34 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||||
Sub | ESJH-online | ESJH-online | 20217969-e578-4e91-beea-9bcf18b05a7e | payg1 | inherited ESJH-landingzones | false | false | Kubernetes clusters should be accessible only over HTTPS | Use of HTTPS ensures authentication and protects data in transit from network layer eavesdropping attacks. This capability is currently generally available for Kubernetes Service (AKS), and in preview for Azure Arc enabled Kubernetes. For more info, visit https://aka.ms/kubepolicydoc | /providers/microsoft.authorization/policydefinitions/1a5b4dca-0b6f-4cf5-907c-56316bc1bf3d | Policy | BuiltIn | Kubernetes | False | deny | effect=deny | Default | 0 | 0 | 0 | 0 | 0 | none | Enforce-Https-Ingress-AKS | Enforce-Https-Ingress-AKS | /providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/policyassignments/enforce-aks-https | n/a | 01/10/2021 20:58:33 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||||
Sub | ESJH-online | ESJH-online | 20217969-e578-4e91-beea-9bcf18b05a7e | payg1 | inherited ESJH-landingzones | false | false | Deploy SQL DB transparent data encryption | Enables transparent data encryption on SQL databases | /providers/microsoft.authorization/policydefinitions/86a912f6-9a06-4e26-b447-11b16ba8659f | Policy | BuiltIn | SQL | False | DeployIfNotExists | Default | 0 | 0 | 0 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/roleassignments/3df334e6-61c3-543a-b548-97586caf6d4f) | Enforce-SQL-Encryption (SPObjId: 34520a11-7b14-46a8-ac34-7d766959460a) | Deploy-SQL-Security | Deploy-SQL-Security | /providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/policyassignments/enforce-sql-encryption | n/a | 01/10/2021 20:58:33 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||||
Sub | ESJH-online | ESJH-online | 20217969-e578-4e91-beea-9bcf18b05a7e | payg1 | inherited ESJH | false | false | Azure Security Benchmark | The Azure Security Benchmark initiative represents the policies and controls implementing security recommendations defined in Azure Security Benchmark v3, see https://aka.ms/azsecbm. This also serves as the Microsoft Defender for Cloud default policy initiative. You can directly assign this initiative, or manage its policies and compliance results within Microsoft Defender for Cloud. | /providers/microsoft.authorization/policysetdefinitions/1f3afdf9-d0c9-4c3d-847f-89da613e70a8 | PolicySet | BuiltIn | Security Center | False | n/a | Default | 38 | 4 | 7 | 0 | 0 | none | ASC-Monitoring | ASC-Monitoring | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-asc-monitoring | n/a | 01/10/2021 21:00:45 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||
Sub | ESJH-online | ESJH-online | 20217969-e578-4e91-beea-9bcf18b05a7e | payg1 | inherited ESJH | false | false | Deploy Azure Defender settings in Azure Security Center. | Deploys the Azure Defender settings in Azure Security Center for the specific services. | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-asc-standard | Policy | Custom | Security Center | true | DeployIfNotExists | pricingTierAppServices=Standard, pricingTierArm=Standard, pricingTierContainerRegistry=Standard, pricingTierDns=Standard, pricingTierKeyVaults=Standard, pricingTierKubernetesService=Standard, pricingTierSqlServers=Standard, pricingTierStorageAccounts=Standard, pricingTierVms=Standard | Default | 1 | 0 | 1 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/538e5329-7b5d-511f-8c05-9c7c32dab0bf) | Deploy-ASC-Security (SPObjId: 4cb4c797-237b-4e64-b2cf-66f841700442) | Deploy-ASC-Defender | Deploy-ASC-Defender | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-asc-security | n/a | 01/10/2021 21:00:47 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||
Sub | ESJH-online | ESJH-online | 20217969-e578-4e91-beea-9bcf18b05a7e | payg1 | inherited ESJH | false | false | Deploy Diagnostic Settings for Activity Log to Log Analytics workspace | Deploys the diagnostic settings for Activity Log to stream to a Log Analytics workspace when any Activity Log which is missing this diagnostic settings is created or updated. The policy wil set the diagnostic with category enabled. | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-activitylog | Policy | Custom | Monitoring | true | DeployIfNotExists | logAnalytics=/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/resourcegroups/esjh-mgmt/providers/microsoft.operationalinsights/workspaces/esjh-la-f28ba982-5ed0-4033-9bdf-e45e4b5df466, logsEnabled=True | Default | 0 | 1 | 0 | 1 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/e5ac6b58-4f31-5956-9082-78d97ba2453e) | Deploy-AzActivity-Log (SPObjId: 1691aa06-da2e-43f0-98f9-af12494603a9) | Deploy-AzActivity-Log | Deploy-AzActivity-Log | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-azactivity-log | n/a | 01/10/2021 21:00:47 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||
Sub | ESJH-online | ESJH-online | 20217969-e578-4e91-beea-9bcf18b05a7e | payg1 | inherited ESJH | false | false | Configure Log Analytics extension on Azure Arc enabled Linux servers. See deprecation notice below | Enable VM insights on servers and machines connected to Azure through Arc enabled servers by installing the Log Analytics virtual machine extension. VM insights uses the Log Analytics agent to collect the guest OS performance data, and provides insights into their performance. See more - https://aka.ms/vminsightsdocs. Deprecation notice: The Log Analytics agent is on a deprecation path and won't be supported after August 31, 2024. You must migrate to the replacement 'Azure Monitor agent' prior to that date | /providers/microsoft.authorization/policydefinitions/9d2b61b4-1d14-4a63-be30-d4498e7ad2cf | Policy | BuiltIn | Monitoring | False | DeployIfNotExists | logAnalytics=/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/resourcegroups/esjh-mgmt/providers/microsoft.operationalinsights/workspaces/esjh-la-f28ba982-5ed0-4033-9bdf-e45e4b5df466 | Default | 0 | 0 | 0 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/ddc0ff3c-a3d0-5d5b-ba19-116b6572acbf) | Deploy-LX-Arc-Monitoring (SPObjId: 9ed01b2b-9311-41a8-8897-0a329047be49) | Deploy-Linux-Arc-Monitoring | Deploy-Linux-Arc-Monitoring | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-lx-arc-monitoring | n/a | 01/10/2021 21:00:44 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||
Sub | ESJH-online | ESJH-online | 20217969-e578-4e91-beea-9bcf18b05a7e | payg1 | inherited ESJH | false | false | Deploy Diagnostic Settings to Azure Services | This policy set deploys the configurations of application Azure resources to forward diagnostic logs and metrics to an Azure Log Analytics workspace. See the list of policies of the services that are included | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policysetdefinitions/deploy-diag-loganalytics | PolicySet | Custom | Monitoring | true | n/a | logAnalytics=/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/resourcegroups/esjh-mgmt/providers/microsoft.operationalinsights/workspaces/esjh-la-f28ba982-5ed0-4033-9bdf-e45e4b5df466 | Default | 1 | 3 | 1 | 5 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/45afca7b-a696-5947-a47f-960081dd1dbc) | Deploy-Resource-Diag (SPObjId: e51576ad-748d-462b-9d70-cb3b03e6c2e6) | Deploy-Resource-Diag | Deploy-Resource-Diag | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-resource-diag | n/a | 01/10/2021 21:00:44 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||
Sub | ESJH-online | ESJH-online | 20217969-e578-4e91-beea-9bcf18b05a7e | payg1 | inherited ESJH | false | false | Legacy - Enable Azure Monitor for VMs | Legacy - Enable Azure Monitor for the virtual machines (VMs) in the specified scope (management group, subscription or resource group). Takes Log Analytics workspace as parameter. Use the new initiative named: Enable Azure Monitor for VMs with Azure Monitoring Agent(AMA) | /providers/microsoft.authorization/policysetdefinitions/55f3eceb-5573-4f18-9695-226972c6d74a | PolicySet | BuiltIn | Monitoring | False | n/a | logAnalytics_1=/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/resourcegroups/esjh-mgmt/providers/microsoft.operationalinsights/workspaces/esjh-la-f28ba982-5ed0-4033-9bdf-e45e4b5df466 | Default | 0 | 0 | 0 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/5d92332d-fe07-5cef-9c6b-33e5025d6374) | Deploy-VM-Monitoring (SPObjId: 065dde0b-5eab-4fce-80ee-ec956e94c498) | Deploy-VM-Monitoring | Deploy-VM-Monitoring v2 | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-vm-monitoring | n/a | 01/10/2021 21:00:44 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | 07/09/2021 16:04:52 | ObjectType: SP APP INT, ObjectDisplayName: AzOps, ObjectSignInName: n/a, ObjectId: c295384a-33d9-475e-abaf-d2fb0274299a | |
Sub | ESJH-online | ESJH-online | 20217969-e578-4e91-beea-9bcf18b05a7e | payg1 | inherited ESJH | false | false | Legacy - Enable Azure Monitor for Virtual Machine Scale Sets | Legacy - Enable Azure Monitor for the Virtual Machine Scale Sets in the specified scope (Management group, Subscription or resource group). Takes Log Analytics workspace as parameter. Use the new initiative named: Enable Azure Monitor for VMSS with Azure Monitoring Agent(AMA). Note: if your scale set upgradePolicy is set to Manual, you need to apply the extension to the all VMs in the set by calling upgrade on them. In CLI this would be az vmss update-instances. | /providers/microsoft.authorization/policysetdefinitions/75714362-cae7-409e-9b99-a8e5075b7fad | PolicySet | BuiltIn | Monitoring | False | n/a | logAnalytics_1=/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/resourcegroups/esjh-mgmt/providers/microsoft.operationalinsights/workspaces/esjh-la-f28ba982-5ed0-4033-9bdf-e45e4b5df466 | Default | 0 | 0 | 0 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/2d361fa3-7bd4-5234-9b12-1f54afa65870) | Deploy-VMSS-Monitoring (SPObjId: a3a4908f-b068-455e-a3f5-38cc5e00448f) | Deploy-VMSS-Monitoring | Deploy-VMSS-Monitoring | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-vmss-monitoring | n/a | 01/10/2021 21:00:47 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||
Sub | ESJH-online | ESJH-online | 20217969-e578-4e91-beea-9bcf18b05a7e | payg1 | inherited ESJH | false | false | Configure Log Analytics extension on Azure Arc enabled Windows servers | Enable VM insights on servers and machines connected to Azure through Arc enabled servers by installing the Log Analytics virtual machine extension. VM insights uses the Log Analytics agent to collect the guest OS performance data, and provides insights into their performance. See more - https://aka.ms/vminsightsdocs. Deprecation notice: The Log Analytics agent is on a deprecation path and won't be supported after August 31, 2024. You must migrate to the replacement 'Azure Monitor agent' prior to that date. | /providers/microsoft.authorization/policydefinitions/69af7d4a-7b18-4044-93a9-2651498ef203 | Policy | BuiltIn | Monitoring | False | DeployIfNotExists | logAnalytics=/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466/resourcegroups/esjh-mgmt/providers/microsoft.operationalinsights/workspaces/esjh-la-f28ba982-5ed0-4033-9bdf-e45e4b5df466 | Default | 0 | 0 | 0 | 0 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/38abf737-131b-52a2-90da-78943675bfed) | Deploy-WS-Arc-Monitoring (SPObjId: b0bdcb08-09c9-4d9d-957e-963d255e7220) | Deploy-Windows-Arc-Monitoring | Deploy-Windows-Arc-Monitoring | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-ws-arc-monitoring | n/a | 01/10/2021 21:00:47 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||
Sub | ESJH-online | ESJH-online | 20217969-e578-4e91-beea-9bcf18b05a7e | payg1 | inherited ESJH | false | false | Enforce Role assignment at Subscription Scope | This Policy definition will enforce a RBAC Role assignment at Subscription scope. | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policydefinitions/enforce-roleassignment-subscriptionscope | Policy | Custom | n/a | false | deployIfNotExists | targetAADObjectId=862a78e3-3e64-4272-a758-c987b2410718, targetRoledefinitionId=acdd72a7-3385-48ef-bd42-f606fba81ae7 | Default | 0 | 1 | 0 | 1 | 0 | Owner (/providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/b429c46d-6843-4a51-a74e-8a484de47815) | enforce0 (SPObjId: 79d69f2f-2fbe-409e-84c3-3e510c18fd16) | no description given | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/enforce0 | n/a | 03/16/2022 23:28:22 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | ||||
RG | ESJH-online | ESJH-online | 20217969-e578-4e91-beea-9bcf18b05a7e | payg1 | thisScope Sub RG | false | false | Deny the creation of private DNS - cust | This policy denies the creation of a private DNS in the current scope, used in combination with policies that create centralized private DNS in connectivity subscription | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/policydefinitions/53568753-a797-45d7-a552-d55f4a398bbb | Policy | Custom | Network-custom | true | Deny | Default | creation of private DNS prohibited | 0 | 0 | 0 | 0 | 0 | none | Deny the creation of private DNS - cust | no description given | /subscriptions/20217969-e578-4e91-beea-9bcf18b05a7e/resourcegroups/nsg/providers/microsoft.authorization/policyassignments/d1212de8a8fd4184a8965eea | Joe Dalton | 05/02/2022 07:02:22 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | ||||
RG | ESJH-online | ESJH-online | 20217969-e578-4e91-beea-9bcf18b05a7e | payg1 | thisScope Sub RG | false | false | API - Deny the creation of private DNS - cust | no description given | /providers/microsoft.management/managementgroups/esjh-online/providers/microsoft.authorization/policysetdefinitions/ee6248fccddc45b59624ac8f | PolicySet | Custom | Network-custom | false | n/a | Default | 0 | 0 | 0 | 0 | 0 | none | API - Deny the creation of private DNS - cust | no description given | /subscriptions/20217969-e578-4e91-beea-9bcf18b05a7e/resourcegroups/nsg/providers/microsoft.authorization/policyassignments/fab7aac62c1d419d87835c61 | Joe Dalton | 05/02/2022 07:08:06 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||
RG | ESJH-online | ESJH-online | 20217969-e578-4e91-beea-9bcf18b05a7e | payg1 | thisScope Sub RG | false | false | 1234Deny-ra-if-SPObjectId | no description given | /subscriptions/20217969-e578-4e91-beea-9bcf18b05a7e/providers/microsoft.authorization/policydefinitions/8a9070c4-7eec-4b78-b044-62c20a06d1de | Policy | Custom | n/a | false | deny | Default | 1 | 0 | 1 | 0 | 0 | none | 1234Deny-ra-if-SPObjectId | no description given | /subscriptions/20217969-e578-4e91-beea-9bcf18b05a7e/resourcegroups/protectedresources/providers/microsoft.authorization/policyassignments/fa0ac64635d34f42b8e052ba | Joe Dalton | 03/17/2022 15:07:17 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a |
Role Name | RoleId | Assignable Scopes | Data | CreatedOn | CreatedBy | UpdatedOn | UpdatedBy |
---|---|---|---|---|---|---|---|
1234 PolicyAutomation 4rbacOnSubTest | 685f2869-7bab-4ecd-9826-ade9cd454354 | 1 (/providers/Microsoft.Management/managementGroups/896470ca-9c6e-4176-9b38-5a655403c638) | false | 03/10/2022 07:28:00 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | ||
1234 RoleAssignment | bd9c9644-eade-4ab3-aaef-ac26fa369586 | 1 (/providers/Microsoft.Management/managementGroups/896470ca-9c6e-4176-9b38-5a655403c638) | false | 08/31/2021 06:10:14 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | ||
1234 RoleAssignmentSubscriptionOwner | 1ee892e0-67a1-4b4c-b171-8c3a371692a9 | 1 (/providers/Microsoft.Management/managementGroups/896470ca-9c6e-4176-9b38-5a655403c638) | false | 03/10/2022 13:28:32 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | 03/11/2022 07:49:42 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a |
Contributor-0433 | fcce8aa9-b8ea-4d43-a930-af0cf1fdbc55 | 1 (/subscriptions/20217969-e578-4e91-beea-9bcf18b05a7e) | false | 05/02/2022 05:05:18 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | ||
CustRole_P_9982_176 | 6b44d6da-5658-444e-a36d-ce64b14011ab | 1 (/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466) | false | 05/18/2021 18:03:13 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | 05/18/2021 18:23:40 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 |
CustRole_P_9982_178 | fc14b032-e6e8-440b-a328-f55918e8c83e | 2 (/subscriptions/4dfa3b56-55bf-4059-802a-24e44a4fb60f, /subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466) | false | 06/16/2021 10:10:06 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | ||
Task4638Role | 8808ebf9-4602-4635-a9b8-6c0f002695be | 1 (/subscriptions/4dfa3b56-55bf-4059-802a-24e44a4fb60f) | false | 01/25/2021 22:22:09 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | ||
test_ReaderRestricted | 5cceafe8-fd60-4928-8fd3-c936158ad756 | 1 (/subscriptions/a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2) | false | 12/31/2021 11:21:10 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | ||
testRole3366 | f548f1ea-48f1-4a74-9061-b5dacacf514a | 1 (/subscriptions/4dfa3b56-55bf-4059-802a-24e44a4fb60f) | false | 07/18/2021 15:22:38 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | 07/19/2021 19:45:44 | ObjectType: User Member, ObjectDisplayName: Jack Dalton, ObjectSignInName: JackDalton@AzGovViz.onmicrosoft.com, ObjectId: c64d2776-a210-428f-b54f-a4a5dd7f8ef8 |
testRole3367 | f7028056-3a12-43ac-a499-0d1844a02240 | 1 (/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466) | false | 08/04/2021 15:34:15 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | ||
testRole3368 | 08a2d627-a94e-461e-8350-432b457d00a3 | 1 (/providers/microsoft.management/managementgroups/esjhdev) | false | 08/04/2021 15:36:21 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a |
Role Name | RoleId | Assignable Scopes |
---|---|---|
1234 PolicyAutomation 4rbacOnSubTest | 685f2869-7bab-4ecd-9826-ade9cd454354 | 1 (/providers/Microsoft.Management/managementGroups/896470ca-9c6e-4176-9b38-5a655403c638) |
1234 RoleAssignment | bd9c9644-eade-4ab3-aaef-ac26fa369586 | 1 (/providers/Microsoft.Management/managementGroups/896470ca-9c6e-4176-9b38-5a655403c638) |
Contributor-0433 | fcce8aa9-b8ea-4d43-a930-af0cf1fdbc55 | 1 (/subscriptions/20217969-e578-4e91-beea-9bcf18b05a7e) |
CustRole_P_9982_176 | 6b44d6da-5658-444e-a36d-ce64b14011ab | 1 (/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466) |
CustRole_P_9982_178 | fc14b032-e6e8-440b-a328-f55918e8c83e | 2 (/subscriptions/4dfa3b56-55bf-4059-802a-24e44a4fb60f, /subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466) |
Task4638Role | 8808ebf9-4602-4635-a9b8-6c0f002695be | 1 (/subscriptions/4dfa3b56-55bf-4059-802a-24e44a4fb60f) |
test_ReaderRestricted | 5cceafe8-fd60-4928-8fd3-c936158ad756 | 1 (/subscriptions/a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2) |
testRole3366 | f548f1ea-48f1-4a74-9061-b5dacacf514a | 1 (/subscriptions/4dfa3b56-55bf-4059-802a-24e44a4fb60f) |
testRole3367 | f7028056-3a12-43ac-a499-0d1844a02240 | 1 (/subscriptions/f28ba982-5ed0-4033-9bdf-e45e4b5df466) |
testRole3368 | 08a2d627-a94e-461e-8350-432b457d00a3 | 1 (/providers/microsoft.management/managementgroups/esjhdev) |
Role AssignmentId | Role Name | RoleId | Impacted Mg/Sub |
---|---|---|---|
/providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/5160c1ae-ab7b-41ac-b57c-a4f618aaf8b8 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Mg: 14; Sub: 4 |
/providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/roleassignments/4cb5ad0a-366c-4dbd-804c-b4dce349e47f | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Mg: 3; Sub: 1 |
Subscription | SubscriptionId | MgPath | Role | Identity |
---|---|---|---|---|
landingZone | 4dfa3b56-55bf-4059-802a-24e44a4fb60f | 896470ca-9c6e-4176-9b38-5a655403c638/ESJH/ESJH-landingzones/ESJH-online/4dfa3b56-55bf-4059-802a-24e44a4fb60f | ServiceAdministrator | its.joe.dalton@azgovviz.net |
management | f28ba982-5ed0-4033-9bdf-e45e4b5df466 | 896470ca-9c6e-4176-9b38-5a655403c638/ESJH/ESJH-platform/ESJH-management/f28ba982-5ed0-4033-9bdf-e45e4b5df466 | ServiceAdministrator | its.joe.dalton@azgovviz.net |
payg0 | a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2 | 896470ca-9c6e-4176-9b38-5a655403c638/test01/test01-EMEA_ID/a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2 | ServiceAdministrator | its.joe.dalton@azgovviz.net |
Scope | Management Group Id | Management Group Name | SubscriptionId | Subscription Name | Assignment Scope | Role | Role Id | Role Type | Data | Can do Role assignment | Identity Displayname | Identity SignInName | Identity ObjectId | Identity Type | Applicability | Applies through membership | Group Details | PIM | PIM assignment type | PIM start | PIM end | Role AssignmentId | Related Policy Assignment | CreatedOn | CreatedBy |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Ten | 896470ca-9c6e-4176-9b38-5a655403c638 | Tenant Root Group | inherited Tenant | User Access Administrator | 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 | Builtin | false | True | Joe Dalton | joe.dalton@AzGovViz.onmicrosoft.com | acf4c68f-7b15-4d70-935b-26116fc2426a | User Member | direct | False | /providers/microsoft.authorization/roleassignments/0c3ffd6f-942d-433d-8abd-2d0d7f4383e1 | none | 01/10/2021 20:27:23 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Ten | 896470ca-9c6e-4176-9b38-5a655403c638 | Tenant Root Group | inherited Tenant | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | ESDeploymentAccount | ESDeploymentAccount@AzGovViz.onmicrosoft.com | b790b1e1-6f46-488b-8c5a-708b0db9a149 | User Member | direct | False | /providers/microsoft.authorization/roleassignments/6c236776-529f-4132-b034-e399e1cd1a99 | none | 01/10/2021 20:51:03 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | 896470ca-9c6e-4176-9b38-5a655403c638 | Tenant Root Group | thisScope MG | Resource Policy Contributor | 36243c78-bf99-498c-9df9-86d9f8d28608 | Builtin | false | False | PolicyPipeline | n/a | 90003bac-487c-4351-ad41-ed1f9e0446c1 | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/132f37b3-0aca-4e26-b71b-bcdde7a981ea | none | 10/27/2021 11:18:15 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | 896470ca-9c6e-4176-9b38-5a655403c638 | Tenant Root Group | thisScope MG | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | AzOps | n/a | c295384a-33d9-475e-abaf-d2fb0274299a | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/30e36b53-bc6c-412b-a026-96fe7527e27b | none | 07/06/2021 12:42:21 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | 896470ca-9c6e-4176-9b38-5a655403c638 | Tenant Root Group | thisScope MG | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | Joe Dalton | joe.dalton@AzGovViz.onmicrosoft.com | acf4c68f-7b15-4d70-935b-26116fc2426a | User Member | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/eda95ae6-8581-4558-b3b9-b3cd05cce33d | none | 06/16/2021 13:58:07 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | 896470ca-9c6e-4176-9b38-5a655403c638 | Tenant Root Group | thisScope MG | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | AzGovVizSPARK | n/a | 527c7ca6-7a74-4b5d-bde2-7465ebb9915a | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/78ff5f82-18d1-4cb8-be40-cb046f39e5ac | none | 02/15/2022 14:42:34 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | 896470ca-9c6e-4176-9b38-5a655403c638 | Tenant Root Group | thisScope MG | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | AzAdServicePrincipalInsights | n/a | 59acc082-8e28-485e-8897-d2a17e03ed50 | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/c6b7a239-63bf-48a6-921e-aa0e1628a702 | none | 09/28/2021 06:26:08 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | 896470ca-9c6e-4176-9b38-5a655403c638 | Tenant Root Group | thisScope MG | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | miCentral001 | n/a | 619f894b-1c1b-4f43-8e7f-9e4d32ffefe1 | SP MI Usr | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/11f78fac-cce2-4278-9364-f84c3c43ae04 | none | 01/07/2022 16:52:53 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | 896470ca-9c6e-4176-9b38-5a655403c638 | Tenant Root Group | thisScope MG | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | n/a | n/a | 638032a0-ff4a-462f-a53b-b99c4cf82964 | Unknown | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/5160c1ae-ab7b-41ac-b57c-a4f618aaf8b8 | none | 02/15/2022 12:56:13 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | 896470ca-9c6e-4176-9b38-5a655403c638 | Tenant Root Group | thisScope MG | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | azgovvizADO | n/a | 8a2f188e-5b60-45f1-b0c6-12cd0e59576e | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/11337883-af36-4131-a7c3-8dd5ce47b4eb | none | 05/19/2022 15:36:50 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | 896470ca-9c6e-4176-9b38-5a655403c638 | Tenant Root Group | thisScope MG | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | Joe Dalton | julian.hayward_yahoo.de#EXT#@AzGovViz.onmicrosoft.com | 9ef38e0f-5e7b-4ac5-8b0c-3635ac3c7ff4 | User Guest | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/0c4b9ba3-fc34-448e-beb0-d4baa7037562 | none | 09/24/2022 06:23:37 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | 896470ca-9c6e-4176-9b38-5a655403c638 | Tenant Root Group | thisScope MG | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | Jack Dalton | JackDalton@AzGovViz.onmicrosoft.com | c64d2776-a210-428f-b54f-a4a5dd7f8ef8 | User Member | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/2df03e9d-a1e3-41f5-a95e-efb2b4641f04 | none | 07/19/2021 19:38:25 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | 896470ca-9c6e-4176-9b38-5a655403c638 | Tenant Root Group | thisScope MG | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | azgovvizwwcsecurity | n/a | e261446e-77d2-4cf5-a32a-0fbef8ee1333 | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/d7973c31-e58a-4af7-bbcb-a4bac69ba141 | none | 04/27/2021 16:53:55 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | 896470ca-9c6e-4176-9b38-5a655403c638 | Tenant Root Group | thisScope MG | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | AzGovVizAzDO | n/a | efc7b786-0bc9-4d41-aacd-6a54d16f7229 | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/c886cc3a-0d4c-45b6-af8b-fbfc4f8a4c06 | none | 05/21/2022 06:31:10 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | 896470ca-9c6e-4176-9b38-5a655403c638 | Tenant Root Group | thisScope MG | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | azgvzGH | n/a | f20c11bb-119b-4914-abaa-99df52ef4f09 | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/7a09194c-13ca-4647-bb5e-da538b45f5e0 | none | 01/15/2022 16:26:49 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH | ESJH | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Resource Policy Contributor | 36243c78-bf99-498c-9df9-86d9f8d28608 | Builtin | false | False | PolicyPipeline | n/a | 90003bac-487c-4351-ad41-ed1f9e0446c1 | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/132f37b3-0aca-4e26-b71b-bcdde7a981ea | none | 10/27/2021 11:18:15 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH | ESJH | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | AzOps | n/a | c295384a-33d9-475e-abaf-d2fb0274299a | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/30e36b53-bc6c-412b-a026-96fe7527e27b | none | 07/06/2021 12:42:21 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH | ESJH | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | Joe Dalton | joe.dalton@AzGovViz.onmicrosoft.com | acf4c68f-7b15-4d70-935b-26116fc2426a | User Member | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/eda95ae6-8581-4558-b3b9-b3cd05cce33d | none | 06/16/2021 13:58:07 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH | ESJH | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | AzGovVizSPARK | n/a | 527c7ca6-7a74-4b5d-bde2-7465ebb9915a | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/78ff5f82-18d1-4cb8-be40-cb046f39e5ac | none | 02/15/2022 14:42:34 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH | ESJH | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | AzAdServicePrincipalInsights | n/a | 59acc082-8e28-485e-8897-d2a17e03ed50 | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/c6b7a239-63bf-48a6-921e-aa0e1628a702 | none | 09/28/2021 06:26:08 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH | ESJH | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | miCentral001 | n/a | 619f894b-1c1b-4f43-8e7f-9e4d32ffefe1 | SP MI Usr | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/11f78fac-cce2-4278-9364-f84c3c43ae04 | none | 01/07/2022 16:52:53 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH | ESJH | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | n/a | n/a | 638032a0-ff4a-462f-a53b-b99c4cf82964 | Unknown | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/5160c1ae-ab7b-41ac-b57c-a4f618aaf8b8 | none | 02/15/2022 12:56:13 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH | ESJH | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | azgovvizADO | n/a | 8a2f188e-5b60-45f1-b0c6-12cd0e59576e | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/11337883-af36-4131-a7c3-8dd5ce47b4eb | none | 05/19/2022 15:36:50 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH | ESJH | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | Joe Dalton | julian.hayward_yahoo.de#EXT#@AzGovViz.onmicrosoft.com | 9ef38e0f-5e7b-4ac5-8b0c-3635ac3c7ff4 | User Guest | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/0c4b9ba3-fc34-448e-beb0-d4baa7037562 | none | 09/24/2022 06:23:37 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH | ESJH | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | Jack Dalton | JackDalton@AzGovViz.onmicrosoft.com | c64d2776-a210-428f-b54f-a4a5dd7f8ef8 | User Member | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/2df03e9d-a1e3-41f5-a95e-efb2b4641f04 | none | 07/19/2021 19:38:25 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH | ESJH | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | azgovvizwwcsecurity | n/a | e261446e-77d2-4cf5-a32a-0fbef8ee1333 | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/d7973c31-e58a-4af7-bbcb-a4bac69ba141 | none | 04/27/2021 16:53:55 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH | ESJH | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | AzGovVizAzDO | n/a | efc7b786-0bc9-4d41-aacd-6a54d16f7229 | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/c886cc3a-0d4c-45b6-af8b-fbfc4f8a4c06 | none | 05/21/2022 06:31:10 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH | ESJH | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | azgvzGH | n/a | f20c11bb-119b-4914-abaa-99df52ef4f09 | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/7a09194c-13ca-4647-bb5e-da538b45f5e0 | none | 01/15/2022 16:26:49 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Ten | ESJH | ESJH | inherited Tenant | User Access Administrator | 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 | Builtin | false | True | Joe Dalton | joe.dalton@AzGovViz.onmicrosoft.com | acf4c68f-7b15-4d70-935b-26116fc2426a | User Member | direct | False | /providers/microsoft.authorization/roleassignments/0c3ffd6f-942d-433d-8abd-2d0d7f4383e1 | none | 01/10/2021 20:27:23 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Ten | ESJH | ESJH | inherited Tenant | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | ESDeploymentAccount | ESDeploymentAccount@AzGovViz.onmicrosoft.com | b790b1e1-6f46-488b-8c5a-708b0db9a149 | User Member | direct | False | /providers/microsoft.authorization/roleassignments/6c236776-529f-4132-b034-e399e1cd1a99 | none | 01/10/2021 20:51:03 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH | ESJH | thisScope MG | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | Deploy-VM-Monitoring | n/a | 065dde0b-5eab-4fce-80ee-ec956e94c498 | SP MI Sys | direct | False | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/5d92332d-fe07-5cef-9c6b-33e5025d6374 | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-vm-monitoring (Legacy - Enable Azure Monitor for VMs) | 01/10/2021 21:00:47 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||||
Mg | ESJH | ESJH | thisScope MG | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | Deploy-AzActivity-Log | n/a | 1691aa06-da2e-43f0-98f9-af12494603a9 | SP MI Sys | direct | False | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/e5ac6b58-4f31-5956-9082-78d97ba2453e | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-azactivity-log (Deploy Diagnostic Settings for Activity Log to Log Analytics workspace) | 01/10/2021 21:00:50 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||||
Mg | ESJH | ESJH | thisScope MG | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | Deploy-ASC-Security | n/a | 4cb4c797-237b-4e64-b2cf-66f841700442 | SP MI Sys | direct | False | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/538e5329-7b5d-511f-8c05-9c7c32dab0bf | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-asc-security (Deploy Azure Defender settings in Azure Security Center.) | 01/10/2021 21:00:50 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||||
Mg | ESJH | ESJH | thisScope MG | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | ESDeploymentAccount | ESDeploymentAccount@AzGovViz.onmicrosoft.com | b790b1e1-6f46-488b-8c5a-708b0db9a149 | User Member | direct | False | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/f8d8ca86-6fdf-4ad5-b801-5e1b3eba3171 | none | 01/10/2021 20:55:50 | ObjectType: SP App EXT, ObjectDisplayName: Azure Management Groups, ObjectSignInName: n/a, ObjectId: 4870c99c-acfe-4210-9212-32949dc37c7a (r) | |||||||
Mg | ESJH | ESJH | thisScope MG | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | enforce0 | n/a | 79d69f2f-2fbe-409e-84c3-3e510c18fd16 | SP MI Sys | direct | False | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/b429c46d-6843-4a51-a74e-8a484de47815 | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/enforce0 (Enforce Role assignment at Subscription Scope) | 03/16/2022 23:57:25 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH | ESJH | thisScope MG | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | Deploy-LX-Arc-Monitoring | n/a | 9ed01b2b-9311-41a8-8897-0a329047be49 | SP MI Sys | direct | False | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/ddc0ff3c-a3d0-5d5b-ba19-116b6572acbf | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-lx-arc-monitoring (Configure Log Analytics extension on Azure Arc enabled Linux servers. See deprecation notice below) | 01/10/2021 21:00:47 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||||
Mg | ESJH | ESJH | thisScope MG | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | Deploy-VMSS-Monitoring | n/a | a3a4908f-b068-455e-a3f5-38cc5e00448f | SP MI Sys | direct | False | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/2d361fa3-7bd4-5234-9b12-1f54afa65870 | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-vmss-monitoring (Legacy - Enable Azure Monitor for Virtual Machine Scale Sets) | 01/10/2021 21:00:50 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||||
Mg | ESJH | ESJH | thisScope MG | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | Deploy-WS-Arc-Monitoring | n/a | b0bdcb08-09c9-4d9d-957e-963d255e7220 | SP MI Sys | direct | False | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/38abf737-131b-52a2-90da-78943675bfed | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-ws-arc-monitoring (Configure Log Analytics extension on Azure Arc enabled Windows servers) | 01/10/2021 21:00:50 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||||
Mg | ESJH | ESJH | thisScope MG | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | Deploy-Resource-Diag | n/a | e51576ad-748d-462b-9d70-cb3b03e6c2e6 | SP MI Sys | direct | False | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/45afca7b-a696-5947-a47f-960081dd1dbc | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-resource-diag (Deploy Diagnostic Settings to Azure Services) | 01/10/2021 21:00:47 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||||
Mg | ESJHDEV | ESJHDEV | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Resource Policy Contributor | 36243c78-bf99-498c-9df9-86d9f8d28608 | Builtin | false | False | PolicyPipeline | n/a | 90003bac-487c-4351-ad41-ed1f9e0446c1 | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/132f37b3-0aca-4e26-b71b-bcdde7a981ea | none | 10/27/2021 11:18:15 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJHDEV | ESJHDEV | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | AzOps | n/a | c295384a-33d9-475e-abaf-d2fb0274299a | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/30e36b53-bc6c-412b-a026-96fe7527e27b | none | 07/06/2021 12:42:21 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJHDEV | ESJHDEV | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | Joe Dalton | joe.dalton@AzGovViz.onmicrosoft.com | acf4c68f-7b15-4d70-935b-26116fc2426a | User Member | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/eda95ae6-8581-4558-b3b9-b3cd05cce33d | none | 06/16/2021 13:58:07 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJHDEV | ESJHDEV | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | AzGovVizSPARK | n/a | 527c7ca6-7a74-4b5d-bde2-7465ebb9915a | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/78ff5f82-18d1-4cb8-be40-cb046f39e5ac | none | 02/15/2022 14:42:34 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJHDEV | ESJHDEV | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | AzAdServicePrincipalInsights | n/a | 59acc082-8e28-485e-8897-d2a17e03ed50 | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/c6b7a239-63bf-48a6-921e-aa0e1628a702 | none | 09/28/2021 06:26:08 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJHDEV | ESJHDEV | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | miCentral001 | n/a | 619f894b-1c1b-4f43-8e7f-9e4d32ffefe1 | SP MI Usr | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/11f78fac-cce2-4278-9364-f84c3c43ae04 | none | 01/07/2022 16:52:53 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJHDEV | ESJHDEV | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | n/a | n/a | 638032a0-ff4a-462f-a53b-b99c4cf82964 | Unknown | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/5160c1ae-ab7b-41ac-b57c-a4f618aaf8b8 | none | 02/15/2022 12:56:13 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJHDEV | ESJHDEV | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | azgovvizADO | n/a | 8a2f188e-5b60-45f1-b0c6-12cd0e59576e | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/11337883-af36-4131-a7c3-8dd5ce47b4eb | none | 05/19/2022 15:36:50 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJHDEV | ESJHDEV | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | Joe Dalton | julian.hayward_yahoo.de#EXT#@AzGovViz.onmicrosoft.com | 9ef38e0f-5e7b-4ac5-8b0c-3635ac3c7ff4 | User Guest | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/0c4b9ba3-fc34-448e-beb0-d4baa7037562 | none | 09/24/2022 06:23:37 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJHDEV | ESJHDEV | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | Jack Dalton | JackDalton@AzGovViz.onmicrosoft.com | c64d2776-a210-428f-b54f-a4a5dd7f8ef8 | User Member | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/2df03e9d-a1e3-41f5-a95e-efb2b4641f04 | none | 07/19/2021 19:38:25 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJHDEV | ESJHDEV | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | azgovvizwwcsecurity | n/a | e261446e-77d2-4cf5-a32a-0fbef8ee1333 | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/d7973c31-e58a-4af7-bbcb-a4bac69ba141 | none | 04/27/2021 16:53:55 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJHDEV | ESJHDEV | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | AzGovVizAzDO | n/a | efc7b786-0bc9-4d41-aacd-6a54d16f7229 | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/c886cc3a-0d4c-45b6-af8b-fbfc4f8a4c06 | none | 05/21/2022 06:31:10 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJHDEV | ESJHDEV | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | azgvzGH | n/a | f20c11bb-119b-4914-abaa-99df52ef4f09 | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/7a09194c-13ca-4647-bb5e-da538b45f5e0 | none | 01/15/2022 16:26:49 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Ten | ESJHDEV | ESJHDEV | inherited Tenant | User Access Administrator | 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 | Builtin | false | True | Joe Dalton | joe.dalton@AzGovViz.onmicrosoft.com | acf4c68f-7b15-4d70-935b-26116fc2426a | User Member | direct | False | /providers/microsoft.authorization/roleassignments/0c3ffd6f-942d-433d-8abd-2d0d7f4383e1 | none | 01/10/2021 20:27:23 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Ten | ESJHDEV | ESJHDEV | inherited Tenant | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | ESDeploymentAccount | ESDeploymentAccount@AzGovViz.onmicrosoft.com | b790b1e1-6f46-488b-8c5a-708b0db9a149 | User Member | direct | False | /providers/microsoft.authorization/roleassignments/6c236776-529f-4132-b034-e399e1cd1a99 | none | 01/10/2021 20:51:03 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJHDEV | ESJHDEV | thisScope MG | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | AzOps | n/a | c295384a-33d9-475e-abaf-d2fb0274299a | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/esjhdev/providers/microsoft.authorization/roleassignments/983c43f8-1c29-4c73-9816-b69d38226be4 | none | 07/06/2021 13:09:24 | ObjectType: SP App EXT, ObjectDisplayName: Azure Management Groups, ObjectSignInName: n/a, ObjectId: 4870c99c-acfe-4210-9212-32949dc37c7a (r) | |||||||
Mg | ESJHQA | ESJHQA | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Resource Policy Contributor | 36243c78-bf99-498c-9df9-86d9f8d28608 | Builtin | false | False | PolicyPipeline | n/a | 90003bac-487c-4351-ad41-ed1f9e0446c1 | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/132f37b3-0aca-4e26-b71b-bcdde7a981ea | none | 10/27/2021 11:18:15 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJHQA | ESJHQA | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | AzOps | n/a | c295384a-33d9-475e-abaf-d2fb0274299a | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/30e36b53-bc6c-412b-a026-96fe7527e27b | none | 07/06/2021 12:42:21 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJHQA | ESJHQA | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | Joe Dalton | joe.dalton@AzGovViz.onmicrosoft.com | acf4c68f-7b15-4d70-935b-26116fc2426a | User Member | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/eda95ae6-8581-4558-b3b9-b3cd05cce33d | none | 06/16/2021 13:58:07 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJHQA | ESJHQA | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | AzGovVizSPARK | n/a | 527c7ca6-7a74-4b5d-bde2-7465ebb9915a | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/78ff5f82-18d1-4cb8-be40-cb046f39e5ac | none | 02/15/2022 14:42:34 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJHQA | ESJHQA | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | AzAdServicePrincipalInsights | n/a | 59acc082-8e28-485e-8897-d2a17e03ed50 | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/c6b7a239-63bf-48a6-921e-aa0e1628a702 | none | 09/28/2021 06:26:08 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJHQA | ESJHQA | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | miCentral001 | n/a | 619f894b-1c1b-4f43-8e7f-9e4d32ffefe1 | SP MI Usr | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/11f78fac-cce2-4278-9364-f84c3c43ae04 | none | 01/07/2022 16:52:53 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJHQA | ESJHQA | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | n/a | n/a | 638032a0-ff4a-462f-a53b-b99c4cf82964 | Unknown | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/5160c1ae-ab7b-41ac-b57c-a4f618aaf8b8 | none | 02/15/2022 12:56:13 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJHQA | ESJHQA | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | azgovvizADO | n/a | 8a2f188e-5b60-45f1-b0c6-12cd0e59576e | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/11337883-af36-4131-a7c3-8dd5ce47b4eb | none | 05/19/2022 15:36:50 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJHQA | ESJHQA | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | Joe Dalton | julian.hayward_yahoo.de#EXT#@AzGovViz.onmicrosoft.com | 9ef38e0f-5e7b-4ac5-8b0c-3635ac3c7ff4 | User Guest | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/0c4b9ba3-fc34-448e-beb0-d4baa7037562 | none | 09/24/2022 06:23:37 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJHQA | ESJHQA | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | Jack Dalton | JackDalton@AzGovViz.onmicrosoft.com | c64d2776-a210-428f-b54f-a4a5dd7f8ef8 | User Member | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/2df03e9d-a1e3-41f5-a95e-efb2b4641f04 | none | 07/19/2021 19:38:25 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJHQA | ESJHQA | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | azgovvizwwcsecurity | n/a | e261446e-77d2-4cf5-a32a-0fbef8ee1333 | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/d7973c31-e58a-4af7-bbcb-a4bac69ba141 | none | 04/27/2021 16:53:55 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJHQA | ESJHQA | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | AzGovVizAzDO | n/a | efc7b786-0bc9-4d41-aacd-6a54d16f7229 | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/c886cc3a-0d4c-45b6-af8b-fbfc4f8a4c06 | none | 05/21/2022 06:31:10 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJHQA | ESJHQA | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | azgvzGH | n/a | f20c11bb-119b-4914-abaa-99df52ef4f09 | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/7a09194c-13ca-4647-bb5e-da538b45f5e0 | none | 01/15/2022 16:26:49 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Ten | ESJHQA | ESJHQA | inherited Tenant | User Access Administrator | 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 | Builtin | false | True | Joe Dalton | joe.dalton@AzGovViz.onmicrosoft.com | acf4c68f-7b15-4d70-935b-26116fc2426a | User Member | direct | False | /providers/microsoft.authorization/roleassignments/0c3ffd6f-942d-433d-8abd-2d0d7f4383e1 | none | 01/10/2021 20:27:23 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Ten | ESJHQA | ESJHQA | inherited Tenant | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | ESDeploymentAccount | ESDeploymentAccount@AzGovViz.onmicrosoft.com | b790b1e1-6f46-488b-8c5a-708b0db9a149 | User Member | direct | False | /providers/microsoft.authorization/roleassignments/6c236776-529f-4132-b034-e399e1cd1a99 | none | 01/10/2021 20:51:03 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJHQA | ESJHQA | thisScope MG | Security Reader | 39bc4728-0917-49c7-9d2c-d95423bc2eb4 | Builtin | false | False | group04NoMembers | n/a | 5f90ced2-7d5e-493b-9db6-862b9332e20a | Group | direct | 0 (Usr: 0, Grp: 0, SP: 0) | False | /providers/microsoft.management/managementgroups/esjhqa/providers/microsoft.authorization/roleassignments/e010f291-49a9-4d4b-be4d-55c6aeb164cd | none | 08/06/2021 09:30:11 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | ||||||
Mg | ESJHQA | ESJHQA | thisScope MG | Log Analytics Reader | 73c42c96-874c-492b-b04d-ab87d138a893 | Builtin | false | False | group04NoMembers | n/a | 5f90ced2-7d5e-493b-9db6-862b9332e20a | Group | indirect | group05OneMemberGroupWithNoMembers (c57f8838-1603-4932-b3c4-9572feea9173) | 1 (Usr: 0, Grp: 1, SP: 0) | False | /providers/microsoft.management/managementgroups/esjhqa/providers/microsoft.authorization/roleassignments/fe935a9c-928f-4dec-aafb-54ecc2642cf3 | none | 08/06/2021 09:30:52 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||
Mg | ESJHQA | ESJHQA | thisScope MG | Log Analytics Reader | 73c42c96-874c-492b-b04d-ab87d138a893 | Builtin | false | False | group05OneMemberGroupWithNoMembers | n/a | c57f8838-1603-4932-b3c4-9572feea9173 | Group | direct | 1 (Usr: 0, Grp: 1, SP: 0) | False | /providers/microsoft.management/managementgroups/esjhqa/providers/microsoft.authorization/roleassignments/fe935a9c-928f-4dec-aafb-54ecc2642cf3 | none | 08/06/2021 09:30:52 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | ||||||
Mg | ESJHQA | ESJHQA | thisScope MG | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | AzOps | n/a | c295384a-33d9-475e-abaf-d2fb0274299a | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/esjhqa/providers/microsoft.authorization/roleassignments/9f1fe9df-5a9c-46ca-b881-154ecd19eaa7 | none | 07/06/2021 10:02:27 | ObjectType: SP App EXT, ObjectDisplayName: Azure Management Groups, ObjectSignInName: n/a, ObjectId: 4870c99c-acfe-4210-9212-32949dc37c7a (r) | |||||||
Mg | test01 | test01 | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Resource Policy Contributor | 36243c78-bf99-498c-9df9-86d9f8d28608 | Builtin | false | False | PolicyPipeline | n/a | 90003bac-487c-4351-ad41-ed1f9e0446c1 | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/132f37b3-0aca-4e26-b71b-bcdde7a981ea | none | 10/27/2021 11:18:15 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | test01 | test01 | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | AzOps | n/a | c295384a-33d9-475e-abaf-d2fb0274299a | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/30e36b53-bc6c-412b-a026-96fe7527e27b | none | 07/06/2021 12:42:21 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | test01 | test01 | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | Joe Dalton | joe.dalton@AzGovViz.onmicrosoft.com | acf4c68f-7b15-4d70-935b-26116fc2426a | User Member | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/eda95ae6-8581-4558-b3b9-b3cd05cce33d | none | 06/16/2021 13:58:07 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | test01 | test01 | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | AzGovVizSPARK | n/a | 527c7ca6-7a74-4b5d-bde2-7465ebb9915a | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/78ff5f82-18d1-4cb8-be40-cb046f39e5ac | none | 02/15/2022 14:42:34 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | test01 | test01 | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | AzAdServicePrincipalInsights | n/a | 59acc082-8e28-485e-8897-d2a17e03ed50 | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/c6b7a239-63bf-48a6-921e-aa0e1628a702 | none | 09/28/2021 06:26:08 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | test01 | test01 | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | miCentral001 | n/a | 619f894b-1c1b-4f43-8e7f-9e4d32ffefe1 | SP MI Usr | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/11f78fac-cce2-4278-9364-f84c3c43ae04 | none | 01/07/2022 16:52:53 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | test01 | test01 | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | n/a | n/a | 638032a0-ff4a-462f-a53b-b99c4cf82964 | Unknown | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/5160c1ae-ab7b-41ac-b57c-a4f618aaf8b8 | none | 02/15/2022 12:56:13 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | test01 | test01 | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | azgovvizADO | n/a | 8a2f188e-5b60-45f1-b0c6-12cd0e59576e | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/11337883-af36-4131-a7c3-8dd5ce47b4eb | none | 05/19/2022 15:36:50 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | test01 | test01 | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | Joe Dalton | julian.hayward_yahoo.de#EXT#@AzGovViz.onmicrosoft.com | 9ef38e0f-5e7b-4ac5-8b0c-3635ac3c7ff4 | User Guest | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/0c4b9ba3-fc34-448e-beb0-d4baa7037562 | none | 09/24/2022 06:23:37 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | test01 | test01 | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | Jack Dalton | JackDalton@AzGovViz.onmicrosoft.com | c64d2776-a210-428f-b54f-a4a5dd7f8ef8 | User Member | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/2df03e9d-a1e3-41f5-a95e-efb2b4641f04 | none | 07/19/2021 19:38:25 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | test01 | test01 | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | azgovvizwwcsecurity | n/a | e261446e-77d2-4cf5-a32a-0fbef8ee1333 | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/d7973c31-e58a-4af7-bbcb-a4bac69ba141 | none | 04/27/2021 16:53:55 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | test01 | test01 | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | AzGovVizAzDO | n/a | efc7b786-0bc9-4d41-aacd-6a54d16f7229 | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/c886cc3a-0d4c-45b6-af8b-fbfc4f8a4c06 | none | 05/21/2022 06:31:10 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | test01 | test01 | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | azgvzGH | n/a | f20c11bb-119b-4914-abaa-99df52ef4f09 | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/7a09194c-13ca-4647-bb5e-da538b45f5e0 | none | 01/15/2022 16:26:49 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Ten | test01 | test01 | inherited Tenant | User Access Administrator | 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 | Builtin | false | True | Joe Dalton | joe.dalton@AzGovViz.onmicrosoft.com | acf4c68f-7b15-4d70-935b-26116fc2426a | User Member | direct | False | /providers/microsoft.authorization/roleassignments/0c3ffd6f-942d-433d-8abd-2d0d7f4383e1 | none | 01/10/2021 20:27:23 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Ten | test01 | test01 | inherited Tenant | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | ESDeploymentAccount | ESDeploymentAccount@AzGovViz.onmicrosoft.com | b790b1e1-6f46-488b-8c5a-708b0db9a149 | User Member | direct | False | /providers/microsoft.authorization/roleassignments/6c236776-529f-4132-b034-e399e1cd1a99 | none | 01/10/2021 20:51:03 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | test01 | test01 | thisScope MG | User Access Administrator | 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 | Builtin | false | True | MS-PIM | n/a | f70514be-80e6-46e8-b985-ce72f5ee8e09 | SP APP EXT | direct | False | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/roleassignments/a4638306-2a51-41b7-bb64-2d5297a04046 | none | 04/27/2022 21:29:11 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | test01 | test01 | thisScope MG | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | n/a | n/a | 604ec94a-0860-478f-bc42-a2b599f1a505 | Unknown | direct | False | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/roleassignments/4cb5ad0a-366c-4dbd-804c-b4dce349e47f | none | 03/09/2022 16:37:12 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | test01 | test01 | thisScope MG | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | Joe Dalton | joe.dalton@AzGovViz.onmicrosoft.com | acf4c68f-7b15-4d70-935b-26116fc2426a | User Member | direct | False | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/roleassignments/a743ba10-46f5-4f1a-9d45-717d0c307c67 | none | 10/27/2021 14:29:28 | ObjectType: SP App EXT, ObjectDisplayName: Azure Management Groups, ObjectSignInName: n/a, ObjectId: 4870c99c-acfe-4210-9212-32949dc37c7a (r) | |||||||
Mg | test01 | test01 | thisScope MG | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | Calamity Jane | Calamity_Jane_AzGovViz.net#EXT#@AzGovViz.onmicrosoft.com | 43b0f5e7-cb78-4e1a-b3da-1239647dfb74 | User Guest | direct | False | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/roleassignments/45462efa-a1a1-42b6-8d51-566171d6835a | none | 04/27/2022 21:30:12 | ObjectType: SP APP EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: f70514be-80e6-46e8-b985-ce72f5ee8e09 | |||||||
Mg | test01 | test01 | thisScope MG | Contributor | b24988ac-6180-42a0-ab88-20f7382dd24c | Builtin | false | False | 1234-SubOwner | n/a | 7d6d814f-5955-4ec8-ae38-f5211298aa2f | Group | direct | 1 (Usr: 1, Grp: 0, SP: 0) | False | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/roleassignments/ecf57eea-35ef-4c1f-88af-d1480b3c05eb | none | 03/10/2022 08:09:07 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | ||||||
Mg | test01 | test01 | thisScope MG | Contributor | b24988ac-6180-42a0-ab88-20f7382dd24c | Builtin | false | False | Jack Dalton | JackDalton@AzGovViz.onmicrosoft.com | c64d2776-a210-428f-b54f-a4a5dd7f8ef8 | User Member | indirect | 1234-SubOwner (7d6d814f-5955-4ec8-ae38-f5211298aa2f) | 1 (Usr: 1, Grp: 0, SP: 0) | False | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/roleassignments/ecf57eea-35ef-4c1f-88af-d1480b3c05eb | none | 03/10/2022 08:09:07 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||
Mg | test01 | test01 | thisScope MG | 1234 RoleAssignmentSubscriptionOwner | 1ee892e0-67a1-4b4c-b171-8c3a371692a9 | Custom | false | True | 1b5ac3236f0246ef83a14435 | n/a | 04b9b3f5-86a7-48cf-85fd-cce9468568db | SP MI Sys | direct | False | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/roleassignments/ac53ad94-7450-4fc1-bc27-fd42de78a1be | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/policyassignments/1b5ac3236f0246ef83a14435 (1234_AP_MG_RA_onSub) | 03/10/2022 15:03:14 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | test01 | test01 | thisScope MG | 1234 RoleAssignmentSubscriptionOwner | 1ee892e0-67a1-4b4c-b171-8c3a371692a9 | Custom | false | True | a2d9426ccece4000b889c72f | n/a | 405b7ca3-fe93-4dfa-b70a-837eef12bfe7 | SP MI Sys | direct | False | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/roleassignments/3d2ad3f2-61bf-40b1-9ae5-ce752e781054 | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/policyassignments/a2d9426ccece4000b889c72f (1234_AP_MG_RA_onSub) | 03/10/2022 13:33:47 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | test01 | test01 | thisScope MG | 1234 RoleAssignmentSubscriptionOwner | 1ee892e0-67a1-4b4c-b171-8c3a371692a9 | Custom | false | True | abe0212187e243e89ce5a623 | n/a | 41d30710-9d12-4361-ad69-ad313b2c427c | SP MI Sys | direct | False | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/roleassignments/3a86f501-86d7-44ea-83fb-6971a44ed3b3 | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/policyassignments/abe0212187e243e89ce5a623 (My_AP_MG_raOnSub) | 03/11/2022 07:44:51 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | test01 | test01 | thisScope MG | 1234 RoleAssignmentSubscriptionOwner | 1ee892e0-67a1-4b4c-b171-8c3a371692a9 | Custom | false | True | 5f9ec45db52f479e940fc150 | n/a | 84a55248-e141-4ea6-b6ad-23791f5e8980 | SP MI Sys | direct | False | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/roleassignments/3d2ad3f2-61bf-40b1-9ae5-ce752e78104a | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/policyassignments/5f9ec45db52f479e940fc150 (1234_AP_MG_RA_onSub) | 03/10/2022 13:32:32 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH-decommissioned | ESJH-decommissioned | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Resource Policy Contributor | 36243c78-bf99-498c-9df9-86d9f8d28608 | Builtin | false | False | PolicyPipeline | n/a | 90003bac-487c-4351-ad41-ed1f9e0446c1 | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/132f37b3-0aca-4e26-b71b-bcdde7a981ea | none | 10/27/2021 11:18:15 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH-decommissioned | ESJH-decommissioned | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | AzOps | n/a | c295384a-33d9-475e-abaf-d2fb0274299a | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/30e36b53-bc6c-412b-a026-96fe7527e27b | none | 07/06/2021 12:42:21 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH-decommissioned | ESJH-decommissioned | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | Joe Dalton | joe.dalton@AzGovViz.onmicrosoft.com | acf4c68f-7b15-4d70-935b-26116fc2426a | User Member | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/eda95ae6-8581-4558-b3b9-b3cd05cce33d | none | 06/16/2021 13:58:07 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH-decommissioned | ESJH-decommissioned | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | AzGovVizSPARK | n/a | 527c7ca6-7a74-4b5d-bde2-7465ebb9915a | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/78ff5f82-18d1-4cb8-be40-cb046f39e5ac | none | 02/15/2022 14:42:34 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH-decommissioned | ESJH-decommissioned | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | AzAdServicePrincipalInsights | n/a | 59acc082-8e28-485e-8897-d2a17e03ed50 | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/c6b7a239-63bf-48a6-921e-aa0e1628a702 | none | 09/28/2021 06:26:08 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH-decommissioned | ESJH-decommissioned | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | miCentral001 | n/a | 619f894b-1c1b-4f43-8e7f-9e4d32ffefe1 | SP MI Usr | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/11f78fac-cce2-4278-9364-f84c3c43ae04 | none | 01/07/2022 16:52:53 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH-decommissioned | ESJH-decommissioned | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | n/a | n/a | 638032a0-ff4a-462f-a53b-b99c4cf82964 | Unknown | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/5160c1ae-ab7b-41ac-b57c-a4f618aaf8b8 | none | 02/15/2022 12:56:13 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH-decommissioned | ESJH-decommissioned | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | azgovvizADO | n/a | 8a2f188e-5b60-45f1-b0c6-12cd0e59576e | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/11337883-af36-4131-a7c3-8dd5ce47b4eb | none | 05/19/2022 15:36:50 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH-decommissioned | ESJH-decommissioned | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | Joe Dalton | julian.hayward_yahoo.de#EXT#@AzGovViz.onmicrosoft.com | 9ef38e0f-5e7b-4ac5-8b0c-3635ac3c7ff4 | User Guest | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/0c4b9ba3-fc34-448e-beb0-d4baa7037562 | none | 09/24/2022 06:23:37 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH-decommissioned | ESJH-decommissioned | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | Jack Dalton | JackDalton@AzGovViz.onmicrosoft.com | c64d2776-a210-428f-b54f-a4a5dd7f8ef8 | User Member | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/2df03e9d-a1e3-41f5-a95e-efb2b4641f04 | none | 07/19/2021 19:38:25 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH-decommissioned | ESJH-decommissioned | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | azgovvizwwcsecurity | n/a | e261446e-77d2-4cf5-a32a-0fbef8ee1333 | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/d7973c31-e58a-4af7-bbcb-a4bac69ba141 | none | 04/27/2021 16:53:55 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH-decommissioned | ESJH-decommissioned | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | AzGovVizAzDO | n/a | efc7b786-0bc9-4d41-aacd-6a54d16f7229 | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/c886cc3a-0d4c-45b6-af8b-fbfc4f8a4c06 | none | 05/21/2022 06:31:10 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH-decommissioned | ESJH-decommissioned | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | azgvzGH | n/a | f20c11bb-119b-4914-abaa-99df52ef4f09 | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/7a09194c-13ca-4647-bb5e-da538b45f5e0 | none | 01/15/2022 16:26:49 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH-decommissioned | ESJH-decommissioned | inherited ESJH | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | Deploy-VM-Monitoring | n/a | 065dde0b-5eab-4fce-80ee-ec956e94c498 | SP MI Sys | direct | False | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/5d92332d-fe07-5cef-9c6b-33e5025d6374 | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-vm-monitoring (Legacy - Enable Azure Monitor for VMs) | 01/10/2021 21:00:47 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||||
Mg | ESJH-decommissioned | ESJH-decommissioned | inherited ESJH | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | Deploy-AzActivity-Log | n/a | 1691aa06-da2e-43f0-98f9-af12494603a9 | SP MI Sys | direct | False | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/e5ac6b58-4f31-5956-9082-78d97ba2453e | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-azactivity-log (Deploy Diagnostic Settings for Activity Log to Log Analytics workspace) | 01/10/2021 21:00:50 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||||
Mg | ESJH-decommissioned | ESJH-decommissioned | inherited ESJH | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | Deploy-ASC-Security | n/a | 4cb4c797-237b-4e64-b2cf-66f841700442 | SP MI Sys | direct | False | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/538e5329-7b5d-511f-8c05-9c7c32dab0bf | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-asc-security (Deploy Azure Defender settings in Azure Security Center.) | 01/10/2021 21:00:50 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||||
Mg | ESJH-decommissioned | ESJH-decommissioned | inherited ESJH | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | ESDeploymentAccount | ESDeploymentAccount@AzGovViz.onmicrosoft.com | b790b1e1-6f46-488b-8c5a-708b0db9a149 | User Member | direct | False | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/f8d8ca86-6fdf-4ad5-b801-5e1b3eba3171 | none | 01/10/2021 20:55:50 | ObjectType: SP App EXT, ObjectDisplayName: Azure Management Groups, ObjectSignInName: n/a, ObjectId: 4870c99c-acfe-4210-9212-32949dc37c7a (r) | |||||||
Mg | ESJH-decommissioned | ESJH-decommissioned | inherited ESJH | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | enforce0 | n/a | 79d69f2f-2fbe-409e-84c3-3e510c18fd16 | SP MI Sys | direct | False | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/b429c46d-6843-4a51-a74e-8a484de47815 | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/enforce0 (Enforce Role assignment at Subscription Scope) | 03/16/2022 23:57:25 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH-decommissioned | ESJH-decommissioned | inherited ESJH | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | Deploy-LX-Arc-Monitoring | n/a | 9ed01b2b-9311-41a8-8897-0a329047be49 | SP MI Sys | direct | False | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/ddc0ff3c-a3d0-5d5b-ba19-116b6572acbf | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-lx-arc-monitoring (Configure Log Analytics extension on Azure Arc enabled Linux servers. See deprecation notice below) | 01/10/2021 21:00:47 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||||
Mg | ESJH-decommissioned | ESJH-decommissioned | inherited ESJH | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | Deploy-VMSS-Monitoring | n/a | a3a4908f-b068-455e-a3f5-38cc5e00448f | SP MI Sys | direct | False | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/2d361fa3-7bd4-5234-9b12-1f54afa65870 | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-vmss-monitoring (Legacy - Enable Azure Monitor for Virtual Machine Scale Sets) | 01/10/2021 21:00:50 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||||
Mg | ESJH-decommissioned | ESJH-decommissioned | inherited ESJH | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | Deploy-WS-Arc-Monitoring | n/a | b0bdcb08-09c9-4d9d-957e-963d255e7220 | SP MI Sys | direct | False | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/38abf737-131b-52a2-90da-78943675bfed | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-ws-arc-monitoring (Configure Log Analytics extension on Azure Arc enabled Windows servers) | 01/10/2021 21:00:50 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||||
Mg | ESJH-decommissioned | ESJH-decommissioned | inherited ESJH | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | Deploy-Resource-Diag | n/a | e51576ad-748d-462b-9d70-cb3b03e6c2e6 | SP MI Sys | direct | False | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/45afca7b-a696-5947-a47f-960081dd1dbc | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-resource-diag (Deploy Diagnostic Settings to Azure Services) | 01/10/2021 21:00:47 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||||
Ten | ESJH-decommissioned | ESJH-decommissioned | inherited Tenant | User Access Administrator | 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 | Builtin | false | True | Joe Dalton | joe.dalton@AzGovViz.onmicrosoft.com | acf4c68f-7b15-4d70-935b-26116fc2426a | User Member | direct | False | /providers/microsoft.authorization/roleassignments/0c3ffd6f-942d-433d-8abd-2d0d7f4383e1 | none | 01/10/2021 20:27:23 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Ten | ESJH-decommissioned | ESJH-decommissioned | inherited Tenant | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | ESDeploymentAccount | ESDeploymentAccount@AzGovViz.onmicrosoft.com | b790b1e1-6f46-488b-8c5a-708b0db9a149 | User Member | direct | False | /providers/microsoft.authorization/roleassignments/6c236776-529f-4132-b034-e399e1cd1a99 | none | 01/10/2021 20:51:03 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH-decommissioned | ESJH-decommissioned | thisScope MG | Security Reader | 39bc4728-0917-49c7-9d2c-d95423bc2eb4 | Builtin | false | False | Jesse James | Jesse.James@AzGovViz.onmicrosoft.com | 6f71f3b7-98e1-4821-8116-13b41476ef84 | User Member | direct | False | /providers/microsoft.management/managementgroups/esjh-decommissioned/providers/microsoft.authorization/roleassignments/9bdf3098-8e69-4e98-bd8c-22b991783b10 | none | 06/16/2021 09:52:59 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH-decommissioned | ESJH-decommissioned | thisScope MG | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | ESDeploymentAccount | ESDeploymentAccount@AzGovViz.onmicrosoft.com | b790b1e1-6f46-488b-8c5a-708b0db9a149 | User Member | direct | False | /providers/microsoft.management/managementgroups/esjh-decommissioned/providers/microsoft.authorization/roleassignments/81bb9ace-a96d-47ab-b9a2-8952e655aa0c | none | 01/10/2021 20:56:27 | ObjectType: SP App EXT, ObjectDisplayName: Azure Management Groups, ObjectSignInName: n/a, ObjectId: 4870c99c-acfe-4210-9212-32949dc37c7a (r) | |||||||
Mg | ESJH-landingzones | ESJH-landingzones | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Resource Policy Contributor | 36243c78-bf99-498c-9df9-86d9f8d28608 | Builtin | false | False | PolicyPipeline | n/a | 90003bac-487c-4351-ad41-ed1f9e0446c1 | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/132f37b3-0aca-4e26-b71b-bcdde7a981ea | none | 10/27/2021 11:18:15 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH-landingzones | ESJH-landingzones | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | AzOps | n/a | c295384a-33d9-475e-abaf-d2fb0274299a | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/30e36b53-bc6c-412b-a026-96fe7527e27b | none | 07/06/2021 12:42:21 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH-landingzones | ESJH-landingzones | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | Joe Dalton | joe.dalton@AzGovViz.onmicrosoft.com | acf4c68f-7b15-4d70-935b-26116fc2426a | User Member | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/eda95ae6-8581-4558-b3b9-b3cd05cce33d | none | 06/16/2021 13:58:07 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH-landingzones | ESJH-landingzones | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | AzGovVizSPARK | n/a | 527c7ca6-7a74-4b5d-bde2-7465ebb9915a | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/78ff5f82-18d1-4cb8-be40-cb046f39e5ac | none | 02/15/2022 14:42:34 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH-landingzones | ESJH-landingzones | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | AzAdServicePrincipalInsights | n/a | 59acc082-8e28-485e-8897-d2a17e03ed50 | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/c6b7a239-63bf-48a6-921e-aa0e1628a702 | none | 09/28/2021 06:26:08 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH-landingzones | ESJH-landingzones | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | miCentral001 | n/a | 619f894b-1c1b-4f43-8e7f-9e4d32ffefe1 | SP MI Usr | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/11f78fac-cce2-4278-9364-f84c3c43ae04 | none | 01/07/2022 16:52:53 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH-landingzones | ESJH-landingzones | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | n/a | n/a | 638032a0-ff4a-462f-a53b-b99c4cf82964 | Unknown | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/5160c1ae-ab7b-41ac-b57c-a4f618aaf8b8 | none | 02/15/2022 12:56:13 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH-landingzones | ESJH-landingzones | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | azgovvizADO | n/a | 8a2f188e-5b60-45f1-b0c6-12cd0e59576e | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/11337883-af36-4131-a7c3-8dd5ce47b4eb | none | 05/19/2022 15:36:50 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH-landingzones | ESJH-landingzones | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | Joe Dalton | julian.hayward_yahoo.de#EXT#@AzGovViz.onmicrosoft.com | 9ef38e0f-5e7b-4ac5-8b0c-3635ac3c7ff4 | User Guest | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/0c4b9ba3-fc34-448e-beb0-d4baa7037562 | none | 09/24/2022 06:23:37 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH-landingzones | ESJH-landingzones | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | Jack Dalton | JackDalton@AzGovViz.onmicrosoft.com | c64d2776-a210-428f-b54f-a4a5dd7f8ef8 | User Member | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/2df03e9d-a1e3-41f5-a95e-efb2b4641f04 | none | 07/19/2021 19:38:25 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH-landingzones | ESJH-landingzones | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | azgovvizwwcsecurity | n/a | e261446e-77d2-4cf5-a32a-0fbef8ee1333 | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/d7973c31-e58a-4af7-bbcb-a4bac69ba141 | none | 04/27/2021 16:53:55 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH-landingzones | ESJH-landingzones | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | AzGovVizAzDO | n/a | efc7b786-0bc9-4d41-aacd-6a54d16f7229 | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/c886cc3a-0d4c-45b6-af8b-fbfc4f8a4c06 | none | 05/21/2022 06:31:10 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH-landingzones | ESJH-landingzones | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | azgvzGH | n/a | f20c11bb-119b-4914-abaa-99df52ef4f09 | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/7a09194c-13ca-4647-bb5e-da538b45f5e0 | none | 01/15/2022 16:26:49 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH-landingzones | ESJH-landingzones | inherited ESJH | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | Deploy-VM-Monitoring | n/a | 065dde0b-5eab-4fce-80ee-ec956e94c498 | SP MI Sys | direct | False | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/5d92332d-fe07-5cef-9c6b-33e5025d6374 | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-vm-monitoring (Legacy - Enable Azure Monitor for VMs) | 01/10/2021 21:00:47 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||||
Mg | ESJH-landingzones | ESJH-landingzones | inherited ESJH | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | Deploy-AzActivity-Log | n/a | 1691aa06-da2e-43f0-98f9-af12494603a9 | SP MI Sys | direct | False | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/e5ac6b58-4f31-5956-9082-78d97ba2453e | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-azactivity-log (Deploy Diagnostic Settings for Activity Log to Log Analytics workspace) | 01/10/2021 21:00:50 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||||
Mg | ESJH-landingzones | ESJH-landingzones | inherited ESJH | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | Deploy-ASC-Security | n/a | 4cb4c797-237b-4e64-b2cf-66f841700442 | SP MI Sys | direct | False | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/538e5329-7b5d-511f-8c05-9c7c32dab0bf | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-asc-security (Deploy Azure Defender settings in Azure Security Center.) | 01/10/2021 21:00:50 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||||
Mg | ESJH-landingzones | ESJH-landingzones | inherited ESJH | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | ESDeploymentAccount | ESDeploymentAccount@AzGovViz.onmicrosoft.com | b790b1e1-6f46-488b-8c5a-708b0db9a149 | User Member | direct | False | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/f8d8ca86-6fdf-4ad5-b801-5e1b3eba3171 | none | 01/10/2021 20:55:50 | ObjectType: SP App EXT, ObjectDisplayName: Azure Management Groups, ObjectSignInName: n/a, ObjectId: 4870c99c-acfe-4210-9212-32949dc37c7a (r) | |||||||
Mg | ESJH-landingzones | ESJH-landingzones | inherited ESJH | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | enforce0 | n/a | 79d69f2f-2fbe-409e-84c3-3e510c18fd16 | SP MI Sys | direct | False | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/b429c46d-6843-4a51-a74e-8a484de47815 | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/enforce0 (Enforce Role assignment at Subscription Scope) | 03/16/2022 23:57:25 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH-landingzones | ESJH-landingzones | inherited ESJH | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | Deploy-LX-Arc-Monitoring | n/a | 9ed01b2b-9311-41a8-8897-0a329047be49 | SP MI Sys | direct | False | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/ddc0ff3c-a3d0-5d5b-ba19-116b6572acbf | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-lx-arc-monitoring (Configure Log Analytics extension on Azure Arc enabled Linux servers. See deprecation notice below) | 01/10/2021 21:00:47 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||||
Mg | ESJH-landingzones | ESJH-landingzones | inherited ESJH | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | Deploy-VMSS-Monitoring | n/a | a3a4908f-b068-455e-a3f5-38cc5e00448f | SP MI Sys | direct | False | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/2d361fa3-7bd4-5234-9b12-1f54afa65870 | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-vmss-monitoring (Legacy - Enable Azure Monitor for Virtual Machine Scale Sets) | 01/10/2021 21:00:50 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||||
Mg | ESJH-landingzones | ESJH-landingzones | inherited ESJH | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | Deploy-WS-Arc-Monitoring | n/a | b0bdcb08-09c9-4d9d-957e-963d255e7220 | SP MI Sys | direct | False | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/38abf737-131b-52a2-90da-78943675bfed | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-ws-arc-monitoring (Configure Log Analytics extension on Azure Arc enabled Windows servers) | 01/10/2021 21:00:50 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||||
Mg | ESJH-landingzones | ESJH-landingzones | inherited ESJH | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | Deploy-Resource-Diag | n/a | e51576ad-748d-462b-9d70-cb3b03e6c2e6 | SP MI Sys | direct | False | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/45afca7b-a696-5947-a47f-960081dd1dbc | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-resource-diag (Deploy Diagnostic Settings to Azure Services) | 01/10/2021 21:00:47 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||||
Ten | ESJH-landingzones | ESJH-landingzones | inherited Tenant | User Access Administrator | 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 | Builtin | false | True | Joe Dalton | joe.dalton@AzGovViz.onmicrosoft.com | acf4c68f-7b15-4d70-935b-26116fc2426a | User Member | direct | False | /providers/microsoft.authorization/roleassignments/0c3ffd6f-942d-433d-8abd-2d0d7f4383e1 | none | 01/10/2021 20:27:23 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Ten | ESJH-landingzones | ESJH-landingzones | inherited Tenant | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | ESDeploymentAccount | ESDeploymentAccount@AzGovViz.onmicrosoft.com | b790b1e1-6f46-488b-8c5a-708b0db9a149 | User Member | direct | False | /providers/microsoft.authorization/roleassignments/6c236776-529f-4132-b034-e399e1cd1a99 | none | 01/10/2021 20:51:03 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH-landingzones | ESJH-landingzones | thisScope MG | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | Enforce-SQL-Encryption | n/a | 34520a11-7b14-46a8-ac34-7d766959460a | SP MI Sys | direct | False | /providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/roleassignments/3df334e6-61c3-543a-b548-97586caf6d4f | /providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/policyassignments/enforce-sql-encryption (Deploy SQL DB transparent data encryption) | 01/10/2021 20:58:36 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||||
Mg | ESJH-landingzones | ESJH-landingzones | thisScope MG | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | Deploy-SQL-DB-Auditing | n/a | 4f3a2551-ea2f-43c6-9623-8950156d19b7 | SP MI Sys | direct | False | /providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/roleassignments/8085d5e6-c291-571e-bd96-a2eb4769f9e6 | /providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/policyassignments/deploy-sql-db-auditing (Auditing on SQL server should be enabled) | 01/10/2021 20:58:39 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||||
Mg | ESJH-landingzones | ESJH-landingzones | thisScope MG | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | ESDeploymentAccount | ESDeploymentAccount@AzGovViz.onmicrosoft.com | b790b1e1-6f46-488b-8c5a-708b0db9a149 | User Member | direct | False | /providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/roleassignments/093ad67e-4eae-4536-aa0b-da4e09b47d88 | none | 01/10/2021 20:56:27 | ObjectType: SP App EXT, ObjectDisplayName: Azure Management Groups, ObjectSignInName: n/a, ObjectId: 4870c99c-acfe-4210-9212-32949dc37c7a (r) | |||||||
Mg | ESJH-landingzones | ESJH-landingzones | thisScope MG | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | Deploy-VM-Backup | n/a | e2511ca5-bcb3-4dbd-9d91-c18590c2a9d2 | SP MI Sys | direct | False | /providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/roleassignments/70486d4a-1ee2-5f70-bb58-b3bd79840ae5 | /providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/policyassignments/deploy-vm-backup (Configure backup on virtual machines without a given tag to a new recovery services vault with a default policy) | 01/10/2021 20:58:36 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||||
Mg | ESJH-landingzones | ESJH-landingzones | thisScope MG | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | Deploy-AKS-Policy | n/a | fb0a7498-393f-434d-aa93-2acd144f489f | SP MI Sys | direct | False | /providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/roleassignments/4f80e55d-446d-5743-a173-5d189d196345 | /providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/policyassignments/deploy-aks-policy (Deploy Azure Policy Add-on to Azure Kubernetes Service clusters) | 01/10/2021 20:58:39 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||||
Mg | ESJH-landingzones | ESJH-landingzones | thisScope MG | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | Calamity Jane | Calamity_Jane_AzGovViz.net#EXT#@AzGovViz.onmicrosoft.com | 43b0f5e7-cb78-4e1a-b3da-1239647dfb74 | User Guest | indirect | 3rdPartyStaff (cb036073-f86b-46e1-9726-1eaccb62a678) | 1 (Usr: 1, Grp: 0, SP: 0) | False | /providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/roleassignments/3b6291a1-fc61-41d8-abff-43d04e35be62 | none | 01/25/2021 22:02:49 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||
Mg | ESJH-landingzones | ESJH-landingzones | thisScope MG | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | 3rdPartyStaff | n/a | cb036073-f86b-46e1-9726-1eaccb62a678 | Group | direct | 1 (Usr: 1, Grp: 0, SP: 0) | False | /providers/microsoft.management/managementgroups/esjh-landingzones/providers/microsoft.authorization/roleassignments/3b6291a1-fc61-41d8-abff-43d04e35be62 | none | 01/25/2021 22:02:49 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | ||||||
Mg | ESJH-platform | ESJH-platform | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Resource Policy Contributor | 36243c78-bf99-498c-9df9-86d9f8d28608 | Builtin | false | False | PolicyPipeline | n/a | 90003bac-487c-4351-ad41-ed1f9e0446c1 | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/132f37b3-0aca-4e26-b71b-bcdde7a981ea | none | 10/27/2021 11:18:15 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH-platform | ESJH-platform | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | AzOps | n/a | c295384a-33d9-475e-abaf-d2fb0274299a | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/30e36b53-bc6c-412b-a026-96fe7527e27b | none | 07/06/2021 12:42:21 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH-platform | ESJH-platform | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | Joe Dalton | joe.dalton@AzGovViz.onmicrosoft.com | acf4c68f-7b15-4d70-935b-26116fc2426a | User Member | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/eda95ae6-8581-4558-b3b9-b3cd05cce33d | none | 06/16/2021 13:58:07 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH-platform | ESJH-platform | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | AzGovVizSPARK | n/a | 527c7ca6-7a74-4b5d-bde2-7465ebb9915a | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/78ff5f82-18d1-4cb8-be40-cb046f39e5ac | none | 02/15/2022 14:42:34 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH-platform | ESJH-platform | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | AzAdServicePrincipalInsights | n/a | 59acc082-8e28-485e-8897-d2a17e03ed50 | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/c6b7a239-63bf-48a6-921e-aa0e1628a702 | none | 09/28/2021 06:26:08 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH-platform | ESJH-platform | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | miCentral001 | n/a | 619f894b-1c1b-4f43-8e7f-9e4d32ffefe1 | SP MI Usr | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/11f78fac-cce2-4278-9364-f84c3c43ae04 | none | 01/07/2022 16:52:53 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH-platform | ESJH-platform | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | n/a | n/a | 638032a0-ff4a-462f-a53b-b99c4cf82964 | Unknown | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/5160c1ae-ab7b-41ac-b57c-a4f618aaf8b8 | none | 02/15/2022 12:56:13 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH-platform | ESJH-platform | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | azgovvizADO | n/a | 8a2f188e-5b60-45f1-b0c6-12cd0e59576e | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/11337883-af36-4131-a7c3-8dd5ce47b4eb | none | 05/19/2022 15:36:50 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH-platform | ESJH-platform | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | Joe Dalton | julian.hayward_yahoo.de#EXT#@AzGovViz.onmicrosoft.com | 9ef38e0f-5e7b-4ac5-8b0c-3635ac3c7ff4 | User Guest | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/0c4b9ba3-fc34-448e-beb0-d4baa7037562 | none | 09/24/2022 06:23:37 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH-platform | ESJH-platform | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | Jack Dalton | JackDalton@AzGovViz.onmicrosoft.com | c64d2776-a210-428f-b54f-a4a5dd7f8ef8 | User Member | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/2df03e9d-a1e3-41f5-a95e-efb2b4641f04 | none | 07/19/2021 19:38:25 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH-platform | ESJH-platform | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | azgovvizwwcsecurity | n/a | e261446e-77d2-4cf5-a32a-0fbef8ee1333 | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/d7973c31-e58a-4af7-bbcb-a4bac69ba141 | none | 04/27/2021 16:53:55 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH-platform | ESJH-platform | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | AzGovVizAzDO | n/a | efc7b786-0bc9-4d41-aacd-6a54d16f7229 | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/c886cc3a-0d4c-45b6-af8b-fbfc4f8a4c06 | none | 05/21/2022 06:31:10 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH-platform | ESJH-platform | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | azgvzGH | n/a | f20c11bb-119b-4914-abaa-99df52ef4f09 | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/7a09194c-13ca-4647-bb5e-da538b45f5e0 | none | 01/15/2022 16:26:49 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH-platform | ESJH-platform | inherited ESJH | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | Deploy-VM-Monitoring | n/a | 065dde0b-5eab-4fce-80ee-ec956e94c498 | SP MI Sys | direct | False | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/5d92332d-fe07-5cef-9c6b-33e5025d6374 | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-vm-monitoring (Legacy - Enable Azure Monitor for VMs) | 01/10/2021 21:00:47 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||||
Mg | ESJH-platform | ESJH-platform | inherited ESJH | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | Deploy-AzActivity-Log | n/a | 1691aa06-da2e-43f0-98f9-af12494603a9 | SP MI Sys | direct | False | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/e5ac6b58-4f31-5956-9082-78d97ba2453e | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-azactivity-log (Deploy Diagnostic Settings for Activity Log to Log Analytics workspace) | 01/10/2021 21:00:50 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||||
Mg | ESJH-platform | ESJH-platform | inherited ESJH | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | Deploy-ASC-Security | n/a | 4cb4c797-237b-4e64-b2cf-66f841700442 | SP MI Sys | direct | False | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/538e5329-7b5d-511f-8c05-9c7c32dab0bf | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-asc-security (Deploy Azure Defender settings in Azure Security Center.) | 01/10/2021 21:00:50 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||||
Mg | ESJH-platform | ESJH-platform | inherited ESJH | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | ESDeploymentAccount | ESDeploymentAccount@AzGovViz.onmicrosoft.com | b790b1e1-6f46-488b-8c5a-708b0db9a149 | User Member | direct | False | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/f8d8ca86-6fdf-4ad5-b801-5e1b3eba3171 | none | 01/10/2021 20:55:50 | ObjectType: SP App EXT, ObjectDisplayName: Azure Management Groups, ObjectSignInName: n/a, ObjectId: 4870c99c-acfe-4210-9212-32949dc37c7a (r) | |||||||
Mg | ESJH-platform | ESJH-platform | inherited ESJH | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | enforce0 | n/a | 79d69f2f-2fbe-409e-84c3-3e510c18fd16 | SP MI Sys | direct | False | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/b429c46d-6843-4a51-a74e-8a484de47815 | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/enforce0 (Enforce Role assignment at Subscription Scope) | 03/16/2022 23:57:25 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH-platform | ESJH-platform | inherited ESJH | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | Deploy-LX-Arc-Monitoring | n/a | 9ed01b2b-9311-41a8-8897-0a329047be49 | SP MI Sys | direct | False | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/ddc0ff3c-a3d0-5d5b-ba19-116b6572acbf | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-lx-arc-monitoring (Configure Log Analytics extension on Azure Arc enabled Linux servers. See deprecation notice below) | 01/10/2021 21:00:47 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||||
Mg | ESJH-platform | ESJH-platform | inherited ESJH | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | Deploy-VMSS-Monitoring | n/a | a3a4908f-b068-455e-a3f5-38cc5e00448f | SP MI Sys | direct | False | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/2d361fa3-7bd4-5234-9b12-1f54afa65870 | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-vmss-monitoring (Legacy - Enable Azure Monitor for Virtual Machine Scale Sets) | 01/10/2021 21:00:50 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||||
Mg | ESJH-platform | ESJH-platform | inherited ESJH | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | Deploy-WS-Arc-Monitoring | n/a | b0bdcb08-09c9-4d9d-957e-963d255e7220 | SP MI Sys | direct | False | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/38abf737-131b-52a2-90da-78943675bfed | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-ws-arc-monitoring (Configure Log Analytics extension on Azure Arc enabled Windows servers) | 01/10/2021 21:00:50 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||||
Mg | ESJH-platform | ESJH-platform | inherited ESJH | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | Deploy-Resource-Diag | n/a | e51576ad-748d-462b-9d70-cb3b03e6c2e6 | SP MI Sys | direct | False | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/45afca7b-a696-5947-a47f-960081dd1dbc | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-resource-diag (Deploy Diagnostic Settings to Azure Services) | 01/10/2021 21:00:47 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||||
Ten | ESJH-platform | ESJH-platform | inherited Tenant | User Access Administrator | 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 | Builtin | false | True | Joe Dalton | joe.dalton@AzGovViz.onmicrosoft.com | acf4c68f-7b15-4d70-935b-26116fc2426a | User Member | direct | False | /providers/microsoft.authorization/roleassignments/0c3ffd6f-942d-433d-8abd-2d0d7f4383e1 | none | 01/10/2021 20:27:23 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Ten | ESJH-platform | ESJH-platform | inherited Tenant | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | ESDeploymentAccount | ESDeploymentAccount@AzGovViz.onmicrosoft.com | b790b1e1-6f46-488b-8c5a-708b0db9a149 | User Member | direct | False | /providers/microsoft.authorization/roleassignments/6c236776-529f-4132-b034-e399e1cd1a99 | none | 01/10/2021 20:51:03 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH-platform | ESJH-platform | thisScope MG | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | ESDeploymentAccount | ESDeploymentAccount@AzGovViz.onmicrosoft.com | b790b1e1-6f46-488b-8c5a-708b0db9a149 | User Member | direct | False | /providers/microsoft.management/managementgroups/esjh-platform/providers/microsoft.authorization/roleassignments/243cb616-b890-4197-bc2e-98b966ba39f5 | none | 01/10/2021 20:56:28 | ObjectType: SP App EXT, ObjectDisplayName: Azure Management Groups, ObjectSignInName: n/a, ObjectId: 4870c99c-acfe-4210-9212-32949dc37c7a (r) | |||||||
Mg | ESJH-sandboxes | ESJH-sandboxes | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Resource Policy Contributor | 36243c78-bf99-498c-9df9-86d9f8d28608 | Builtin | false | False | PolicyPipeline | n/a | 90003bac-487c-4351-ad41-ed1f9e0446c1 | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/132f37b3-0aca-4e26-b71b-bcdde7a981ea | none | 10/27/2021 11:18:15 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH-sandboxes | ESJH-sandboxes | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | AzOps | n/a | c295384a-33d9-475e-abaf-d2fb0274299a | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/30e36b53-bc6c-412b-a026-96fe7527e27b | none | 07/06/2021 12:42:21 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH-sandboxes | ESJH-sandboxes | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | Joe Dalton | joe.dalton@AzGovViz.onmicrosoft.com | acf4c68f-7b15-4d70-935b-26116fc2426a | User Member | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/eda95ae6-8581-4558-b3b9-b3cd05cce33d | none | 06/16/2021 13:58:07 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH-sandboxes | ESJH-sandboxes | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | AzGovVizSPARK | n/a | 527c7ca6-7a74-4b5d-bde2-7465ebb9915a | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/78ff5f82-18d1-4cb8-be40-cb046f39e5ac | none | 02/15/2022 14:42:34 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH-sandboxes | ESJH-sandboxes | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | AzAdServicePrincipalInsights | n/a | 59acc082-8e28-485e-8897-d2a17e03ed50 | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/c6b7a239-63bf-48a6-921e-aa0e1628a702 | none | 09/28/2021 06:26:08 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH-sandboxes | ESJH-sandboxes | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | miCentral001 | n/a | 619f894b-1c1b-4f43-8e7f-9e4d32ffefe1 | SP MI Usr | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/11f78fac-cce2-4278-9364-f84c3c43ae04 | none | 01/07/2022 16:52:53 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH-sandboxes | ESJH-sandboxes | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | n/a | n/a | 638032a0-ff4a-462f-a53b-b99c4cf82964 | Unknown | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/5160c1ae-ab7b-41ac-b57c-a4f618aaf8b8 | none | 02/15/2022 12:56:13 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH-sandboxes | ESJH-sandboxes | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | azgovvizADO | n/a | 8a2f188e-5b60-45f1-b0c6-12cd0e59576e | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/11337883-af36-4131-a7c3-8dd5ce47b4eb | none | 05/19/2022 15:36:50 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH-sandboxes | ESJH-sandboxes | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | Joe Dalton | julian.hayward_yahoo.de#EXT#@AzGovViz.onmicrosoft.com | 9ef38e0f-5e7b-4ac5-8b0c-3635ac3c7ff4 | User Guest | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/0c4b9ba3-fc34-448e-beb0-d4baa7037562 | none | 09/24/2022 06:23:37 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH-sandboxes | ESJH-sandboxes | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | Jack Dalton | JackDalton@AzGovViz.onmicrosoft.com | c64d2776-a210-428f-b54f-a4a5dd7f8ef8 | User Member | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/2df03e9d-a1e3-41f5-a95e-efb2b4641f04 | none | 07/19/2021 19:38:25 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH-sandboxes | ESJH-sandboxes | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | azgovvizwwcsecurity | n/a | e261446e-77d2-4cf5-a32a-0fbef8ee1333 | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/d7973c31-e58a-4af7-bbcb-a4bac69ba141 | none | 04/27/2021 16:53:55 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH-sandboxes | ESJH-sandboxes | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | AzGovVizAzDO | n/a | efc7b786-0bc9-4d41-aacd-6a54d16f7229 | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/c886cc3a-0d4c-45b6-af8b-fbfc4f8a4c06 | none | 05/21/2022 06:31:10 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH-sandboxes | ESJH-sandboxes | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | azgvzGH | n/a | f20c11bb-119b-4914-abaa-99df52ef4f09 | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/7a09194c-13ca-4647-bb5e-da538b45f5e0 | none | 01/15/2022 16:26:49 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH-sandboxes | ESJH-sandboxes | inherited ESJH | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | Deploy-VM-Monitoring | n/a | 065dde0b-5eab-4fce-80ee-ec956e94c498 | SP MI Sys | direct | False | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/5d92332d-fe07-5cef-9c6b-33e5025d6374 | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-vm-monitoring (Legacy - Enable Azure Monitor for VMs) | 01/10/2021 21:00:47 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||||
Mg | ESJH-sandboxes | ESJH-sandboxes | inherited ESJH | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | Deploy-AzActivity-Log | n/a | 1691aa06-da2e-43f0-98f9-af12494603a9 | SP MI Sys | direct | False | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/e5ac6b58-4f31-5956-9082-78d97ba2453e | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-azactivity-log (Deploy Diagnostic Settings for Activity Log to Log Analytics workspace) | 01/10/2021 21:00:50 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||||
Mg | ESJH-sandboxes | ESJH-sandboxes | inherited ESJH | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | Deploy-ASC-Security | n/a | 4cb4c797-237b-4e64-b2cf-66f841700442 | SP MI Sys | direct | False | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/538e5329-7b5d-511f-8c05-9c7c32dab0bf | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-asc-security (Deploy Azure Defender settings in Azure Security Center.) | 01/10/2021 21:00:50 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||||
Mg | ESJH-sandboxes | ESJH-sandboxes | inherited ESJH | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | ESDeploymentAccount | ESDeploymentAccount@AzGovViz.onmicrosoft.com | b790b1e1-6f46-488b-8c5a-708b0db9a149 | User Member | direct | False | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/f8d8ca86-6fdf-4ad5-b801-5e1b3eba3171 | none | 01/10/2021 20:55:50 | ObjectType: SP App EXT, ObjectDisplayName: Azure Management Groups, ObjectSignInName: n/a, ObjectId: 4870c99c-acfe-4210-9212-32949dc37c7a (r) | |||||||
Mg | ESJH-sandboxes | ESJH-sandboxes | inherited ESJH | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | enforce0 | n/a | 79d69f2f-2fbe-409e-84c3-3e510c18fd16 | SP MI Sys | direct | False | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/b429c46d-6843-4a51-a74e-8a484de47815 | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/enforce0 (Enforce Role assignment at Subscription Scope) | 03/16/2022 23:57:25 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH-sandboxes | ESJH-sandboxes | inherited ESJH | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | Deploy-LX-Arc-Monitoring | n/a | 9ed01b2b-9311-41a8-8897-0a329047be49 | SP MI Sys | direct | False | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/ddc0ff3c-a3d0-5d5b-ba19-116b6572acbf | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-lx-arc-monitoring (Configure Log Analytics extension on Azure Arc enabled Linux servers. See deprecation notice below) | 01/10/2021 21:00:47 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||||
Mg | ESJH-sandboxes | ESJH-sandboxes | inherited ESJH | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | Deploy-VMSS-Monitoring | n/a | a3a4908f-b068-455e-a3f5-38cc5e00448f | SP MI Sys | direct | False | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/2d361fa3-7bd4-5234-9b12-1f54afa65870 | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-vmss-monitoring (Legacy - Enable Azure Monitor for Virtual Machine Scale Sets) | 01/10/2021 21:00:50 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||||
Mg | ESJH-sandboxes | ESJH-sandboxes | inherited ESJH | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | Deploy-WS-Arc-Monitoring | n/a | b0bdcb08-09c9-4d9d-957e-963d255e7220 | SP MI Sys | direct | False | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/38abf737-131b-52a2-90da-78943675bfed | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-ws-arc-monitoring (Configure Log Analytics extension on Azure Arc enabled Windows servers) | 01/10/2021 21:00:50 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||||
Mg | ESJH-sandboxes | ESJH-sandboxes | inherited ESJH | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | Deploy-Resource-Diag | n/a | e51576ad-748d-462b-9d70-cb3b03e6c2e6 | SP MI Sys | direct | False | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/45afca7b-a696-5947-a47f-960081dd1dbc | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-resource-diag (Deploy Diagnostic Settings to Azure Services) | 01/10/2021 21:00:47 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||||
Ten | ESJH-sandboxes | ESJH-sandboxes | inherited Tenant | User Access Administrator | 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 | Builtin | false | True | Joe Dalton | joe.dalton@AzGovViz.onmicrosoft.com | acf4c68f-7b15-4d70-935b-26116fc2426a | User Member | direct | False | /providers/microsoft.authorization/roleassignments/0c3ffd6f-942d-433d-8abd-2d0d7f4383e1 | none | 01/10/2021 20:27:23 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Ten | ESJH-sandboxes | ESJH-sandboxes | inherited Tenant | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | ESDeploymentAccount | ESDeploymentAccount@AzGovViz.onmicrosoft.com | b790b1e1-6f46-488b-8c5a-708b0db9a149 | User Member | direct | False | /providers/microsoft.authorization/roleassignments/6c236776-529f-4132-b034-e399e1cd1a99 | none | 01/10/2021 20:51:03 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | ESJH-sandboxes | ESJH-sandboxes | thisScope MG | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | ESDeploymentAccount | ESDeploymentAccount@AzGovViz.onmicrosoft.com | b790b1e1-6f46-488b-8c5a-708b0db9a149 | User Member | direct | False | /providers/microsoft.management/managementgroups/esjh-sandboxes/providers/microsoft.authorization/roleassignments/5c852bb9-bc65-44cb-a7d7-f230589f9c5f | none | 01/10/2021 20:56:28 | ObjectType: SP App EXT, ObjectDisplayName: Azure Management Groups, ObjectSignInName: n/a, ObjectId: 4870c99c-acfe-4210-9212-32949dc37c7a (r) | |||||||
Mg | ESJH-sandboxes | ESJH-sandboxes | thisScope MG | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | ESDeploymentAccount | ESDeploymentAccount@AzGovViz.onmicrosoft.com | b790b1e1-6f46-488b-8c5a-708b0db9a149 | User Member | direct | False | /providers/microsoft.management/managementgroups/esjh-sandboxes/providers/microsoft.authorization/roleassignments/5c852bb9-bc65-44cb-a7d7-f230589f9c11 | none | 07/05/2021 08:20:09 | ObjectType: SP APP INT, ObjectDisplayName: AzOps, ObjectSignInName: n/a, ObjectId: c295384a-33d9-475e-abaf-d2fb0274299a | |||||||
Mg | test01-APAC_ID | test01-APAC | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Resource Policy Contributor | 36243c78-bf99-498c-9df9-86d9f8d28608 | Builtin | false | False | PolicyPipeline | n/a | 90003bac-487c-4351-ad41-ed1f9e0446c1 | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/132f37b3-0aca-4e26-b71b-bcdde7a981ea | none | 10/27/2021 11:18:15 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | test01-APAC_ID | test01-APAC | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | AzOps | n/a | c295384a-33d9-475e-abaf-d2fb0274299a | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/30e36b53-bc6c-412b-a026-96fe7527e27b | none | 07/06/2021 12:42:21 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | test01-APAC_ID | test01-APAC | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | Joe Dalton | joe.dalton@AzGovViz.onmicrosoft.com | acf4c68f-7b15-4d70-935b-26116fc2426a | User Member | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/eda95ae6-8581-4558-b3b9-b3cd05cce33d | none | 06/16/2021 13:58:07 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | test01-APAC_ID | test01-APAC | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | AzGovVizSPARK | n/a | 527c7ca6-7a74-4b5d-bde2-7465ebb9915a | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/78ff5f82-18d1-4cb8-be40-cb046f39e5ac | none | 02/15/2022 14:42:34 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | test01-APAC_ID | test01-APAC | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | AzAdServicePrincipalInsights | n/a | 59acc082-8e28-485e-8897-d2a17e03ed50 | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/c6b7a239-63bf-48a6-921e-aa0e1628a702 | none | 09/28/2021 06:26:08 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | test01-APAC_ID | test01-APAC | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | miCentral001 | n/a | 619f894b-1c1b-4f43-8e7f-9e4d32ffefe1 | SP MI Usr | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/11f78fac-cce2-4278-9364-f84c3c43ae04 | none | 01/07/2022 16:52:53 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | test01-APAC_ID | test01-APAC | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | n/a | n/a | 638032a0-ff4a-462f-a53b-b99c4cf82964 | Unknown | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/5160c1ae-ab7b-41ac-b57c-a4f618aaf8b8 | none | 02/15/2022 12:56:13 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | test01-APAC_ID | test01-APAC | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | azgovvizADO | n/a | 8a2f188e-5b60-45f1-b0c6-12cd0e59576e | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/11337883-af36-4131-a7c3-8dd5ce47b4eb | none | 05/19/2022 15:36:50 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | test01-APAC_ID | test01-APAC | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | Joe Dalton | julian.hayward_yahoo.de#EXT#@AzGovViz.onmicrosoft.com | 9ef38e0f-5e7b-4ac5-8b0c-3635ac3c7ff4 | User Guest | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/0c4b9ba3-fc34-448e-beb0-d4baa7037562 | none | 09/24/2022 06:23:37 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | test01-APAC_ID | test01-APAC | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | Jack Dalton | JackDalton@AzGovViz.onmicrosoft.com | c64d2776-a210-428f-b54f-a4a5dd7f8ef8 | User Member | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/2df03e9d-a1e3-41f5-a95e-efb2b4641f04 | none | 07/19/2021 19:38:25 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | test01-APAC_ID | test01-APAC | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | azgovvizwwcsecurity | n/a | e261446e-77d2-4cf5-a32a-0fbef8ee1333 | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/d7973c31-e58a-4af7-bbcb-a4bac69ba141 | none | 04/27/2021 16:53:55 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | test01-APAC_ID | test01-APAC | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | AzGovVizAzDO | n/a | efc7b786-0bc9-4d41-aacd-6a54d16f7229 | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/c886cc3a-0d4c-45b6-af8b-fbfc4f8a4c06 | none | 05/21/2022 06:31:10 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | test01-APAC_ID | test01-APAC | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | azgvzGH | n/a | f20c11bb-119b-4914-abaa-99df52ef4f09 | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/7a09194c-13ca-4647-bb5e-da538b45f5e0 | none | 01/15/2022 16:26:49 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Ten | test01-APAC_ID | test01-APAC | inherited Tenant | User Access Administrator | 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 | Builtin | false | True | Joe Dalton | joe.dalton@AzGovViz.onmicrosoft.com | acf4c68f-7b15-4d70-935b-26116fc2426a | User Member | direct | False | /providers/microsoft.authorization/roleassignments/0c3ffd6f-942d-433d-8abd-2d0d7f4383e1 | none | 01/10/2021 20:27:23 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Ten | test01-APAC_ID | test01-APAC | inherited Tenant | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | ESDeploymentAccount | ESDeploymentAccount@AzGovViz.onmicrosoft.com | b790b1e1-6f46-488b-8c5a-708b0db9a149 | User Member | direct | False | /providers/microsoft.authorization/roleassignments/6c236776-529f-4132-b034-e399e1cd1a99 | none | 01/10/2021 20:51:03 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | test01-APAC_ID | test01-APAC | inherited test01 | User Access Administrator | 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 | Builtin | false | True | MS-PIM | n/a | f70514be-80e6-46e8-b985-ce72f5ee8e09 | SP APP EXT | direct | False | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/roleassignments/a4638306-2a51-41b7-bb64-2d5297a04046 | none | 04/27/2022 21:29:11 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | test01-APAC_ID | test01-APAC | inherited test01 | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | n/a | n/a | 604ec94a-0860-478f-bc42-a2b599f1a505 | Unknown | direct | False | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/roleassignments/4cb5ad0a-366c-4dbd-804c-b4dce349e47f | none | 03/09/2022 16:37:12 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | test01-APAC_ID | test01-APAC | inherited test01 | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | Joe Dalton | joe.dalton@AzGovViz.onmicrosoft.com | acf4c68f-7b15-4d70-935b-26116fc2426a | User Member | direct | False | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/roleassignments/a743ba10-46f5-4f1a-9d45-717d0c307c67 | none | 10/27/2021 14:29:28 | ObjectType: SP App EXT, ObjectDisplayName: Azure Management Groups, ObjectSignInName: n/a, ObjectId: 4870c99c-acfe-4210-9212-32949dc37c7a (r) | |||||||
Mg | test01-APAC_ID | test01-APAC | inherited test01 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | Calamity Jane | Calamity_Jane_AzGovViz.net#EXT#@AzGovViz.onmicrosoft.com | 43b0f5e7-cb78-4e1a-b3da-1239647dfb74 | User Guest | direct | False | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/roleassignments/45462efa-a1a1-42b6-8d51-566171d6835a | none | 04/27/2022 21:30:12 | ObjectType: SP APP EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: f70514be-80e6-46e8-b985-ce72f5ee8e09 | |||||||
Mg | test01-APAC_ID | test01-APAC | inherited test01 | Contributor | b24988ac-6180-42a0-ab88-20f7382dd24c | Builtin | false | False | 1234-SubOwner | n/a | 7d6d814f-5955-4ec8-ae38-f5211298aa2f | Group | direct | 1 (Usr: 1, Grp: 0, SP: 0) | False | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/roleassignments/ecf57eea-35ef-4c1f-88af-d1480b3c05eb | none | 03/10/2022 08:09:07 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | ||||||
Mg | test01-APAC_ID | test01-APAC | inherited test01 | Contributor | b24988ac-6180-42a0-ab88-20f7382dd24c | Builtin | false | False | Jack Dalton | JackDalton@AzGovViz.onmicrosoft.com | c64d2776-a210-428f-b54f-a4a5dd7f8ef8 | User Member | indirect | 1234-SubOwner (7d6d814f-5955-4ec8-ae38-f5211298aa2f) | 1 (Usr: 1, Grp: 0, SP: 0) | False | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/roleassignments/ecf57eea-35ef-4c1f-88af-d1480b3c05eb | none | 03/10/2022 08:09:07 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||
Mg | test01-APAC_ID | test01-APAC | inherited test01 | 1234 RoleAssignmentSubscriptionOwner | 1ee892e0-67a1-4b4c-b171-8c3a371692a9 | Custom | false | True | 1b5ac3236f0246ef83a14435 | n/a | 04b9b3f5-86a7-48cf-85fd-cce9468568db | SP MI Sys | direct | False | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/roleassignments/ac53ad94-7450-4fc1-bc27-fd42de78a1be | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/policyassignments/1b5ac3236f0246ef83a14435 (1234_AP_MG_RA_onSub) | 03/10/2022 15:03:14 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | test01-APAC_ID | test01-APAC | inherited test01 | 1234 RoleAssignmentSubscriptionOwner | 1ee892e0-67a1-4b4c-b171-8c3a371692a9 | Custom | false | True | a2d9426ccece4000b889c72f | n/a | 405b7ca3-fe93-4dfa-b70a-837eef12bfe7 | SP MI Sys | direct | False | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/roleassignments/3d2ad3f2-61bf-40b1-9ae5-ce752e781054 | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/policyassignments/a2d9426ccece4000b889c72f (1234_AP_MG_RA_onSub) | 03/10/2022 13:33:47 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | test01-APAC_ID | test01-APAC | inherited test01 | 1234 RoleAssignmentSubscriptionOwner | 1ee892e0-67a1-4b4c-b171-8c3a371692a9 | Custom | false | True | abe0212187e243e89ce5a623 | n/a | 41d30710-9d12-4361-ad69-ad313b2c427c | SP MI Sys | direct | False | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/roleassignments/3a86f501-86d7-44ea-83fb-6971a44ed3b3 | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/policyassignments/abe0212187e243e89ce5a623 (My_AP_MG_raOnSub) | 03/11/2022 07:44:51 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | test01-APAC_ID | test01-APAC | inherited test01 | 1234 RoleAssignmentSubscriptionOwner | 1ee892e0-67a1-4b4c-b171-8c3a371692a9 | Custom | false | True | 5f9ec45db52f479e940fc150 | n/a | 84a55248-e141-4ea6-b6ad-23791f5e8980 | SP MI Sys | direct | False | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/roleassignments/3d2ad3f2-61bf-40b1-9ae5-ce752e78104a | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/policyassignments/5f9ec45db52f479e940fc150 (1234_AP_MG_RA_onSub) | 03/10/2022 13:32:32 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | test01-APAC_ID | test01-APAC | thisScope MG | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | Joe Dalton | joe.dalton@AzGovViz.onmicrosoft.com | acf4c68f-7b15-4d70-935b-26116fc2426a | User Member | direct | False | /providers/microsoft.management/managementgroups/test01-apac_id/providers/microsoft.authorization/roleassignments/d53a075b-ed91-4ece-b9e4-86c5a57d50bf | none | 01/31/2022 05:19:20 | ObjectType: SP App EXT, ObjectDisplayName: Azure Management Groups, ObjectSignInName: n/a, ObjectId: 4870c99c-acfe-4210-9212-32949dc37c7a (r) | |||||||
Mg | test01-EMEA_ID | test01-EMEA | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Resource Policy Contributor | 36243c78-bf99-498c-9df9-86d9f8d28608 | Builtin | false | False | PolicyPipeline | n/a | 90003bac-487c-4351-ad41-ed1f9e0446c1 | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/132f37b3-0aca-4e26-b71b-bcdde7a981ea | none | 10/27/2021 11:18:15 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | test01-EMEA_ID | test01-EMEA | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | AzOps | n/a | c295384a-33d9-475e-abaf-d2fb0274299a | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/30e36b53-bc6c-412b-a026-96fe7527e27b | none | 07/06/2021 12:42:21 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | test01-EMEA_ID | test01-EMEA | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | Joe Dalton | joe.dalton@AzGovViz.onmicrosoft.com | acf4c68f-7b15-4d70-935b-26116fc2426a | User Member | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/eda95ae6-8581-4558-b3b9-b3cd05cce33d | none | 06/16/2021 13:58:07 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | test01-EMEA_ID | test01-EMEA | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | AzGovVizSPARK | n/a | 527c7ca6-7a74-4b5d-bde2-7465ebb9915a | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/78ff5f82-18d1-4cb8-be40-cb046f39e5ac | none | 02/15/2022 14:42:34 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | test01-EMEA_ID | test01-EMEA | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | AzAdServicePrincipalInsights | n/a | 59acc082-8e28-485e-8897-d2a17e03ed50 | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/c6b7a239-63bf-48a6-921e-aa0e1628a702 | none | 09/28/2021 06:26:08 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | test01-EMEA_ID | test01-EMEA | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | miCentral001 | n/a | 619f894b-1c1b-4f43-8e7f-9e4d32ffefe1 | SP MI Usr | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/11f78fac-cce2-4278-9364-f84c3c43ae04 | none | 01/07/2022 16:52:53 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | test01-EMEA_ID | test01-EMEA | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | n/a | n/a | 638032a0-ff4a-462f-a53b-b99c4cf82964 | Unknown | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/5160c1ae-ab7b-41ac-b57c-a4f618aaf8b8 | none | 02/15/2022 12:56:13 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | test01-EMEA_ID | test01-EMEA | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | azgovvizADO | n/a | 8a2f188e-5b60-45f1-b0c6-12cd0e59576e | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/11337883-af36-4131-a7c3-8dd5ce47b4eb | none | 05/19/2022 15:36:50 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | test01-EMEA_ID | test01-EMEA | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | Joe Dalton | julian.hayward_yahoo.de#EXT#@AzGovViz.onmicrosoft.com | 9ef38e0f-5e7b-4ac5-8b0c-3635ac3c7ff4 | User Guest | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/0c4b9ba3-fc34-448e-beb0-d4baa7037562 | none | 09/24/2022 06:23:37 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | test01-EMEA_ID | test01-EMEA | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | Jack Dalton | JackDalton@AzGovViz.onmicrosoft.com | c64d2776-a210-428f-b54f-a4a5dd7f8ef8 | User Member | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/2df03e9d-a1e3-41f5-a95e-efb2b4641f04 | none | 07/19/2021 19:38:25 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | test01-EMEA_ID | test01-EMEA | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | azgovvizwwcsecurity | n/a | e261446e-77d2-4cf5-a32a-0fbef8ee1333 | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/d7973c31-e58a-4af7-bbcb-a4bac69ba141 | none | 04/27/2021 16:53:55 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | test01-EMEA_ID | test01-EMEA | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | AzGovVizAzDO | n/a | efc7b786-0bc9-4d41-aacd-6a54d16f7229 | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/c886cc3a-0d4c-45b6-af8b-fbfc4f8a4c06 | none | 05/21/2022 06:31:10 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | test01-EMEA_ID | test01-EMEA | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | azgvzGH | n/a | f20c11bb-119b-4914-abaa-99df52ef4f09 | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/7a09194c-13ca-4647-bb5e-da538b45f5e0 | none | 01/15/2022 16:26:49 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Ten | test01-EMEA_ID | test01-EMEA | inherited Tenant | User Access Administrator | 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 | Builtin | false | True | Joe Dalton | joe.dalton@AzGovViz.onmicrosoft.com | acf4c68f-7b15-4d70-935b-26116fc2426a | User Member | direct | False | /providers/microsoft.authorization/roleassignments/0c3ffd6f-942d-433d-8abd-2d0d7f4383e1 | none | 01/10/2021 20:27:23 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Ten | test01-EMEA_ID | test01-EMEA | inherited Tenant | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | ESDeploymentAccount | ESDeploymentAccount@AzGovViz.onmicrosoft.com | b790b1e1-6f46-488b-8c5a-708b0db9a149 | User Member | direct | False | /providers/microsoft.authorization/roleassignments/6c236776-529f-4132-b034-e399e1cd1a99 | none | 01/10/2021 20:51:03 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | test01-EMEA_ID | test01-EMEA | inherited test01 | User Access Administrator | 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 | Builtin | false | True | MS-PIM | n/a | f70514be-80e6-46e8-b985-ce72f5ee8e09 | SP APP EXT | direct | False | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/roleassignments/a4638306-2a51-41b7-bb64-2d5297a04046 | none | 04/27/2022 21:29:11 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | test01-EMEA_ID | test01-EMEA | inherited test01 | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | n/a | n/a | 604ec94a-0860-478f-bc42-a2b599f1a505 | Unknown | direct | False | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/roleassignments/4cb5ad0a-366c-4dbd-804c-b4dce349e47f | none | 03/09/2022 16:37:12 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | test01-EMEA_ID | test01-EMEA | inherited test01 | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | Joe Dalton | joe.dalton@AzGovViz.onmicrosoft.com | acf4c68f-7b15-4d70-935b-26116fc2426a | User Member | direct | False | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/roleassignments/a743ba10-46f5-4f1a-9d45-717d0c307c67 | none | 10/27/2021 14:29:28 | ObjectType: SP App EXT, ObjectDisplayName: Azure Management Groups, ObjectSignInName: n/a, ObjectId: 4870c99c-acfe-4210-9212-32949dc37c7a (r) | |||||||
Mg | test01-EMEA_ID | test01-EMEA | inherited test01 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | Calamity Jane | Calamity_Jane_AzGovViz.net#EXT#@AzGovViz.onmicrosoft.com | 43b0f5e7-cb78-4e1a-b3da-1239647dfb74 | User Guest | direct | False | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/roleassignments/45462efa-a1a1-42b6-8d51-566171d6835a | none | 04/27/2022 21:30:12 | ObjectType: SP APP EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: f70514be-80e6-46e8-b985-ce72f5ee8e09 | |||||||
Mg | test01-EMEA_ID | test01-EMEA | inherited test01 | Contributor | b24988ac-6180-42a0-ab88-20f7382dd24c | Builtin | false | False | 1234-SubOwner | n/a | 7d6d814f-5955-4ec8-ae38-f5211298aa2f | Group | direct | 1 (Usr: 1, Grp: 0, SP: 0) | False | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/roleassignments/ecf57eea-35ef-4c1f-88af-d1480b3c05eb | none | 03/10/2022 08:09:07 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | ||||||
Mg | test01-EMEA_ID | test01-EMEA | inherited test01 | Contributor | b24988ac-6180-42a0-ab88-20f7382dd24c | Builtin | false | False | Jack Dalton | JackDalton@AzGovViz.onmicrosoft.com | c64d2776-a210-428f-b54f-a4a5dd7f8ef8 | User Member | indirect | 1234-SubOwner (7d6d814f-5955-4ec8-ae38-f5211298aa2f) | 1 (Usr: 1, Grp: 0, SP: 0) | False | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/roleassignments/ecf57eea-35ef-4c1f-88af-d1480b3c05eb | none | 03/10/2022 08:09:07 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||
Mg | test01-EMEA_ID | test01-EMEA | inherited test01 | 1234 RoleAssignmentSubscriptionOwner | 1ee892e0-67a1-4b4c-b171-8c3a371692a9 | Custom | false | True | 1b5ac3236f0246ef83a14435 | n/a | 04b9b3f5-86a7-48cf-85fd-cce9468568db | SP MI Sys | direct | False | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/roleassignments/ac53ad94-7450-4fc1-bc27-fd42de78a1be | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/policyassignments/1b5ac3236f0246ef83a14435 (1234_AP_MG_RA_onSub) | 03/10/2022 15:03:14 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | test01-EMEA_ID | test01-EMEA | inherited test01 | 1234 RoleAssignmentSubscriptionOwner | 1ee892e0-67a1-4b4c-b171-8c3a371692a9 | Custom | false | True | a2d9426ccece4000b889c72f | n/a | 405b7ca3-fe93-4dfa-b70a-837eef12bfe7 | SP MI Sys | direct | False | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/roleassignments/3d2ad3f2-61bf-40b1-9ae5-ce752e781054 | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/policyassignments/a2d9426ccece4000b889c72f (1234_AP_MG_RA_onSub) | 03/10/2022 13:33:47 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | test01-EMEA_ID | test01-EMEA | inherited test01 | 1234 RoleAssignmentSubscriptionOwner | 1ee892e0-67a1-4b4c-b171-8c3a371692a9 | Custom | false | True | abe0212187e243e89ce5a623 | n/a | 41d30710-9d12-4361-ad69-ad313b2c427c | SP MI Sys | direct | False | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/roleassignments/3a86f501-86d7-44ea-83fb-6971a44ed3b3 | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/policyassignments/abe0212187e243e89ce5a623 (My_AP_MG_raOnSub) | 03/11/2022 07:44:51 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | test01-EMEA_ID | test01-EMEA | inherited test01 | 1234 RoleAssignmentSubscriptionOwner | 1ee892e0-67a1-4b4c-b171-8c3a371692a9 | Custom | false | True | 5f9ec45db52f479e940fc150 | n/a | 84a55248-e141-4ea6-b6ad-23791f5e8980 | SP MI Sys | direct | False | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/roleassignments/3d2ad3f2-61bf-40b1-9ae5-ce752e78104a | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/policyassignments/5f9ec45db52f479e940fc150 (1234_AP_MG_RA_onSub) | 03/10/2022 13:32:32 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | test01-EMEA_ID | test01-EMEA | thisScope MG | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | Joe Dalton | joe.dalton@AzGovViz.onmicrosoft.com | acf4c68f-7b15-4d70-935b-26116fc2426a | User Member | direct | False | /providers/microsoft.management/managementgroups/test01-emea_id/providers/microsoft.authorization/roleassignments/b3e7a86e-9057-45d0-b7da-004932703b32 | none | 12/31/2021 09:59:27 | ObjectType: SP App EXT, ObjectDisplayName: Azure Management Groups, ObjectSignInName: n/a, ObjectId: 4870c99c-acfe-4210-9212-32949dc37c7a (r) | |||||||
Mg | test01-EMEA_ID | test01-EMEA | a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2 | payg0 | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Resource Policy Contributor | 36243c78-bf99-498c-9df9-86d9f8d28608 | Builtin | false | False | PolicyPipeline | n/a | 90003bac-487c-4351-ad41-ed1f9e0446c1 | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/132f37b3-0aca-4e26-b71b-bcdde7a981ea | none | 10/27/2021 11:18:15 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||
Mg | test01-EMEA_ID | test01-EMEA | a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2 | payg0 | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | AzOps | n/a | c295384a-33d9-475e-abaf-d2fb0274299a | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/30e36b53-bc6c-412b-a026-96fe7527e27b | none | 07/06/2021 12:42:21 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||
Mg | test01-EMEA_ID | test01-EMEA | a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2 | payg0 | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | Joe Dalton | joe.dalton@AzGovViz.onmicrosoft.com | acf4c68f-7b15-4d70-935b-26116fc2426a | User Member | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/eda95ae6-8581-4558-b3b9-b3cd05cce33d | none | 06/16/2021 13:58:07 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||
Mg | test01-EMEA_ID | test01-EMEA | a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2 | payg0 | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | AzGovVizSPARK | n/a | 527c7ca6-7a74-4b5d-bde2-7465ebb9915a | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/78ff5f82-18d1-4cb8-be40-cb046f39e5ac | none | 02/15/2022 14:42:34 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||
Mg | test01-EMEA_ID | test01-EMEA | a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2 | payg0 | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | AzAdServicePrincipalInsights | n/a | 59acc082-8e28-485e-8897-d2a17e03ed50 | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/c6b7a239-63bf-48a6-921e-aa0e1628a702 | none | 09/28/2021 06:26:08 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||
Mg | test01-EMEA_ID | test01-EMEA | a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2 | payg0 | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | miCentral001 | n/a | 619f894b-1c1b-4f43-8e7f-9e4d32ffefe1 | SP MI Usr | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/11f78fac-cce2-4278-9364-f84c3c43ae04 | none | 01/07/2022 16:52:53 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||
Mg | test01-EMEA_ID | test01-EMEA | a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2 | payg0 | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | n/a | n/a | 638032a0-ff4a-462f-a53b-b99c4cf82964 | Unknown | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/5160c1ae-ab7b-41ac-b57c-a4f618aaf8b8 | none | 02/15/2022 12:56:13 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||
Mg | test01-EMEA_ID | test01-EMEA | a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2 | payg0 | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | azgovvizADO | n/a | 8a2f188e-5b60-45f1-b0c6-12cd0e59576e | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/11337883-af36-4131-a7c3-8dd5ce47b4eb | none | 05/19/2022 15:36:50 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||
Mg | test01-EMEA_ID | test01-EMEA | a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2 | payg0 | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | Joe Dalton | julian.hayward_yahoo.de#EXT#@AzGovViz.onmicrosoft.com | 9ef38e0f-5e7b-4ac5-8b0c-3635ac3c7ff4 | User Guest | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/0c4b9ba3-fc34-448e-beb0-d4baa7037562 | none | 09/24/2022 06:23:37 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||
Mg | test01-EMEA_ID | test01-EMEA | a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2 | payg0 | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | Jack Dalton | JackDalton@AzGovViz.onmicrosoft.com | c64d2776-a210-428f-b54f-a4a5dd7f8ef8 | User Member | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/2df03e9d-a1e3-41f5-a95e-efb2b4641f04 | none | 07/19/2021 19:38:25 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||
Mg | test01-EMEA_ID | test01-EMEA | a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2 | payg0 | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | azgovvizwwcsecurity | n/a | e261446e-77d2-4cf5-a32a-0fbef8ee1333 | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/d7973c31-e58a-4af7-bbcb-a4bac69ba141 | none | 04/27/2021 16:53:55 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||
Mg | test01-EMEA_ID | test01-EMEA | a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2 | payg0 | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | AzGovVizAzDO | n/a | efc7b786-0bc9-4d41-aacd-6a54d16f7229 | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/c886cc3a-0d4c-45b6-af8b-fbfc4f8a4c06 | none | 05/21/2022 06:31:10 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||
Mg | test01-EMEA_ID | test01-EMEA | a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2 | payg0 | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | azgvzGH | n/a | f20c11bb-119b-4914-abaa-99df52ef4f09 | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/7a09194c-13ca-4647-bb5e-da538b45f5e0 | none | 01/15/2022 16:26:49 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||
Ten | test01-EMEA_ID | test01-EMEA | a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2 | payg0 | inherited Tenant | User Access Administrator | 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 | Builtin | false | True | Joe Dalton | joe.dalton@AzGovViz.onmicrosoft.com | acf4c68f-7b15-4d70-935b-26116fc2426a | User Member | direct | False | /providers/microsoft.authorization/roleassignments/0c3ffd6f-942d-433d-8abd-2d0d7f4383e1 | none | 01/10/2021 20:27:23 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||
Ten | test01-EMEA_ID | test01-EMEA | a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2 | payg0 | inherited Tenant | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | ESDeploymentAccount | ESDeploymentAccount@AzGovViz.onmicrosoft.com | b790b1e1-6f46-488b-8c5a-708b0db9a149 | User Member | direct | False | /providers/microsoft.authorization/roleassignments/6c236776-529f-4132-b034-e399e1cd1a99 | none | 01/10/2021 20:51:03 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||
Mg | test01-EMEA_ID | test01-EMEA | a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2 | payg0 | inherited test01 | User Access Administrator | 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 | Builtin | false | True | MS-PIM | n/a | f70514be-80e6-46e8-b985-ce72f5ee8e09 | SP APP EXT | direct | False | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/roleassignments/a4638306-2a51-41b7-bb64-2d5297a04046 | none | 04/27/2022 21:29:11 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||
Mg | test01-EMEA_ID | test01-EMEA | a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2 | payg0 | inherited test01 | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | n/a | n/a | 604ec94a-0860-478f-bc42-a2b599f1a505 | Unknown | direct | False | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/roleassignments/4cb5ad0a-366c-4dbd-804c-b4dce349e47f | none | 03/09/2022 16:37:12 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||
Mg | test01-EMEA_ID | test01-EMEA | a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2 | payg0 | inherited test01 | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | Joe Dalton | joe.dalton@AzGovViz.onmicrosoft.com | acf4c68f-7b15-4d70-935b-26116fc2426a | User Member | direct | False | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/roleassignments/a743ba10-46f5-4f1a-9d45-717d0c307c67 | none | 10/27/2021 14:29:28 | ObjectType: SP App EXT, ObjectDisplayName: Azure Management Groups, ObjectSignInName: n/a, ObjectId: 4870c99c-acfe-4210-9212-32949dc37c7a (r) | |||||
Mg | test01-EMEA_ID | test01-EMEA | a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2 | payg0 | inherited test01 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | Calamity Jane | Calamity_Jane_AzGovViz.net#EXT#@AzGovViz.onmicrosoft.com | 43b0f5e7-cb78-4e1a-b3da-1239647dfb74 | User Guest | direct | False | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/roleassignments/45462efa-a1a1-42b6-8d51-566171d6835a | none | 04/27/2022 21:30:12 | ObjectType: SP APP EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: f70514be-80e6-46e8-b985-ce72f5ee8e09 | |||||
Mg | test01-EMEA_ID | test01-EMEA | a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2 | payg0 | inherited test01 | Contributor | b24988ac-6180-42a0-ab88-20f7382dd24c | Builtin | false | False | 1234-SubOwner | n/a | 7d6d814f-5955-4ec8-ae38-f5211298aa2f | Group | direct | 1 (Usr: 1, Grp: 0, SP: 0) | False | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/roleassignments/ecf57eea-35ef-4c1f-88af-d1480b3c05eb | none | 03/10/2022 08:09:07 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | ||||
Mg | test01-EMEA_ID | test01-EMEA | a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2 | payg0 | inherited test01 | Contributor | b24988ac-6180-42a0-ab88-20f7382dd24c | Builtin | false | False | Jack Dalton | JackDalton@AzGovViz.onmicrosoft.com | c64d2776-a210-428f-b54f-a4a5dd7f8ef8 | User Member | indirect | 1234-SubOwner (7d6d814f-5955-4ec8-ae38-f5211298aa2f) | 1 (Usr: 1, Grp: 0, SP: 0) | False | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/roleassignments/ecf57eea-35ef-4c1f-88af-d1480b3c05eb | none | 03/10/2022 08:09:07 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||
Mg | test01-EMEA_ID | test01-EMEA | a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2 | payg0 | inherited test01 | 1234 RoleAssignmentSubscriptionOwner | 1ee892e0-67a1-4b4c-b171-8c3a371692a9 | Custom | false | True | 1b5ac3236f0246ef83a14435 | n/a | 04b9b3f5-86a7-48cf-85fd-cce9468568db | SP MI Sys | direct | False | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/roleassignments/ac53ad94-7450-4fc1-bc27-fd42de78a1be | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/policyassignments/1b5ac3236f0246ef83a14435 (1234_AP_MG_RA_onSub) | 03/10/2022 15:03:14 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||
Mg | test01-EMEA_ID | test01-EMEA | a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2 | payg0 | inherited test01 | 1234 RoleAssignmentSubscriptionOwner | 1ee892e0-67a1-4b4c-b171-8c3a371692a9 | Custom | false | True | a2d9426ccece4000b889c72f | n/a | 405b7ca3-fe93-4dfa-b70a-837eef12bfe7 | SP MI Sys | direct | False | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/roleassignments/3d2ad3f2-61bf-40b1-9ae5-ce752e781054 | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/policyassignments/a2d9426ccece4000b889c72f (1234_AP_MG_RA_onSub) | 03/10/2022 13:33:47 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||
Mg | test01-EMEA_ID | test01-EMEA | a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2 | payg0 | inherited test01 | 1234 RoleAssignmentSubscriptionOwner | 1ee892e0-67a1-4b4c-b171-8c3a371692a9 | Custom | false | True | abe0212187e243e89ce5a623 | n/a | 41d30710-9d12-4361-ad69-ad313b2c427c | SP MI Sys | direct | False | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/roleassignments/3a86f501-86d7-44ea-83fb-6971a44ed3b3 | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/policyassignments/abe0212187e243e89ce5a623 (My_AP_MG_raOnSub) | 03/11/2022 07:44:51 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||
Mg | test01-EMEA_ID | test01-EMEA | a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2 | payg0 | inherited test01 | 1234 RoleAssignmentSubscriptionOwner | 1ee892e0-67a1-4b4c-b171-8c3a371692a9 | Custom | false | True | 5f9ec45db52f479e940fc150 | n/a | 84a55248-e141-4ea6-b6ad-23791f5e8980 | SP MI Sys | direct | False | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/roleassignments/3d2ad3f2-61bf-40b1-9ae5-ce752e78104a | /providers/microsoft.management/managementgroups/test01/providers/microsoft.authorization/policyassignments/5f9ec45db52f479e940fc150 (1234_AP_MG_RA_onSub) | 03/10/2022 13:32:32 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||
Mg | test01-EMEA_ID | test01-EMEA | a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2 | payg0 | inherited test01-EMEA_ID | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | Joe Dalton | joe.dalton@AzGovViz.onmicrosoft.com | acf4c68f-7b15-4d70-935b-26116fc2426a | User Member | direct | False | /providers/microsoft.management/managementgroups/test01-emea_id/providers/microsoft.authorization/roleassignments/b3e7a86e-9057-45d0-b7da-004932703b32 | none | 12/31/2021 09:59:27 | ObjectType: SP App EXT, ObjectDisplayName: Azure Management Groups, ObjectSignInName: n/a, ObjectId: 4870c99c-acfe-4210-9212-32949dc37c7a (r) | |||||
Sub | test01-EMEA_ID | test01-EMEA | a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2 | payg0 | thisScope Sub | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | 1234-SubOwner | n/a | 7d6d814f-5955-4ec8-ae38-f5211298aa2f | Group | direct | 1 (Usr: 1, Grp: 0, SP: 0) | False | /subscriptions/a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2/providers/microsoft.authorization/roleassignments/970054de-6c25-5393-afcd-bef8453a50fd | none | 03/10/2022 18:47:54 | ObjectType: SP MI Sys, ObjectDisplayName: 5f9ec45db52f479e940fc150, ObjectSignInName: n/a, ObjectId: 84a55248-e141-4ea6-b6ad-23791f5e8980 | ||||
Sub | test01-EMEA_ID | test01-EMEA | a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2 | payg0 | thisScope Sub | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | Jack Dalton | JackDalton@AzGovViz.onmicrosoft.com | c64d2776-a210-428f-b54f-a4a5dd7f8ef8 | User Member | indirect | 1234-SubOwner (7d6d814f-5955-4ec8-ae38-f5211298aa2f) | 1 (Usr: 1, Grp: 0, SP: 0) | False | /subscriptions/a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2/providers/microsoft.authorization/roleassignments/970054de-6c25-5393-afcd-bef8453a50fd | none | 03/10/2022 18:47:54 | ObjectType: SP MI Sys, ObjectDisplayName: 5f9ec45db52f479e940fc150, ObjectSignInName: n/a, ObjectId: 84a55248-e141-4ea6-b6ad-23791f5e8980 | |||
Sub | test01-EMEA_ID | test01-EMEA | a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2 | payg0 | thisScope Sub | Log Analytics Contributor | 92aaf0da-9dab-42b6-94a3-d43ce8d16293 | Builtin | false | False | e184b6792089442786621cfe | n/a | 71f8ba53-97da-4880-8d02-8b22176c9317 | SP MI Sys | direct | False | /subscriptions/a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2/providers/microsoft.authorization/roleassignments/a11b5e6d-bb3d-43ea-8009-733bc510f16b | /subscriptions/a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2/providers/microsoft.authorization/policyassignments/e184b6792089442786621cfe (DiagSubscriptionsDim) | 06/24/2022 15:46:27 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||
Sub | test01-EMEA_ID | test01-EMEA | a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2 | payg0 | thisScope Sub | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | user00 | user00@AzGovViz.onmicrosoft.com | 05687e51-8ebb-4a06-9eae-9e9786f79090 | User Member | indirect | group00 (c1916fdd-08d8-439e-a329-d540c6f002a8) | 6 (Usr: 4, Grp: 2, SP: 0) | False | /subscriptions/a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2/providers/microsoft.authorization/roleassignments/4509c4d8-390c-519a-b7d4-4b2764c58986 | none | 03/11/2022 07:52:51 | ObjectType: SP MI Sys, ObjectDisplayName: abe0212187e243e89ce5a623, ObjectSignInName: n/a, ObjectId: 41d30710-9d12-4361-ad69-ad313b2c427c | |||
Sub | test01-EMEA_ID | test01-EMEA | a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2 | payg0 | thisScope Sub | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | mi4439 | n/a | 4b8bce68-e5f3-47d9-9420-66187e697c64 | SP MI Usr | direct | False | /subscriptions/a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2/providers/microsoft.authorization/roleassignments/76c168f5-9ca6-4e1f-bc44-f7cf435a9e12 | none | 01/08/2022 16:38:03 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||
Sub | test01-EMEA_ID | test01-EMEA | a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2 | payg0 | thisScope Sub | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | group04NoMembers | n/a | 5f90ced2-7d5e-493b-9db6-862b9332e20a | Group | direct | 0 (Usr: 0, Grp: 0, SP: 0) | False | /subscriptions/a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2/providers/microsoft.authorization/roleassignments/d13dccbe-d20e-46c5-9459-fbff922e2b22 | none | 03/11/2022 07:33:21 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | ||||
Sub | test01-EMEA_ID | test01-EMEA | a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2 | payg0 | thisScope Sub | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | group01 | n/a | 66f4e0b3-13af-4c93-ad43-67042ed760e5 | Group | indirect | group00 (c1916fdd-08d8-439e-a329-d540c6f002a8) | 6 (Usr: 4, Grp: 2, SP: 0) | False | /subscriptions/a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2/providers/microsoft.authorization/roleassignments/4509c4d8-390c-519a-b7d4-4b2764c58986 | none | 03/11/2022 07:52:51 | ObjectType: SP MI Sys, ObjectDisplayName: abe0212187e243e89ce5a623, ObjectSignInName: n/a, ObjectId: 41d30710-9d12-4361-ad69-ad313b2c427c | |||
Sub | test01-EMEA_ID | test01-EMEA | a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2 | payg0 | thisScope Sub | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | user01 | user01@AzGovViz.onmicrosoft.com | 7dd8e665-9277-4bbb-94f9-ff278ceff8c0 | User Member | indirect | group00 (c1916fdd-08d8-439e-a329-d540c6f002a8) | 6 (Usr: 4, Grp: 2, SP: 0) | False | /subscriptions/a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2/providers/microsoft.authorization/roleassignments/4509c4d8-390c-519a-b7d4-4b2764c58986 | none | 03/11/2022 07:52:51 | ObjectType: SP MI Sys, ObjectDisplayName: abe0212187e243e89ce5a623, ObjectSignInName: n/a, ObjectId: 41d30710-9d12-4361-ad69-ad313b2c427c | |||
Sub | test01-EMEA_ID | test01-EMEA | a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2 | payg0 | thisScope Sub | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | group02 | n/a | 903a7f87-c183-4962-8983-c793a77f18bf | Group | indirect | group00 (c1916fdd-08d8-439e-a329-d540c6f002a8) | 6 (Usr: 4, Grp: 2, SP: 0) | False | /subscriptions/a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2/providers/microsoft.authorization/roleassignments/4509c4d8-390c-519a-b7d4-4b2764c58986 | none | 03/11/2022 07:52:51 | ObjectType: SP MI Sys, ObjectDisplayName: abe0212187e243e89ce5a623, ObjectSignInName: n/a, ObjectId: 41d30710-9d12-4361-ad69-ad313b2c427c | |||
Sub | test01-EMEA_ID | test01-EMEA | a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2 | payg0 | thisScope Sub | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | group00 | n/a | c1916fdd-08d8-439e-a329-d540c6f002a8 | Group | direct | 6 (Usr: 4, Grp: 2, SP: 0) | False | /subscriptions/a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2/providers/microsoft.authorization/roleassignments/4509c4d8-390c-519a-b7d4-4b2764c58986 | none | 03/11/2022 07:52:51 | ObjectType: SP MI Sys, ObjectDisplayName: abe0212187e243e89ce5a623, ObjectSignInName: n/a, ObjectId: 41d30710-9d12-4361-ad69-ad313b2c427c | ||||
Sub | test01-EMEA_ID | test01-EMEA | a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2 | payg0 | thisScope Sub | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | user03 | user03@AzGovViz.onmicrosoft.com | c472fa07-5319-4f5f-8bcd-00d4162bb8fd | User Member | indirect | group00 (c1916fdd-08d8-439e-a329-d540c6f002a8) | 6 (Usr: 4, Grp: 2, SP: 0) | False | /subscriptions/a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2/providers/microsoft.authorization/roleassignments/4509c4d8-390c-519a-b7d4-4b2764c58986 | none | 03/11/2022 07:52:51 | ObjectType: SP MI Sys, ObjectDisplayName: abe0212187e243e89ce5a623, ObjectSignInName: n/a, ObjectId: 41d30710-9d12-4361-ad69-ad313b2c427c | |||
Sub | test01-EMEA_ID | test01-EMEA | a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2 | payg0 | thisScope Sub | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | user02 | user02@AzGovViz.onmicrosoft.com | cb317eea-8af2-4cb8-bde5-516e0b951f1b | User Member | indirect | group00 (c1916fdd-08d8-439e-a329-d540c6f002a8) | 6 (Usr: 4, Grp: 2, SP: 0) | False | /subscriptions/a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2/providers/microsoft.authorization/roleassignments/4509c4d8-390c-519a-b7d4-4b2764c58986 | none | 03/11/2022 07:52:51 | ObjectType: SP MI Sys, ObjectDisplayName: abe0212187e243e89ce5a623, ObjectSignInName: n/a, ObjectId: 41d30710-9d12-4361-ad69-ad313b2c427c | |||
Sub | test01-EMEA_ID | test01-EMEA | a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2 | payg0 | thisScope Sub | Contributor | b24988ac-6180-42a0-ab88-20f7382dd24c | Builtin | false | False | 1234-SubOwner | n/a | 7d6d814f-5955-4ec8-ae38-f5211298aa2f | Group | direct | 1 (Usr: 1, Grp: 0, SP: 0) | False | /subscriptions/a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2/providers/microsoft.authorization/roleassignments/9e637076-9509-527b-bd3f-0e6f82553205 | none | 03/10/2022 13:52:48 | ObjectType: SP MI Sys, ObjectDisplayName: a2d9426ccece4000b889c72f, ObjectSignInName: n/a, ObjectId: 405b7ca3-fe93-4dfa-b70a-837eef12bfe7 | ||||
Sub | test01-EMEA_ID | test01-EMEA | a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2 | payg0 | thisScope Sub | Contributor | b24988ac-6180-42a0-ab88-20f7382dd24c | Builtin | false | False | Jack Dalton | JackDalton@AzGovViz.onmicrosoft.com | c64d2776-a210-428f-b54f-a4a5dd7f8ef8 | User Member | indirect | 1234-SubOwner (7d6d814f-5955-4ec8-ae38-f5211298aa2f) | 1 (Usr: 1, Grp: 0, SP: 0) | False | /subscriptions/a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2/providers/microsoft.authorization/roleassignments/9e637076-9509-527b-bd3f-0e6f82553205 | none | 03/10/2022 13:52:48 | ObjectType: SP MI Sys, ObjectDisplayName: a2d9426ccece4000b889c72f, ObjectSignInName: n/a, ObjectId: 405b7ca3-fe93-4dfa-b70a-837eef12bfe7 | |||
RG | test01-EMEA_ID | test01-EMEA | a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2 | payg0 | thisScope Sub RG | Contributor | b24988ac-6180-42a0-ab88-20f7382dd24c | Builtin | false | False | William Dalton | william.dalton@AzGovViz.onmicrosoft.com | 3c99d2bc-12b3-4f4f-87a6-c673aed4628c | User Member | direct | False | /subscriptions/a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2/resourcegroups/dev_p1/providers/microsoft.authorization/roleassignments/c2c51f92-01fe-4a69-b508-1ec383a595f1 | none | 12/31/2021 13:54:48 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||
Res | test01-EMEA_ID | test01-EMEA | a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2 | payg0 | thisScope Sub RG Res | Network Contributor | 4d97b98b-1d4f-4787-a291-c67834d212e7 | Builtin | false | False | William Dalton | william.dalton@AzGovViz.onmicrosoft.com | 3c99d2bc-12b3-4f4f-87a6-c673aed4628c | User Member | direct | False | /subscriptions/a5a8a7d5-77f4-4389-8ee9-2f2a3aca06f2/resourcegroups/prod_p1/providers/microsoft.network/networksecuritygroups/nsgx_p1/providers/microsoft.authorization/roleassignments/b7794256-353c-4e73-89d1-d300ceb8cacd | none | 12/31/2021 13:57:18 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||
Mg | CUST_T5 | CUST_T5 atz | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Resource Policy Contributor | 36243c78-bf99-498c-9df9-86d9f8d28608 | Builtin | false | False | PolicyPipeline | n/a | 90003bac-487c-4351-ad41-ed1f9e0446c1 | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/132f37b3-0aca-4e26-b71b-bcdde7a981ea | none | 10/27/2021 11:18:15 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | CUST_T5 | CUST_T5 atz | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | AzOps | n/a | c295384a-33d9-475e-abaf-d2fb0274299a | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/30e36b53-bc6c-412b-a026-96fe7527e27b | none | 07/06/2021 12:42:21 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | CUST_T5 | CUST_T5 atz | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | Joe Dalton | joe.dalton@AzGovViz.onmicrosoft.com | acf4c68f-7b15-4d70-935b-26116fc2426a | User Member | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/eda95ae6-8581-4558-b3b9-b3cd05cce33d | none | 06/16/2021 13:58:07 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | CUST_T5 | CUST_T5 atz | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | AzGovVizSPARK | n/a | 527c7ca6-7a74-4b5d-bde2-7465ebb9915a | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/78ff5f82-18d1-4cb8-be40-cb046f39e5ac | none | 02/15/2022 14:42:34 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | CUST_T5 | CUST_T5 atz | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | AzAdServicePrincipalInsights | n/a | 59acc082-8e28-485e-8897-d2a17e03ed50 | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/c6b7a239-63bf-48a6-921e-aa0e1628a702 | none | 09/28/2021 06:26:08 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | CUST_T5 | CUST_T5 atz | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | miCentral001 | n/a | 619f894b-1c1b-4f43-8e7f-9e4d32ffefe1 | SP MI Usr | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/11f78fac-cce2-4278-9364-f84c3c43ae04 | none | 01/07/2022 16:52:53 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | CUST_T5 | CUST_T5 atz | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | n/a | n/a | 638032a0-ff4a-462f-a53b-b99c4cf82964 | Unknown | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/5160c1ae-ab7b-41ac-b57c-a4f618aaf8b8 | none | 02/15/2022 12:56:13 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | CUST_T5 | CUST_T5 atz | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | azgovvizADO | n/a | 8a2f188e-5b60-45f1-b0c6-12cd0e59576e | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/11337883-af36-4131-a7c3-8dd5ce47b4eb | none | 05/19/2022 15:36:50 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | CUST_T5 | CUST_T5 atz | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | Joe Dalton | julian.hayward_yahoo.de#EXT#@AzGovViz.onmicrosoft.com | 9ef38e0f-5e7b-4ac5-8b0c-3635ac3c7ff4 | User Guest | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/0c4b9ba3-fc34-448e-beb0-d4baa7037562 | none | 09/24/2022 06:23:37 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | CUST_T5 | CUST_T5 atz | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | Jack Dalton | JackDalton@AzGovViz.onmicrosoft.com | c64d2776-a210-428f-b54f-a4a5dd7f8ef8 | User Member | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/2df03e9d-a1e3-41f5-a95e-efb2b4641f04 | none | 07/19/2021 19:38:25 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | CUST_T5 | CUST_T5 atz | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | azgovvizwwcsecurity | n/a | e261446e-77d2-4cf5-a32a-0fbef8ee1333 | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/d7973c31-e58a-4af7-bbcb-a4bac69ba141 | none | 04/27/2021 16:53:55 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | CUST_T5 | CUST_T5 atz | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | AzGovVizAzDO | n/a | efc7b786-0bc9-4d41-aacd-6a54d16f7229 | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/c886cc3a-0d4c-45b6-af8b-fbfc4f8a4c06 | none | 05/21/2022 06:31:10 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | CUST_T5 | CUST_T5 atz | inherited 896470ca-9c6e-4176-9b38-5a655403c638 | Reader | acdd72a7-3385-48ef-bd42-f606fba81ae7 | Builtin | false | False | azgvzGH | n/a | f20c11bb-119b-4914-abaa-99df52ef4f09 | SP APP INT | direct | False | /providers/microsoft.management/managementgroups/896470ca-9c6e-4176-9b38-5a655403c638/providers/microsoft.authorization/roleassignments/7a09194c-13ca-4647-bb5e-da538b45f5e0 | none | 01/15/2022 16:26:49 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | CUST_T5 | CUST_T5 atz | inherited ESJH | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | Deploy-VM-Monitoring | n/a | 065dde0b-5eab-4fce-80ee-ec956e94c498 | SP MI Sys | direct | False | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/5d92332d-fe07-5cef-9c6b-33e5025d6374 | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-vm-monitoring (Legacy - Enable Azure Monitor for VMs) | 01/10/2021 21:00:47 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||||
Mg | CUST_T5 | CUST_T5 atz | inherited ESJH | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | Deploy-AzActivity-Log | n/a | 1691aa06-da2e-43f0-98f9-af12494603a9 | SP MI Sys | direct | False | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/e5ac6b58-4f31-5956-9082-78d97ba2453e | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-azactivity-log (Deploy Diagnostic Settings for Activity Log to Log Analytics workspace) | 01/10/2021 21:00:50 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||||
Mg | CUST_T5 | CUST_T5 atz | inherited ESJH | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | Deploy-ASC-Security | n/a | 4cb4c797-237b-4e64-b2cf-66f841700442 | SP MI Sys | direct | False | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/538e5329-7b5d-511f-8c05-9c7c32dab0bf | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-asc-security (Deploy Azure Defender settings in Azure Security Center.) | 01/10/2021 21:00:50 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||||
Mg | CUST_T5 | CUST_T5 atz | inherited ESJH | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | ESDeploymentAccount | ESDeploymentAccount@AzGovViz.onmicrosoft.com | b790b1e1-6f46-488b-8c5a-708b0db9a149 | User Member | direct | False | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/f8d8ca86-6fdf-4ad5-b801-5e1b3eba3171 | none | 01/10/2021 20:55:50 | ObjectType: SP App EXT, ObjectDisplayName: Azure Management Groups, ObjectSignInName: n/a, ObjectId: 4870c99c-acfe-4210-9212-32949dc37c7a (r) | |||||||
Mg | CUST_T5 | CUST_T5 atz | inherited ESJH | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | enforce0 | n/a | 79d69f2f-2fbe-409e-84c3-3e510c18fd16 | SP MI Sys | direct | False | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/b429c46d-6843-4a51-a74e-8a484de47815 | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/enforce0 (Enforce Role assignment at Subscription Scope) | 03/16/2022 23:57:25 | ObjectType: User Member, ObjectDisplayName: Joe Dalton, ObjectSignInName: joe.dalton@AzGovViz.onmicrosoft.com, ObjectId: acf4c68f-7b15-4d70-935b-26116fc2426a | |||||||
Mg | CUST_T5 | CUST_T5 atz | inherited ESJH | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | Deploy-LX-Arc-Monitoring | n/a | 9ed01b2b-9311-41a8-8897-0a329047be49 | SP MI Sys | direct | False | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/ddc0ff3c-a3d0-5d5b-ba19-116b6572acbf | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-lx-arc-monitoring (Configure Log Analytics extension on Azure Arc enabled Linux servers. See deprecation notice below) | 01/10/2021 21:00:47 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||||
Mg | CUST_T5 | CUST_T5 atz | inherited ESJH | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | Deploy-VMSS-Monitoring | n/a | a3a4908f-b068-455e-a3f5-38cc5e00448f | SP MI Sys | direct | False | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/2d361fa3-7bd4-5234-9b12-1f54afa65870 | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-vmss-monitoring (Legacy - Enable Azure Monitor for Virtual Machine Scale Sets) | 01/10/2021 21:00:50 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||||
Mg | CUST_T5 | CUST_T5 atz | inherited ESJH | Owner | 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 | Builtin | false | True | Deploy-WS-Arc-Monitoring | n/a | b0bdcb08-09c9-4d9d-957e-963d255e7220 | SP MI Sys | direct | False | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/roleassignments/38abf737-131b-52a2-90da-78943675bfed | /providers/microsoft.management/managementgroups/esjh/providers/microsoft.authorization/policyassignments/deploy-ws-arc-monitoring (Configure Log Analytics extension on Azure Arc enabled Windows servers) | 01/10/2021 21:00:50 | ObjectType: User Member, ObjectDisplayName: ESDeploymentAccount, ObjectSignInName: ESDeploymentAccount@AzGovViz.onmicrosoft.com, ObjectId: b790b1e1-6f46-488b-8c5a-708b0db9a149 | |||||||
Mg | CUST_T5 | CUST_T5 atz< |