| Source | Azure Portal | ||||||||||||||
| Display name | [Deprecated]: Access to App Services should be restricted | ||||||||||||||
| Id | 1a833ff1-d297-4a0f-9944-888428f8e0ff | ||||||||||||||
| Version | 1.0.0-deprecated Details on versioning  | 
                ||||||||||||||
| Versioning | 
                        Versions supported for Versioning: 1 1.0.0 (1.0.0-deprecated) Built-in Versioning [Preview]  | 
                ||||||||||||||
| Category | Security Center Microsoft Learn  | 
                ||||||||||||||
| Description | Azure security center has discovered that the networking configuration of some of your app services are overly permissive and allow inbound traffic from ranges that are too broad | ||||||||||||||
| Cloud environments | AzureCloud = true AzureUSGovernment = true AzureChinaCloud = unknown  | 
                ||||||||||||||
| Available in AzUSGov | The Policy is available in AzureUSGovernment cloud. Version: '1.0.0-deprecated' Repository: Azure-Policy 1a833ff1-d297-4a0f-9944-888428f8e0ff  | 
                ||||||||||||||
| Mode | All | ||||||||||||||
| Type | BuiltIn | ||||||||||||||
| Preview | False | ||||||||||||||
| Deprecated | True | ||||||||||||||
| Effect |                 Default Disabled Allowed AuditIfNotExists, Disabled  | 
                ||||||||||||||
| RBAC role(s) | none | ||||||||||||||
| Rule aliases |                     THEN-ExistenceCondition (1)
  | 
                ||||||||||||||
| Rule resource types |                 IF (1) | 
                ||||||||||||||
| Compliance | Not a Compliance control | ||||||||||||||
| Initiatives usage | none | ||||||||||||||
| History |                         
  | 
                ||||||||||||||
| JSON compare | n/a | ||||||||||||||
| JSON | 
                    
  |