Source | Azure Portal | ||||||||||||||
Display name | Public network access should be disabled for Azure File Sync | ||||||||||||||
Id | 21a8cd35-125e-4d13-b82d-2e19b7208bb7 | ||||||||||||||
Version | 1.0.0 Details on versioning |
||||||||||||||
Versioning |
Versions supported for Versioning: 1 1.0.0 Built-in Versioning [Preview] |
||||||||||||||
Category | Storage Microsoft Learn |
||||||||||||||
Description | Disabling the public endpoint allows you to restrict access to your Storage Sync Service resource to requests destined to approved private endpoints on your organization's network. There is nothing inherently insecure about allowing requests to the public endpoint, however, you may wish to disable it to meet regulatory, legal, or organizational policy requirements. You can disable the public endpoint for a Storage Sync Service by setting the incomingTrafficPolicy of the resource to AllowVirtualNetworksOnly. | ||||||||||||||
Cloud environments | AzureCloud = true AzureUSGovernment = true AzureChinaCloud = unknown |
||||||||||||||
Available in AzUSGov | The Policy is available in AzureUSGovernment cloud. Version: '1.0.0' Repository: Azure-Policy 21a8cd35-125e-4d13-b82d-2e19b7208bb7 |
||||||||||||||
Mode | Indexed | ||||||||||||||
Type | BuiltIn | ||||||||||||||
Preview | False | ||||||||||||||
Deprecated | False | ||||||||||||||
Effect | Default Audit Allowed Audit, Deny, Disabled |
||||||||||||||
RBAC role(s) | none | ||||||||||||||
Rule aliases | IF (1)
|
||||||||||||||
Rule resource types | IF (1) |
||||||||||||||
Compliance | Not a Compliance control | ||||||||||||||
Initiatives usage |
|
||||||||||||||
History |
|
||||||||||||||
JSON compare | n/a | ||||||||||||||
JSON |
|