last sync: 2021-May-10 15:04:35 UTC

Azure Policy definition

App Service apps should enable outbound non-RFC 1918 traffic to Azure Virtual Network

Name App Service apps should enable outbound non-RFC 1918 traffic to Azure Virtual Network
Azure Portal
Id 33228571-70a4-4fa1-8ca1-26d0aba8d6ef
Version 1.0.0
details on versioning
Category App Service
Microsoft docs
Description By default, if one uses regional Azure Virtual Network (VNET) integration, the app only routes RFC1918 traffic into that respective virtual network. Using the API to set 'vnetRouteAllEnabled' to true enables all outbound traffic into the Azure Virtual Network. This setting allows features like network security groups and user defined routes to be used for all outbound traffic from the App Service app.
Mode Indexed
Type BuiltIn
Preview FALSE
Deprecated FALSE
Effect Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
Used RBAC Role none
History
Date/Time (UTC ymd) (i) Change type Change detail
2021-04-27 15:38:15 add 33228571-70a4-4fa1-8ca1-26d0aba8d6ef
Used in Initiatives none
JSON
{
  "properties": {
    "displayName": "App Service apps should enable outbound non-RFC 1918 traffic to Azure Virtual Network",
    "policyType": "BuiltIn",
    "mode": "Indexed",
    "description": "By default, if one uses regional Azure Virtual Network (VNET) integration, the app only routes RFC1918 traffic into that respective virtual network. Using the API to set 'vnetRouteAllEnabled' to true enables all outbound traffic into the Azure Virtual Network. This setting allows features like network security groups and user defined routes to be used for all outbound traffic from the App Service app.",
    "metadata": {
      "version": "1.0.0",
      "category": "App Service"
    },
    "parameters": {
      "effect": {
        "type": "String",
        "metadata": {
          "displayName": "Effect",
          "description": "Enable or disable the execution of the policy"
        },
        "allowedValues": [
          "AuditIfNotExists",
          "Disabled"
        ],
        "defaultValue": "AuditIfNotExists"
      }
    },
    "policyRule": {
      "if": {
        "field": "type",
        "equals": "Microsoft.Web/sites"
      },
      "then": {
      "effect": "[parameters('effect')]",
        "details": {
          "type": "Microsoft.Web/sites/config",
          "name": "web",
          "existenceCondition": {
            "field": "Microsoft.Web/sites/config/vnetRouteAllEnabled",
            "equals": "true"
          }
        }
      }
    }
  },
  "id": "/providers/Microsoft.Authorization/policyDefinitions/33228571-70a4-4fa1-8ca1-26d0aba8d6ef",
  "type": "Microsoft.Authorization/policyDefinitions",
  "name": "33228571-70a4-4fa1-8ca1-26d0aba8d6ef"
}