last sync: 2020-Oct-01 14:15:17 UTC

Azure Policy

Operating system version should be the most current version for your cloud service roles

Policy DisplayName Operating system version should be the most current version for your cloud service roles
Policy Id 5a913c68-0590-402c-a531-e57e19379da3
Policy Category Security Center
Policy Description Keeping the operating system (OS) on the most recent supported version for your cloud service roles enhances the systems security posture.
Policy Mode All
Policy Type BuiltIn
Policy in Preview FALSE
Policy Deprecated FALSE
Policy Effect Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
Roles used none
Policy Changes
Date/Time (UTC ymd) (i) Change Change detail
2020-09-09 11:24:03 add: Policy 5a913c68-0590-402c-a531-e57e19379da3
Used in Policy Initiative(s)
Initiative DisplayName Initiative Id
Enable Monitoring in Azure Security Center 1f3afdf9-d0c9-4c3d-847f-89da613e70a8
Policy Rule
{
  "properties": {
    "displayName": "Operating system version should be the most current version for your cloud service roles",
    "policyType": "BuiltIn",
    "mode": "All",
    "description": "Keeping the operating system (OS) on the most recent supported version for your cloud service roles enhances the systems security posture.",
    "metadata": {
      "version": "1.0.0",
      "category": "Security Center"
    },
    "parameters": {
      "effect": {
        "type": "String",
        "metadata": {
          "displayName": "Effect",
          "description": "Enable or disable the execution of the policy"
        },
        "allowedValues": [
          "AuditIfNotExists",
          "Disabled"
        ],
        "defaultValue": "AuditIfNotExists"
      }
    },
    "policyRule": {
      "if": {
        "field": "type",
        "in": [
          "Microsoft.ClassicCompute/domainNames/slots/roles"
        ]
      },
      "then": {
      "effect": "[parameters('effect')]",
        "details": {
          "type": "Microsoft.Security/assessments",
          "name": "8bc390da-9eb6-938d-25ed-44a35d9bcc9d",
          "existenceCondition": {
            "field": "Microsoft.Security/assessments/status.code",
            "in": [
              "NotApplicable",
              "Healthy"
            ]
          }
        }
      }
    }
  },
  "id": "/providers/Microsoft.Authorization/policyDefinitions/5a913c68-0590-402c-a531-e57e19379da3",
  "type": "Microsoft.Authorization/policyDefinitions",
  "name": "5a913c68-0590-402c-a531-e57e19379da3"
}