last sync: 2024-Jul-26 18:17:39 UTC

Azure Virtual Desktop workspaces should disable public network access

Azure BuiltIn Policy definition

Source Azure Portal
Display name Azure Virtual Desktop workspaces should disable public network access
Id 87ac3038-c07a-4b92-860d-29e270a4f3cd
Version 1.0.0
Details on versioning
Category Desktop Virtualization
Microsoft Learn
Description Disabling public network access for your Azure Virtual Desktop workspace resource prevents the feed from being accessible over the public internet. Allowing only private network access improves security and keeps your data safe. Learn more at: https://aka.ms/avdprivatelink.
Mode Indexed
Type BuiltIn
Preview False
Deprecated False
Effect Default
Audit
Allowed
Audit, Deny, Disabled
RBAC role(s) none
Rule aliases IF (1)
Alias Namespace ResourceType Path PathIsDefault DefaultPath Modifiable
Microsoft.DesktopVirtualization/workspaces/publicNetworkAccess Microsoft.DesktopVirtualization workspaces properties.publicNetworkAccess True True
Rule resource types IF (1)
Microsoft.DesktopVirtualization/workspaces
Compliance Not a Compliance control
Initiatives usage
Initiative DisplayName Initiative Id Initiative Category State Type
Public network access should be disabled for PaaS services Deny-PublicPaaSEndpoints Network GA ALZ
History
Date/Time (UTC ymd) (i) Change type Change detail
2023-02-16 18:41:08 add 87ac3038-c07a-4b92-860d-29e270a4f3cd
JSON compare n/a
JSON
api-version=2021-06-01
EPAC