Source | Azure Portal | ||||||||||||
Display name | Azure Media Services accounts should disable public network access | ||||||||||||
Id | 8bfe3603-0888-404a-87ff-5c1b6b4cc5e3 | ||||||||||||
Version | 1.0.0 Details on versioning |
||||||||||||
Versioning |
Versions supported for Versioning: 1 1.0.0 Built-in Versioning [Preview] |
||||||||||||
Category | Media Services Microsoft Learn |
||||||||||||
Description | Disabling public network access improves security by ensuring that Media Services resources are not exposed on the public internet. Creating private endpoints can limit exposure of Media Services resources. Learn more at: https://aka.ms/mediaservicesprivatelinkdocs. | ||||||||||||
Cloud environments | AzureCloud = true AzureUSGovernment = unknown AzureChinaCloud = unknown |
||||||||||||
Available in AzUSGov | Unknown, no evidence if Policy definition is/not available in AzureUSGovernment | ||||||||||||
Mode | Indexed | ||||||||||||
Type | BuiltIn | ||||||||||||
Preview | False | ||||||||||||
Deprecated | False | ||||||||||||
Effect | Default Audit Allowed Audit, Deny, Disabled |
||||||||||||
RBAC role(s) | none | ||||||||||||
Rule aliases | none | ||||||||||||
Rule resource types | none | ||||||||||||
Compliance | Not a Compliance control | ||||||||||||
Initiatives usage |
|
||||||||||||
History |
|
||||||||||||
JSON compare | n/a | ||||||||||||
JSON |
|