Source | Azure Portal | ||||||||||||||||||||||
Display name | Storage accounts should restrict network access using virtual network rules (excluding storage accounts created by Databricks) | ||||||||||||||||||||||
Id | db4f9b05-5ffd-4b34-b714-3c710dbb3fd6 | ||||||||||||||||||||||
Version | 1.0.0 Details on versioning |
||||||||||||||||||||||
Versioning |
Versions supported for Versioning: 1 1.0.0 Built-in Versioning [Preview] |
||||||||||||||||||||||
Category | Storage Microsoft Learn |
||||||||||||||||||||||
Description | Protect your storage accounts from potential threats using virtual network rules as a preferred method instead of IP-based filtering. Disabling IP-based filtering prevents public IPs from accessing your storage accounts. | ||||||||||||||||||||||
Cloud environments | AzureCloud = true AzureUSGovernment = true AzureChinaCloud = unknown |
||||||||||||||||||||||
Available in AzUSGov | The Policy is available in AzureUSGovernment cloud. Version: '1.*.*' | ||||||||||||||||||||||
Mode | Indexed | ||||||||||||||||||||||
Type | BuiltIn | ||||||||||||||||||||||
Preview | False | ||||||||||||||||||||||
Deprecated | False | ||||||||||||||||||||||
Effect | Default Audit Allowed Audit, Deny, Disabled |
||||||||||||||||||||||
RBAC role(s) | none | ||||||||||||||||||||||
Rule aliases | IF (2)
|
||||||||||||||||||||||
Rule resource types | IF (1) |
||||||||||||||||||||||
Compliance |
The following 1 compliance controls are associated with this Policy definition 'Storage accounts should restrict network access using virtual network rules (excluding storage accounts created by Databricks)' (db4f9b05-5ffd-4b34-b714-3c710dbb3fd6)
| ||||||||||||||||||||||
Initiatives usage |
|
||||||||||||||||||||||
History |
|
||||||||||||||||||||||
JSON compare | n/a | ||||||||||||||||||||||
JSON |
|