last sync: 2020-Jul-13 14:14:31 UTC

Azure Policy Initiative

[Deprecated]: DOD Impact Level 4

Initiative DisplayName [Deprecated]: DOD Impact Level 4
Initiative Id 8d792a84-723c-4d92-a3c3-e4ed16a2d133
Initiative Category Regulatory Compliance
Initiative Description This initiative includes audit and virtual machine extension deployment policies that address a subset of DOD Impact Level 4 (IL4) controls. Additional policies will be added in upcoming releases. For more information, visit https://aka.ms/dodil4-blueprint.
Initiative Type BuiltIn
Initiative Changes
Date/Time (UTC ymd) (i) Change(s)
2020-07-01 14:50:07 remove Policy [Deprecated]: Advanced Threat Protection types should be set to 'All' in SQL Managed Instance advanced data security settings (bda18df3-5e41-4709-add9-2554ce68c966)
remove Policy [Deprecated]: Advanced data security settings for SQL Managed Instance should contain an email address to receive security alerts (3965c43d-b5f4-482e-b74a-d89ee0e0b3a8)
remove Policy [Deprecated]: Advanced data security settings for SQL server should contain an email address to receive security alerts (9677b740-f641-4f3c-b9c5-466005c85278)
remove Policy [Deprecated]: Email notifications to admins and subscription owners should be enabled in SQL server advanced data security settings (c8343d2f-fdc9-4a97-b76f-fc71d1163bfc)
remove Policy [Deprecated]: Email notifications to admins and subscription owners should be enabled in SQL Managed Instance advanced data security settings (aeb23562-188d-47cb-80b8-551f16ef9fff)
remove Policy [Deprecated]: Advanced Threat Protection types should be set to 'All' in SQL server Advanced Data Security settings (e756b945-1b1b-480b-8de8-9a0859d5f7ad)
2020-06-23 16:03:23 remove Policy Security Center standard pricing tier should be selected (a1181c5f-672a-477a-979a-7d58aa086233)
2020-06-16 14:55:25 change Description Description change: 'This initiative includes audit and VM extension deployment policies that address a subset of DOD Impact Level 4 (IL4) controls. Additional policies will be added in upcoming releases. For more information, visit https://aka.ms/dodil4-blueprint.' to 'This initiative includes audit and virtual machine extension deployment policies that address a subset of DOD Impact Level 4 (IL4) controls. Additional policies will be added in upcoming releases. For more information, visit https://aka.ms/dodil4-blueprint.'
2020-06-01 18:36:21 change DisplayName Name change: '[Deprecated]: Audit DoD Impact Level 4 controls and deploy specific VM Extensions to support audit requirements' to '[Deprecated]: DOD Impact Level 4'
change Description Description change: 'This initiative includes audit and VM Extension deployment policies that address a subset of DoD Impact Level 4 controls. Additional policies will be added in upcoming releases. For more information, please visit https://aka.ms/DoDIL4-blueprint.' to 'This initiative includes audit and VM extension deployment policies that address a subset of DOD Impact Level 4 (IL4) controls. Additional policies will be added in upcoming releases. For more information, visit https://aka.ms/dodil4-blueprint.'
2020-05-29 15:39:26 add Policy The Log Analytics agent should be installed on virtual machines (a70ca396-0a34-413a-88e1-b956c1e683be)
add Policy Network Watcher should be enabled (b6e2945c-0b7b-40f5-9233-7a5323b5cdc6)
add Policy The Log Analytics agent should be installed on Virtual Machine Scale Sets (efbde977-ba53-4479-b8e9-10b957924fbf)
change DisplayName Name change: '[Preview]: Audit DoD Impact Level 4 controls and deploy specific VM Extensions to support audit requirements' to '[Deprecated]: Audit DoD Impact Level 4 controls and deploy specific VM Extensions to support audit requirements'
add Policy Microsoft IaaSAntimalware extension should be deployed on Windows servers (9b597639-28e4-48eb-b506-56b05d366257)
2020-03-16 18:14:00 change Description Description change: 'Assigns policies to address specific DoD Impact Level 4 (IL4) controls. Learn more - https://aka.ms/DoDIL4-blueprint.' to 'This initiative includes audit and VM Extension deployment policies that address a subset of DoD Impact Level 4 controls. Additional policies will be added in upcoming releases. For more information, please visit https://aka.ms/DoDIL4-blueprint.'
change DisplayName Name change: '[Preview]: DoD Impact Level 4' to '[Preview]: Audit DoD Impact Level 4 controls and deploy specific VM Extensions to support audit requirements'
2020-03-03 10:09:24 add Policy [Preview]: Kubernetes Services should be upgraded to a non-vulnerable Kubernetes version (fb893a29-21bb-418c-a157-e99480ec364c)
add Policy Ensure that 'HTTP Version' is the latest, if used to run the Web app (8c122334-9d20-4eb8-89ea-ac9a705b74ae)
add Policy Ensure that 'Python version' is the latest, if used as a part of the Api app (74c3584d-afae-46f7-a20a-6f8adba71a16)
add Policy Ensure that 'PHP version' is the latest, if used as a part of the Api app (1bc1795e-d44a-4d48-9b3b-6fff0fd5f9ba)
add Policy Ensure that 'Java version' is the latest, if used as a part of the Web app (496223c3-ad65-4ecd-878a-bae78737e9ed)
add Policy [Deprecated]: Email notifications to admins and subscription owners should be enabled in SQL Managed Instance advanced data security settings (aeb23562-188d-47cb-80b8-551f16ef9fff)
add Policy Ensure that '.NET Framework' version is the latest, if used as a part of the Function App (10c1859c-e1a7-4df3-ab97-a487fa8059f6)
remove Policy Allowed locations (e56962a6-4747-49cd-b67b-bf8b01975c4c)
add Policy [Deprecated]: Advanced Threat Protection types should be set to 'All' in SQL server Advanced Data Security settings (e756b945-1b1b-480b-8de8-9a0859d5f7ad)
add Policy Latest TLS version should be used in your API App (8cb6aa8b-9e41-4f4e-aa25-089a7ac2581e)
add Policy Ensure that 'Python version' is the latest, if used as a part of the Function app (7238174a-fd10-4ef0-817e-fc820a951d73)
add Policy [Deprecated]: Advanced Threat Protection types should be set to 'All' in SQL Managed Instance advanced data security settings (bda18df3-5e41-4709-add9-2554ce68c966)
add Policy Latest TLS version should be used in your Function App (f9d614c5-c173-4d56-95a7-b4437057d193)
add Policy Ensure that 'Java version' is the latest, if used as a part of the Api app (88999f4c-376a-45c8-bcb3-4058f713cf39)
add Policy Latest TLS version should be used in your Web App (f0e6e85b-9b9f-4a4b-b67b-f730d42f1b0b)
add Policy Ensure that 'Java version' is the latest, if used as a part of the Function app (9d0b6ea4-93e2-4578-bf2f-6bb17d22b4bc)
add Policy A security contact phone number should be provided for your subscription (b4d66858-c922-44e3-9566-5cdb7a7be744)
add Policy A security contact email address should be provided for your subscription (4f4f78b8-e367-4b10-a341-d9a4ad5cf1c7)
add Policy Vulnerabilities in container security configurations should be remediated (e8cbc669-f12d-49eb-93e7-9273119e9933)
add Policy Email notification to subscription owner for high severity alerts should be enabled (0b15565f-aa9e-48ba-8619-45960f2c314d)
add Policy Ensure that 'HTTP Version' is the latest, if used to run the Api app (991310cd-e9f3-47bc-b7b6-f57b557d07db)
add Policy Ensure that '.NET Framework' version is the latest, if used as a part of the Web app (843664e0-7563-41ee-a9cb-7522c382d2c4)
add Policy Ensure that 'PHP version' is the latest, if used as a part of the Function app (ab965db2-d2bf-4b64-8b39-c38ec8179461)
remove Policy Allowed locations for resource groups (e765b5de-1225-4ba3-bd56-1ac6695af988)
add Policy Ensure that 'HTTP Version' is the latest, if used to run the Function app (e2c1c086-2d84-4019-bff3-c44ccd95113c)
add Policy Ensure that 'PHP version' is the latest, if used as a part of the WEB app (7261b898-8a84-4db8-9e04-18527132abb3)
add Policy [Deprecated]: Advanced data security settings for SQL Managed Instance should contain an email address to receive security alerts (3965c43d-b5f4-482e-b74a-d89ee0e0b3a8)
add Policy Ensure that '.NET Framework' version is the latest, if used as a part of the API app (c2e7ca55-f62c-49b2-89a4-d41eb661d2f0)
add Policy Ensure that 'Python version' is the latest, if used as a part of the Web app (7008174a-fd10-4ef0-817e-fc820a951d73)
add Policy Security Center standard pricing tier should be selected (a1181c5f-672a-477a-979a-7d58aa086233)
add Policy [Deprecated]: Email notifications to admins and subscription owners should be enabled in SQL server advanced data security settings (c8343d2f-fdc9-4a97-b76f-fc71d1163bfc)
add Policy [Deprecated]: Advanced data security settings for SQL server should contain an email address to receive security alerts (9677b740-f641-4f3c-b9c5-466005c85278)
2020-02-20 08:25:18 remove Policy [Deprecated]: Web ports should be restricted on Network Security Groups associated to your VM (201ea587-7c90-41c3-910f-c280ae01cfd6)
2020-02-05 07:51:53 add Initiative 8d792a84-723c-4d92-a3c3-e4ed16a2d133
Initiative Policies count Total Policies: 105
Builtin Policies: 105/105
Static Policies: 0/105
Initiative Policies
Policy DisplayName Policy Id
Ensure that '.NET Framework' version is the latest, if used as a part of the API app c2e7ca55-f62c-49b2-89a4-d41eb661d2f0
Vulnerabilities in security configuration on your machines should be remediated e1e5fd5d-3e4c-4ce1-8661-7d1873ae6b15
Geo-redundant backup should be enabled for Azure Database for MySQL 82339799-d096-41ae-8538-b108becf0970
Show audit results from Windows VMs that do not have the password complexity setting enabled f48b2913-1dc5-4834-8c72-ccc1dfd819bb
Show audit results from Windows VMs that do not restrict the minimum password length to 14 characters 5aebc8d1-020d-4037-89a0-02043a7524ec
Show audit results from Linux VMs that do not have the passwd file permissions set to 0644 b18175dd-c599-4c64-83ba-bb018a06d35b
Adaptive application controls for whitelisting safe applications should be enabled on your machines 47a6b606-51aa-4496-8bb7-64b11cf66adc
[Preview]: Audit Log Analytics Agent Deployment - VM Image (OS) unlisted 32133ab0-ee4b-4b44-98d6-042180979d50
Ensure that 'Java version' is the latest, if used as a part of the Web app 496223c3-ad65-4ecd-878a-bae78737e9ed
Show audit results from Linux VMs that allow remote connections from accounts without passwords 2d67222d-05fd-4526-a171-2ee132ad9e83
A security contact email address should be provided for your subscription 4f4f78b8-e367-4b10-a341-d9a4ad5cf1c7
Vulnerabilities should be remediated by a Vulnerability Assessment solution 760a85ff-6162-42b3-8d70-698e268f648c
Show audit results from Windows web servers that are not using secure communication protocols 60ffe3e2-4604-4460-8f22-0f1da058266c
The Log Analytics agent should be installed on Virtual Machine Scale Sets efbde977-ba53-4479-b8e9-10b957924fbf
Deploy prerequisites to audit Windows VMs that do not have the password complexity setting enabled 7ed40801-8a0f-4ceb-85c0-9fd25c1d61a8
Remote debugging should be turned off for Function Apps 0e60b895-3786-45da-8377-9c6b4b6ac5f9
Remote debugging should be turned off for API Apps e9c8d085-d9cc-4b17-9cdc-059f1f01f19e
Latest TLS version should be used in your API App 8cb6aa8b-9e41-4f4e-aa25-089a7ac2581e
Ensure that 'Python version' is the latest, if used as a part of the Api app 74c3584d-afae-46f7-a20a-6f8adba71a16
Service Fabric clusters should only use Azure Active Directory for client authentication b54ed75b-3e1a-44ac-a333-05ba39b99ff0
Show audit results from Windows VMs that do not have a maximum password age of 70 days 24dde96d-f0b1-425e-884f-4a1421e2dcdc
Deploy prerequisites to audit Windows VMs that allow re-use of the previous 24 passwords 726671ac-c4de-4908-8c7d-6043ae62e3b6
Deploy prerequisites to audit Windows VMs that do not store passwords using reversible encryption 8ff0b18b-262e-4512-857a-48ad0aeb9a78
Access through Internet facing endpoint should be restricted 9daedab3-fb2d-461e-b861-71790eead4f6
Storage accounts should restrict network access 34c877ad-507e-4c82-993e-3452a6e0ad3c
Long-term geo-redundant backup should be enabled for Azure SQL Databases d38fc420-0735-4ef3-ac11-c806f651a570
Show audit results from Windows VMs that do not have a minimum password age of 1 day 5aa11bbc-5c76-4302-80e5-aba46a4282e7
Azure DDoS Protection Standard should be enabled a7aca53f-2ed4-4466-a25e-0b45ade68efd
Monitor missing Endpoint Protection in Azure Security Center af6cd1bd-1635-48cb-bde7-5b15693900b9
Auditing on SQL server should be enabled a6fb4358-5bf4-4ad7-ba82-2cd2f41ce5e9
Ensure that 'Python version' is the latest, if used as a part of the Web app 7008174a-fd10-4ef0-817e-fc820a951d73
API App should only be accessible over HTTPS b7ddfbdc-1260-477d-91fd-98bd9be789a6
Management ports of virtual machines should be protected with just-in-time network access control b0f33259-77d7-4c9e-aac6-3aabcfae693c
System updates should be installed on your machines 86b3d65f-7626-441e-b690-81a8b71cff60
Deploy prerequisites to audit Windows VMs in which the Administrators group does not contain all of the specified members 93507a81-10a4-4af0-9ee2-34cf25a96e98
Advanced data security should be enabled on your SQL servers abfb4388-5bf4-4ad7-ba82-2cd2f41ceae9
Web Application should only be accessible over HTTPS a4af4a39-4135-47fb-b175-47fbdf85311d
A maximum of 3 owners should be designated for your subscription 4f11b553-d42e-4e3a-89be-32ca364cad4c
Audit diagnostic setting 7f89b1eb-583c-429a-8828-af049802c1d9
Geo-redundant backup should be enabled for Azure Database for PostgreSQL 48af4db5-9b8b-401c-8e74-076be876a430
Deploy prerequisites to audit Linux VMs that do not have the passwd file permissions set to 0644 f19aa1c1-6b91-4c27-ae6a-970279f03db9
Disk encryption should be applied on virtual machines 0961003e-5a0a-4549-abde-af6a37f2724d
Deploy prerequisites to audit Windows VMs that do not have a minimum password age of 1 day 16390df4-2f73-4b42-af13-c801066763df
Advanced data security should be enabled on SQL Managed Instance abfb7388-5bf4-4ad7-ba99-2cd2f41cebb9
External accounts with read permissions should be removed from your subscription 5f76cf89-fbf2-47fd-a3f4-b891fa780b60
External accounts with owner permissions should be removed from your subscription f8456c1c-aa66-4dfb-861a-25d127b775c9
There should be more than one owner assigned to your subscription 09024ccc-0c5f-475e-9457-b7c0d9ed487b
Transparent Data Encryption on SQL databases should be enabled 17k78e20-9358-41c9-923c-fb736d382a12
Remote debugging should be turned off for Web Applications cb510bfd-1cba-4d9f-a230-cb0976f4bb71
Ensure that '.NET Framework' version is the latest, if used as a part of the Web app 843664e0-7563-41ee-a9cb-7522c382d2c4
Ensure that 'PHP version' is the latest, if used as a part of the Api app 1bc1795e-d44a-4d48-9b3b-6fff0fd5f9ba
Adaptive Network Hardening recommendations should be applied on internet facing virtual machines 08e6af2d-db70-460a-bfe9-d5bd474ba9d6
Latest TLS version should be used in your Web App f0e6e85b-9b9f-4a4b-b67b-f730d42f1b0b
An Azure Active Directory administrator should be provisioned for SQL servers 1f314764-cb73-4fc9-b863-8eca98ac36e9
External accounts with write permissions should be removed from your subscription 5c607a2e-c700-4744-8254-d77e7c9eb5e4
[Preview] Vulnerability Assessment should be enabled on Virtual Machines 501541f7-f7e7-4cd6-868c-4190fdad3ac9
Vulnerabilities in security configuration on your virtual machine scale sets should be remediated 3c735d8a-a4ba-4a3a-b7cf-db7754cf57f4
Vulnerabilities on your SQL databases should be remediated feedbf84-6b99-488c-acc2-71c829aa5ffc
Vulnerability assessment should be enabled on your SQL servers ef2a8f2a-b3d9-49cd-a8a8-9a3aaaf647d9
Ensure that '.NET Framework' version is the latest, if used as a part of the Function App 10c1859c-e1a7-4df3-ab97-a487fa8059f6
Audit Log Analytics agent deployment in virtual machine scale sets - VM Image (OS) unlisted 5c3bc7b8-a64c-4e08-a9cd-7ff0f31e1138
Deprecated accounts should be removed from your subscription 6b1cbf55-e8b6-442f-ba4c-7246b6381474
Ensure that 'HTTP Version' is the latest, if used to run the Api app 991310cd-e9f3-47bc-b7b6-f57b557d07db
Geo-redundant backup should be enabled for Azure Database for MariaDB 0ec47710-77ff-4a3d-9181-6aa50af424d0
Function App should only be accessible over HTTPS 6d555dd1-86f2-4f1c-8ed7-5abae7c6cbab
[Preview]: Kubernetes Services should be upgraded to a non-vulnerable Kubernetes version fb893a29-21bb-418c-a157-e99480ec364c
Show audit results from Windows VMs in which the Administrators group does not contain all of the specified members f3b44e5d-1456-475f-9c67-c66c4618e85a
Secure transfer to storage accounts should be enabled 404c3081-a854-4457-ae30-26a93ef643f9
Deploy prerequisites to audit Windows web servers that are not using secure communication protocols b2fc8f91-866d-4434-9089-5ebfe38d6fd8
MFA should be enabled accounts with write permissions on your subscription 9297c21d-2ed6-4474-b48f-163f75654ce3
Show audit results from Windows VMs that do not store passwords using reversible encryption 2d60d3b7-aa10-454c-88a8-de39d99d17c6
Audit virtual machines without disaster recovery configured 0015ea4d-51ff-4ce3-8d8c-f3f8f0179a56
Audit usage of custom RBAC rules a451c1ef-c6ca-483d-87ed-f49761e3ffb5
Endpoint protection solution should be installed on virtual machine scale sets 26a828e1-e88f-464e-bbb3-c134a282b9de
The Log Analytics agent should be installed on virtual machines a70ca396-0a34-413a-88e1-b956c1e683be
System updates on virtual machine scale sets should be installed c3f317a7-a95c-4547-b7e7-11017ebdf2fe
Ensure that 'Java version' is the latest, if used as a part of the Api app 88999f4c-376a-45c8-bcb3-4058f713cf39
A security contact phone number should be provided for your subscription b4d66858-c922-44e3-9566-5cdb7a7be744
Vulnerabilities in container security configurations should be remediated e8cbc669-f12d-49eb-93e7-9273119e9933
Ensure that 'HTTP Version' is the latest, if used to run the Web app 8c122334-9d20-4eb8-89ea-ac9a705b74ae
Ensure that 'HTTP Version' is the latest, if used to run the Function app e2c1c086-2d84-4019-bff3-c44ccd95113c
Show audit results from Windows VMs in which the Administrators group contains any of the specified members bde62c94-ccca-4821-a815-92c1d31a76de
Ensure that 'PHP version' is the latest, if used as a part of the WEB app 7261b898-8a84-4db8-9e04-18527132abb3
Email notification to subscription owner for high severity alerts should be enabled 0b15565f-aa9e-48ba-8619-45960f2c314d
Show audit results from Linux VMs that have accounts without passwords c40c9087-1981-4e73-9f53-39743eda9d05
Deploy prerequisites to audit Windows VMs that do not restrict the minimum password length to 14 characters 23020aa6-1135-4be2-bae2-149982b06eca
Deploy prerequisites to audit Windows VMs in which the Administrators group contains any of the specified members 144f1397-32f9-4598-8c88-118decc3ccba
Deprecated accounts with owner permissions should be removed from your subscription ebb62a0c-3560-49e1-89ed-27e074e9f8ad
Ensure that 'PHP version' is the latest, if used as a part of the Function app ab965db2-d2bf-4b64-8b39-c38ec8179461
Geo-redundant storage should be enabled for Storage Accounts bf045164-79ba-4215-8f95-f8048dc1780b
Show audit results from Windows VMs that allow re-use of the previous 24 passwords cdbf72d9-ac9c-4026-8a3a-491a5ac59293
Audit Log Analytics workspace for VM - Report Mismatch f47b5582-33ec-4c5c-87c0-b010a6b2e917
Ensure that 'Python version' is the latest, if used as a part of the Function app 7238174a-fd10-4ef0-817e-fc820a951d73
Vulnerability assessment should be enabled on SQL Managed Instance 1b7aa243-30e4-4c9e-bca8-d0d3022b634a
Deploy prerequisites to audit Windows VMs that do not have a maximum password age of 70 days 356a906e-05e5-4625-8729-90771e0ee934
Deploy prerequisites to audit Linux VMs that have accounts without passwords 3470477a-b35a-49db-aca5-1073d04524fe
Ensure that 'Java version' is the latest, if used as a part of the Function app 9d0b6ea4-93e2-4578-bf2f-6bb17d22b4bc
Microsoft IaaSAntimalware extension should be deployed on Windows servers 9b597639-28e4-48eb-b506-56b05d366257
Network Watcher should be enabled b6e2945c-0b7b-40f5-9233-7a5323b5cdc6
Latest TLS version should be used in your Function App f9d614c5-c173-4d56-95a7-b4437057d193
MFA should be enabled on accounts with read permissions on your subscription e3576e28-8b17-4677-84c3-db2990658d64
Deploy prerequisites to audit Linux VMs that allow remote connections from accounts without passwords ec49586f-4939-402d-a29e-6ff502b20592
Only secure connections to your Azure Cache for Redis should be enabled 22bee202-a82f-4305-9a2a-6d7f44d4dedb
CORS should not allow every resource to access your Web Applications 5744710e-cc2f-4ee8-8809-3b11e89f4bc9
MFA should be enabled on accounts with owner permissions on your subscription aa633080-8b72-40c4-a2d7-d00c03e80bed
Initiative Rule
{
  "properties": {
  "displayName": "[Deprecated]: DOD Impact Level 4",
    "policyType": "BuiltIn",
    "description": "This initiative includes audit and virtual machine extension deployment policies that address a subset of DOD Impact Level 4 (IL4) controls. Additional policies will be added in upcoming releases. For more information, visit https://aka.ms/dodil4-blueprint.",
    "metadata": {
      "version": "4.1.1-deprecated",
      "category": "Regulatory Compliance",
      "deprecated": true
    },
    "parameters": {
      "listOfAllowedLocationsForResourcesAndResourceGroups": {
        "type": "Array",
        "metadata": {
        "displayName": "[Deprecated]: Allowed locations for resources and resource groups",
          "description": "To see a complete list of regions use Get-AzLocation",
          "strongType": "location",
          "deprecated": true
        }
      },
      "membersToIncludeInAdministratorsLocalGroup": {
        "type": "String",
        "metadata": {
        "displayName": "[Deprecated]: List of users that must be included in Windows VM Administrators group",
          "description": "A semicolon-separated list of users that should be included in the Administrators local group; Ex: Administrator; myUser1; myUser2"
        }
      },
      "membersToExcludeInAdministratorsLocalGroup": {
        "type": "String",
        "metadata": {
        "displayName": "[Deprecated]: List of users excluded from Windows VM Administrators group",
          "description": "A semicolon-separated list of users that should be excluded in the Administrators local group; Ex: Administrator; myUser1; myUser2"
        }
      },
      "logAnalyticsWorkspaceIdForVMs": {
        "type": "String",
        "metadata": {
        "displayName": "[Deprecated]: Log Analytics workspace ID for VM agent reporting",
          "description": "ID (GUID) of the Log Analytics workspace where VMs agents should report"
        }
      },
      "listOfResourceTypes": {
        "type": "Array",
        "metadata": {
        "displayName": "[Deprecated]: List of resource types that should have diagnostic logs enabled"
        },
        "allowedValues": [
          "Microsoft.AnalysisServices/servers",
          "Microsoft.ApiManagement/service",
          "Microsoft.Network/applicationGateways",
          "Microsoft.Automation/automationAccounts",
          "Microsoft.ContainerInstance/containerGroups",
          "Microsoft.ContainerRegistry/registries",
          "Microsoft.ContainerService/managedClusters",
          "Microsoft.Batch/batchAccounts",
          "Microsoft.Cdn/profiles/endpoints",
          "Microsoft.CognitiveServices/accounts",
          "Microsoft.DocumentDB/databaseAccounts",
          "Microsoft.DataFactory/factories",
          "Microsoft.DataLakeAnalytics/accounts",
          "Microsoft.DataLakeStore/accounts",
          "Microsoft.EventGrid/eventSubscriptions",
          "Microsoft.EventGrid/topics",
          "Microsoft.EventHub/namespaces",
          "Microsoft.Network/expressRouteCircuits",
          "Microsoft.Network/azureFirewalls",
          "Microsoft.HDInsight/clusters",
          "Microsoft.Devices/IotHubs",
          "Microsoft.KeyVault/vaults",
          "Microsoft.Network/loadBalancers",
          "Microsoft.Logic/integrationAccounts",
          "Microsoft.Logic/workflows",
          "Microsoft.DBforMySQL/servers",
          "Microsoft.Network/networkInterfaces",
          "Microsoft.Network/networkSecurityGroups",
          "Microsoft.DBforPostgreSQL/servers",
          "Microsoft.PowerBIDedicated/capacities",
          "Microsoft.Network/publicIPAddresses",
          "Microsoft.RecoveryServices/vaults",
          "Microsoft.Cache/redis",
          "Microsoft.Relay/namespaces",
          "Microsoft.Search/searchServices",
          "Microsoft.ServiceBus/namespaces",
          "Microsoft.SignalRService/SignalR",
          "Microsoft.Sql/servers/databases",
          "Microsoft.Sql/servers/elasticPools",
          "Microsoft.StreamAnalytics/streamingjobs",
          "Microsoft.TimeSeriesInsights/environments",
          "Microsoft.Network/trafficManagerProfiles",
          "Microsoft.Compute/virtualMachines",
          "Microsoft.Compute/virtualMachineScaleSets",
          "Microsoft.Network/virtualNetworks",
          "Microsoft.Network/virtualNetworkGateways"
        ],
        "defaultValue": [
          "Microsoft.AnalysisServices/servers",
          "Microsoft.ApiManagement/service",
          "Microsoft.Network/applicationGateways",
          "Microsoft.Automation/automationAccounts",
          "Microsoft.ContainerInstance/containerGroups",
          "Microsoft.ContainerRegistry/registries",
          "Microsoft.ContainerService/managedClusters",
          "Microsoft.Batch/batchAccounts",
          "Microsoft.Cdn/profiles/endpoints",
          "Microsoft.CognitiveServices/accounts",
          "Microsoft.DocumentDB/databaseAccounts",
          "Microsoft.DataFactory/factories",
          "Microsoft.DataLakeAnalytics/accounts",
          "Microsoft.DataLakeStore/accounts",
          "Microsoft.EventGrid/eventSubscriptions",
          "Microsoft.EventGrid/topics",
          "Microsoft.EventHub/namespaces",
          "Microsoft.Network/expressRouteCircuits",
          "Microsoft.Network/azureFirewalls",
          "Microsoft.HDInsight/clusters",
          "Microsoft.Devices/IotHubs",
          "Microsoft.KeyVault/vaults",
          "Microsoft.Network/loadBalancers",
          "Microsoft.Logic/integrationAccounts",
          "Microsoft.Logic/workflows",
          "Microsoft.DBforMySQL/servers",
          "Microsoft.Network/networkInterfaces",
          "Microsoft.Network/networkSecurityGroups",
          "Microsoft.DBforPostgreSQL/servers",
          "Microsoft.PowerBIDedicated/capacities",
          "Microsoft.Network/publicIPAddresses",
          "Microsoft.RecoveryServices/vaults",
          "Microsoft.Cache/redis",
          "Microsoft.Relay/namespaces",
          "Microsoft.Search/searchServices",
          "Microsoft.ServiceBus/namespaces",
          "Microsoft.SignalRService/SignalR",
          "Microsoft.Sql/servers/databases",
          "Microsoft.Sql/servers/elasticPools",
          "Microsoft.StreamAnalytics/streamingjobs",
          "Microsoft.TimeSeriesInsights/environments",
          "Microsoft.Network/trafficManagerProfiles",
          "Microsoft.Compute/virtualMachines",
          "Microsoft.Compute/virtualMachineScaleSets",
          "Microsoft.Network/virtualNetworks",
          "Microsoft.Network/virtualNetworkGateways"
        ]
      },
      "listOfLocations": {
        "type": "Array",
        "metadata": {
        "displayName": "[Deprecated]: List of regions where Network Watcher should be enabled",
          "description": "To see a complete list of regions use Get-AzLocation",
          "strongType": "location"
        },
        "defaultValue": [
          "eastus"
        ]
      },
      "vulnerabilityAssessmentOnManagedInstanceMonitoringEffect": {
        "type": "String",
        "metadata": {
        "displayName": "[Deprecated]: Effect for policy: Vulnerability assessment should be enabled on SQL Managed Instance",
          "description": "Azure Policy effect for this policy; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "AuditIfNotExists",
          "Disabled"
        ],
        "defaultValue": "AuditIfNotExists"
      },
      "vulnerabilityAssessmentOnServerMonitoringEffect": {
        "type": "String",
        "metadata": {
        "displayName": "[Deprecated]: Effect for policy: Vulnerability assessment should be enabled on your SQL servers",
          "description": "Azure Policy effect for this policy; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "AuditIfNotExists",
          "Disabled"
        ],
        "defaultValue": "AuditIfNotExists"
      },
      "vulnerabilityAssessmentOnVirtualMachinesEffect": {
        "type": "String",
        "metadata": {
        "displayName": "[Deprecated]: Vulnerability Assessment should be enabled on Virtual Machines",
          "description": "Monitors vulnerabilities detected by Azure Security Center Vulnerability Assessment on Virtual Machines"
        },
        "allowedValues": [
          "AuditIfNotExists",
          "Disabled"
        ],
        "defaultValue": "AuditIfNotExists"
      },
      "geoRedundancyEnabledForStorageAccountsEffect": {
        "type": "String",
        "metadata": {
        "displayName": "[Deprecated]: Effect for policy: Geo-redundant storage should be enabled for Storage Accounts",
          "description": "Azure Policy effect for this policy; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "Audit",
          "Disabled"
        ],
        "defaultValue": "Audit"
      },
      "geoRedundancyEnabledForAzureDatabaseForMariaDBEffect": {
        "type": "String",
        "metadata": {
        "displayName": "[Deprecated]: Effect for policy: Geo-redundant backup should be enabled for Azure Database for MariaDB",
          "description": "Azure Policy effect for this policy; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "Audit",
          "Disabled"
        ],
        "defaultValue": "Audit"
      },
      "geoRedundancyEnabledForAzureDatabaseForMySQLEffect": {
        "type": "String",
        "metadata": {
        "displayName": "[Deprecated]: Effect for policy: Geo-redundant backup should be enabled for Azure Database for MySQL",
          "description": "Azure Policy effect for this policy; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "Audit",
          "Disabled"
        ],
        "defaultValue": "Audit"
      },
      "geoRedundancyEnabledForAzureDatabaseForPostgreSQLEffect": {
        "type": "String",
        "metadata": {
        "displayName": "[Deprecated]: Effect for policy: Geo-redundant backup should be enabled for Azure Database for PostgreSQL",
          "description": "Azure Policy effect for this policy; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "Audit",
          "Disabled"
        ],
        "defaultValue": "Audit"
      },
      "adaptiveNetworkHardeningsMonitoringEffect": {
        "type": "String",
        "metadata": {
        "displayName": "[Deprecated]: Adaptive Network Hardening recommendations should be applied on internet facing virtual machines",
          "description": "Enable or disable the monitoring of Internet-facing virtual machines for Network Security Group traffic hardening recommendations"
        },
        "allowedValues": [
          "AuditIfNotExists",
          "Disabled"
        ],
        "defaultValue": "AuditIfNotExists"
      },
      "webAppEnforceHttpsMonitoringEffect": {
        "type": "String",
        "metadata": {
        "displayName": "[Deprecated]: Effect for policy: Web Application should only be accessible over HTTPS",
          "description": "Azure Policy effect for this policy; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "Audit",
          "Disabled"
        ],
        "defaultValue": "Audit"
      },
      "functionAppEnforceHttpsMonitoringEffect": {
        "type": "String",
        "metadata": {
        "displayName": "[Deprecated]: Effect for policy: Function App should only be accessible over HTTPS",
          "description": "Azure Policy effect for this policy; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "Audit",
          "Disabled"
        ],
        "defaultValue": "Audit"
      },
      "identityRemoveExternalAccountWithWritePermissionsMonitoringEffect": {
        "type": "String",
        "metadata": {
        "displayName": "[Deprecated]: Effect for policy: External accounts with write permissions should be removed from your subscription",
          "description": "Azure Policy effect for this policy; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "AuditIfNotExists",
          "Disabled"
        ],
        "defaultValue": "AuditIfNotExists"
      },
      "identityRemoveExternalAccountWithReadPermissionsMonitoringEffect": {
        "type": "String",
        "metadata": {
        "displayName": "[Deprecated]: Effect for policy: External accounts with read permissions should be removed from your subscription",
          "description": "Azure Policy effect for this policy; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "AuditIfNotExists",
          "Disabled"
        ],
        "defaultValue": "AuditIfNotExists"
      },
      "identityRemoveExternalAccountWithOwnerPermissionsMonitoringEffect": {
        "type": "String",
        "metadata": {
        "displayName": "[Deprecated]: Effect for policy: External accounts with owner permissions should be removed from your subscription",
          "description": "Azure Policy effect for this policy; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "AuditIfNotExists",
          "Disabled"
        ],
        "defaultValue": "AuditIfNotExists"
      },
      "identityRemoveDeprecatedAccountWithOwnerPermissionsMonitoringEffect": {
        "type": "String",
        "metadata": {
        "displayName": "[Deprecated]: Effect for policy: Deprecated accounts with owner permissions should be removed from your subscription",
          "description": "Azure Policy effect for this policy; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "AuditIfNotExists",
          "Disabled"
        ],
        "defaultValue": "AuditIfNotExists"
      },
      "identityRemoveDeprecatedAccountMonitoringEffect": {
        "type": "String",
        "metadata": {
        "displayName": "[Deprecated]: Effect for policy: Deprecated accounts should be removed from your subscription",
          "description": "Azure Policy effect for this policy; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "AuditIfNotExists",
          "Disabled"
        ],
        "defaultValue": "AuditIfNotExists"
      },
      "webAppRestrictCORSAccessMonitoringEffect": {
        "type": "String",
        "metadata": {
        "displayName": "[Deprecated]: Effect for policy: CORS should not allow every resource to access your Web Applications",
          "description": "Azure Policy effect for this policy; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "AuditIfNotExists",
          "Disabled"
        ],
        "defaultValue": "AuditIfNotExists"
      },
      "vmssSystemUpdatesMonitoringEffect": {
        "type": "String",
        "metadata": {
        "displayName": "[Deprecated]: Effect for policy: System updates on virtual machine scale sets should be installed",
          "description": "Azure Policy effect for this policy; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "AuditIfNotExists",
          "Disabled"
        ],
        "defaultValue": "AuditIfNotExists"
      },
      "identityEnableMFAForReadPermissionsMonitoringEffect": {
        "type": "String",
        "metadata": {
        "displayName": "[Deprecated]: Effect for policy: MFA should be enabled on accounts with read permissions on your subscription",
          "description": "Azure Policy effect for this policy; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "AuditIfNotExists",
          "Disabled"
        ],
        "defaultValue": "AuditIfNotExists"
      },
      "identityEnableMFAForOwnerPermissionsMonitoringEffect": {
        "type": "String",
        "metadata": {
        "displayName": "[Deprecated]: Effect for policy: MFA should be enabled on accounts with owner permissions on your subscription",
          "description": "Azure Policy effect for this policy; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "AuditIfNotExists",
          "Disabled"
        ],
        "defaultValue": "AuditIfNotExists"
      },
      "identityEnableMFAForWritePermissionsMonitoringEffect": {
        "type": "String",
        "metadata": {
        "displayName": "[Deprecated]: Effect for policy: MFA should be enabled accounts with write permissions on your subscription",
          "description": "Azure Policy effect for this policy; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "AuditIfNotExists",
          "Disabled"
        ],
        "defaultValue": "AuditIfNotExists"
      },
      "longtermGeoRedundantBackupEnabledAzureSQLDatabasesEffect": {
        "type": "String",
        "metadata": {
        "displayName": "[Deprecated]: Effect for policy: Long-term geo-redundant backup should be enabled for Azure SQL Databases",
          "description": "Azure Policy effect for this policy; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "AuditIfNotExists",
          "Disabled"
        ],
        "defaultValue": "AuditIfNotExists"
      }
    },
    "policyDefinitions": [
      {
        "policyDefinitionReferenceId": "deployRequirementsToAuditWindowsWebServersThatAreNotUsingSecureCommunicationProtocols",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/b2fc8f91-866d-4434-9089-5ebfe38d6fd8",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "auditVirtualMachinesWithoutDisasterRecoveryConfigured",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/0015ea4d-51ff-4ce3-8d8c-f3f8f0179a56",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "auditUsageOfCustomRBACRules",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/a451c1ef-c6ca-483d-87ed-f49761e3ffb5",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "serviceFabricClustersShouldOnlyUseAzureActiveDirectoryForClientAuthentication",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/b54ed75b-3e1a-44ac-a333-05ba39b99ff0",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "auditUnrestrictedNetworkAccessToStorageAccounts",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/34c877ad-507e-4c82-993e-3452a6e0ad3c",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "transparentDataEncryptionOnSqlDatabasesShouldBeEnabled",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/17k78e20-9358-41c9-923c-fb736d382a12",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "auditWindowsWebServersThatAreNotUsingSecureCommunicationProtocols",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/60ffe3e2-4604-4460-8f22-0f1da058266c",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "auditWindowsVMsInWhichTheAdministratorsGroupDoesNotContainAllOfTheSpecifiedMembers",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/f3b44e5d-1456-475f-9c67-c66c4618e85a",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "auditWindowsVMsInWhichTheAdministratorsGroupContainsAnyOfTheSpecifiedMembers",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/bde62c94-ccca-4821-a815-92c1d31a76de",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "advancedDataSecurityShouldBeEnabledOnYourSqlServers",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/abfb4388-5bf4-4ad7-ba82-2cd2f41ceae9",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "auditSqlServerLevelAuditingSettings",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/a6fb4358-5bf4-4ad7-ba82-2cd2f41ce5e9",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "advancedDataSecurityShouldBeEnabledOnYourManagedInstances",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/abfb7388-5bf4-4ad7-ba99-2cd2f41cebb9",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "auditSecureTransferToStorageAccounts",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/404c3081-a854-4457-ae30-26a93ef643f9",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "anAzureActiveDirectoryAdministratorShouldBeProvisionedForSqlServers",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/1f314764-cb73-4fc9-b863-8eca98ac36e9",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "OnlySecureConnectionsToYourRedisCacheShouldBeEnabled",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/22bee202-a82f-4305-9a2a-6d7f44d4dedb",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "vulnerabilitiesShouldBeRemediatedByAVulnerabilityAssessmentSolution",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/760a85ff-6162-42b3-8d70-698e268f648c",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "previewMonitorUnprotectedNetworkEndpointsInAzureSecurityCenter",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/9daedab3-fb2d-461e-b861-71790eead4f6",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "diskEncryptionShouldBeAppliedOnVirtualMachines",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/0961003e-5a0a-4549-abde-af6a37f2724d",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "vulnerabilitiesOnYourSqlDatabasesShouldBeRemediated",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/feedbf84-6b99-488c-acc2-71c829aa5ffc",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "justInTimeNetworkAccessControlShouldBeAppliedOnVirtualMachines",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/b0f33259-77d7-4c9e-aac6-3aabcfae693c",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "adaptiveApplicationControlsShouldBeEnabledOnVirtualMachines",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/47a6b606-51aa-4496-8bb7-64b11cf66adc",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "vulnerabilitiesInSecurityConfigurationOnYourMachinesShouldBeRemediated",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/e1e5fd5d-3e4c-4ce1-8661-7d1873ae6b15",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "systemUpdatesShouldBeInstalledOnYourMachines",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/86b3d65f-7626-441e-b690-81a8b71cff60",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "monitorMissingEndpointProtectionInAzureSecurityCenter",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/af6cd1bd-1635-48cb-bde7-5b15693900b9",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "previewDeployVmExtensionToAuditWindowsVmShouldNotStorePasswordsUsingReversibleEncryption",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/8ff0b18b-262e-4512-857a-48ad0aeb9a78",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "previewDeployVmExtensionToAuditWindowsVmPasswordsMustBeAtLeast14Characters",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/23020aa6-1135-4be2-bae2-149982b06eca",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "previewDeployVmExtensionToAuditWindowsVmEnforcesPasswordComplexityRequirements",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/7ed40801-8a0f-4ceb-85c0-9fd25c1d61a8",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "previewDeployVmExtensionToAuditWindowsVmMinimumPasswordAge1Day",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/16390df4-2f73-4b42-af13-c801066763df",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "previewDeployVmExtensionToAuditWindowsVmMaximumPasswordAge70Days",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/356a906e-05e5-4625-8729-90771e0ee934",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "previewDeployVmExtensionToAuditWindowsVmShouldNotAllowPrevious24Passwords",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/726671ac-c4de-4908-8c7d-6043ae62e3b6",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "previewDeployVmExtensionToAuditLinuxVmPasswdFilePermissions",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/f19aa1c1-6b91-4c27-ae6a-970279f03db9",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "previewDeployVmExtensionToAuditLinuxVmAccountsWithNoPasswords",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/3470477a-b35a-49db-aca5-1073d04524fe",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "PreviewDeployVmExtensionToAuditLinuxVmAllowingRemoteConnectionsFromAccountsWithNoPasswords",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/ec49586f-4939-402d-a29e-6ff502b20592",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "endpointProtectionSolutionShouldBeInstalledOnVirtualMachineScaleSets",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/26a828e1-e88f-464e-bbb3-c134a282b9de",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "previewShowAuditResultsFromWindowsVMsThatDoNotStorePasswordsUsingReversibleEncryption",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/2d60d3b7-aa10-454c-88a8-de39d99d17c6",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "previewAuditWindowsVMsThatDoNotRestrictTheMinimumPasswordLengthTo14Characters",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/5aebc8d1-020d-4037-89a0-02043a7524ec",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "previewAuditWindowsVMsThatDoNotHaveThePasswordComplexitySettingEnabled",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/f48b2913-1dc5-4834-8c72-ccc1dfd819bb",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "previewAuditWindowsVMsThatDoNotHaveAMinimumPasswordAgeOf1Day",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/5aa11bbc-5c76-4302-80e5-aba46a4282e7",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "previewAuditWindowsVMsThatDoNotHaveAMaximumPasswordAgeOf70Days",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/24dde96d-f0b1-425e-884f-4a1421e2dcdc",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "previewAuditWindowsVMsThatAllowReUseOfThePrevious24Passwords",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/cdbf72d9-ac9c-4026-8a3a-491a5ac59293",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "previewAuditLinuxVMsThatDoNotHaveThePasswdFilePermissionsSetTo0644",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/b18175dd-c599-4c64-83ba-bb018a06d35b",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "previewAuditLinuxVMsThatHaveAccountsWithoutPasswords",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/c40c9087-1981-4e73-9f53-39743eda9d05",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "previewAuditLinuxVMsThatAllowRemoteConnectionsFromAccountsWithoutPasswords",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/2d67222d-05fd-4526-a171-2ee132ad9e83",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "dDoSProtectionStandardShouldBeEnabled",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/a7aca53f-2ed4-4466-a25e-0b45ade68efd",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "remoteDebuggingShouldBeTurnedOffForApiApp",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/e9c8d085-d9cc-4b17-9cdc-059f1f01f19e",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "remoteDebuggingShouldBeTurnedOffForWebApplication",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/cb510bfd-1cba-4d9f-a230-cb0976f4bb71",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "remoteDebuggingShouldBeTurnedOffForFunctionApp",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/0e60b895-3786-45da-8377-9c6b4b6ac5f9",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "vulnerabilitiesInSecurityConfigurationOnYourVirtualMachineScaleSetsShouldBeRemediated",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/3c735d8a-a4ba-4a3a-b7cf-db7754cf57f4",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "thereShouldBeMoreThanOneOwnerAssignedToYourSubscription",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/09024ccc-0c5f-475e-9457-b7c0d9ed487b",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "aMaximumOf3OwnersShouldBeDesignatedForYourSubscription",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/4f11b553-d42e-4e3a-89be-32ca364cad4c",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "previewAuditLogAnalyticsAgentDeploymentInVmssVmImageOsUnlisted",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/5c3bc7b8-a64c-4e08-a9cd-7ff0f31e1138",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "previewAuditLogAnalyticsAgentDeploymentVmImageOsUnlisted",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/32133ab0-ee4b-4b44-98d6-042180979d50",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "apiAppShouldOnlyBeAccessibleOverHttps",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/b7ddfbdc-1260-477d-91fd-98bd9be789a6",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "vulnerabilityAssessmentOnManagedInstanceMonitoring",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/1b7aa243-30e4-4c9e-bca8-d0d3022b634a",
        "parameters": {
          "effect": {
          "value": "[parameters('vulnerabilityAssessmentOnManagedInstanceMonitoringEffect')]"
          }
        }
      },
      {
        "policyDefinitionReferenceId": "vulnerabilityAssessmentOnServerMonitoring",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/ef2a8f2a-b3d9-49cd-a8a8-9a3aaaf647d9",
        "parameters": {
          "effect": {
          "value": "[parameters('vulnerabilityAssessmentOnServerMonitoringEffect')]"
          }
        }
      },
      {
        "policyDefinitionReferenceId": "VulnerabilityAssessmentshouldbeenabledonVirtualMachines",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/501541f7-f7e7-4cd6-868c-4190fdad3ac9",
        "parameters": {
          "effect": {
          "value": "[parameters('vulnerabilityAssessmentOnVirtualMachinesEffect')]"
          }
        }
      },
      {
        "policyDefinitionReferenceId": "geoRedundantStorageShouldBeEnabledForStorageAccounts",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/bf045164-79ba-4215-8f95-f8048dc1780b",
        "parameters": {
          "effect": {
          "value": "[parameters('geoRedundancyEnabledForStorageAccountsEffect')]"
          }
        }
      },
      {
        "policyDefinitionReferenceId": "geoRedundantBackupShouldBeEnabledForAzureDatabaseForMariaDB",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/0ec47710-77ff-4a3d-9181-6aa50af424d0",
        "parameters": {
          "effect": {
          "value": "[parameters('geoRedundancyEnabledForAzureDatabaseForMariaDBEffect')]"
          }
        }
      },
      {
        "policyDefinitionReferenceId": "geoRedundantBackupShouldBeEnabledForAzureDatabaseForMySQL",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/82339799-d096-41ae-8538-b108becf0970",
        "parameters": {
          "effect": {
          "value": "[parameters('geoRedundancyEnabledForAzureDatabaseForMySQLEffect')]"
          }
        }
      },
      {
        "policyDefinitionReferenceId": "geoRedundantBackupShouldBeEnabledForAzureDatabaseForPostgreSQL",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/48af4db5-9b8b-401c-8e74-076be876a430",
        "parameters": {
          "effect": {
          "value": "[parameters('geoRedundancyEnabledForAzureDatabaseForPostgreSQLEffect')]"
          }
        }
      },
      {
        "policyDefinitionReferenceId": "deployRequirementsToAuditWindowsVMsInWhichTheAdministratorsGroupDoesNotContainAllOfTheSpecifiedMembers",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/93507a81-10a4-4af0-9ee2-34cf25a96e98",
        "parameters": {
          "membersToInclude": {
          "value": "[parameters('membersToIncludeInAdministratorsLocalGroup')]"
          }
        }
      },
      {
        "policyDefinitionReferenceId": "DeployRequirementsToAuditWindowsVMsInWhichTheAdministratorsGroupContainsAnyOfTheSpecifiedMembers",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/144f1397-32f9-4598-8c88-118decc3ccba",
        "parameters": {
          "membersToExclude": {
          "value": "[parameters('membersToExcludeInAdministratorsLocalGroup')]"
          }
        }
      },
      {
        "policyDefinitionReferenceId": "auditDiagnosticSetting",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/7f89b1eb-583c-429a-8828-af049802c1d9",
        "parameters": {
          "listOfResourceTypes": {
          "value": "[parameters('listOfResourceTypes')]"
          }
        }
      },
      {
        "policyDefinitionReferenceId": "adaptiveNetworkHardeningsMonitoring",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/08e6af2d-db70-460a-bfe9-d5bd474ba9d6",
        "parameters": {
          "effect": {
          "value": "[parameters('adaptiveNetworkHardeningsMonitoringEffect')]"
          }
        }
      },
      {
        "policyDefinitionReferenceId": "previewAuditLogAnalyticsWorkspaceForVmReportMismatch",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/f47b5582-33ec-4c5c-87c0-b010a6b2e917",
        "parameters": {
          "logAnalyticsWorkspaceId": {
          "value": "[parameters('logAnalyticsWorkspaceIdForVMs')]"
          }
        }
      },
      {
        "policyDefinitionReferenceId": "webAppEnforceHttpsMonitoring",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/a4af4a39-4135-47fb-b175-47fbdf85311d",
        "parameters": {
          "effect": {
          "value": "[parameters('webAppEnforceHttpsMonitoringEffect')]"
          }
        }
      },
      {
        "policyDefinitionReferenceId": "functionAppEnforceHttpsMonitoring",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/6d555dd1-86f2-4f1c-8ed7-5abae7c6cbab",
        "parameters": {
          "effect": {
          "value": "[parameters('functionAppEnforceHttpsMonitoringEffect')]"
          }
        }
      },
      {
        "policyDefinitionReferenceId": "identityRemoveExternalAccountWithWritePermissionsMonitoring",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/5c607a2e-c700-4744-8254-d77e7c9eb5e4",
        "parameters": {
          "effect": {
          "value": "[parameters('identityRemoveExternalAccountWithWritePermissionsMonitoringEffect')]"
          }
        }
      },
      {
        "policyDefinitionReferenceId": "identityRemoveExternalAccountWithReadPermissionsMonitoring",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/5f76cf89-fbf2-47fd-a3f4-b891fa780b60",
        "parameters": {
          "effect": {
          "value": "[parameters('identityRemoveExternalAccountWithReadPermissionsMonitoringEffect')]"
          }
        }
      },
      {
        "policyDefinitionReferenceId": "identityRemoveExternalAccountWithOwnerPermissionsMonitoring",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/f8456c1c-aa66-4dfb-861a-25d127b775c9",
        "parameters": {
          "effect": {
          "value": "[parameters('identityRemoveExternalAccountWithOwnerPermissionsMonitoringEffect')]"
          }
        }
      },
      {
        "policyDefinitionReferenceId": "identityRemoveDeprecatedAccountWithOwnerPermissionsMonitoring",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/ebb62a0c-3560-49e1-89ed-27e074e9f8ad",
        "parameters": {
          "effect": {
          "value": "[parameters('identityRemoveDeprecatedAccountWithOwnerPermissionsMonitoringEffect')]"
          }
        }
      },
      {
        "policyDefinitionReferenceId": "identityRemoveDeprecatedAccountMonitoring",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/6b1cbf55-e8b6-442f-ba4c-7246b6381474",
        "parameters": {
          "effect": {
          "value": "[parameters('identityRemoveDeprecatedAccountMonitoringEffect')]"
          }
        }
      },
      {
        "policyDefinitionReferenceId": "webAppRestrictCORSAccessMonitoring",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/5744710e-cc2f-4ee8-8809-3b11e89f4bc9",
        "parameters": {
          "effect": {
          "value": "[parameters('webAppRestrictCORSAccessMonitoringEffect')]"
          }
        }
      },
      {
        "policyDefinitionReferenceId": "vmssSystemUpdatesMonitoring",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/c3f317a7-a95c-4547-b7e7-11017ebdf2fe",
        "parameters": {
          "effect": {
          "value": "[parameters('vmssSystemUpdatesMonitoringEffect')]"
          }
        }
      },
      {
        "policyDefinitionReferenceId": "identityEnableMFAForWritePermissionsMonitoring",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/9297c21d-2ed6-4474-b48f-163f75654ce3",
        "parameters": {
          "effect": {
          "value": "[parameters('identityEnableMFAForWritePermissionsMonitoringEffect')]"
          }
        }
      },
      {
        "policyDefinitionReferenceId": "identityEnableMFAForReadPermissionsMonitoring",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/e3576e28-8b17-4677-84c3-db2990658d64",
        "parameters": {
          "effect": {
          "value": "[parameters('identityEnableMFAForReadPermissionsMonitoringEffect')]"
          }
        }
      },
      {
        "policyDefinitionReferenceId": "identityEnableMFAForOwnerPermissionsMonitoring",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/aa633080-8b72-40c4-a2d7-d00c03e80bed",
        "parameters": {
          "effect": {
          "value": "[parameters('identityEnableMFAForOwnerPermissionsMonitoringEffect')]"
          }
        }
      },
      {
        "policyDefinitionReferenceId": "longtermGeoRedundantBackupEnabledAzureSQLDatabases",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/d38fc420-0735-4ef3-ac11-c806f651a570",
        "parameters": {
          "effect": {
          "value": "[parameters('longtermGeoRedundantBackupEnabledAzureSQLDatabasesEffect')]"
          }
        }
      },
      {
        "policyDefinitionReferenceId": "vulnerabilitiesSecurityConfigurationsRemediated",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/e8cbc669-f12d-49eb-93e7-9273119e9933",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "ensureDotNetFrameworkLatestForAPIApp",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/c2e7ca55-f62c-49b2-89a4-d41eb661d2f0",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "ensureDotNetFrameworkLatestForFunctionApp",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/10c1859c-e1a7-4df3-ab97-a487fa8059f6",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "ensureDotNetFrameworkLatestForWebApp",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/843664e0-7563-41ee-a9cb-7522c382d2c4",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "ensureHTTPVersionLatestForAPIApp",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/991310cd-e9f3-47bc-b7b6-f57b557d07db",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "ensureHTTPVersionLatestForFunctionApp",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/e2c1c086-2d84-4019-bff3-c44ccd95113c",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "ensureHTTPVersionLatestForWebApp",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/8c122334-9d20-4eb8-89ea-ac9a705b74ae",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "ensureJavaVersionLatestForAPIApp",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/88999f4c-376a-45c8-bcb3-4058f713cf39",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "ensureJavaVersionLatestForFunctionApp",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/9d0b6ea4-93e2-4578-bf2f-6bb17d22b4bc",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "ensureJavaVersionLatestForWebApp",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/496223c3-ad65-4ecd-878a-bae78737e9ed",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "ensurePHPVersionLatestForAPIApp",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/1bc1795e-d44a-4d48-9b3b-6fff0fd5f9ba",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "ensurePHPVersionLatestForFunctionApp",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/ab965db2-d2bf-4b64-8b39-c38ec8179461",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "ensurePHPVersionLatestForWebApp",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/7261b898-8a84-4db8-9e04-18527132abb3",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "ensurePythonVersionLatestForAPIApp",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/74c3584d-afae-46f7-a20a-6f8adba71a16",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "ensurePythonVersionLatestForFunctionApp",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/7238174a-fd10-4ef0-817e-fc820a951d73",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "ensurePythonVersionLatestForWebApp",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/7008174a-fd10-4ef0-817e-fc820a951d73",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "ensureTLSVersionLatestForAPIApp",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/8cb6aa8b-9e41-4f4e-aa25-089a7ac2581e",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "ensureTLSVersionLatestForFunctionApp",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/f9d614c5-c173-4d56-95a7-b4437057d193",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "ensureTLSVersionLatestForWebApp",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/f0e6e85b-9b9f-4a4b-b67b-f730d42f1b0b",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "kubernetesServicesUpgradedToNonVulnerableKubernetesVersion",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/fb893a29-21bb-418c-a157-e99480ec364c",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "emailNotificationToSubscriptionOwnerHighSeverityAlertsEnabled",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/0b15565f-aa9e-48ba-8619-45960f2c314d",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "securityContactEmailAddressForSubscription",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/4f4f78b8-e367-4b10-a341-d9a4ad5cf1c7",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "securityContactPhoneNumberShouldBeProvidedForSubscription",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/b4d66858-c922-44e3-9566-5cdb7a7be744",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "logAnalyticsAgentUnstalledVMScaleSets",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/efbde977-ba53-4479-b8e9-10b957924fbf",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "logAnalyticsAgentUnstalledVMs",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/a70ca396-0a34-413a-88e1-b956c1e683be",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "microsftIaaSAntimalwareExtensionShouldBeDeployedOnWindowsServers",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/9b597639-28e4-48eb-b506-56b05d366257",
        "parameters": {
          
        }
      },
      {
        "policyDefinitionReferenceId": "NetworkWatcherShouldBeEnabled",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/b6e2945c-0b7b-40f5-9233-7a5323b5cdc6",
        "parameters": {
          "listOfLocations": {
          "value": "[parameters('listOfLocations')]"
          }
        }
      }
    ]
  },
  "id": "/providers/Microsoft.Authorization/policySetDefinitions/8d792a84-723c-4d92-a3c3-e4ed16a2d133",
  "type": "Microsoft.Authorization/policySetDefinitions",
  "name": "8d792a84-723c-4d92-a3c3-e4ed16a2d133"
}