last sync: 2025-Aug-12 17:22:34 UTC

PCI DSS v4.0.1

Azure BuiltIn Policy Initiative (PolicySet)

Source Azure Portal
Display namePCI DSS v4.0.1
Ida06d5deb-24aa-4991-9d58-fa7563154e31
Version1.4.1
Details on versioning
Versioning Versions supported for Versioning: 6
1.4.1
1.4.0
1.3.0
1.2.0
1.1.0
1.0.0
Built-in Versioning [Preview]
CategoryRegulatory Compliance
Microsoft Learn
DescriptionPayment Card Industry Data Security Standard, focusing on protecting credit card transaction data.
Cloud environmentsAzureCloud = true
AzureChinaCloud = unknown
AzureUSGovernment = unknown
Available in AzUSGovUnknown, no evidence if PolicySet definition is/not available in AzureUSGovernment
TypeBuiltIn
DeprecatedFalse
PreviewFalse
Policy-used summary
Policy types Policy states Policy categories
Total Policies: 213
Builtin Policies: 213
Static Policies: 0
GA: 199
Preview: 14
37 categories:
API for FHIR: 1
API Management: 1
App Configuration: 2
App Platform: 1
App Service: 8
Automation: 1
Azure Ai Services: 1
Azure Data Explorer: 2
Azure Update Manager: 1
Backup: 2
Batch: 2
Cache: 2
Cognitive Services: 1
Compute: 8
Container Instance: 2
Container Registry: 1
Cosmos DB: 3
Data Lake: 2
Event Hub: 4
General: 1
Guest Configuration: 25
Internet of Things: 2
Key Vault: 11
Kubernetes: 13
Logic Apps: 1
Machine Learning: 5
Monitoring: 16
Network: 12
Regulatory Compliance: 3
Security Center: 39
Service Bus: 2
SignalR: 1
Site Recovery: 1
SQL: 27
Storage: 6
Stream Analytics: 2
Synapse: 1
Policy-used
Rows: 1-10 / 213
Records:
Use the filters above each column to filter and limit table data. Advanced searches can be performed by using the following operators:
<, <=, >, >=, =, *, !, {, }, ||,&&, [empty], [nonempty], rgx:
Learn more

TableFilter v0.7.3

https://www.tablefilter.com/
©2015-2025 Max Guglielmi
?
Page of 22
Policy DisplayName Policy Id Category Version Versioning Effect Roles# Roles State policy in AzUSGov
[Preview]: Azure Arc enabled Kubernetes clusters should have Microsoft Defender for Cloud extension installed 8dfab9c4-fe7b-49ad-85e4-1e9be085358f Kubernetes 6.0.0-preview 1x
6.0.0-preview
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 Preview true
[Preview]: Azure PostgreSQL flexible server should have Microsoft Entra Only Authentication enabled fa498b91-8a7e-4710-9578-da944c68d1fe SQL 1.0.0-preview 1x
1.0.0-preview
Default
Audit
Allowed
Audit, Disabled
0 Preview true
[Preview]: Azure Recovery Services vaults should use private link for backup deeddb44-9f94-4903-9fa0-081d524406e3 Backup 2.0.0-preview 1x
2.0.0-preview
Default
Audit
Allowed
Audit, Disabled
0 Preview unknown
[Preview]: Container Registry should use a virtual network service endpoint c4857be7-912a-4c75-87e6-e30292bcdf78 Network 1.0.0-preview 1x
1.0.0-preview
Default
Audit
Allowed
Audit, Disabled
0 Preview true
[Preview]: Guest Attestation extension should be installed on supported Linux virtual machines 672fe5a1-2fcd-42d7-b85d-902b6e28c6ff Security Center 6.0.0-preview 1x
6.0.0-preview
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 Preview true
[Preview]: Guest Attestation extension should be installed on supported Linux virtual machines scale sets a21f8c92-9e22-4f09-b759-50500d1d2dda Security Center 5.1.0-preview 1x
5.1.0-preview
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 Preview true
[Preview]: Guest Attestation extension should be installed on supported Windows virtual machines 1cb4d9c2-f88f-4069-bee0-dba239a57b09 Security Center 4.0.0-preview 1x
4.0.0-preview
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 Preview true
[Preview]: Guest Attestation extension should be installed on supported Windows virtual machines scale sets f655e522-adff-494d-95c2-52d4f6d56a42 Security Center 3.1.0-preview 1x
3.1.0-preview
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 Preview true
[Preview]: IoT Hub device provisioning service data should be encrypted using customer-managed keys (CMK) 47031206-ce96-41f8-861b-6a915f3de284 Internet of Things 1.0.0-preview 1x
1.0.0-preview
Default
Audit
Allowed
Audit, Deny, Disabled
0 Preview true
[Preview]: Linux virtual machines should use only signed and trusted boot components 13a6c84f-49a5-410a-b5df-5b880c3fe009 Security Center 1.0.0-preview 1x
1.0.0-preview
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 Preview unknown
[Preview]: Machines should have ports closed that might expose attack vectors af99038c-02fd-4a2f-ac24-386b62bf32de Security Center 1.0.0-preview 1x
1.0.0-preview
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 Preview unknown
[Preview]: Recovery Services vaults should use private link 11e3da8c-1d68-4392-badd-0ff3c43ab5b0 Site Recovery 1.0.0-preview 1x
1.0.0-preview
Default
Audit
Allowed
Audit, Disabled
0 Preview unknown
[Preview]: Secure Boot should be enabled on supported Windows virtual machines 97566dd7-78ae-4997-8b36-1c7bfe0d8121 Security Center 4.0.0-preview 1x
4.0.0-preview
Default
Audit
Allowed
Audit, Disabled
0 Preview true
[Preview]: vTPM should be enabled on supported virtual machines 1c30f9cd-b84c-49cc-aa2c-9288447cc3b3 Security Center 2.0.0-preview 1x
2.0.0-preview
Default
Audit
Allowed
Audit, Disabled
0 Preview true
A Microsoft Entra administrator should be provisioned for PostgreSQL servers b4dec045-250a-48c2-b5cc-e0c4eec8b5b4 SQL 1.0.1 2x
1.0.1, 1.0.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
A vulnerability assessment solution should be enabled on your virtual machines 501541f7-f7e7-4cd6-868c-4190fdad3ac9 Security Center 3.0.0 1x
3.0.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
Activity log should be retained for at least one year b02aacc0-b073-424e-8298-42b22829ee0a Monitoring 1.0.0 1x
1.0.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
All authorization rules except RootManageSharedAccessKey should be removed from Service Bus namespace a1817ec0-a368-432a-8057-8371e17ac6ee Service Bus 1.0.1 1x
1.0.1
Default
Audit
Allowed
Audit, Deny, Disabled
0 GA unknown
All network ports should be restricted on network security groups associated to your virtual machine 9daedab3-fb2d-461e-b861-71790eead4f6 Security Center 3.0.0 1x
3.0.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
An activity log alert should exist for specific Administrative operations b954148f-4c11-4c38-8221-be76711e194a Monitoring 1.0.0 1x
1.0.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
An activity log alert should exist for specific Policy operations c5447c04-a4d7-4ba8-a263-c9ee321a6858 Monitoring 3.0.0 1x
3.0.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
An activity log alert should exist for specific Security operations 3b980d31-7904-4bb7-8575-5665739a8052 Monitoring 1.0.0 1x
1.0.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
API endpoints in Azure API Management should be authenticated 8ac833bd-f505-48d5-887e-c993a1d3eea0 Security Center 1.0.1 1x
1.0.1
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA unknown
API Management should disable public network access to the service configuration endpoints df73bd95-24da-4a4f-96b9-4e8b94b402bd API Management 1.0.1 1x
1.0.1
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA unknown
App Configuration should disable public network access 3d9f5e4c-9947-4579-9539-2a7695fbc187 App Configuration 1.0.0 1x
1.0.0
Default
Audit
Allowed
Audit, Deny, Disabled
0 GA unknown
App Configuration should use a customer-managed key 967a4b4b-2da9-43c1-b7d0-f98d0d74d0b1 App Configuration 1.1.0 1x
1.1.0
Default
Audit
Allowed
Audit, Deny, Disabled
0 GA unknown
App Service apps should have authentication enabled 95bccee9-a7f8-4bec-9ee9-62c3473701fc App Service 2.0.1 1x
2.0.1
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
App Service apps should have Client Certificates (Incoming client certificates) enabled 19dd1db6-f442-49cf-a838-b0786b4401ef App Service 1.0.0 1x
1.0.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
App Service apps should have remote debugging turned off cb510bfd-1cba-4d9f-a230-cb0976f4bb71 App Service 2.0.0 1x
2.0.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
App Service apps should have resource logs enabled 91a78b24-f231-4a8a-8da9-02c35b2b6510 App Service 2.0.1 1x
2.0.1
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
App Service apps should use a virtual network service endpoint 2d21331d-a4c2-4def-a9ad-ee4e1e023beb Network 2.0.1 1x
2.0.1
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
App Service apps should use managed identity 2b9ad585-36bc-4615-b300-fd4435808332 App Service 3.0.0 1x
3.0.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
Application Insights components should block log ingestion and querying from public networks 1bc02227-0cb6-4e11-8f53-eb0b22eab7e8 Monitoring 1.1.0 1x
1.1.0
Default
Audit
Allowed
audit, Audit, deny, Deny, disabled, Disabled
0 GA unknown
Audit diagnostic setting for selected resource types 7f89b1eb-583c-429a-8828-af049802c1d9 Monitoring 2.0.1 1x
2.0.1
Fixed
AuditIfNotExists
0 GA true
Audit flow logs configuration for every virtual network 4c3c6c5f-0d47-4402-99b8-aa543dd8bcee Network 1.0.1 2x
1.0.1, 1.0.0
Default
Audit
Allowed
Audit, Disabled
0 GA unknown
Audit Linux machines that allow remote connections from accounts without passwords ea53dbee-c6c9-4f0e-9f9e-de0039b78023 Guest Configuration 3.1.0 2x
3.1.0, 3.0.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
Audit Linux machines that do not have the passwd file permissions set to 0644 e6955644-301c-44b5-a4c4-528577de6861 Guest Configuration 3.1.0 2x
3.1.0, 3.0.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
Audit resource location matches resource group location 0a914e76-4921-4c19-b460-a2d36003525a General 2.0.0 1x
2.0.0
Fixed
audit
0 GA unknown
Audit virtual machines without disaster recovery configured 0015ea4d-51ff-4ce3-8d8c-f3f8f0179a56 Compute 1.0.0 1x
1.0.0
Fixed
auditIfNotExists
0 GA true
Audit VMs that do not use managed disks 06a78e20-9358-41c9-923c-fb736d382a4d Compute 1.0.0 1x
1.0.0
Fixed
audit
0 GA true
Audit Windows machines missing any of specified members in the Administrators group 30f71ea1-ac77-4f26-9fc5-2d926bbd4ba7 Guest Configuration 2.0.0 1x
2.0.0
Fixed
auditIfNotExists
0 GA true
Audit Windows machines that do not contain the specified certificates in Trusted Root 934345e1-4dfb-4c70-90d7-41990dc9608b Guest Configuration 3.0.0 1x
3.0.0
Fixed
auditIfNotExists
0 GA true
Audit Windows machines that do not have the maximum password age set to specified number of days 4ceb8dc2-559c-478b-a15b-733fbf1e3738 Guest Configuration 2.1.0 1x
2.1.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
Audit Windows machines that do not have the password complexity setting enabled bf16e0bb-31e1-4646-8202-60a235cc7e74 Guest Configuration 2.0.0 1x
2.0.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
Audit Windows machines that don't have the specified applications installed ebb67efd-3c46-49b0-adfe-5599eb944998 Guest Configuration 2.0.0 1x
2.0.0
Fixed
auditIfNotExists
0 GA true
Audit Windows machines that have extra accounts in the Administrators group 3d2a3320-2a72-4c67-ac5f-caa40fbee2b2 Guest Configuration 2.0.0 1x
2.0.0
Fixed
auditIfNotExists
0 GA true
Audit Windows machines that have the specified members in the Administrators group 69bf4abd-ca1e-4cf6-8b5a-762d42e61d4f Guest Configuration 2.0.0 1x
2.0.0
Fixed
auditIfNotExists
0 GA true
Auditing on SQL server should be enabled a6fb4358-5bf4-4ad7-ba82-2cd2f41ce5e9 SQL 2.0.0 1x
2.0.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
Authorization rules on the Event Hub instance should be defined f4826e5f-6a27-407c-ae3e-9582eb39891d Event Hub 1.0.0 1x
1.0.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA unknown
Azure AI Services resources should use Azure Private Link d6759c02-b87f-42b7-892e-71b3f471d782 Azure Ai Services 1.0.0 1x
1.0.0
Default
Audit
Allowed
Audit, Disabled
0 GA true
Azure Arc enabled Kubernetes clusters should have the Azure Policy extension installed 6b2122c1-8120-4ff5-801b-17625a355590 Kubernetes 1.1.0 1x
1.1.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
Azure Automation accounts should use customer-managed keys to encrypt data at rest 56a5ee18-2ae6-4810-86f7-18e39ce5629b Automation 1.0.0 1x
1.0.0
Default
Audit
Allowed
Audit, Deny, Disabled
0 GA true
Azure Backup should be enabled for Virtual Machines 013e242c-8828-4970-87b3-ab247555486d Backup 3.0.0 1x
3.0.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
Azure Cache for Redis should use private link 7803067c-7d34-46e3-8c79-0ca68fc4036d Cache 1.0.0 1x
1.0.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
Azure Container Instance container group should deploy into a virtual network 8af8f826-edcb-4178-b35f-851ea6fea615 Container Instance 2.0.0 1x
2.0.0
Default
Audit
Allowed
Audit, Disabled, Deny
0 GA unknown
Azure Container Instance container group should use customer-managed key for encryption 0aa61e00-0a01-4a3c-9945-e93cffedf0e6 Container Instance 1.0.0 1x
1.0.0
Default
Audit
Allowed
Audit, Disabled, Deny
0 GA true
Azure Cosmos DB accounts should have firewall rules 862e97cf-49fc-4a5c-9de4-40d4e2e7c8eb Cosmos DB 2.1.0 2x
2.1.0, 2.0.0
Default
Deny
Allowed
Audit, Deny, Disabled
0 GA true
Azure Cosmos DB should disable public network access 797b37f7-06b8-444c-b1ad-fc62867f335a Cosmos DB 1.0.0 1x
1.0.0
Default
Audit
Allowed
Audit, Deny, Disabled
0 GA true
Azure Data Explorer encryption at rest should use a customer-managed key 81e74cea-30fd-40d5-802f-d72103c2aaaa Azure Data Explorer 1.0.0 1x
1.0.0
Default
Audit
Allowed
Audit, Deny, Disabled
0 GA true
Azure Defender for App Service should be enabled 2913021d-f2fd-4f3d-b958-22354e2bdbcb Security Center 1.0.3 1x
1.0.3
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA unknown
Azure Defender for Azure SQL Database servers should be enabled 7fe3b40f-802b-4cdd-8bd4-fd799c948cc2 Security Center 1.0.2 1x
1.0.2
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
Azure Defender for Key Vault should be enabled 0e6763cc-5078-4e64-889d-ff4d9a839047 Security Center 1.0.3 1x
1.0.3
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA unknown
Azure Defender for open-source relational databases should be enabled 0a9fbe0d-c5c4-4da8-87d8-f4fd77338835 Security Center 1.0.0 1x
1.0.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA unknown
Azure Defender for Resource Manager should be enabled c3d20c29-b36d-48fe-808b-99a87530ad99 Security Center 1.0.0 1x
1.0.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
Azure Defender for servers should be enabled 4da35fc9-c9e7-4960-aec9-797fe7d9051d Security Center 1.0.3 1x
1.0.3
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
Azure Defender for SQL servers on machines should be enabled 6581d072-105e-4418-827f-bd446d56421b Security Center 1.0.2 1x
1.0.2
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA unknown
Azure Defender for SQL should be enabled for unprotected Azure SQL servers abfb4388-5bf4-4ad7-ba82-2cd2f41ceae9 SQL 2.0.1 1x
2.0.1
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
Azure Defender for SQL should be enabled for unprotected MySQL flexible servers 3bc8a0d5-38e0-4a3d-a657-2cb64468fc34 Security Center 1.0.0 1x
1.0.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
Azure Defender for SQL should be enabled for unprotected PostgreSQL flexible servers d38668f5-d155-42c7-ab3d-9b57b50f8fbf Security Center 1.0.0 1x
1.0.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
Azure Defender for SQL should be enabled for unprotected SQL Managed Instances abfb7388-5bf4-4ad7-ba99-2cd2f41cebb9 SQL 1.0.2 1x
1.0.2
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
Azure Event Hub namespaces should have local authentication methods disabled 5d4e3c65-4873-47be-94f3-6f8b953a3598 Event Hub 1.0.1 1x
1.0.1
Default
Audit
Allowed
Audit, Deny, Disabled
0 GA unknown
Azure Key Vault should have firewall enabled or public network access disabled 55615ac9-af46-4a59-874e-391cc3dfb490 Key Vault 3.3.0 2x
3.3.0, 3.2.1
Default
Audit
Allowed
Audit, Deny, Disabled
0 GA true
Azure Key Vault should use RBAC permission model 12d4fa5e-1f9f-4c21-97a9-b99b3c6611b5 Key Vault 1.0.1 2x
1.0.1, 1.0.0-preview
Default
Audit
Allowed
Audit, Deny, Disabled
0 GA unknown
Azure Kubernetes Service clusters should have Defender profile enabled a1840de2-8088-4ea8-b153-b4c723e9cb01 Kubernetes 2.0.1 1x
2.0.1
Default
Audit
Allowed
Audit, Disabled
0 GA true
Azure Machine Learning compute instances should be recreated to get the latest software updates f110a506-2dcb-422e-bcea-d533fc8c35e2 Machine Learning 1.0.3 1x
1.0.3
Fixed
[parameters('effects')]
0 GA true
Azure Machine Learning Computes should be in a virtual network 7804b5c7-01dc-4723-969b-ae300cc07ff1 Machine Learning 1.0.1 1x
1.0.1
Default
Audit
Allowed
Audit, Disabled
0 GA true
Azure Machine Learning Computes should have local authentication methods disabled e96a9a5f-07ca-471b-9bc5-6a0f33cbd68f Machine Learning 2.1.0 2x
2.1.0, 2.0.1
Default
Audit
Allowed
Audit, Deny, Disabled
0 GA true
Azure Machine Learning Workspaces should disable public network access 438c38d2-3772-465a-a9cc-7a6666a275ce Machine Learning 2.0.1 1x
2.0.1
Default
Audit
Allowed
Audit, Deny, Disabled
0 GA true
Azure Monitor log profile should collect logs for categories 'write,' 'delete,' and 'action' 1a4e592a-6a6e-44a5-9814-e36264ca96e7 Monitoring 1.0.0 1x
1.0.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
Azure Monitor Logs for Application Insights should be linked to a Log Analytics workspace d550e854-df1a-4de9-bf44-cd894b39a95e Monitoring 1.1.0 1x
1.1.0
Default
Audit
Allowed
audit, Audit, deny, Deny, disabled, Disabled
0 GA unknown
Azure Monitor should collect activity logs from all regions 41388f1c-2db0-4c25-95b2-35d7f5ccbfa9 Monitoring 2.0.0 1x
2.0.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
Azure Monitor solution 'Security and Audit' must be deployed 3e596b57-105f-48a6-be97-03e9243bad6e Monitoring 1.0.0 1x
1.0.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA unknown
Azure MySQL flexible server should have Microsoft Entra Only Authentication enabled 40e85574-ef33-47e8-a854-7a65c7500560 SQL 1.0.1 2x
1.0.1, 1.0.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA unknown
Azure Policy Add-on for Kubernetes service (AKS) should be installed and enabled on your clusters 0a15ec92-a229-4763-bb14-0ea34a568f8d Kubernetes 1.0.2 1x
1.0.2
Default
Audit
Allowed
Audit, Disabled
0 GA true
Azure registry container images should have vulnerabilities resolved (powered by Microsoft Defender Vulnerability Management) 090c7b07-b4ed-4561-ad20-e9075f3ccaff Security Center 1.0.1 2x
1.0.1, 1.0.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
Azure running container images should have vulnerabilities resolved (powered by Microsoft Defender Vulnerability Management) 17f4b1cc-c55c-4d94-b1f9-2978f6ac2957 Security Center 1.0.1 2x
1.0.1, 1.0.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
Azure SignalR Service should use private link 2393d2cf-a342-44cd-a2e2-fe0188fd1234 SignalR 1.0.0 1x
1.0.0
Default
Audit
Allowed
Audit, Disabled
0 GA true
Azure Spring Cloud should use network injection af35e2a4-ef96-44e7-a9ae-853dd97032c4 App Platform 1.2.0 1x
1.2.0
Default
Audit
Allowed
Audit, Disabled, Deny
0 GA unknown
Azure SQL Database should be running TLS version 1.2 or newer 32e6bbec-16b6-44c2-be37-c5b672d103cf SQL 2.0.0 1x
2.0.0
Default
Audit
Allowed
Audit, Disabled, Deny
0 GA true
Azure SQL Managed Instances should disable public network access 9dfea752-dd46-4766-aed1-c355fa93fb91 SQL 1.0.0 1x
1.0.0
Default
Audit
Allowed
Audit, Deny, Disabled
0 GA true
Azure SQL Managed Instances should have Microsoft Entra-only authentication enabled during creation 78215662-041e-49ed-a9dd-5385911b3a1f SQL 1.2.0 2x
1.2.0, 1.1.0
Default
Audit
Allowed
Audit, Deny, Disabled
0 GA true
Azure Stream Analytics jobs should use customer-managed keys to encrypt data 87ba29ef-1ab3-4d82-b763-87fcd4f531f7 Stream Analytics 1.1.0 1x
1.1.0
Default
Audit
Allowed
audit, Audit, deny, Deny, disabled, Disabled
0 GA true
Azure subscriptions should have a log profile for Activity Log 7796937f-307b-4598-941c-67d3a05ebfe7 Monitoring 1.0.0 1x
1.0.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
Azure VPN gateways should not use 'basic' SKU e345b6c3-24bd-4c93-9bbb-7e5e49a17b78 Network 1.0.0 1x
1.0.0
Default
Audit
Allowed
Audit, Disabled
0 GA unknown
Certificates should have the specified maximum validity period 0a075868-4c26-42ef-914c-5bc007359560 Key Vault 2.2.1 2x
2.2.1, 2.2.0-preview
Default
Audit
Allowed
audit, Audit, deny, Deny, disabled, Disabled
0 GA true
Cognitive Services accounts should use customer owned storage 46aa9b05-0e60-4eae-a88b-1e9d374fa515 Cognitive Services 2.0.0 1x
2.0.0
Default
Audit
Allowed
Audit, Deny, Disabled
0 GA unknown
CORS should not allow every domain to access your API for FHIR 0fea8f8a-4169-495d-8307-30ec335f387d API for FHIR 1.1.0 1x
1.1.0
Default
Audit
Allowed
audit, Audit, disabled, Disabled
0 GA unknown
Cosmos DB database accounts should have local authentication methods disabled 5450f5bd-9c72-4390-a9c4-a7aba4edfdd2 Cosmos DB 1.1.0 1x
1.1.0
Default
Audit
Allowed
Audit, Deny, Disabled
0 GA true
Define acceptable and unacceptable mobile code technologies 1afada58-8b34-7ac2-a38a-983218635201 Regulatory Compliance 1.1.0 1x
1.1.0
Default
Manual
Allowed
Manual, Disabled
0 GA unknown
Dependency agent should be enabled for listed virtual machine images 11ac78e3-31bc-4f0c-8434-37ab963cea07 Monitoring 2.1.0 2x
2.1.0, 2.0.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
Dependency agent should be enabled in virtual machine scale sets for listed virtual machine images e2dd799a-a932-4e9d-ac17-d473bc3c6c10 Monitoring 2.1.0 2x
2.1.0, 2.0.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
Deploy default Microsoft IaaSAntimalware extension for Windows Server 2835b622-407b-4114-9198-6f7064cbe0dc Compute 1.1.0 1x
1.1.0
Fixed
deployIfNotExists
1 Virtual Machine Contributor GA unknown
Deploy network watcher when virtual networks are created a9b99dd8-06c5-4317-8629-9d86a3c6e7d9 Network 1.0.0 1x
1.0.0
Fixed
DeployIfNotExists
1 Network Contributor GA unknown
Deploy the Linux Guest Configuration extension to enable Guest Configuration assignments on Linux VMs 331e8ea8-378a-410f-a2e5-ae22f38bb0da Guest Configuration 3.2.0 3x
3.2.0, 3.1.0, 3.0.0
Fixed
deployIfNotExists
1 Contributor GA true
Disk encryption should be enabled on Azure Data Explorer f4b53539-8df9-40e4-86c6-6b607703bd4e Azure Data Explorer 2.0.0 1x
2.0.0
Default
Audit
Allowed
Audit, Deny, Disabled
0 GA true
Email notification for high severity alerts should be enabled 6e2593d9-add6-4083-9c9b-4b7d2188c899 Security Center 1.2.0 3x
1.2.0, 1.1.0, 1.0.1
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
Event Hub namespaces should use private link b8564268-eb4a-4337-89be-a19db070c59d Event Hub 1.0.0 1x
1.0.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
Flow logs should be configured for every network security group c251913d-7d24-4958-af87-478ed3b9ba41 Network 1.1.0 1x
1.1.0
Default
Audit
Allowed
Audit, Disabled
0 GA true
Function apps should have remote debugging turned off 0e60b895-3786-45da-8377-9c6b4b6ac5f9 App Service 2.0.0 1x
2.0.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
Function apps should not have CORS configured to allow every resource to access your apps 0820b7b9-23aa-4725-a1ce-ae4558f718e5 App Service 2.0.0 1x
2.0.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
Function apps should use managed identity 0da106f2-4ca3-48e8-bc85-c638fe6aea8f App Service 3.0.0 1x
3.0.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
Geo-redundant backup should be enabled for Azure Database for MariaDB 0ec47710-77ff-4a3d-9181-6aa50af424d0 SQL 1.0.1 1x
1.0.1
Default
Audit
Allowed
Audit, Disabled
0 GA true
Guest Configuration extension should be installed on your machines ae89ebca-1c92-4898-ac2c-9f63decb045c Security Center 1.0.3 1x
1.0.3
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
Internet-facing virtual machines should be protected with network security groups f6de0be7-9a8a-4b8a-b349-43cf02d22f7c Security Center 3.0.0 1x
3.0.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
Key Vault keys should have an expiration date 152b15f7-8e1f-4c1f-ab71-8c010ba5dbc0 Key Vault 1.0.2 1x
1.0.2
Default
Audit
Allowed
Audit, Deny, Disabled
0 GA true
Key Vault secrets should have an expiration date 98728c90-32c7-4049-8429-847dc0f4fe37 Key Vault 1.0.2 1x
1.0.2
Default
Audit
Allowed
Audit, Deny, Disabled
0 GA true
Key vaults should have deletion protection enabled 0b60c0b2-2dc2-4e1c-b5c9-abbed971de53 Key Vault 2.1.0 1x
2.1.0
Default
Audit
Allowed
Audit, Deny, Disabled
0 GA true
Keys should be the specified cryptographic type RSA or EC 75c4f823-d65c-4f29-a733-01d0077fdbcb Key Vault 1.0.1 1x
1.0.1
Default
Audit
Allowed
Audit, Deny, Disabled
0 GA true
Keys should have a rotation policy ensuring that their rotation is scheduled within the specified number of days after creation. d8cf8476-a2ec-4916-896e-992351803c44 Key Vault 1.0.0 1x
1.0.0
Default
Audit
Allowed
Audit, Disabled
0 GA unknown
Keys using elliptic curve cryptography should have the specified curve names ff25f3c8-b739-4538-9d07-3d6d25cfb255 Key Vault 1.0.1 1x
1.0.1
Default
Audit
Allowed
Audit, Deny, Disabled
0 GA true
Kubernetes cluster containers should not share host process ID or host IPC namespace 47a1ee2f-2a2a-4576-bf2a-e0e36709c2b8 Kubernetes 5.2.0 2x
5.2.0, 5.1.0
Default
Audit
Allowed
audit, Audit, deny, Deny, disabled, Disabled
0 GA true
Kubernetes cluster containers should only use allowed AppArmor profiles 511f5417-5d12-434d-ab2e-816901e72a5e Kubernetes 6.2.0 2x
6.2.0, 6.1.1
Default
Audit
Allowed
audit, Audit, deny, Deny, disabled, Disabled
0 GA true
Kubernetes cluster containers should only use allowed capabilities c26596ff-4d70-4e6a-9a30-c2506bd2f80c Kubernetes 6.2.0 2x
6.2.0, 6.1.0
Default
Audit
Allowed
audit, Audit, deny, Deny, disabled, Disabled
0 GA true
Kubernetes cluster pod hostPath volumes should only use allowed host paths 098fc59e-46c7-4d99-9b16-64990e543d75 Kubernetes 6.2.0 2x
6.2.0, 6.1.1
Default
Audit
Allowed
audit, Audit, deny, Deny, disabled, Disabled
0 GA true
Kubernetes cluster should not allow privileged containers 95edb821-ddaf-4404-9732-666045e056b4 Kubernetes 9.2.0 2x
9.2.0, 9.1.0
Default
Deny
Allowed
audit, Audit, deny, Deny, disabled, Disabled
0 GA true
Kubernetes clusters should disable automounting API credentials 423dd1ba-798e-40e4-9c4d-b6902674b423 Kubernetes 4.2.0 2x
4.2.0, 4.1.0
Default
Audit
Allowed
audit, Audit, deny, Deny, disabled, Disabled
0 GA true
Kubernetes clusters should not allow container privilege escalation 1c6e92c9-99f0-4e55-9cf2-0c234dc48f99 Kubernetes 7.2.0 2x
7.2.0, 7.1.0
Default
Audit
Allowed
audit, Audit, deny, Deny, disabled, Disabled
0 GA true
Kubernetes clusters should not use the default namespace 9f061a12-e40d-4183-a00e-171812443373 Kubernetes 4.2.0 2x
4.2.0, 4.1.0
Default
Audit
Allowed
audit, Audit, deny, Deny, disabled, Disabled
0 GA true
Kubernetes Services should be upgraded to a non-vulnerable Kubernetes version fb893a29-21bb-418c-a157-e99480ec364c Security Center 1.0.2 1x
1.0.2
Default
Audit
Allowed
Audit, Disabled
0 GA true
Log Analytics workspaces should block log ingestion and querying from public networks 6c53d030-cc64-46f0-906d-2bc061cd1334 Monitoring 1.1.0 1x
1.1.0
Default
Audit
Allowed
audit, Audit, deny, Deny, disabled, Disabled
0 GA unknown
Log Analytics Workspaces should block non-Azure Active Directory based ingestion. e15effd4-2278-4c65-a0da-4d6f6d1890e2 Monitoring 1.0.0 1x
1.0.0
Default
Audit
Allowed
Deny, Audit, Disabled
0 GA unknown
Long-term geo-redundant backup should be enabled for Azure SQL Databases d38fc420-0735-4ef3-ac11-c806f651a570 SQL 2.0.0 1x
2.0.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
Machines should be configured to periodically check for missing system updates bd876905-5b84-4f73-ab2d-2e7a7c4568d9 Azure Update Manager 3.8.0 5x
3.8.0, 3.7.0, 3.6.0, 3.5.0, 3.4.1
Default
Audit
Allowed
Audit, Deny, Disabled
0 GA true
Machines should have secret findings resolved 3ac7c827-eea2-4bde-acc7-9568cd320efa Security Center 1.0.2 1x
1.0.2
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
Managed disks should be double encrypted with both platform-managed and customer-managed keys ca91455f-eace-4f96-be59-e6e2c35b4816 Compute 1.0.0 1x
1.0.0
Default
Audit
Allowed
Audit, Deny, Disabled
0 GA true
Managed disks should disable public network access 8405fdab-1faf-48aa-b702-999c9c172094 Compute 2.1.0 2x
2.1.0, 2.0.0
Default
Audit
Allowed
Audit, Deny, Disabled
0 GA unknown
Managed disks should use a specific set of disk encryption sets for the customer-managed key encryption d461a302-a187-421a-89ac-84acdb4edc04 Compute 2.0.0 1x
2.0.0
Default
Audit
Allowed
Audit, Deny, Disabled
0 GA unknown
Management ports should be closed on your virtual machines 22730e10-96f6-4aac-ad84-9383d35b5917 Security Center 3.0.0 1x
3.0.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
Microsoft Antimalware for Azure should be configured to automatically update protection signatures c43e4a30-77cb-48ab-a4dd-93f175c63b57 Compute 1.0.0 1x
1.0.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
Microsoft Defender CSPM should be enabled 1f90fc71-a595-4066-8974-d4d0802e8ef0 Security Center 1.0.0 1x
1.0.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA unknown
Microsoft Defender for APIs should be enabled 7926a6d1-b268-4586-8197-e8ae90c877d7 Security Center 1.0.3 1x
1.0.3
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA unknown
Microsoft Defender for Azure Cosmos DB should be enabled adbe85b5-83e6-4350-ab58-bf3a4f736e5e Security Center 1.0.0 1x
1.0.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA unknown
Microsoft Defender for Containers should be enabled 1c988dd6-ade4-430f-a608-2a3e5b0a6d38 Security Center 1.0.0 1x
1.0.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
Microsoft Defender for SQL should be enabled for unprotected Synapse workspaces d31e5c31-63b2-4f12-887b-e49456834fa1 Security Center 1.0.0 1x
1.0.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
Microsoft IaaSAntimalware extension should be deployed on Windows servers 9b597639-28e4-48eb-b506-56b05d366257 Compute 1.1.0 1x
1.1.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
Only secure connections to your Azure Cache for Redis should be enabled 22bee202-a82f-4305-9a2a-6d7f44d4dedb Cache 1.0.0 1x
1.0.0
Default
Audit
Allowed
Audit, Deny, Disabled
0 GA true
PostgreSQL servers should use customer-managed keys to encrypt data at rest 18adea5e-f416-4d0f-8aa8-d24321e3e274 SQL 1.0.4 1x
1.0.4
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
Private endpoint connections on Batch accounts should be enabled 009a0c92-f5b4-4776-9b66-4ed2b4775563 Batch 1.0.0 1x
1.0.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA unknown
Private endpoint should be enabled for MariaDB servers 0a1302fb-a631-4106-9753-f3d494733990 SQL 1.0.2 1x
1.0.2
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
Private endpoint should be enabled for PostgreSQL servers 0564d078-92f5-4f97-8398-b9f58a51f70b SQL 1.0.2 1x
1.0.2
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
Public network access on Azure SQL Database should be disabled 1b8ca024-1d5c-4dec-8995-b1a932b41780 SQL 1.1.0 1x
1.1.0
Default
Audit
Allowed
Audit, Deny, Disabled
0 GA true
Public network access should be disabled for Container registries 0fdf0491-d080-4575-b627-ad0e843cba0f Container Registry 1.0.0 1x
1.0.0
Default
Audit
Allowed
Audit, Deny, Disabled
0 GA true
Public network access should be disabled for MariaDB servers fdccbe47-f3e3-4213-ad5d-ea459b2fa077 SQL 2.0.0 1x
2.0.0
Default
Audit
Allowed
Audit, Deny, Disabled
0 GA unknown
Public network access should be disabled for MySQL flexible servers c9299215-ae47-4f50-9c54-8a392f68a052 SQL 2.3.0 3x
2.3.0, 2.2.0, 2.1.0
Default
Audit
Allowed
Audit, Deny, Disabled
0 GA unknown
Public network access should be disabled for MySQL servers d9844e8a-1437-4aeb-a32c-0c992f056095 SQL 2.0.0 1x
2.0.0
Default
Audit
Allowed
Audit, Deny, Disabled
0 GA unknown
Public network access should be disabled for PostgreSQL flexible servers 5e1de0e3-42cb-4ebc-a86d-61d0c619ca48 SQL 3.1.0 2x
3.1.0, 3.0.1
Default
Audit
Allowed
Audit, Deny, Disabled
0 GA unknown
Public network access should be disabled for PostgreSQL servers b52376f7-9612-48a1-81cd-1ffe4b61032c SQL 2.0.1 1x
2.0.1
Default
Audit
Allowed
Audit, Deny, Disabled
0 GA true
Resource logs in Azure Data Lake Store should be enabled 057ef27e-665e-4328-8ea3-04b3122bd9fb Data Lake 5.0.0 1x
5.0.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
Resource logs in Azure Key Vault Managed HSM should be enabled a2a5b911-5617-447e-a49e-59dbe0e0434b Key Vault 1.1.0 1x
1.1.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA unknown
Resource logs in Azure Kubernetes Service should be enabled 245fc9df-fa96-4414-9a0b-3738c2f7341c Kubernetes 1.0.0 1x
1.0.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
Resource logs in Azure Machine Learning Workspaces should be enabled afe0c3be-ba3b-4544-ba52-0c99672a8ad6 Machine Learning 1.0.1 1x
1.0.1
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
Resource logs in Azure Stream Analytics should be enabled f9be5368-9bf5-4b84-9e0a-7850da98bb46 Stream Analytics 5.0.0 1x
5.0.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
Resource logs in Batch accounts should be enabled 428256e6-1fac-4f48-a757-df34c2b3336d Batch 5.0.0 1x
5.0.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
Resource logs in Data Lake Analytics should be enabled c95c74d9-38fe-4f0d-af86-0c7d626a315c Data Lake 5.0.0 1x
5.0.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
Resource logs in Event Hub should be enabled 83a214f7-d01a-484b-91a9-ed54470c9a6a Event Hub 5.0.0 1x
5.0.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
Resource logs in IoT Hub should be enabled 383856f8-de7f-44a2-81fc-e5135b5c2aa4 Internet of Things 3.1.0 1x
3.1.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA unknown
Resource logs in Key Vault should be enabled cf820ca0-f99e-4f3e-84fb-66e913812d21 Key Vault 5.0.0 1x
5.0.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
Resource logs in Logic Apps should be enabled 34f95f76-5386-4de7-b824-0d8478470c9d Logic Apps 5.1.0 1x
5.1.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
Resource logs in Service Bus should be enabled f8d36e2f-389b-4ee4-898d-21aeb69a0f45 Service Bus 5.0.0 1x
5.0.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
Secure transfer to storage accounts should be enabled 404c3081-a854-4457-ae30-26a93ef643f9 Storage 2.0.0 1x
2.0.0
Default
Audit
Allowed
Audit, Deny, Disabled
0 GA true
Security Center standard pricing tier should be selected a1181c5f-672a-477a-979a-7d58aa086233 Security Center 1.1.0 1x
1.1.0
Default
Audit
Allowed
Audit, Disabled
0 GA true
Separately store backup information fc26e2fd-3149-74b4-5988-d64bb90f8ef7 Regulatory Compliance 1.1.0 1x
1.1.0
Default
Manual
Allowed
Manual, Disabled
0 GA true
SQL Auditing settings should have Action-Groups configured to capture critical activities 7ff426e2-515f-405a-91c8-4f2333442eb5 SQL 1.0.0 1x
1.0.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
SQL Managed Instance should have the minimal TLS version of 1.2 a8793640-60f7-487c-b5c3-1d37215905c4 SQL 1.0.1 1x
1.0.1
Default
Audit
Allowed
Audit, Disabled
0 GA true
SQL managed instances should use customer-managed keys to encrypt data at rest ac01ad65-10e5-46df-bdd9-6b0cad13e1d2 SQL 2.0.0 1x
2.0.0
Default
Audit
Allowed
Audit, Deny, Disabled
0 GA true
SQL Server should use a virtual network service endpoint ae5d2f14-d830-42b6-9899-df6cfe9c71a3 Network 1.0.0 1x
1.0.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
SQL servers on machines should have vulnerability findings resolved 6ba6d016-e7c3-4842-b8f2-4992ebc0d72d Security Center 1.0.0 1x
1.0.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
SQL servers should use customer-managed keys to encrypt data at rest 0a370ff3-6cab-4e85-8995-295fd854c5b8 SQL 2.0.1 1x
2.0.1
Default
Audit
Allowed
Audit, Deny, Disabled
0 GA true
Storage account encryption scopes should use double encryption for data at rest bfecdea6-31c4-4045-ad42-71b9dc87247d Storage 1.0.0 1x
1.0.0
Default
Audit
Allowed
Audit, Deny, Disabled
0 GA unknown
Storage account keys should not be expired 044985bb-afe1-42cd-8a36-9d5d42424537 Storage 3.0.0 1x
3.0.0
Default
Audit
Allowed
Audit, Deny, Disabled
0 GA unknown
Storage account public access should be disallowed 4fa4b6c0-31ca-4c0d-b10d-24b96f62a751 Storage 3.1.1 2x
3.1.1, 3.1.0-preview
Default
Audit
Allowed
audit, Audit, deny, Deny, disabled, Disabled
0 GA unknown
Storage accounts should allow access from trusted Microsoft services c9d007d0-c057-4772-b18c-01e546713bcd Storage 1.0.0 1x
1.0.0
Default
Audit
Allowed
Audit, Deny, Disabled
0 GA true
Storage accounts should prevent shared key access 8c6a50c6-9ffd-4ae7-986f-5fa6111f9a54 Storage 2.0.0 1x
2.0.0
Default
Audit
Allowed
Audit, Deny, Disabled
0 GA true
Storage Accounts should use a virtual network service endpoint 60d21c4f-21a3-4d94-85f4-b924e6aeeda4 Network 1.0.0 1x
1.0.0
Default
Audit
Allowed
Audit, Disabled
0 GA true
Subnets should be associated with a Network Security Group e71308d3-144b-4262-b144-efdc3cc90517 Security Center 3.0.0 1x
3.0.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
Subscriptions should have a contact email address for security issues 4f4f78b8-e367-4b10-a341-d9a4ad5cf1c7 Security Center 1.0.1 1x
1.0.1
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
System updates should be installed on your machines (powered by Update Center) f85bf3e0-d513-442e-89c3-1784ad63382b Security Center 1.0.1 2x
1.0.1, 1.0.0-preview
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
The Log Analytics extension should be installed on Virtual Machine Scale Sets efbde977-ba53-4479-b8e9-10b957924fbf Monitoring 1.0.1 1x
1.0.1
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
Transfer backup information to an alternate storage site 7bdb79ea-16b8-453e-4ca4-ad5b16012414 Regulatory Compliance 1.1.0 1x
1.1.0
Default
Manual
Allowed
Manual, Disabled
0 GA true
Virtual machines' Guest Configuration extension should be deployed with system-assigned managed identity d26f7642-7545-4e18-9b75-8c9bbdee3a9a Security Center 1.0.1 1x
1.0.1
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
Virtual machines should be connected to an approved virtual network d416745a-506c-48b6-8ab1-83cb814bcaa3 Network 1.0.0 1x
1.0.0
Default
Audit
Allowed
Audit, Deny, Disabled
0 GA true
Virtual network firewall rule on Azure SQL Database should be enabled to allow traffic from the specified subnet 77e8b146-0078-4fb2-b002-e112381199f0 SQL 1.0.0 1x
1.0.0
Fixed
AuditIfNotExists
0 GA unknown
VPN gateways should use only Azure Active Directory (Azure AD) authentication for point-to-site users 21a6bc25-125e-4d13-b82d-2e19b7208ab7 Network 1.0.0 1x
1.0.0
Default
Audit
Allowed
Audit, Deny, Disabled
0 GA true
Vulnerability assessment should be enabled on SQL Managed Instance 1b7aa243-30e4-4c9e-bca8-d0d3022b634a SQL 1.0.1 1x
1.0.1
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
Vulnerability assessment should be enabled on your SQL servers ef2a8f2a-b3d9-49cd-a8a8-9a3aaaf647d9 SQL 3.0.0 1x
3.0.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
Vulnerability assessment should be enabled on your Synapse workspaces 0049a6b3-a662-4f3e-8635-39cf44ace45a Synapse 1.0.0 1x
1.0.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
Web Application Firewall (WAF) should be enabled for Application Gateway 564feb30-bf6a-4854-b4bb-0d2d2d1e6c66 Network 2.0.0 1x
2.0.0
Default
Audit
Allowed
Audit, Deny, Disabled
0 GA true
Web Application Firewall (WAF) should use the specified mode for Application Gateway 12430be1-6cc8-4527-a9a8-e3d38f250096 Network 1.0.0 1x
1.0.0
Default
Audit
Allowed
Audit, Deny, Disabled
0 GA true
Windows machines should meet requirements for 'Administrative Templates - Network' 67e010c1-640d-438e-a3a5-feaccb533a98 Guest Configuration 3.0.0 1x
3.0.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
Windows machines should meet requirements for 'Security Options - Accounts' ee984370-154a-4ee8-9726-19d900e56fc0 Guest Configuration 3.0.0 1x
3.0.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
Windows machines should meet requirements for 'Security Options - Audit' 33936777-f2ac-45aa-82ec-07958ec9ade4 Guest Configuration 3.0.0 1x
3.0.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
Windows machines should meet requirements for 'Security Options - Network Access' 3ff60f98-7fa4-410a-9f7f-0b00f5afdbdd Guest Configuration 3.0.0 1x
3.0.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
Windows machines should meet requirements for 'Security Options - Network Security' 1221c620-d201-468c-81e7-2817e6107e84 Guest Configuration 3.0.0 1x
3.0.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
Windows machines should meet requirements for 'Security Options - User Account Control' 492a29ed-d143-4f03-b6a4-705ce081b463 Guest Configuration 3.0.0 1x
3.0.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
Windows machines should meet requirements for 'Security Settings - Account Policies' f2143251-70de-4e81-87a8-36cee5a2f29d Guest Configuration 3.0.0 1x
3.0.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
Windows machines should meet requirements for 'System Audit Policies - Account Management' 94d9aca8-3757-46df-aa51-f218c5f11954 Guest Configuration 3.0.0 1x
3.0.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
Windows machines should meet requirements for 'System Audit Policies - Detailed Tracking' 58383b73-94a9-4414-b382-4146eb02611b Guest Configuration 3.0.0 1x
3.0.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
Windows machines should meet requirements for 'System Audit Policies - Policy Change' 2a7a701e-dff3-4da9-9ec5-42cb98594c0b Guest Configuration 3.0.0 1x
3.0.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
Windows machines should meet requirements for 'System Audit Policies - Privilege Use' 87845465-c458-45f3-af66-dcd62176f397 Guest Configuration 3.0.0 1x
3.0.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
Windows machines should meet requirements for 'User Rights Assignment' e068b215-0026-4354-b347-8fb2766f73a2 Guest Configuration 3.0.0 1x
3.0.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
Windows machines should meet requirements for 'Windows Firewall Properties' 35d9882c-993d-44e6-87d2-db66ce21b636 Guest Configuration 3.0.0 1x
3.0.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
Windows machines should meet requirements of the Azure compute security baseline 72650e9f-97bc-4b2a-ab5f-9781a9fcecbc Guest Configuration 2.0.0 1x
2.0.0
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA true
Windows virtual machines should enable Azure Disk Encryption or EncryptionAtHost. 3dc5edcd-002d-444c-b216-e123bbfa37c0 Guest Configuration 1.1.1 2x
1.1.1, 1.1.0-preview
Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
0 GA unknown
Roles used Total Roles usage: 3
Total Roles unique usage: 3
Role Role Id #Policies Policies
Virtual Machine Contributor 9980e02c-c2be-4d73-94e8-173b1dc7cf3c 1 Deploy default Microsoft IaaSAntimalware extension for Windows Server
Contributor b24988ac-6180-42a0-ab88-20f7382dd24c 1 Deploy the Linux Guest Configuration extension to enable Guest Configuration assignments on Linux VMs
Network Contributor 4d97b98b-1d4f-4787-a291-c67834d212e7 1 Deploy network watcher when virtual networks are created
History
Date/Time (UTC ymd) (i) Changes
2025-08-07 17:22:55 Version change: '1.4.0' to '1.4.1'
2025-06-09 17:23:47 Version change: '1.3.0' to '1.4.0'
remove Policy [Deprecated]: Log Analytics extension should be enabled in virtual machine scale sets for listed virtual machine images (5c3bc7b8-a64c-4e08-a9cd-7ff0f31e1138)
remove Policy [Deprecated]: Log Analytics Extension should be enabled for listed virtual machine images (32133ab0-ee4b-4b44-98d6-042180979d50)
remove Policy [Deprecated]: Virtual machines should be connected to a specified workspace (f47b5582-33ec-4c5c-87c0-b010a6b2e917)
2025-05-09 17:29:42 Version change: '1.2.0' to '1.3.0'
remove Policy [Deprecated]: Virtual machines should have the Log Analytics extension installed (a70ca396-0a34-413a-88e1-b956c1e683be)
2025-04-24 19:52:16 Version change: '1.1.0' to '1.2.0'
2025-03-12 18:29:00 Version change: '1.0.0' to '1.1.0'
remove Policy [Deprecated]: Vulnerabilities in security configuration on your machines should be remediated (e1e5fd5d-3e4c-4ce1-8661-7d1873ae6b15)
2025-01-28 19:35:17 add Initiative a06d5deb-24aa-4991-9d58-fa7563154e31
JSON compare
compare mode: version left: version right:
1.4.0 → 1.4.1 RENAMED
@@ -1,17 +1,17 @@
1
  {
2
  "displayName": "PCI DSS v4.0.1",
3
  "description": "Payment Card Industry Data Security Standard, focusing on protecting credit card transaction data.",
4
  "metadata": {
5
- "version": "1.4.0",
6
  "category": "Regulatory Compliance"
7
  },
8
- "version": "1.4.0",
9
  "parameters": {
10
  "effect-5450f5bd-9c72-4390-a9c4-a7aba4edfdd2": {
11
  "type": "String",
12
  "metadata": {
13
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
14
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
15
  },
16
  "allowedValues": [
17
  "Audit",
@@ -75,9 +75,9 @@
75
  },
76
  "effect-1221c620-d201-468c-81e7-2817e6107e84": {
77
  "type": "String",
78
  "metadata": {
79
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
80
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
81
  },
82
  "allowedValues": [
83
  "AuditIfNotExists",
@@ -87,9 +87,9 @@
87
  },
88
  "effect-fa498b91-8a7e-4710-9578-da944c68d1fe": {
89
  "type": "String",
90
  "metadata": {
91
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
92
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
93
  },
94
  "allowedValues": [
95
  "Audit",
@@ -99,9 +99,9 @@
99
  },
100
  "effect-d6759c02-b87f-42b7-892e-71b3f471d782": {
101
  "type": "String",
102
  "metadata": {
103
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
104
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
105
  },
106
  "allowedValues": [
107
  "Audit",
@@ -111,9 +111,9 @@
111
  },
112
  "effect-c9d007d0-c057-4772-b18c-01e546713bcd": {
113
  "type": "String",
114
  "metadata": {
115
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
116
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
117
  },
118
  "allowedValues": [
119
  "Audit",
@@ -124,9 +124,9 @@
124
  },
125
  "effect-60d21c4f-21a3-4d94-85f4-b924e6aeeda4": {
126
  "type": "String",
127
  "metadata": {
128
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
129
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
130
  },
131
  "allowedValues": [
132
  "Audit",
@@ -136,9 +136,9 @@
136
  },
137
  "effect-11e3da8c-1d68-4392-badd-0ff3c43ab5b0": {
138
  "type": "String",
139
  "metadata": {
140
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
141
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
142
  },
143
  "allowedValues": [
144
  "Audit",
@@ -148,9 +148,9 @@
148
  },
149
  "effect-95bccee9-a7f8-4bec-9ee9-62c3473701fc": {
150
  "type": "String",
151
  "metadata": {
152
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
153
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
154
  },
155
  "allowedValues": [
156
  "AuditIfNotExists",
@@ -197,9 +197,9 @@
197
  },
198
  "effect-3ff60f98-7fa4-410a-9f7f-0b00f5afdbdd": {
199
  "type": "String",
200
  "metadata": {
201
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
202
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
203
  },
204
  "allowedValues": [
205
  "AuditIfNotExists",
@@ -209,9 +209,9 @@
209
  },
210
  "effect-21a6bc25-125e-4d13-b82d-2e19b7208ab7": {
211
  "type": "String",
212
  "metadata": {
213
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
214
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
215
  },
216
  "allowedValues": [
217
  "Audit",
@@ -222,9 +222,9 @@
222
  },
223
  "effect-deeddb44-9f94-4903-9fa0-081d524406e3": {
224
  "type": "String",
225
  "metadata": {
226
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
227
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
228
  },
229
  "allowedValues": [
230
  "Audit",
@@ -234,9 +234,9 @@
234
  },
235
  "effect-0a15ec92-a229-4763-bb14-0ea34a568f8d": {
236
  "type": "String",
237
  "metadata": {
238
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
239
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
240
  },
241
  "allowedValues": [
242
  "Audit",
@@ -246,9 +246,9 @@
246
  },
247
  "effect-0e60b895-3786-45da-8377-9c6b4b6ac5f9": {
248
  "type": "String",
249
  "metadata": {
250
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
251
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
252
  },
253
  "allowedValues": [
254
  "AuditIfNotExists",
@@ -279,9 +279,9 @@
279
  },
280
  "effect-c26596ff-4d70-4e6a-9a30-c2506bd2f80c": {
281
  "type": "String",
282
  "metadata": {
283
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
284
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
285
  },
286
  "allowedValues": [
287
  "Audit",
@@ -369,9 +369,9 @@
369
  },
370
  "effect-e6955644-301c-44b5-a4c4-528577de6861": {
371
  "type": "String",
372
  "metadata": {
373
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
374
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
375
  },
376
  "allowedValues": [
377
  "AuditIfNotExists",
@@ -402,9 +402,9 @@
402
  },
403
  "effect-1c6e92c9-99f0-4e55-9cf2-0c234dc48f99": {
404
  "type": "String",
405
  "metadata": {
406
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
407
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
408
  },
409
  "allowedValues": [
410
  "Audit",
@@ -461,9 +461,9 @@
461
  },
462
  "effect-d416745a-506c-48b6-8ab1-83cb814bcaa3": {
463
  "type": "String",
464
  "metadata": {
465
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
466
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
467
  },
468
  "allowedValues": [
469
  "Audit",
@@ -526,9 +526,9 @@
526
  },
527
  "effect-492a29ed-d143-4f03-b6a4-705ce081b463": {
528
  "type": "String",
529
  "metadata": {
530
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
531
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
532
  },
533
  "allowedValues": [
534
  "AuditIfNotExists",
@@ -695,9 +695,9 @@
695
  },
696
  "effect-35d9882c-993d-44e6-87d2-db66ce21b636": {
697
  "type": "String",
698
  "metadata": {
699
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
700
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
701
  },
702
  "allowedValues": [
703
  "AuditIfNotExists",
@@ -720,9 +720,9 @@
720
  },
721
  "effect-72650e9f-97bc-4b2a-ab5f-9781a9fcecbc": {
722
  "type": "String",
723
  "metadata": {
724
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
725
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
726
  },
727
  "allowedValues": [
728
  "AuditIfNotExists",
@@ -732,9 +732,9 @@
732
  },
733
  "effect-12430be1-6cc8-4527-a9a8-e3d38f250096": {
734
  "type": "String",
735
  "metadata": {
736
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
737
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
738
  },
739
  "allowedValues": [
740
  "Audit",
@@ -757,9 +757,9 @@
757
  },
758
  "effect-22730e10-96f6-4aac-ad84-9383d35b5917": {
759
  "type": "String",
760
  "metadata": {
761
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
762
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
763
  },
764
  "allowedValues": [
765
  "AuditIfNotExists",
@@ -769,9 +769,9 @@
769
  },
770
  "effect-0564d078-92f5-4f97-8398-b9f58a51f70b": {
771
  "type": "String",
772
  "metadata": {
773
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
774
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
775
  },
776
  "allowedValues": [
777
  "AuditIfNotExists",
@@ -781,9 +781,9 @@
781
  },
782
  "effect-0a1302fb-a631-4106-9753-f3d494733990": {
783
  "type": "String",
784
  "metadata": {
785
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
786
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
787
  },
788
  "allowedValues": [
789
  "AuditIfNotExists",
@@ -814,9 +814,9 @@
814
  },
815
  "effect-ee984370-154a-4ee8-9726-19d900e56fc0": {
816
  "type": "String",
817
  "metadata": {
818
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
819
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
820
  },
821
  "allowedValues": [
822
  "AuditIfNotExists",
@@ -826,9 +826,9 @@
826
  },
827
  "effect-e71308d3-144b-4262-b144-efdc3cc90517": {
828
  "type": "String",
829
  "metadata": {
830
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
831
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
832
  },
833
  "allowedValues": [
834
  "AuditIfNotExists",
@@ -838,9 +838,9 @@
838
  },
839
  "effect-564feb30-bf6a-4854-b4bb-0d2d2d1e6c66": {
840
  "type": "String",
841
  "metadata": {
842
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
843
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
844
  },
845
  "allowedValues": [
846
  "Audit",
@@ -872,9 +872,9 @@
872
  },
873
  "effect-098fc59e-46c7-4d99-9b16-64990e543d75": {
874
  "type": "String",
875
  "metadata": {
876
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
877
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
878
  },
879
  "allowedValues": [
880
  "Audit",
@@ -963,9 +963,9 @@
963
  },
964
  "effect-9f061a12-e40d-4183-a00e-171812443373": {
965
  "type": "String",
966
  "metadata": {
967
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
968
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
969
  },
970
  "allowedValues": [
971
  "Audit",
@@ -1007,9 +1007,9 @@
1007
  },
1008
  "effect-862e97cf-49fc-4a5c-9de4-40d4e2e7c8eb": {
1009
  "type": "String",
1010
  "metadata": {
1011
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1012
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1013
  },
1014
  "allowedValues": [
1015
  "Audit",
@@ -1020,9 +1020,9 @@
1020
  },
1021
  "effect-9daedab3-fb2d-461e-b861-71790eead4f6": {
1022
  "type": "String",
1023
  "metadata": {
1024
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1025
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1026
  },
1027
  "allowedValues": [
1028
  "AuditIfNotExists",
@@ -1061,9 +1061,9 @@
1061
  },
1062
  "effect-47a1ee2f-2a2a-4576-bf2a-e0e36709c2b8": {
1063
  "type": "String",
1064
  "metadata": {
1065
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1066
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1067
  },
1068
  "allowedValues": [
1069
  "Audit",
@@ -1112,9 +1112,9 @@
1112
  },
1113
  "effect-2913021d-f2fd-4f3d-b958-22354e2bdbcb": {
1114
  "type": "String",
1115
  "metadata": {
1116
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1117
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1118
  },
1119
  "allowedValues": [
1120
  "AuditIfNotExists",
@@ -1124,9 +1124,9 @@
1124
  },
1125
  "effect-7804b5c7-01dc-4723-969b-ae300cc07ff1": {
1126
  "type": "String",
1127
  "metadata": {
1128
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1129
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1130
  },
1131
  "allowedValues": [
1132
  "Audit",
@@ -1136,9 +1136,9 @@
1136
  },
1137
  "effect-8af8f826-edcb-4178-b35f-851ea6fea615": {
1138
  "type": "String",
1139
  "metadata": {
1140
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1141
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1142
  },
1143
  "allowedValues": [
1144
  "Audit",
@@ -1149,9 +1149,9 @@
1149
  },
1150
  "effect-0fdf0491-d080-4575-b627-ad0e843cba0f": {
1151
  "type": "String",
1152
  "metadata": {
1153
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1154
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1155
  },
1156
  "allowedValues": [
1157
  "Audit",
@@ -1162,9 +1162,9 @@
1162
  },
1163
  "effect-404c3081-a854-4457-ae30-26a93ef643f9": {
1164
  "type": "String",
1165
  "metadata": {
1166
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1167
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1168
  },
1169
  "allowedValues": [
1170
  "Audit",
@@ -1175,9 +1175,9 @@
1175
  },
1176
  "effect-1b8ca024-1d5c-4dec-8995-b1a932b41780": {
1177
  "type": "String",
1178
  "metadata": {
1179
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1180
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1181
  },
1182
  "allowedValues": [
1183
  "Audit",
@@ -1188,9 +1188,9 @@
1188
  },
1189
  "effect-1afada58-8b34-7ac2-a38a-983218635201": {
1190
  "type": "String",
1191
  "metadata": {
1192
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1193
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1194
  },
1195
  "allowedValues": [
1196
  "Manual",
@@ -1200,9 +1200,9 @@
1200
  },
1201
  "effect-797b37f7-06b8-444c-b1ad-fc62867f335a": {
1202
  "type": "String",
1203
  "metadata": {
1204
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1205
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1206
  },
1207
  "allowedValues": [
1208
  "Audit",
@@ -1213,9 +1213,9 @@
1213
  },
1214
  "effect-2d21331d-a4c2-4def-a9ad-ee4e1e023beb": {
1215
  "type": "String",
1216
  "metadata": {
1217
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1218
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1219
  },
1220
  "allowedValues": [
1221
  "AuditIfNotExists",
@@ -1225,9 +1225,9 @@
1225
  },
1226
  "effect-7803067c-7d34-46e3-8c79-0ca68fc4036d": {
1227
  "type": "String",
1228
  "metadata": {
1229
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1230
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1231
  },
1232
  "allowedValues": [
1233
  "AuditIfNotExists",
@@ -1237,9 +1237,9 @@
1237
  },
1238
  "effect-3d9f5e4c-9947-4579-9539-2a7695fbc187": {
1239
  "type": "String",
1240
  "metadata": {
1241
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1242
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1243
  },
1244
  "allowedValues": [
1245
  "Audit",
@@ -1250,9 +1250,9 @@
1250
  },
1251
  "effect-f6de0be7-9a8a-4b8a-b349-43cf02d22f7c": {
1252
  "type": "String",
1253
  "metadata": {
1254
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1255
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1256
  },
1257
  "allowedValues": [
1258
  "AuditIfNotExists",
@@ -1262,9 +1262,9 @@
1262
  },
1263
  "effect-009a0c92-f5b4-4776-9b66-4ed2b4775563": {
1264
  "type": "String",
1265
  "metadata": {
1266
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1267
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1268
  },
1269
  "allowedValues": [
1270
  "AuditIfNotExists",
@@ -1274,9 +1274,9 @@
1274
  },
1275
  "effect-af35e2a4-ef96-44e7-a9ae-853dd97032c4": {
1276
  "type": "String",
1277
  "metadata": {
1278
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1279
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1280
  },
1281
  "allowedValues": [
1282
  "Audit",
@@ -1302,9 +1302,9 @@
1302
  },
1303
  "effect-2393d2cf-a342-44cd-a2e2-fe0188fd1234": {
1304
  "type": "String",
1305
  "metadata": {
1306
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1307
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1308
  },
1309
  "allowedValues": [
1310
  "Audit",
@@ -1314,9 +1314,9 @@
1314
  },
1315
  "effect-b8564268-eb4a-4337-89be-a19db070c59d": {
1316
  "type": "String",
1317
  "metadata": {
1318
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1319
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1320
  },
1321
  "allowedValues": [
1322
  "AuditIfNotExists",
@@ -1326,9 +1326,9 @@
1326
  },
1327
  "effect-4fa4b6c0-31ca-4c0d-b10d-24b96f62a751": {
1328
  "type": "String",
1329
  "metadata": {
1330
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1331
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1332
  },
1333
  "allowedValues": [
1334
  "Audit",
@@ -1339,9 +1339,9 @@
1339
  },
1340
  "effect-55615ac9-af46-4a59-874e-391cc3dfb490": {
1341
  "type": "String",
1342
  "metadata": {
1343
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1344
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1345
  },
1346
  "allowedValues": [
1347
  "Audit",
@@ -1380,9 +1380,9 @@
1380
  },
1381
  "effect-c4857be7-912a-4c75-87e6-e30292bcdf78": {
1382
  "type": "String",
1383
  "metadata": {
1384
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1385
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1386
  },
1387
  "allowedValues": [
1388
  "Audit",
@@ -1392,9 +1392,9 @@
1392
  },
1393
  "effect-ae5d2f14-d830-42b6-9899-df6cfe9c71a3": {
1394
  "type": "String",
1395
  "metadata": {
1396
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1397
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1398
  },
1399
  "allowedValues": [
1400
  "AuditIfNotExists",
@@ -1404,9 +1404,9 @@
1404
  },
1405
  "effect-5e1de0e3-42cb-4ebc-a86d-61d0c619ca48": {
1406
  "type": "String",
1407
  "metadata": {
1408
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1409
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1410
  },
1411
  "allowedValues": [
1412
  "Audit",
@@ -1417,9 +1417,9 @@
1417
  },
1418
  "effect-c9299215-ae47-4f50-9c54-8a392f68a052": {
1419
  "type": "String",
1420
  "metadata": {
1421
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1422
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1423
  },
1424
  "allowedValues": [
1425
  "Audit",
@@ -1430,9 +1430,9 @@
1430
  },
1431
  "effect-0820b7b9-23aa-4725-a1ce-ae4558f718e5": {
1432
  "type": "String",
1433
  "metadata": {
1434
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1435
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1436
  },
1437
  "allowedValues": [
1438
  "AuditIfNotExists",
@@ -1442,9 +1442,9 @@
1442
  },
1443
  "effect-9dfea752-dd46-4766-aed1-c355fa93fb91": {
1444
  "type": "String",
1445
  "metadata": {
1446
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1447
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1448
  },
1449
  "allowedValues": [
1450
  "Audit",
@@ -1455,9 +1455,9 @@
1455
  },
1456
  "effect-438c38d2-3772-465a-a9cc-7a6666a275ce": {
1457
  "type": "String",
1458
  "metadata": {
1459
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1460
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1461
  },
1462
  "allowedValues": [
1463
  "Audit",
@@ -1468,9 +1468,9 @@
1468
  },
1469
  "effect-0e6763cc-5078-4e64-889d-ff4d9a839047": {
1470
  "type": "String",
1471
  "metadata": {
1472
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1473
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1474
  },
1475
  "allowedValues": [
1476
  "AuditIfNotExists",
@@ -1480,9 +1480,9 @@
1480
  },
1481
  "effect-af99038c-02fd-4a2f-ac24-386b62bf32de": {
1482
  "type": "String",
1483
  "metadata": {
1484
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1485
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1486
  },
1487
  "allowedValues": [
1488
  "AuditIfNotExists",
@@ -1492,9 +1492,9 @@
1492
  },
1493
  "effect-0fea8f8a-4169-495d-8307-30ec335f387d": {
1494
  "type": "String",
1495
  "metadata": {
1496
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1497
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1498
  },
1499
  "allowedValues": [
1500
  "Audit",
@@ -1504,9 +1504,9 @@
1504
  },
1505
  "effect-df73bd95-24da-4a4f-96b9-4e8b94b402bd": {
1506
  "type": "String",
1507
  "metadata": {
1508
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1509
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1510
  },
1511
  "allowedValues": [
1512
  "AuditIfNotExists",
@@ -1529,9 +1529,9 @@
1529
  },
1530
  "effect-1c988dd6-ade4-430f-a608-2a3e5b0a6d38": {
1531
  "type": "String",
1532
  "metadata": {
1533
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1534
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1535
  },
1536
  "allowedValues": [
1537
  "AuditIfNotExists",
@@ -1541,9 +1541,9 @@
1541
  },
1542
  "effect-6c53d030-cc64-46f0-906d-2bc061cd1334": {
1543
  "type": "String",
1544
  "metadata": {
1545
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1546
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1547
  },
1548
  "allowedValues": [
1549
  "Audit",
@@ -1554,9 +1554,9 @@
1554
  },
1555
  "effect-8405fdab-1faf-48aa-b702-999c9c172094": {
1556
  "type": "String",
1557
  "metadata": {
1558
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1559
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1560
  },
1561
  "allowedValues": [
1562
  "Audit",
@@ -1566,9 +1566,9 @@
1566
  },
1567
  "effect-1bc02227-0cb6-4e11-8f53-eb0b22eab7e8": {
1568
  "type": "String",
1569
  "metadata": {
1570
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1571
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1572
  },
1573
  "allowedValues": [
1574
  "Audit",
@@ -1620,9 +1620,9 @@
1620
  },
1621
  "effect-2a7a701e-dff3-4da9-9ec5-42cb98594c0b": {
1622
  "type": "String",
1623
  "metadata": {
1624
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1625
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1626
  },
1627
  "allowedValues": [
1628
  "AuditIfNotExists",
@@ -1632,9 +1632,9 @@
1632
  },
1633
  "effect-3b980d31-7904-4bb7-8575-5665739a8052": {
1634
  "type": "String",
1635
  "metadata": {
1636
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1637
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1638
  },
1639
  "allowedValues": [
1640
  "AuditIfNotExists",
@@ -1656,9 +1656,9 @@
1656
  },
1657
  "effect-c251913d-7d24-4958-af87-478ed3b9ba41": {
1658
  "type": "String",
1659
  "metadata": {
1660
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1661
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1662
  },
1663
  "allowedValues": [
1664
  "Audit",
@@ -1668,9 +1668,9 @@
1668
  },
1669
  "effect-a2a5b911-5617-447e-a49e-59dbe0e0434b": {
1670
  "type": "String",
1671
  "metadata": {
1672
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1673
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1674
  },
1675
  "allowedValues": [
1676
  "AuditIfNotExists",
@@ -1688,9 +1688,9 @@
1688
  },
1689
  "effect-3e596b57-105f-48a6-be97-03e9243bad6e": {
1690
  "type": "String",
1691
  "metadata": {
1692
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1693
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1694
  },
1695
  "allowedValues": [
1696
  "AuditIfNotExists",
@@ -1700,9 +1700,9 @@
1700
  },
1701
  "effect-7ff426e2-515f-405a-91c8-4f2333442eb5": {
1702
  "type": "String",
1703
  "metadata": {
1704
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1705
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1706
  },
1707
  "allowedValues": [
1708
  "AuditIfNotExists",
@@ -1733,9 +1733,9 @@
1733
  },
1734
  "effect-33936777-f2ac-45aa-82ec-07958ec9ade4": {
1735
  "type": "String",
1736
  "metadata": {
1737
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1738
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1739
  },
1740
  "allowedValues": [
1741
  "AuditIfNotExists",
@@ -1745,9 +1745,9 @@
1745
  },
1746
  "effect-afe0c3be-ba3b-4544-ba52-0c99672a8ad6": {
1747
  "type": "String",
1748
  "metadata": {
1749
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1750
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1751
  },
1752
  "allowedValues": [
1753
  "AuditIfNotExists",
@@ -1778,9 +1778,9 @@
1778
  },
1779
  "effect-87845465-c458-45f3-af66-dcd62176f397": {
1780
  "type": "String",
1781
  "metadata": {
1782
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1783
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1784
  },
1785
  "allowedValues": [
1786
  "AuditIfNotExists",
@@ -1790,9 +1790,9 @@
1790
  },
1791
  "effect-efbde977-ba53-4479-b8e9-10b957924fbf": {
1792
  "type": "String",
1793
  "metadata": {
1794
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1795
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1796
  },
1797
  "allowedValues": [
1798
  "AuditIfNotExists",
@@ -1815,9 +1815,9 @@
1815
  },
1816
  "effect-94d9aca8-3757-46df-aa51-f218c5f11954": {
1817
  "type": "String",
1818
  "metadata": {
1819
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1820
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1821
  },
1822
  "allowedValues": [
1823
  "AuditIfNotExists",
@@ -1827,9 +1827,9 @@
1827
  },
1828
  "effect-91a78b24-f231-4a8a-8da9-02c35b2b6510": {
1829
  "type": "String",
1830
  "metadata": {
1831
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1832
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1833
  },
1834
  "allowedValues": [
1835
  "AuditIfNotExists",
@@ -1847,9 +1847,9 @@
1847
  },
1848
  "effect-2b9ad585-36bc-4615-b300-fd4435808332": {
1849
  "type": "String",
1850
  "metadata": {
1851
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1852
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1853
  },
1854
  "allowedValues": [
1855
  "AuditIfNotExists",
@@ -1868,9 +1868,9 @@
1868
  },
1869
  "effect-f47b5582-33ec-4c5c-87c0-b010a6b2e917": {
1870
  "type": "String",
1871
  "metadata": {
1872
- "displayName": "[Deprecated]: Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1873
  "description": "For more information about effects, visit https://aka.ms/policyeffects",
1874
  "deprecated": true
1875
  },
1876
  "allowedValues": [
@@ -1881,9 +1881,9 @@
1881
  },
1882
  "effect-7796937f-307b-4598-941c-67d3a05ebfe7": {
1883
  "type": "String",
1884
  "metadata": {
1885
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1886
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1887
  },
1888
  "allowedValues": [
1889
  "AuditIfNotExists",
@@ -1893,9 +1893,9 @@
1893
  },
1894
  "effect-4c3c6c5f-0d47-4402-99b8-aa543dd8bcee": {
1895
  "type": "String",
1896
  "metadata": {
1897
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1898
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1899
  },
1900
  "allowedValues": [
1901
  "Audit",
@@ -1934,9 +1934,9 @@
1934
  },
1935
  "effect-c5447c04-a4d7-4ba8-a263-c9ee321a6858": {
1936
  "type": "String",
1937
  "metadata": {
1938
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1939
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1940
  },
1941
  "allowedValues": [
1942
  "AuditIfNotExists",
@@ -1957,9 +1957,9 @@
1957
  },
1958
  "effect-41388f1c-2db0-4c25-95b2-35d7f5ccbfa9": {
1959
  "type": "String",
1960
  "metadata": {
1961
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1962
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1963
  },
1964
  "allowedValues": [
1965
  "AuditIfNotExists",
@@ -1996,9 +1996,9 @@
1996
  },
1997
  "effect-58383b73-94a9-4414-b382-4146eb02611b": {
1998
  "type": "String",
1999
  "metadata": {
2000
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2001
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2002
  },
2003
  "allowedValues": [
2004
  "AuditIfNotExists",
@@ -2008,9 +2008,9 @@
2008
  },
2009
  "effect-13a6c84f-49a5-410a-b5df-5b880c3fe009": {
2010
  "type": "String",
2011
  "metadata": {
2012
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2013
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2014
  },
2015
  "allowedValues": [
2016
  "AuditIfNotExists",
@@ -2020,9 +2020,9 @@
2020
  },
2021
  "effect-245fc9df-fa96-4414-9a0b-3738c2f7341c": {
2022
  "type": "String",
2023
  "metadata": {
2024
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2025
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2026
  },
2027
  "allowedValues": [
2028
  "AuditIfNotExists",
@@ -2040,9 +2040,9 @@
2040
  },
2041
  "effect-672fe5a1-2fcd-42d7-b85d-902b6e28c6ff": {
2042
  "type": "String",
2043
  "metadata": {
2044
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2045
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2046
  },
2047
  "allowedValues": [
2048
  "AuditIfNotExists",
@@ -2052,9 +2052,9 @@
2052
  },
2053
  "effect-f9be5368-9bf5-4b84-9e0a-7850da98bb46": {
2054
  "type": "String",
2055
  "metadata": {
2056
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2057
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2058
  },
2059
  "allowedValues": [
2060
  "AuditIfNotExists",
@@ -2072,9 +2072,9 @@
2072
  },
2073
  "effect-f8d36e2f-389b-4ee4-898d-21aeb69a0f45": {
2074
  "type": "String",
2075
  "metadata": {
2076
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2077
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2078
  },
2079
  "allowedValues": [
2080
  "AuditIfNotExists",
@@ -2092,9 +2092,9 @@
2092
  },
2093
  "effect-b954148f-4c11-4c38-8221-be76711e194a": {
2094
  "type": "String",
2095
  "metadata": {
2096
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2097
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2098
  },
2099
  "allowedValues": [
2100
  "AuditIfNotExists",
@@ -2123,9 +2123,9 @@
2123
  },
2124
  "effect-83a214f7-d01a-484b-91a9-ed54470c9a6a": {
2125
  "type": "String",
2126
  "metadata": {
2127
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2128
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2129
  },
2130
  "allowedValues": [
2131
  "AuditIfNotExists",
@@ -2143,9 +2143,9 @@
2143
  },
2144
  "effect-428256e6-1fac-4f48-a757-df34c2b3336d": {
2145
  "type": "String",
2146
  "metadata": {
2147
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2148
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2149
  },
2150
  "allowedValues": [
2151
  "AuditIfNotExists",
@@ -2163,9 +2163,9 @@
2163
  },
2164
  "effect-a6fb4358-5bf4-4ad7-ba82-2cd2f41ce5e9": {
2165
  "type": "String",
2166
  "metadata": {
2167
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2168
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2169
  },
2170
  "allowedValues": [
2171
  "AuditIfNotExists",
@@ -2186,9 +2186,9 @@
2186
  },
2187
  "effect-6e2593d9-add6-4083-9c9b-4b7d2188c899": {
2188
  "type": "String",
2189
  "metadata": {
2190
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2191
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2192
  },
2193
  "allowedValues": [
2194
  "AuditIfNotExists",
@@ -2198,9 +2198,9 @@
2198
  },
2199
  "effect-d550e854-df1a-4de9-bf44-cd894b39a95e": {
2200
  "type": "String",
2201
  "metadata": {
2202
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2203
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2204
  },
2205
  "allowedValues": [
2206
  "Audit",
@@ -2211,9 +2211,9 @@
2211
  },
2212
  "effect-f655e522-adff-494d-95c2-52d4f6d56a42": {
2213
  "type": "String",
2214
  "metadata": {
2215
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2216
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2217
  },
2218
  "allowedValues": [
2219
  "AuditIfNotExists",
@@ -2223,9 +2223,9 @@
2223
  },
2224
  "effect-a1181c5f-672a-477a-979a-7d58aa086233": {
2225
  "type": "String",
2226
  "metadata": {
2227
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2228
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2229
  },
2230
  "allowedValues": [
2231
  "Audit",
@@ -2235,9 +2235,9 @@
2235
  },
2236
  "effect-1a4e592a-6a6e-44a5-9814-e36264ca96e7": {
2237
  "type": "String",
2238
  "metadata": {
2239
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2240
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2241
  },
2242
  "allowedValues": [
2243
  "AuditIfNotExists",
@@ -2247,9 +2247,9 @@
2247
  },
2248
  "effect-8dfab9c4-fe7b-49ad-85e4-1e9be085358f": {
2249
  "type": "String",
2250
  "metadata": {
2251
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2252
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2253
  },
2254
  "allowedValues": [
2255
  "AuditIfNotExists",
@@ -2259,9 +2259,9 @@
2259
  },
2260
  "effect-abfb4388-5bf4-4ad7-ba82-2cd2f41ceae9": {
2261
  "type": "String",
2262
  "metadata": {
2263
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2264
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2265
  },
2266
  "allowedValues": [
2267
  "AuditIfNotExists",
@@ -2271,9 +2271,9 @@
2271
  },
2272
  "effect-3bc8a0d5-38e0-4a3d-a657-2cb64468fc34": {
2273
  "type": "String",
2274
  "metadata": {
2275
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2276
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2277
  },
2278
  "allowedValues": [
2279
  "AuditIfNotExists",
@@ -2283,9 +2283,9 @@
2283
  },
2284
  "effect-a70ca396-0a34-413a-88e1-b956c1e683be": {
2285
  "type": "String",
2286
  "metadata": {
2287
- "displayName": "[Deprecated]: Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2288
  "description": "For more information about effects, visit https://aka.ms/policyeffects",
2289
  "deprecated": true
2290
  },
2291
  "allowedValues": [
@@ -2296,9 +2296,9 @@
2296
  },
2297
  "effect-97566dd7-78ae-4997-8b36-1c7bfe0d8121": {
2298
  "type": "String",
2299
  "metadata": {
2300
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2301
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2302
  },
2303
  "allowedValues": [
2304
  "Audit",
@@ -2308,9 +2308,9 @@
2308
  },
2309
  "effect-6581d072-105e-4418-827f-bd446d56421b": {
2310
  "type": "String",
2311
  "metadata": {
2312
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2313
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2314
  },
2315
  "allowedValues": [
2316
  "AuditIfNotExists",
@@ -2341,9 +2341,9 @@
2341
  },
2342
  "effect-511f5417-5d12-434d-ab2e-816901e72a5e": {
2343
  "type": "String",
2344
  "metadata": {
2345
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2346
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2347
  },
2348
  "allowedValues": [
2349
  "Audit",
@@ -2411,9 +2411,9 @@
2411
  },
2412
  "effect-1cb4d9c2-f88f-4069-bee0-dba239a57b09": {
2413
  "type": "String",
2414
  "metadata": {
2415
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2416
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2417
  },
2418
  "allowedValues": [
2419
  "AuditIfNotExists",
@@ -2423,9 +2423,9 @@
2423
  },
2424
  "effect-7926a6d1-b268-4586-8197-e8ae90c877d7": {
2425
  "type": "String",
2426
  "metadata": {
2427
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2428
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2429
  },
2430
  "allowedValues": [
2431
  "AuditIfNotExists",
@@ -2453,9 +2453,9 @@
2453
  },
2454
  "effect-32133ab0-ee4b-4b44-98d6-042180979d50": {
2455
  "type": "String",
2456
  "metadata": {
2457
- "displayName": "[Deprecated]: Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2458
  "description": "For more information about effects, visit https://aka.ms/policyeffects",
2459
  "deprecated": true
2460
  },
2461
  "allowedValues": [
@@ -2486,9 +2486,9 @@
2486
  },
2487
  "effect-a21f8c92-9e22-4f09-b759-50500d1d2dda": {
2488
  "type": "String",
2489
  "metadata": {
2490
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2491
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2492
  },
2493
  "allowedValues": [
2494
  "AuditIfNotExists",
@@ -2498,9 +2498,9 @@
2498
  },
2499
  "effect-d31e5c31-63b2-4f12-887b-e49456834fa1": {
2500
  "type": "String",
2501
  "metadata": {
2502
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2503
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2504
  },
2505
  "allowedValues": [
2506
  "AuditIfNotExists",
@@ -2510,9 +2510,9 @@
2510
  },
2511
  "effect-0a9fbe0d-c5c4-4da8-87d8-f4fd77338835": {
2512
  "type": "String",
2513
  "metadata": {
2514
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2515
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2516
  },
2517
  "allowedValues": [
2518
  "AuditIfNotExists",
@@ -2522,9 +2522,9 @@
2522
  },
2523
  "effect-d38668f5-d155-42c7-ab3d-9b57b50f8fbf": {
2524
  "type": "String",
2525
  "metadata": {
2526
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2527
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2528
  },
2529
  "allowedValues": [
2530
  "AuditIfNotExists",
@@ -2552,9 +2552,9 @@
2552
  },
2553
  "effect-5c3bc7b8-a64c-4e08-a9cd-7ff0f31e1138": {
2554
  "type": "String",
2555
  "metadata": {
2556
- "displayName": "[Deprecated]: Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2557
  "description": "For more information about effects, visit https://aka.ms/policyeffects",
2558
  "deprecated": true
2559
  },
2560
  "allowedValues": [
@@ -2565,9 +2565,9 @@
2565
  },
2566
  "effect-e1e5fd5d-3e4c-4ce1-8661-7d1873ae6b15": {
2567
  "type": "String",
2568
  "metadata": {
2569
- "displayName": "[Deprecated]: Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2570
  "description": "For more information about effects, visit https://aka.ms/policyeffects",
2571
  "deprecated": true
2572
  },
2573
  "allowedValues": [
@@ -2598,9 +2598,9 @@
2598
  },
2599
  "effect-22bee202-a82f-4305-9a2a-6d7f44d4dedb": {
2600
  "type": "String",
2601
  "metadata": {
2602
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2603
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2604
  },
2605
  "allowedValues": [
2606
  "Audit",
@@ -2611,9 +2611,9 @@
2611
  },
2612
  "effect-383856f8-de7f-44a2-81fc-e5135b5c2aa4": {
2613
  "type": "String",
2614
  "metadata": {
2615
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2616
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2617
  },
2618
  "allowedValues": [
2619
  "AuditIfNotExists",
@@ -2631,9 +2631,9 @@
2631
  },
2632
  "effect-cf820ca0-f99e-4f3e-84fb-66e913812d21": {
2633
  "type": "String",
2634
  "metadata": {
2635
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2636
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2637
  },
2638
  "allowedValues": [
2639
  "AuditIfNotExists",
@@ -2651,9 +2651,9 @@
2651
  },
2652
  "effect-34f95f76-5386-4de7-b824-0d8478470c9d": {
2653
  "type": "String",
2654
  "metadata": {
2655
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2656
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2657
  },
2658
  "allowedValues": [
2659
  "AuditIfNotExists",
@@ -2671,9 +2671,9 @@
2671
  },
2672
  "effect-057ef27e-665e-4328-8ea3-04b3122bd9fb": {
2673
  "type": "String",
2674
  "metadata": {
2675
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2676
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2677
  },
2678
  "allowedValues": [
2679
  "AuditIfNotExists",
@@ -2691,9 +2691,9 @@
2691
  },
2692
  "effect-c95c74d9-38fe-4f0d-af86-0c7d626a315c": {
2693
  "type": "String",
2694
  "metadata": {
2695
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2696
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2697
  },
2698
  "allowedValues": [
2699
  "AuditIfNotExists",
@@ -2731,9 +2731,9 @@
2731
  },
2732
  "effect-501541f7-f7e7-4cd6-868c-4190fdad3ac9": {
2733
  "type": "String",
2734
  "metadata": {
2735
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2736
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2737
  },
2738
  "allowedValues": [
2739
  "AuditIfNotExists",
@@ -2743,9 +2743,9 @@
2743
  },
2744
  "effect-3ac7c827-eea2-4bde-acc7-9568cd320efa": {
2745
  "type": "String",
2746
  "metadata": {
2747
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2748
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2749
  },
2750
  "allowedValues": [
2751
  "AuditIfNotExists",
@@ -2755,9 +2755,9 @@
2755
  },
2756
  "effect-090c7b07-b4ed-4561-ad20-e9075f3ccaff": {
2757
  "type": "String",
2758
  "metadata": {
2759
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2760
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2761
  },
2762
  "allowedValues": [
2763
  "AuditIfNotExists",
@@ -2767,9 +2767,9 @@
2767
  },
2768
  "effect-1b7aa243-30e4-4c9e-bca8-d0d3022b634a": {
2769
  "type": "String",
2770
  "metadata": {
2771
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2772
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2773
  },
2774
  "allowedValues": [
2775
  "AuditIfNotExists",
@@ -2779,9 +2779,9 @@
2779
  },
2780
  "effect-17f4b1cc-c55c-4d94-b1f9-2978f6ac2957": {
2781
  "type": "String",
2782
  "metadata": {
2783
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2784
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2785
  },
2786
  "allowedValues": [
2787
  "AuditIfNotExists",
@@ -2791,9 +2791,9 @@
2791
  },
2792
  "effect-6ba6d016-e7c3-4842-b8f2-4992ebc0d72d": {
2793
  "type": "String",
2794
  "metadata": {
2795
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2796
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2797
  },
2798
  "allowedValues": [
2799
  "AuditIfNotExists",
@@ -2803,9 +2803,9 @@
2803
  },
2804
  "effect-ae89ebca-1c92-4898-ac2c-9f63decb045c": {
2805
  "type": "String",
2806
  "metadata": {
2807
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2808
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2809
  },
2810
  "allowedValues": [
2811
  "AuditIfNotExists",
@@ -2815,9 +2815,9 @@
2815
  },
2816
  "effect-adbe85b5-83e6-4350-ab58-bf3a4f736e5e": {
2817
  "type": "String",
2818
  "metadata": {
2819
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2820
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2821
  },
2822
  "allowedValues": [
2823
  "AuditIfNotExists",
@@ -2827,9 +2827,9 @@
2827
  },
2828
  "effect-4f4f78b8-e367-4b10-a341-d9a4ad5cf1c7": {
2829
  "type": "String",
2830
  "metadata": {
2831
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2832
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2833
  },
2834
  "allowedValues": [
2835
  "AuditIfNotExists",
@@ -2988,9 +2988,9 @@
2988
  },
2989
  "effect-e068b215-0026-4354-b347-8fb2766f73a2": {
2990
  "type": "String",
2991
  "metadata": {
2992
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2993
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2994
  },
2995
  "allowedValues": [
2996
  "AuditIfNotExists",
@@ -3000,9 +3000,9 @@
3000
  },
3001
  "effect-4da35fc9-c9e7-4960-aec9-797fe7d9051d": {
3002
  "type": "String",
3003
  "metadata": {
3004
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3005
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3006
  },
3007
  "allowedValues": [
3008
  "AuditIfNotExists",
@@ -3012,9 +3012,9 @@
3012
  },
3013
  "effect-7fe3b40f-802b-4cdd-8bd4-fd799c948cc2": {
3014
  "type": "String",
3015
  "metadata": {
3016
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3017
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3018
  },
3019
  "allowedValues": [
3020
  "AuditIfNotExists",
@@ -3024,9 +3024,9 @@
3024
  },
3025
  "effect-1f90fc71-a595-4066-8974-d4d0802e8ef0": {
3026
  "type": "String",
3027
  "metadata": {
3028
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3029
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3030
  },
3031
  "allowedValues": [
3032
  "AuditIfNotExists",
@@ -3036,9 +3036,9 @@
3036
  },
3037
  "effect-c3d20c29-b36d-48fe-808b-99a87530ad99": {
3038
  "type": "String",
3039
  "metadata": {
3040
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3041
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3042
  },
3043
  "allowedValues": [
3044
  "AuditIfNotExists",
@@ -3048,9 +3048,9 @@
3048
  },
3049
  "effect-0ec47710-77ff-4a3d-9181-6aa50af424d0": {
3050
  "type": "String",
3051
  "metadata": {
3052
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3053
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3054
  },
3055
  "allowedValues": [
3056
  "Audit",
@@ -3060,9 +3060,9 @@
3060
  },
3061
  "effect-0b60c0b2-2dc2-4e1c-b5c9-abbed971de53": {
3062
  "type": "String",
3063
  "metadata": {
3064
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3065
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3066
  },
3067
  "allowedValues": [
3068
  "Audit",
@@ -3073,9 +3073,9 @@
3073
  },
3074
  "effect-d38fc420-0735-4ef3-ac11-c806f651a570": {
3075
  "type": "String",
3076
  "metadata": {
3077
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3078
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3079
  },
3080
  "allowedValues": [
3081
  "AuditIfNotExists",
@@ -3085,9 +3085,9 @@
3085
  },
3086
  "effect-32e6bbec-16b6-44c2-be37-c5b672d103cf": {
3087
  "type": "String",
3088
  "metadata": {
3089
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3090
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3091
  },
3092
  "allowedValues": [
3093
  "Audit",
@@ -3098,9 +3098,9 @@
3098
  },
3099
  "effect-a8793640-60f7-487c-b5c3-1d37215905c4": {
3100
  "type": "String",
3101
  "metadata": {
3102
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3103
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3104
  },
3105
  "allowedValues": [
3106
  "Audit",
@@ -3110,9 +3110,9 @@
3110
  },
3111
  "effect-013e242c-8828-4970-87b3-ab247555486d": {
3112
  "type": "String",
3113
  "metadata": {
3114
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3115
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3116
  },
3117
  "allowedValues": [
3118
  "AuditIfNotExists",
@@ -3122,9 +3122,9 @@
3122
  },
3123
  "effect-6b2122c1-8120-4ff5-801b-17625a355590": {
3124
  "type": "String",
3125
  "metadata": {
3126
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3127
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3128
  },
3129
  "allowedValues": [
3130
  "AuditIfNotExists",
@@ -3155,9 +3155,9 @@
3155
  },
3156
  "effect-95edb821-ddaf-4404-9732-666045e056b4": {
3157
  "type": "String",
3158
  "metadata": {
3159
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3160
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3161
  },
3162
  "allowedValues": [
3163
  "Audit",
@@ -3214,9 +3214,9 @@
3214
  },
3215
  "effect-cb510bfd-1cba-4d9f-a230-cb0976f4bb71": {
3216
  "type": "String",
3217
  "metadata": {
3218
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3219
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3220
  },
3221
  "allowedValues": [
3222
  "AuditIfNotExists",
@@ -3226,9 +3226,9 @@
3226
  },
3227
  "effect-d26f7642-7545-4e18-9b75-8c9bbdee3a9a": {
3228
  "type": "String",
3229
  "metadata": {
3230
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3231
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3232
  },
3233
  "allowedValues": [
3234
  "AuditIfNotExists",
@@ -3238,9 +3238,9 @@
3238
  },
3239
  "effect-f85bf3e0-d513-442e-89c3-1784ad63382b": {
3240
  "type": "String",
3241
  "metadata": {
3242
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3243
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3244
  },
3245
  "allowedValues": [
3246
  "AuditIfNotExists",
@@ -3250,9 +3250,9 @@
3250
  },
3251
  "effect-0da106f2-4ca3-48e8-bc85-c638fe6aea8f": {
3252
  "type": "String",
3253
  "metadata": {
3254
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3255
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3256
  },
3257
  "allowedValues": [
3258
  "AuditIfNotExists",
@@ -3275,9 +3275,9 @@
3275
  },
3276
  "effect-bf16e0bb-31e1-4646-8202-60a235cc7e74": {
3277
  "type": "String",
3278
  "metadata": {
3279
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3280
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3281
  },
3282
  "allowedValues": [
3283
  "AuditIfNotExists",
@@ -3287,9 +3287,9 @@
3287
  },
3288
  "effect-b4dec045-250a-48c2-b5cc-e0c4eec8b5b4": {
3289
  "type": "String",
3290
  "metadata": {
3291
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3292
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3293
  },
3294
  "allowedValues": [
3295
  "AuditIfNotExists",
@@ -3336,9 +3336,9 @@
3336
  },
3337
  "effect-67e010c1-640d-438e-a3a5-feaccb533a98": {
3338
  "type": "String",
3339
  "metadata": {
3340
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3341
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3342
  },
3343
  "allowedValues": [
3344
  "AuditIfNotExists",
@@ -3348,9 +3348,9 @@
3348
  },
3349
  "effect-e345b6c3-24bd-4c93-9bbb-7e5e49a17b78": {
3350
  "type": "String",
3351
  "metadata": {
3352
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3353
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3354
  },
3355
  "allowedValues": [
3356
  "Audit",
@@ -3360,9 +3360,9 @@
3360
  },
3361
  "effect-1c30f9cd-b84c-49cc-aa2c-9288447cc3b3": {
3362
  "type": "String",
3363
  "metadata": {
3364
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3365
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3366
  },
3367
  "allowedValues": [
3368
  "Audit",
@@ -3425,9 +3425,9 @@
3425
  },
3426
  "effect-f2143251-70de-4e81-87a8-36cee5a2f29d": {
3427
  "type": "String",
3428
  "metadata": {
3429
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3430
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3431
  },
3432
  "allowedValues": [
3433
  "AuditIfNotExists",
@@ -3437,9 +3437,9 @@
3437
  },
3438
  "effect-19dd1db6-f442-49cf-a838-b0786b4401ef": {
3439
  "type": "String",
3440
  "metadata": {
3441
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3442
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3443
  },
3444
  "allowedValues": [
3445
  "AuditIfNotExists",
@@ -3449,9 +3449,9 @@
3449
  },
3450
  "effect-81e74cea-30fd-40d5-802f-d72103c2aaaa": {
3451
  "type": "String",
3452
  "metadata": {
3453
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3454
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3455
  },
3456
  "allowedValues": [
3457
  "Audit",
@@ -3462,9 +3462,9 @@
3462
  },
3463
  "effect-3dc5edcd-002d-444c-b216-e123bbfa37c0": {
3464
  "type": "String",
3465
  "metadata": {
3466
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3467
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3468
  },
3469
  "allowedValues": [
3470
  "AuditIfNotExists",
@@ -3474,9 +3474,9 @@
3474
  },
3475
  "effect-18adea5e-f416-4d0f-8aa8-d24321e3e274": {
3476
  "type": "String",
3477
  "metadata": {
3478
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3479
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3480
  },
3481
  "allowedValues": [
3482
  "AuditIfNotExists",
@@ -3486,9 +3486,9 @@
3486
  },
3487
  "effect-f4b53539-8df9-40e4-86c6-6b607703bd4e": {
3488
  "type": "String",
3489
  "metadata": {
3490
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3491
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3492
  },
3493
  "allowedValues": [
3494
  "Audit",
@@ -3499,9 +3499,9 @@
3499
  },
3500
  "effect-0aa61e00-0a01-4a3c-9945-e93cffedf0e6": {
3501
  "type": "String",
3502
  "metadata": {
3503
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3504
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3505
  },
3506
  "allowedValues": [
3507
  "Audit",
@@ -3531,9 +3531,9 @@
3531
  },
3532
  "effect-75c4f823-d65c-4f29-a733-01d0077fdbcb": {
3533
  "type": "String",
3534
  "metadata": {
3535
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3536
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3537
  },
3538
  "allowedValues": [
3539
  "Audit",
@@ -3544,9 +3544,9 @@
3544
  },
3545
  "effect-56a5ee18-2ae6-4810-86f7-18e39ce5629b": {
3546
  "type": "String",
3547
  "metadata": {
3548
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3549
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3550
  },
3551
  "allowedValues": [
3552
  "Audit",
@@ -3565,9 +3565,9 @@
3565
  },
3566
  "effect-d461a302-a187-421a-89ac-84acdb4edc04": {
3567
  "type": "String",
3568
  "metadata": {
3569
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3570
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3571
  },
3572
  "allowedValues": [
3573
  "Audit",
@@ -3578,9 +3578,9 @@
3578
  },
3579
  "effect-ca91455f-eace-4f96-be59-e6e2c35b4816": {
3580
  "type": "String",
3581
  "metadata": {
3582
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3583
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3584
  },
3585
  "allowedValues": [
3586
  "Audit",
@@ -3591,9 +3591,9 @@
3591
  },
3592
  "effect-87ba29ef-1ab3-4d82-b763-87fcd4f531f7": {
3593
  "type": "String",
3594
  "metadata": {
3595
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3596
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3597
  },
3598
  "allowedValues": [
3599
  "Audit",
@@ -3604,9 +3604,9 @@
3604
  },
3605
  "effect-967a4b4b-2da9-43c1-b7d0-f98d0d74d0b1": {
3606
  "type": "String",
3607
  "metadata": {
3608
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3609
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3610
  },
3611
  "allowedValues": [
3612
  "Audit",
@@ -3636,9 +3636,9 @@
3636
  },
3637
  "effect-ff25f3c8-b739-4538-9d07-3d6d25cfb255": {
3638
  "type": "String",
3639
  "metadata": {
3640
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3641
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3642
  },
3643
  "allowedValues": [
3644
  "Audit",
@@ -3649,9 +3649,9 @@
3649
  },
3650
  "effect-ac01ad65-10e5-46df-bdd9-6b0cad13e1d2": {
3651
  "type": "String",
3652
  "metadata": {
3653
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3654
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3655
  },
3656
  "allowedValues": [
3657
  "Audit",
@@ -3662,9 +3662,9 @@
3662
  },
3663
  "effect-0a370ff3-6cab-4e85-8995-295fd854c5b8": {
3664
  "type": "String",
3665
  "metadata": {
3666
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3667
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3668
  },
3669
  "allowedValues": [
3670
  "Audit",
@@ -3675,9 +3675,9 @@
3675
  },
3676
  "effect-47031206-ce96-41f8-861b-6a915f3de284": {
3677
  "type": "String",
3678
  "metadata": {
3679
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3680
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3681
  },
3682
  "allowedValues": [
3683
  "Audit",
@@ -3688,9 +3688,9 @@
3688
  },
3689
  "effect-46aa9b05-0e60-4eae-a88b-1e9d374fa515": {
3690
  "type": "String",
3691
  "metadata": {
3692
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3693
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3694
  },
3695
  "allowedValues": [
3696
  "Audit",
@@ -3701,9 +3701,9 @@
3701
  },
3702
  "effect-bfecdea6-31c4-4045-ad42-71b9dc87247d": {
3703
  "type": "String",
3704
  "metadata": {
3705
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3706
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3707
  },
3708
  "allowedValues": [
3709
  "Audit",
@@ -3714,9 +3714,9 @@
3714
  },
3715
  "effect-98728c90-32c7-4049-8429-847dc0f4fe37": {
3716
  "type": "String",
3717
  "metadata": {
3718
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3719
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3720
  },
3721
  "allowedValues": [
3722
  "Audit",
@@ -3727,9 +3727,9 @@
3727
  },
3728
  "effect-152b15f7-8e1f-4c1f-ab71-8c010ba5dbc0": {
3729
  "type": "String",
3730
  "metadata": {
3731
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3732
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3733
  },
3734
  "allowedValues": [
3735
  "Audit",
@@ -3747,9 +3747,9 @@
3747
  },
3748
  "effect-d8cf8476-a2ec-4916-896e-992351803c44": {
3749
  "type": "String",
3750
  "metadata": {
3751
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3752
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3753
  },
3754
  "allowedValues": [
3755
  "Audit",
@@ -3759,9 +3759,9 @@
3759
  },
3760
  "effect-044985bb-afe1-42cd-8a36-9d5d42424537": {
3761
  "type": "String",
3762
  "metadata": {
3763
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3764
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3765
  },
3766
  "allowedValues": [
3767
  "Audit",
@@ -3772,9 +3772,9 @@
3772
  },
3773
  "effect-a1840de2-8088-4ea8-b153-b4c723e9cb01": {
3774
  "type": "String",
3775
  "metadata": {
3776
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3777
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3778
  },
3779
  "allowedValues": [
3780
  "Audit",
@@ -3784,9 +3784,9 @@
3784
  },
3785
  "effect-9b597639-28e4-48eb-b506-56b05d366257": {
3786
  "type": "String",
3787
  "metadata": {
3788
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3789
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3790
  },
3791
  "allowedValues": [
3792
  "AuditIfNotExists",
@@ -3796,9 +3796,9 @@
3796
  },
3797
  "effect-abfb7388-5bf4-4ad7-ba99-2cd2f41cebb9": {
3798
  "type": "String",
3799
  "metadata": {
3800
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3801
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3802
  },
3803
  "allowedValues": [
3804
  "AuditIfNotExists",
@@ -3808,9 +3808,9 @@
3808
  },
3809
  "effect-b02aacc0-b073-424e-8298-42b22829ee0a": {
3810
  "type": "String",
3811
  "metadata": {
3812
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3813
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3814
  },
3815
  "allowedValues": [
3816
  "AuditIfNotExists",
@@ -3820,9 +3820,9 @@
3820
  },
3821
  "effect-ef2a8f2a-b3d9-49cd-a8a8-9a3aaaf647d9": {
3822
  "type": "String",
3823
  "metadata": {
3824
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3825
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3826
  },
3827
  "allowedValues": [
3828
  "AuditIfNotExists",
@@ -3832,9 +3832,9 @@
3832
  },
3833
  "effect-0049a6b3-a662-4f3e-8635-39cf44ace45a": {
3834
  "type": "String",
3835
  "metadata": {
3836
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3837
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3838
  },
3839
  "allowedValues": [
3840
  "AuditIfNotExists",
@@ -3844,9 +3844,9 @@
3844
  },
3845
  "effect-c43e4a30-77cb-48ab-a4dd-93f175c63b57": {
3846
  "type": "String",
3847
  "metadata": {
3848
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3849
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3850
  },
3851
  "allowedValues": [
3852
  "AuditIfNotExists",
@@ -3856,9 +3856,9 @@
3856
  },
3857
  "effect-fb893a29-21bb-418c-a157-e99480ec364c": {
3858
  "type": "String",
3859
  "metadata": {
3860
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3861
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3862
  },
3863
  "allowedValues": [
3864
  "Audit",
@@ -3868,9 +3868,9 @@
3868
  },
3869
  "effect-bd876905-5b84-4f73-ab2d-2e7a7c4568d9": {
3870
  "type": "String",
3871
  "metadata": {
3872
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3873
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3874
  },
3875
  "allowedValues": [
3876
  "Audit",
@@ -3909,9 +3909,9 @@
3909
  },
3910
  "effect-e2dd799a-a932-4e9d-ac17-d473bc3c6c10": {
3911
  "type": "String",
3912
  "metadata": {
3913
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3914
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3915
  },
3916
  "allowedValues": [
3917
  "AuditIfNotExists",
@@ -3934,9 +3934,9 @@
3934
  },
3935
  "effect-ea53dbee-c6c9-4f0e-9f9e-de0039b78023": {
3936
  "type": "String",
3937
  "metadata": {
3938
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3939
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3940
  },
3941
  "allowedValues": [
3942
  "AuditIfNotExists",
@@ -3946,9 +3946,9 @@
3946
  },
3947
  "effect-a1817ec0-a368-432a-8057-8371e17ac6ee": {
3948
  "type": "String",
3949
  "metadata": {
3950
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3951
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3952
  },
3953
  "allowedValues": [
3954
  "Audit",
@@ -3980,9 +3980,9 @@
3980
  },
3981
  "effect-423dd1ba-798e-40e4-9c4d-b6902674b423": {
3982
  "type": "String",
3983
  "metadata": {
3984
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3985
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3986
  },
3987
  "allowedValues": [
3988
  "Audit",
@@ -4031,9 +4031,9 @@
4031
  },
4032
  "effect-8c6a50c6-9ffd-4ae7-986f-5fa6111f9a54": {
4033
  "type": "String",
4034
  "metadata": {
4035
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
4036
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
4037
  },
4038
  "allowedValues": [
4039
  "Audit",
@@ -4066,9 +4066,9 @@
4066
  },
4067
  "effect-f4826e5f-6a27-407c-ae3e-9582eb39891d": {
4068
  "type": "String",
4069
  "metadata": {
4070
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
4071
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
4072
  },
4073
  "allowedValues": [
4074
  "AuditIfNotExists",
@@ -4078,9 +4078,9 @@
4078
  },
4079
  "effect-e96a9a5f-07ca-471b-9bc5-6a0f33cbd68f": {
4080
  "type": "String",
4081
  "metadata": {
4082
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
4083
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
4084
  },
4085
  "allowedValues": [
4086
  "Audit",
@@ -4113,9 +4113,9 @@
4113
  },
4114
  "effect-4ceb8dc2-559c-478b-a15b-733fbf1e3738": {
4115
  "type": "String",
4116
  "metadata": {
4117
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
4118
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
4119
  },
4120
  "allowedValues": [
4121
  "AuditIfNotExists",
@@ -4125,9 +4125,9 @@
4125
  },
4126
  "effect-8ac833bd-f505-48d5-887e-c993a1d3eea0": {
4127
  "type": "String",
4128
  "metadata": {
4129
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
4130
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
4131
  },
4132
  "allowedValues": [
4133
  "AuditIfNotExists",
@@ -4137,9 +4137,9 @@
4137
  },
4138
  "effect-e15effd4-2278-4c65-a0da-4d6f6d1890e2": {
4139
  "type": "String",
4140
  "metadata": {
4141
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
4142
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
4143
  },
4144
  "allowedValues": [
4145
  "Deny",
@@ -4150,9 +4150,9 @@
4150
  },
4151
  "effect-fdccbe47-f3e3-4213-ad5d-ea459b2fa077": {
4152
  "type": "String",
4153
  "metadata": {
4154
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
4155
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
4156
  },
4157
  "allowedValues": [
4158
  "Audit",
@@ -4163,9 +4163,9 @@
4163
  },
4164
  "effect-b52376f7-9612-48a1-81cd-1ffe4b61032c": {
4165
  "type": "String",
4166
  "metadata": {
4167
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
4168
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
4169
  },
4170
  "allowedValues": [
4171
  "Audit",
@@ -4176,9 +4176,9 @@
4176
  },
4177
  "effect-d9844e8a-1437-4aeb-a32c-0c992f056095": {
4178
  "type": "String",
4179
  "metadata": {
4180
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
4181
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
4182
  },
4183
  "allowedValues": [
4184
  "Audit",
@@ -4189,9 +4189,9 @@
4189
  },
4190
  "effect-78215662-041e-49ed-a9dd-5385911b3a1f": {
4191
  "type": "String",
4192
  "metadata": {
4193
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
4194
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
4195
  },
4196
  "allowedValues": [
4197
  "Audit",
@@ -4202,9 +4202,9 @@
4202
  },
4203
  "effect-5d4e3c65-4873-47be-94f3-6f8b953a3598": {
4204
  "type": "String",
4205
  "metadata": {
4206
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
4207
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
4208
  },
4209
  "allowedValues": [
4210
  "Audit",
@@ -4223,9 +4223,9 @@
4223
  },
4224
  "effect-0a075868-4c26-42ef-914c-5bc007359560": {
4225
  "type": "String",
4226
  "metadata": {
4227
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
4228
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
4229
  },
4230
  "allowedValues": [
4231
  "Audit",
@@ -4236,9 +4236,9 @@
4236
  },
4237
  "effect-12d4fa5e-1f9f-4c21-97a9-b99b3c6611b5": {
4238
  "type": "String",
4239
  "metadata": {
4240
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
4241
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
4242
  },
4243
  "allowedValues": [
4244
  "Audit",
@@ -4249,9 +4249,9 @@
4249
  },
4250
  "effect-40e85574-ef33-47e8-a854-7a65c7500560": {
4251
  "type": "String",
4252
  "metadata": {
4253
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
4254
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
4255
  },
4256
  "allowedValues": [
4257
  "AuditIfNotExists",
@@ -4261,9 +4261,9 @@
4261
  },
4262
  "effect-fc26e2fd-3149-74b4-5988-d64bb90f8ef7": {
4263
  "type": "String",
4264
  "metadata": {
4265
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
4266
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
4267
  },
4268
  "allowedValues": [
4269
  "Manual",
@@ -4273,9 +4273,9 @@
4273
  },
4274
  "effect-7bdb79ea-16b8-453e-4ca4-ad5b16012414": {
4275
  "type": "String",
4276
  "metadata": {
4277
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
4278
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
4279
  },
4280
  "allowedValues": [
4281
  "Manual",
@@ -4301,9 +4301,9 @@
4301
  },
4302
  "effect-11ac78e3-31bc-4f0c-8434-37ab963cea07": {
4303
  "type": "String",
4304
  "metadata": {
4305
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
4306
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
4307
  },
4308
  "allowedValues": [
4309
  "AuditIfNotExists",
@@ -8832,8 +8832,9 @@
8832
  "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/PCI_DSS_v4.0.1_9.5.1.3"
8833
  }
8834
  ],
8835
  "versions": [
 
8836
  "1.4.0",
8837
  "1.3.0",
8838
  "1.2.0",
8839
  "1.1.0",
 
1
  {
2
  "displayName": "PCI DSS v4.0.1",
3
  "description": "Payment Card Industry Data Security Standard, focusing on protecting credit card transaction data.",
4
  "metadata": {
5
+ "version": "1.4.1",
6
  "category": "Regulatory Compliance"
7
  },
8
+ "version": "1.4.1",
9
  "parameters": {
10
  "effect-5450f5bd-9c72-4390-a9c4-a7aba4edfdd2": {
11
  "type": "String",
12
  "metadata": {
13
+ "displayName": "Effect for policy: Cosmos DB database accounts should have local authentication methods disabled",
14
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
15
  },
16
  "allowedValues": [
17
  "Audit",
 
75
  },
76
  "effect-1221c620-d201-468c-81e7-2817e6107e84": {
77
  "type": "String",
78
  "metadata": {
79
+ "displayName": "Effect for policy: Windows machines should meet requirements for 'Security Options - Network Security'",
80
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
81
  },
82
  "allowedValues": [
83
  "AuditIfNotExists",
 
87
  },
88
  "effect-fa498b91-8a7e-4710-9578-da944c68d1fe": {
89
  "type": "String",
90
  "metadata": {
91
+ "displayName": "Effect for policy: Azure PostgreSQL flexible server should have Microsoft Entra Only Authentication enabled",
92
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
93
  },
94
  "allowedValues": [
95
  "Audit",
 
99
  },
100
  "effect-d6759c02-b87f-42b7-892e-71b3f471d782": {
101
  "type": "String",
102
  "metadata": {
103
+ "displayName": "Effect for policy: Azure AI Services resources should use Azure Private Link",
104
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
105
  },
106
  "allowedValues": [
107
  "Audit",
 
111
  },
112
  "effect-c9d007d0-c057-4772-b18c-01e546713bcd": {
113
  "type": "String",
114
  "metadata": {
115
+ "displayName": "Effect for policy: Storage accounts should allow access from trusted Microsoft services",
116
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
117
  },
118
  "allowedValues": [
119
  "Audit",
 
124
  },
125
  "effect-60d21c4f-21a3-4d94-85f4-b924e6aeeda4": {
126
  "type": "String",
127
  "metadata": {
128
+ "displayName": "Effect for policy: Storage Accounts should use a virtual network service endpoint",
129
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
130
  },
131
  "allowedValues": [
132
  "Audit",
 
136
  },
137
  "effect-11e3da8c-1d68-4392-badd-0ff3c43ab5b0": {
138
  "type": "String",
139
  "metadata": {
140
+ "displayName": "Effect for policy: Recovery Services vaults should use private link",
141
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
142
  },
143
  "allowedValues": [
144
  "Audit",
 
148
  },
149
  "effect-95bccee9-a7f8-4bec-9ee9-62c3473701fc": {
150
  "type": "String",
151
  "metadata": {
152
+ "displayName": "Effect for policy: App Service apps should have authentication enabled",
153
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
154
  },
155
  "allowedValues": [
156
  "AuditIfNotExists",
 
197
  },
198
  "effect-3ff60f98-7fa4-410a-9f7f-0b00f5afdbdd": {
199
  "type": "String",
200
  "metadata": {
201
+ "displayName": "Effect for policy: Windows machines should meet requirements for 'Security Options - Network Access'",
202
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
203
  },
204
  "allowedValues": [
205
  "AuditIfNotExists",
 
209
  },
210
  "effect-21a6bc25-125e-4d13-b82d-2e19b7208ab7": {
211
  "type": "String",
212
  "metadata": {
213
+ "displayName": "Effect for policy: VPN gateways should use only Azure Active Directory (Azure AD) authentication for point-to-site users",
214
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
215
  },
216
  "allowedValues": [
217
  "Audit",
 
222
  },
223
  "effect-deeddb44-9f94-4903-9fa0-081d524406e3": {
224
  "type": "String",
225
  "metadata": {
226
+ "displayName": "Effect for policy: Azure Recovery Services vaults should use private link for backup",
227
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
228
  },
229
  "allowedValues": [
230
  "Audit",
 
234
  },
235
  "effect-0a15ec92-a229-4763-bb14-0ea34a568f8d": {
236
  "type": "String",
237
  "metadata": {
238
+ "displayName": "Effect for policy: Azure Policy Add-on for Kubernetes service (AKS) should be installed and enabled on your clusters",
239
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
240
  },
241
  "allowedValues": [
242
  "Audit",
 
246
  },
247
  "effect-0e60b895-3786-45da-8377-9c6b4b6ac5f9": {
248
  "type": "String",
249
  "metadata": {
250
+ "displayName": "Effect for policy: Function apps should have remote debugging turned off",
251
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
252
  },
253
  "allowedValues": [
254
  "AuditIfNotExists",
 
279
  },
280
  "effect-c26596ff-4d70-4e6a-9a30-c2506bd2f80c": {
281
  "type": "String",
282
  "metadata": {
283
+ "displayName": "Effect for policy: Kubernetes cluster containers should only use allowed capabilities",
284
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
285
  },
286
  "allowedValues": [
287
  "Audit",
 
369
  },
370
  "effect-e6955644-301c-44b5-a4c4-528577de6861": {
371
  "type": "String",
372
  "metadata": {
373
+ "displayName": "Effect for policy: Audit Linux machines that do not have the passwd file permissions set to 0644",
374
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
375
  },
376
  "allowedValues": [
377
  "AuditIfNotExists",
 
402
  },
403
  "effect-1c6e92c9-99f0-4e55-9cf2-0c234dc48f99": {
404
  "type": "String",
405
  "metadata": {
406
+ "displayName": "Effect for policy: Kubernetes clusters should not allow container privilege escalation",
407
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
408
  },
409
  "allowedValues": [
410
  "Audit",
 
461
  },
462
  "effect-d416745a-506c-48b6-8ab1-83cb814bcaa3": {
463
  "type": "String",
464
  "metadata": {
465
+ "displayName": "Effect for policy: Virtual machines should be connected to an approved virtual network",
466
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
467
  },
468
  "allowedValues": [
469
  "Audit",
 
526
  },
527
  "effect-492a29ed-d143-4f03-b6a4-705ce081b463": {
528
  "type": "String",
529
  "metadata": {
530
+ "displayName": "Effect for policy: Windows machines should meet requirements for 'Security Options - User Account Control'",
531
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
532
  },
533
  "allowedValues": [
534
  "AuditIfNotExists",
 
695
  },
696
  "effect-35d9882c-993d-44e6-87d2-db66ce21b636": {
697
  "type": "String",
698
  "metadata": {
699
+ "displayName": "Effect for policy: Windows machines should meet requirements for 'Windows Firewall Properties'",
700
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
701
  },
702
  "allowedValues": [
703
  "AuditIfNotExists",
 
720
  },
721
  "effect-72650e9f-97bc-4b2a-ab5f-9781a9fcecbc": {
722
  "type": "String",
723
  "metadata": {
724
+ "displayName": "Effect for policy: Windows machines should meet requirements of the Azure compute security baseline",
725
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
726
  },
727
  "allowedValues": [
728
  "AuditIfNotExists",
 
732
  },
733
  "effect-12430be1-6cc8-4527-a9a8-e3d38f250096": {
734
  "type": "String",
735
  "metadata": {
736
+ "displayName": "Effect for policy: Web Application Firewall (WAF) should use the specified mode for Application Gateway",
737
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
738
  },
739
  "allowedValues": [
740
  "Audit",
 
757
  },
758
  "effect-22730e10-96f6-4aac-ad84-9383d35b5917": {
759
  "type": "String",
760
  "metadata": {
761
+ "displayName": "Effect for policy: Management ports should be closed on your virtual machines",
762
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
763
  },
764
  "allowedValues": [
765
  "AuditIfNotExists",
 
769
  },
770
  "effect-0564d078-92f5-4f97-8398-b9f58a51f70b": {
771
  "type": "String",
772
  "metadata": {
773
+ "displayName": "Effect for policy: Private endpoint should be enabled for PostgreSQL servers",
774
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
775
  },
776
  "allowedValues": [
777
  "AuditIfNotExists",
 
781
  },
782
  "effect-0a1302fb-a631-4106-9753-f3d494733990": {
783
  "type": "String",
784
  "metadata": {
785
+ "displayName": "Effect for policy: Private endpoint should be enabled for MariaDB servers",
786
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
787
  },
788
  "allowedValues": [
789
  "AuditIfNotExists",
 
814
  },
815
  "effect-ee984370-154a-4ee8-9726-19d900e56fc0": {
816
  "type": "String",
817
  "metadata": {
818
+ "displayName": "Effect for policy: Windows machines should meet requirements for 'Security Options - Accounts'",
819
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
820
  },
821
  "allowedValues": [
822
  "AuditIfNotExists",
 
826
  },
827
  "effect-e71308d3-144b-4262-b144-efdc3cc90517": {
828
  "type": "String",
829
  "metadata": {
830
+ "displayName": "Effect for policy: Subnets should be associated with a Network Security Group",
831
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
832
  },
833
  "allowedValues": [
834
  "AuditIfNotExists",
 
838
  },
839
  "effect-564feb30-bf6a-4854-b4bb-0d2d2d1e6c66": {
840
  "type": "String",
841
  "metadata": {
842
+ "displayName": "Effect for policy: Web Application Firewall (WAF) should be enabled for Application Gateway",
843
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
844
  },
845
  "allowedValues": [
846
  "Audit",
 
872
  },
873
  "effect-098fc59e-46c7-4d99-9b16-64990e543d75": {
874
  "type": "String",
875
  "metadata": {
876
+ "displayName": "Effect for policy: Kubernetes cluster pod hostPath volumes should only use allowed host paths",
877
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
878
  },
879
  "allowedValues": [
880
  "Audit",
 
963
  },
964
  "effect-9f061a12-e40d-4183-a00e-171812443373": {
965
  "type": "String",
966
  "metadata": {
967
+ "displayName": "Effect for policy: Kubernetes clusters should not use the default namespace",
968
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
969
  },
970
  "allowedValues": [
971
  "Audit",
 
1007
  },
1008
  "effect-862e97cf-49fc-4a5c-9de4-40d4e2e7c8eb": {
1009
  "type": "String",
1010
  "metadata": {
1011
+ "displayName": "Effect for policy: Azure Cosmos DB accounts should have firewall rules",
1012
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1013
  },
1014
  "allowedValues": [
1015
  "Audit",
 
1020
  },
1021
  "effect-9daedab3-fb2d-461e-b861-71790eead4f6": {
1022
  "type": "String",
1023
  "metadata": {
1024
+ "displayName": "Effect for policy: All network ports should be restricted on network security groups associated to your virtual machine",
1025
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1026
  },
1027
  "allowedValues": [
1028
  "AuditIfNotExists",
 
1061
  },
1062
  "effect-47a1ee2f-2a2a-4576-bf2a-e0e36709c2b8": {
1063
  "type": "String",
1064
  "metadata": {
1065
+ "displayName": "Effect for policy: Kubernetes cluster containers should not share host process ID or host IPC namespace",
1066
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1067
  },
1068
  "allowedValues": [
1069
  "Audit",
 
1112
  },
1113
  "effect-2913021d-f2fd-4f3d-b958-22354e2bdbcb": {
1114
  "type": "String",
1115
  "metadata": {
1116
+ "displayName": "Effect for policy: Azure Defender for App Service should be enabled",
1117
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1118
  },
1119
  "allowedValues": [
1120
  "AuditIfNotExists",
 
1124
  },
1125
  "effect-7804b5c7-01dc-4723-969b-ae300cc07ff1": {
1126
  "type": "String",
1127
  "metadata": {
1128
+ "displayName": "Effect for policy: Azure Machine Learning Computes should be in a virtual network",
1129
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1130
  },
1131
  "allowedValues": [
1132
  "Audit",
 
1136
  },
1137
  "effect-8af8f826-edcb-4178-b35f-851ea6fea615": {
1138
  "type": "String",
1139
  "metadata": {
1140
+ "displayName": "Effect for policy: Azure Container Instance container group should deploy into a virtual network",
1141
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1142
  },
1143
  "allowedValues": [
1144
  "Audit",
 
1149
  },
1150
  "effect-0fdf0491-d080-4575-b627-ad0e843cba0f": {
1151
  "type": "String",
1152
  "metadata": {
1153
+ "displayName": "Effect for policy: Public network access should be disabled for Container registries",
1154
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1155
  },
1156
  "allowedValues": [
1157
  "Audit",
 
1162
  },
1163
  "effect-404c3081-a854-4457-ae30-26a93ef643f9": {
1164
  "type": "String",
1165
  "metadata": {
1166
+ "displayName": "Effect for policy: Secure transfer to storage accounts should be enabled",
1167
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1168
  },
1169
  "allowedValues": [
1170
  "Audit",
 
1175
  },
1176
  "effect-1b8ca024-1d5c-4dec-8995-b1a932b41780": {
1177
  "type": "String",
1178
  "metadata": {
1179
+ "displayName": "Effect for policy: Public network access on Azure SQL Database should be disabled",
1180
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1181
  },
1182
  "allowedValues": [
1183
  "Audit",
 
1188
  },
1189
  "effect-1afada58-8b34-7ac2-a38a-983218635201": {
1190
  "type": "String",
1191
  "metadata": {
1192
+ "displayName": "Effect for policy: Define acceptable and unacceptable mobile code technologies",
1193
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1194
  },
1195
  "allowedValues": [
1196
  "Manual",
 
1200
  },
1201
  "effect-797b37f7-06b8-444c-b1ad-fc62867f335a": {
1202
  "type": "String",
1203
  "metadata": {
1204
+ "displayName": "Effect for policy: Azure Cosmos DB should disable public network access",
1205
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1206
  },
1207
  "allowedValues": [
1208
  "Audit",
 
1213
  },
1214
  "effect-2d21331d-a4c2-4def-a9ad-ee4e1e023beb": {
1215
  "type": "String",
1216
  "metadata": {
1217
+ "displayName": "Effect for policy: App Service apps should use a virtual network service endpoint",
1218
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1219
  },
1220
  "allowedValues": [
1221
  "AuditIfNotExists",
 
1225
  },
1226
  "effect-7803067c-7d34-46e3-8c79-0ca68fc4036d": {
1227
  "type": "String",
1228
  "metadata": {
1229
+ "displayName": "Effect for policy: Azure Cache for Redis should use private link",
1230
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1231
  },
1232
  "allowedValues": [
1233
  "AuditIfNotExists",
 
1237
  },
1238
  "effect-3d9f5e4c-9947-4579-9539-2a7695fbc187": {
1239
  "type": "String",
1240
  "metadata": {
1241
+ "displayName": "Effect for policy: App Configuration should disable public network access",
1242
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1243
  },
1244
  "allowedValues": [
1245
  "Audit",
 
1250
  },
1251
  "effect-f6de0be7-9a8a-4b8a-b349-43cf02d22f7c": {
1252
  "type": "String",
1253
  "metadata": {
1254
+ "displayName": "Effect for policy: Internet-facing virtual machines should be protected with network security groups",
1255
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1256
  },
1257
  "allowedValues": [
1258
  "AuditIfNotExists",
 
1262
  },
1263
  "effect-009a0c92-f5b4-4776-9b66-4ed2b4775563": {
1264
  "type": "String",
1265
  "metadata": {
1266
+ "displayName": "Effect for policy: Private endpoint connections on Batch accounts should be enabled",
1267
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1268
  },
1269
  "allowedValues": [
1270
  "AuditIfNotExists",
 
1274
  },
1275
  "effect-af35e2a4-ef96-44e7-a9ae-853dd97032c4": {
1276
  "type": "String",
1277
  "metadata": {
1278
+ "displayName": "Effect for policy: Azure Spring Cloud should use network injection",
1279
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1280
  },
1281
  "allowedValues": [
1282
  "Audit",
 
1302
  },
1303
  "effect-2393d2cf-a342-44cd-a2e2-fe0188fd1234": {
1304
  "type": "String",
1305
  "metadata": {
1306
+ "displayName": "Effect for policy: Azure SignalR Service should use private link",
1307
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1308
  },
1309
  "allowedValues": [
1310
  "Audit",
 
1314
  },
1315
  "effect-b8564268-eb4a-4337-89be-a19db070c59d": {
1316
  "type": "String",
1317
  "metadata": {
1318
+ "displayName": "Effect for policy: Event Hub namespaces should use private link",
1319
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1320
  },
1321
  "allowedValues": [
1322
  "AuditIfNotExists",
 
1326
  },
1327
  "effect-4fa4b6c0-31ca-4c0d-b10d-24b96f62a751": {
1328
  "type": "String",
1329
  "metadata": {
1330
+ "displayName": "Effect for policy: Storage account public access should be disallowed",
1331
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1332
  },
1333
  "allowedValues": [
1334
  "Audit",
 
1339
  },
1340
  "effect-55615ac9-af46-4a59-874e-391cc3dfb490": {
1341
  "type": "String",
1342
  "metadata": {
1343
+ "displayName": "Effect for policy: Azure Key Vault should have firewall enabled or public network access disabled",
1344
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1345
  },
1346
  "allowedValues": [
1347
  "Audit",
 
1380
  },
1381
  "effect-c4857be7-912a-4c75-87e6-e30292bcdf78": {
1382
  "type": "String",
1383
  "metadata": {
1384
+ "displayName": "Effect for policy: Container Registry should use a virtual network service endpoint",
1385
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1386
  },
1387
  "allowedValues": [
1388
  "Audit",
 
1392
  },
1393
  "effect-ae5d2f14-d830-42b6-9899-df6cfe9c71a3": {
1394
  "type": "String",
1395
  "metadata": {
1396
+ "displayName": "Effect for policy: SQL Server should use a virtual network service endpoint",
1397
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1398
  },
1399
  "allowedValues": [
1400
  "AuditIfNotExists",
 
1404
  },
1405
  "effect-5e1de0e3-42cb-4ebc-a86d-61d0c619ca48": {
1406
  "type": "String",
1407
  "metadata": {
1408
+ "displayName": "Effect for policy: Public network access should be disabled for PostgreSQL flexible servers",
1409
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1410
  },
1411
  "allowedValues": [
1412
  "Audit",
 
1417
  },
1418
  "effect-c9299215-ae47-4f50-9c54-8a392f68a052": {
1419
  "type": "String",
1420
  "metadata": {
1421
+ "displayName": "Effect for policy: Public network access should be disabled for MySQL flexible servers",
1422
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1423
  },
1424
  "allowedValues": [
1425
  "Audit",
 
1430
  },
1431
  "effect-0820b7b9-23aa-4725-a1ce-ae4558f718e5": {
1432
  "type": "String",
1433
  "metadata": {
1434
+ "displayName": "Effect for policy: Function apps should not have CORS configured to allow every resource to access your apps",
1435
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1436
  },
1437
  "allowedValues": [
1438
  "AuditIfNotExists",
 
1442
  },
1443
  "effect-9dfea752-dd46-4766-aed1-c355fa93fb91": {
1444
  "type": "String",
1445
  "metadata": {
1446
+ "displayName": "Effect for policy: Azure SQL Managed Instances should disable public network access",
1447
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1448
  },
1449
  "allowedValues": [
1450
  "Audit",
 
1455
  },
1456
  "effect-438c38d2-3772-465a-a9cc-7a6666a275ce": {
1457
  "type": "String",
1458
  "metadata": {
1459
+ "displayName": "Effect for policy: Azure Machine Learning Workspaces should disable public network access",
1460
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1461
  },
1462
  "allowedValues": [
1463
  "Audit",
 
1468
  },
1469
  "effect-0e6763cc-5078-4e64-889d-ff4d9a839047": {
1470
  "type": "String",
1471
  "metadata": {
1472
+ "displayName": "Effect for policy: Azure Defender for Key Vault should be enabled",
1473
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1474
  },
1475
  "allowedValues": [
1476
  "AuditIfNotExists",
 
1480
  },
1481
  "effect-af99038c-02fd-4a2f-ac24-386b62bf32de": {
1482
  "type": "String",
1483
  "metadata": {
1484
+ "displayName": "Effect for policy: Machines should have ports closed that might expose attack vectors",
1485
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1486
  },
1487
  "allowedValues": [
1488
  "AuditIfNotExists",
 
1492
  },
1493
  "effect-0fea8f8a-4169-495d-8307-30ec335f387d": {
1494
  "type": "String",
1495
  "metadata": {
1496
+ "displayName": "Effect for policy: CORS should not allow every domain to access your API for FHIR",
1497
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1498
  },
1499
  "allowedValues": [
1500
  "Audit",
 
1504
  },
1505
  "effect-df73bd95-24da-4a4f-96b9-4e8b94b402bd": {
1506
  "type": "String",
1507
  "metadata": {
1508
+ "displayName": "Effect for policy: API Management should disable public network access to the service configuration endpoints",
1509
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1510
  },
1511
  "allowedValues": [
1512
  "AuditIfNotExists",
 
1529
  },
1530
  "effect-1c988dd6-ade4-430f-a608-2a3e5b0a6d38": {
1531
  "type": "String",
1532
  "metadata": {
1533
+ "displayName": "Effect for policy: Microsoft Defender for Containers should be enabled",
1534
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1535
  },
1536
  "allowedValues": [
1537
  "AuditIfNotExists",
 
1541
  },
1542
  "effect-6c53d030-cc64-46f0-906d-2bc061cd1334": {
1543
  "type": "String",
1544
  "metadata": {
1545
+ "displayName": "Effect for policy: Log Analytics workspaces should block log ingestion and querying from public networks",
1546
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1547
  },
1548
  "allowedValues": [
1549
  "Audit",
 
1554
  },
1555
  "effect-8405fdab-1faf-48aa-b702-999c9c172094": {
1556
  "type": "String",
1557
  "metadata": {
1558
+ "displayName": "Effect for policy: Managed disks should disable public network access",
1559
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1560
  },
1561
  "allowedValues": [
1562
  "Audit",
 
1566
  },
1567
  "effect-1bc02227-0cb6-4e11-8f53-eb0b22eab7e8": {
1568
  "type": "String",
1569
  "metadata": {
1570
+ "displayName": "Effect for policy: Application Insights components should block log ingestion and querying from public networks",
1571
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1572
  },
1573
  "allowedValues": [
1574
  "Audit",
 
1620
  },
1621
  "effect-2a7a701e-dff3-4da9-9ec5-42cb98594c0b": {
1622
  "type": "String",
1623
  "metadata": {
1624
+ "displayName": "Effect for policy: Windows machines should meet requirements for 'System Audit Policies - Policy Change'",
1625
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1626
  },
1627
  "allowedValues": [
1628
  "AuditIfNotExists",
 
1632
  },
1633
  "effect-3b980d31-7904-4bb7-8575-5665739a8052": {
1634
  "type": "String",
1635
  "metadata": {
1636
+ "displayName": "Effect for policy: An activity log alert should exist for specific Security operations",
1637
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1638
  },
1639
  "allowedValues": [
1640
  "AuditIfNotExists",
 
1656
  },
1657
  "effect-c251913d-7d24-4958-af87-478ed3b9ba41": {
1658
  "type": "String",
1659
  "metadata": {
1660
+ "displayName": "Effect for policy: Flow logs should be configured for every network security group",
1661
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1662
  },
1663
  "allowedValues": [
1664
  "Audit",
 
1668
  },
1669
  "effect-a2a5b911-5617-447e-a49e-59dbe0e0434b": {
1670
  "type": "String",
1671
  "metadata": {
1672
+ "displayName": "Effect for policy: Resource logs in Azure Key Vault Managed HSM should be enabled",
1673
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1674
  },
1675
  "allowedValues": [
1676
  "AuditIfNotExists",
 
1688
  },
1689
  "effect-3e596b57-105f-48a6-be97-03e9243bad6e": {
1690
  "type": "String",
1691
  "metadata": {
1692
+ "displayName": "Effect for policy: Azure Monitor solution 'Security and Audit' must be deployed",
1693
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1694
  },
1695
  "allowedValues": [
1696
  "AuditIfNotExists",
 
1700
  },
1701
  "effect-7ff426e2-515f-405a-91c8-4f2333442eb5": {
1702
  "type": "String",
1703
  "metadata": {
1704
+ "displayName": "Effect for policy: SQL Auditing settings should have Action-Groups configured to capture critical activities",
1705
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1706
  },
1707
  "allowedValues": [
1708
  "AuditIfNotExists",
 
1733
  },
1734
  "effect-33936777-f2ac-45aa-82ec-07958ec9ade4": {
1735
  "type": "String",
1736
  "metadata": {
1737
+ "displayName": "Effect for policy: Windows machines should meet requirements for 'Security Options - Audit'",
1738
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1739
  },
1740
  "allowedValues": [
1741
  "AuditIfNotExists",
 
1745
  },
1746
  "effect-afe0c3be-ba3b-4544-ba52-0c99672a8ad6": {
1747
  "type": "String",
1748
  "metadata": {
1749
+ "displayName": "Effect for policy: Resource logs in Azure Machine Learning Workspaces should be enabled",
1750
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1751
  },
1752
  "allowedValues": [
1753
  "AuditIfNotExists",
 
1778
  },
1779
  "effect-87845465-c458-45f3-af66-dcd62176f397": {
1780
  "type": "String",
1781
  "metadata": {
1782
+ "displayName": "Effect for policy: Windows machines should meet requirements for 'System Audit Policies - Privilege Use'",
1783
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1784
  },
1785
  "allowedValues": [
1786
  "AuditIfNotExists",
 
1790
  },
1791
  "effect-efbde977-ba53-4479-b8e9-10b957924fbf": {
1792
  "type": "String",
1793
  "metadata": {
1794
+ "displayName": "Effect for policy: The Log Analytics extension should be installed on Virtual Machine Scale Sets",
1795
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1796
  },
1797
  "allowedValues": [
1798
  "AuditIfNotExists",
 
1815
  },
1816
  "effect-94d9aca8-3757-46df-aa51-f218c5f11954": {
1817
  "type": "String",
1818
  "metadata": {
1819
+ "displayName": "Effect for policy: Windows machines should meet requirements for 'System Audit Policies - Account Management'",
1820
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1821
  },
1822
  "allowedValues": [
1823
  "AuditIfNotExists",
 
1827
  },
1828
  "effect-91a78b24-f231-4a8a-8da9-02c35b2b6510": {
1829
  "type": "String",
1830
  "metadata": {
1831
+ "displayName": "Effect for policy: App Service apps should have resource logs enabled",
1832
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1833
  },
1834
  "allowedValues": [
1835
  "AuditIfNotExists",
 
1847
  },
1848
  "effect-2b9ad585-36bc-4615-b300-fd4435808332": {
1849
  "type": "String",
1850
  "metadata": {
1851
+ "displayName": "Effect for policy: App Service apps should use managed identity",
1852
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1853
  },
1854
  "allowedValues": [
1855
  "AuditIfNotExists",
 
1868
  },
1869
  "effect-f47b5582-33ec-4c5c-87c0-b010a6b2e917": {
1870
  "type": "String",
1871
  "metadata": {
1872
+ "displayName": "[Deprecated]: Effect for policy: Virtual machines should be connected to a specified workspace",
1873
  "description": "For more information about effects, visit https://aka.ms/policyeffects",
1874
  "deprecated": true
1875
  },
1876
  "allowedValues": [
 
1881
  },
1882
  "effect-7796937f-307b-4598-941c-67d3a05ebfe7": {
1883
  "type": "String",
1884
  "metadata": {
1885
+ "displayName": "Effect for policy: Azure subscriptions should have a log profile for Activity Log",
1886
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1887
  },
1888
  "allowedValues": [
1889
  "AuditIfNotExists",
 
1893
  },
1894
  "effect-4c3c6c5f-0d47-4402-99b8-aa543dd8bcee": {
1895
  "type": "String",
1896
  "metadata": {
1897
+ "displayName": "Effect for policy: Audit flow logs configuration for every virtual network",
1898
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1899
  },
1900
  "allowedValues": [
1901
  "Audit",
 
1934
  },
1935
  "effect-c5447c04-a4d7-4ba8-a263-c9ee321a6858": {
1936
  "type": "String",
1937
  "metadata": {
1938
+ "displayName": "Effect for policy: An activity log alert should exist for specific Policy operations",
1939
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1940
  },
1941
  "allowedValues": [
1942
  "AuditIfNotExists",
 
1957
  },
1958
  "effect-41388f1c-2db0-4c25-95b2-35d7f5ccbfa9": {
1959
  "type": "String",
1960
  "metadata": {
1961
+ "displayName": "Effect for policy: Azure Monitor should collect activity logs from all regions",
1962
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
1963
  },
1964
  "allowedValues": [
1965
  "AuditIfNotExists",
 
1996
  },
1997
  "effect-58383b73-94a9-4414-b382-4146eb02611b": {
1998
  "type": "String",
1999
  "metadata": {
2000
+ "displayName": "Effect for policy: Windows machines should meet requirements for 'System Audit Policies - Detailed Tracking'",
2001
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2002
  },
2003
  "allowedValues": [
2004
  "AuditIfNotExists",
 
2008
  },
2009
  "effect-13a6c84f-49a5-410a-b5df-5b880c3fe009": {
2010
  "type": "String",
2011
  "metadata": {
2012
+ "displayName": "Effect for policy: Linux virtual machines should use only signed and trusted boot components",
2013
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2014
  },
2015
  "allowedValues": [
2016
  "AuditIfNotExists",
 
2020
  },
2021
  "effect-245fc9df-fa96-4414-9a0b-3738c2f7341c": {
2022
  "type": "String",
2023
  "metadata": {
2024
+ "displayName": "Effect for policy: Resource logs in Azure Kubernetes Service should be enabled",
2025
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2026
  },
2027
  "allowedValues": [
2028
  "AuditIfNotExists",
 
2040
  },
2041
  "effect-672fe5a1-2fcd-42d7-b85d-902b6e28c6ff": {
2042
  "type": "String",
2043
  "metadata": {
2044
+ "displayName": "Effect for policy: Guest Attestation extension should be installed on supported Linux virtual machines",
2045
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2046
  },
2047
  "allowedValues": [
2048
  "AuditIfNotExists",
 
2052
  },
2053
  "effect-f9be5368-9bf5-4b84-9e0a-7850da98bb46": {
2054
  "type": "String",
2055
  "metadata": {
2056
+ "displayName": "Effect for policy: Resource logs in Azure Stream Analytics should be enabled",
2057
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2058
  },
2059
  "allowedValues": [
2060
  "AuditIfNotExists",
 
2072
  },
2073
  "effect-f8d36e2f-389b-4ee4-898d-21aeb69a0f45": {
2074
  "type": "String",
2075
  "metadata": {
2076
+ "displayName": "Effect for policy: Resource logs in Service Bus should be enabled",
2077
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2078
  },
2079
  "allowedValues": [
2080
  "AuditIfNotExists",
 
2092
  },
2093
  "effect-b954148f-4c11-4c38-8221-be76711e194a": {
2094
  "type": "String",
2095
  "metadata": {
2096
+ "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations",
2097
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2098
  },
2099
  "allowedValues": [
2100
  "AuditIfNotExists",
 
2123
  },
2124
  "effect-83a214f7-d01a-484b-91a9-ed54470c9a6a": {
2125
  "type": "String",
2126
  "metadata": {
2127
+ "displayName": "Effect for policy: Resource logs in Event Hub should be enabled",
2128
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2129
  },
2130
  "allowedValues": [
2131
  "AuditIfNotExists",
 
2143
  },
2144
  "effect-428256e6-1fac-4f48-a757-df34c2b3336d": {
2145
  "type": "String",
2146
  "metadata": {
2147
+ "displayName": "Effect for policy: Resource logs in Batch accounts should be enabled",
2148
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2149
  },
2150
  "allowedValues": [
2151
  "AuditIfNotExists",
 
2163
  },
2164
  "effect-a6fb4358-5bf4-4ad7-ba82-2cd2f41ce5e9": {
2165
  "type": "String",
2166
  "metadata": {
2167
+ "displayName": "Effect for policy: Auditing on SQL server should be enabled",
2168
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2169
  },
2170
  "allowedValues": [
2171
  "AuditIfNotExists",
 
2186
  },
2187
  "effect-6e2593d9-add6-4083-9c9b-4b7d2188c899": {
2188
  "type": "String",
2189
  "metadata": {
2190
+ "displayName": "Effect for policy: Email notification for high severity alerts should be enabled",
2191
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2192
  },
2193
  "allowedValues": [
2194
  "AuditIfNotExists",
 
2198
  },
2199
  "effect-d550e854-df1a-4de9-bf44-cd894b39a95e": {
2200
  "type": "String",
2201
  "metadata": {
2202
+ "displayName": "Effect for policy: Azure Monitor Logs for Application Insights should be linked to a Log Analytics workspace",
2203
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2204
  },
2205
  "allowedValues": [
2206
  "Audit",
 
2211
  },
2212
  "effect-f655e522-adff-494d-95c2-52d4f6d56a42": {
2213
  "type": "String",
2214
  "metadata": {
2215
+ "displayName": "Effect for policy: Guest Attestation extension should be installed on supported Windows virtual machines scale sets",
2216
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2217
  },
2218
  "allowedValues": [
2219
  "AuditIfNotExists",
 
2223
  },
2224
  "effect-a1181c5f-672a-477a-979a-7d58aa086233": {
2225
  "type": "String",
2226
  "metadata": {
2227
+ "displayName": "Effect for policy: Security Center standard pricing tier should be selected",
2228
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2229
  },
2230
  "allowedValues": [
2231
  "Audit",
 
2235
  },
2236
  "effect-1a4e592a-6a6e-44a5-9814-e36264ca96e7": {
2237
  "type": "String",
2238
  "metadata": {
2239
+ "displayName": "Effect for policy: Azure Monitor log profile should collect logs for categories 'write,' 'delete,' and 'action'",
2240
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2241
  },
2242
  "allowedValues": [
2243
  "AuditIfNotExists",
 
2247
  },
2248
  "effect-8dfab9c4-fe7b-49ad-85e4-1e9be085358f": {
2249
  "type": "String",
2250
  "metadata": {
2251
+ "displayName": "Effect for policy: Azure Arc enabled Kubernetes clusters should have Microsoft Defender for Cloud extension installed",
2252
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2253
  },
2254
  "allowedValues": [
2255
  "AuditIfNotExists",
 
2259
  },
2260
  "effect-abfb4388-5bf4-4ad7-ba82-2cd2f41ceae9": {
2261
  "type": "String",
2262
  "metadata": {
2263
+ "displayName": "Effect for policy: Azure Defender for SQL should be enabled for unprotected Azure SQL servers",
2264
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2265
  },
2266
  "allowedValues": [
2267
  "AuditIfNotExists",
 
2271
  },
2272
  "effect-3bc8a0d5-38e0-4a3d-a657-2cb64468fc34": {
2273
  "type": "String",
2274
  "metadata": {
2275
+ "displayName": "Effect for policy: Azure Defender for SQL should be enabled for unprotected MySQL flexible servers",
2276
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2277
  },
2278
  "allowedValues": [
2279
  "AuditIfNotExists",
 
2283
  },
2284
  "effect-a70ca396-0a34-413a-88e1-b956c1e683be": {
2285
  "type": "String",
2286
  "metadata": {
2287
+ "displayName": "[Deprecated]: Effect for policy: Virtual machines should have the Log Analytics extension installed",
2288
  "description": "For more information about effects, visit https://aka.ms/policyeffects",
2289
  "deprecated": true
2290
  },
2291
  "allowedValues": [
 
2296
  },
2297
  "effect-97566dd7-78ae-4997-8b36-1c7bfe0d8121": {
2298
  "type": "String",
2299
  "metadata": {
2300
+ "displayName": "Effect for policy: Secure Boot should be enabled on supported Windows virtual machines",
2301
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2302
  },
2303
  "allowedValues": [
2304
  "Audit",
 
2308
  },
2309
  "effect-6581d072-105e-4418-827f-bd446d56421b": {
2310
  "type": "String",
2311
  "metadata": {
2312
+ "displayName": "Effect for policy: Azure Defender for SQL servers on machines should be enabled",
2313
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2314
  },
2315
  "allowedValues": [
2316
  "AuditIfNotExists",
 
2341
  },
2342
  "effect-511f5417-5d12-434d-ab2e-816901e72a5e": {
2343
  "type": "String",
2344
  "metadata": {
2345
+ "displayName": "Effect for policy: Kubernetes cluster containers should only use allowed AppArmor profiles",
2346
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2347
  },
2348
  "allowedValues": [
2349
  "Audit",
 
2411
  },
2412
  "effect-1cb4d9c2-f88f-4069-bee0-dba239a57b09": {
2413
  "type": "String",
2414
  "metadata": {
2415
+ "displayName": "Effect for policy: Guest Attestation extension should be installed on supported Windows virtual machines",
2416
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2417
  },
2418
  "allowedValues": [
2419
  "AuditIfNotExists",
 
2423
  },
2424
  "effect-7926a6d1-b268-4586-8197-e8ae90c877d7": {
2425
  "type": "String",
2426
  "metadata": {
2427
+ "displayName": "Effect for policy: Microsoft Defender for APIs should be enabled",
2428
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2429
  },
2430
  "allowedValues": [
2431
  "AuditIfNotExists",
 
2453
  },
2454
  "effect-32133ab0-ee4b-4b44-98d6-042180979d50": {
2455
  "type": "String",
2456
  "metadata": {
2457
+ "displayName": "[Deprecated]: Effect for policy: Log Analytics Extension should be enabled for listed virtual machine images",
2458
  "description": "For more information about effects, visit https://aka.ms/policyeffects",
2459
  "deprecated": true
2460
  },
2461
  "allowedValues": [
 
2486
  },
2487
  "effect-a21f8c92-9e22-4f09-b759-50500d1d2dda": {
2488
  "type": "String",
2489
  "metadata": {
2490
+ "displayName": "Effect for policy: Guest Attestation extension should be installed on supported Linux virtual machines scale sets",
2491
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2492
  },
2493
  "allowedValues": [
2494
  "AuditIfNotExists",
 
2498
  },
2499
  "effect-d31e5c31-63b2-4f12-887b-e49456834fa1": {
2500
  "type": "String",
2501
  "metadata": {
2502
+ "displayName": "Effect for policy: Microsoft Defender for SQL should be enabled for unprotected Synapse workspaces",
2503
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2504
  },
2505
  "allowedValues": [
2506
  "AuditIfNotExists",
 
2510
  },
2511
  "effect-0a9fbe0d-c5c4-4da8-87d8-f4fd77338835": {
2512
  "type": "String",
2513
  "metadata": {
2514
+ "displayName": "Effect for policy: Azure Defender for open-source relational databases should be enabled",
2515
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2516
  },
2517
  "allowedValues": [
2518
  "AuditIfNotExists",
 
2522
  },
2523
  "effect-d38668f5-d155-42c7-ab3d-9b57b50f8fbf": {
2524
  "type": "String",
2525
  "metadata": {
2526
+ "displayName": "Effect for policy: Azure Defender for SQL should be enabled for unprotected PostgreSQL flexible servers",
2527
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2528
  },
2529
  "allowedValues": [
2530
  "AuditIfNotExists",
 
2552
  },
2553
  "effect-5c3bc7b8-a64c-4e08-a9cd-7ff0f31e1138": {
2554
  "type": "String",
2555
  "metadata": {
2556
+ "displayName": "[Deprecated]: Effect for policy: Log Analytics extension should be enabled in virtual machine scale sets for listed virtual machine images",
2557
  "description": "For more information about effects, visit https://aka.ms/policyeffects",
2558
  "deprecated": true
2559
  },
2560
  "allowedValues": [
 
2565
  },
2566
  "effect-e1e5fd5d-3e4c-4ce1-8661-7d1873ae6b15": {
2567
  "type": "String",
2568
  "metadata": {
2569
+ "displayName": "[Deprecated]: Effect for policy: Vulnerabilities in security configuration on your machines should be remediated",
2570
  "description": "For more information about effects, visit https://aka.ms/policyeffects",
2571
  "deprecated": true
2572
  },
2573
  "allowedValues": [
 
2598
  },
2599
  "effect-22bee202-a82f-4305-9a2a-6d7f44d4dedb": {
2600
  "type": "String",
2601
  "metadata": {
2602
+ "displayName": "Effect for policy: Only secure connections to your Azure Cache for Redis should be enabled",
2603
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2604
  },
2605
  "allowedValues": [
2606
  "Audit",
 
2611
  },
2612
  "effect-383856f8-de7f-44a2-81fc-e5135b5c2aa4": {
2613
  "type": "String",
2614
  "metadata": {
2615
+ "displayName": "Effect for policy: Resource logs in IoT Hub should be enabled",
2616
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2617
  },
2618
  "allowedValues": [
2619
  "AuditIfNotExists",
 
2631
  },
2632
  "effect-cf820ca0-f99e-4f3e-84fb-66e913812d21": {
2633
  "type": "String",
2634
  "metadata": {
2635
+ "displayName": "Effect for policy: Resource logs in Key Vault should be enabled",
2636
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2637
  },
2638
  "allowedValues": [
2639
  "AuditIfNotExists",
 
2651
  },
2652
  "effect-34f95f76-5386-4de7-b824-0d8478470c9d": {
2653
  "type": "String",
2654
  "metadata": {
2655
+ "displayName": "Effect for policy: Resource logs in Logic Apps should be enabled",
2656
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2657
  },
2658
  "allowedValues": [
2659
  "AuditIfNotExists",
 
2671
  },
2672
  "effect-057ef27e-665e-4328-8ea3-04b3122bd9fb": {
2673
  "type": "String",
2674
  "metadata": {
2675
+ "displayName": "Effect for policy: Resource logs in Azure Data Lake Store should be enabled",
2676
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2677
  },
2678
  "allowedValues": [
2679
  "AuditIfNotExists",
 
2691
  },
2692
  "effect-c95c74d9-38fe-4f0d-af86-0c7d626a315c": {
2693
  "type": "String",
2694
  "metadata": {
2695
+ "displayName": "Effect for policy: Resource logs in Data Lake Analytics should be enabled",
2696
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2697
  },
2698
  "allowedValues": [
2699
  "AuditIfNotExists",
 
2731
  },
2732
  "effect-501541f7-f7e7-4cd6-868c-4190fdad3ac9": {
2733
  "type": "String",
2734
  "metadata": {
2735
+ "displayName": "Effect for policy: A vulnerability assessment solution should be enabled on your virtual machines",
2736
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2737
  },
2738
  "allowedValues": [
2739
  "AuditIfNotExists",
 
2743
  },
2744
  "effect-3ac7c827-eea2-4bde-acc7-9568cd320efa": {
2745
  "type": "String",
2746
  "metadata": {
2747
+ "displayName": "Effect for policy: Machines should have secret findings resolved",
2748
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2749
  },
2750
  "allowedValues": [
2751
  "AuditIfNotExists",
 
2755
  },
2756
  "effect-090c7b07-b4ed-4561-ad20-e9075f3ccaff": {
2757
  "type": "String",
2758
  "metadata": {
2759
+ "displayName": "Effect for policy: Azure registry container images should have vulnerabilities resolved (powered by Microsoft Defender Vulnerability Management)",
2760
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2761
  },
2762
  "allowedValues": [
2763
  "AuditIfNotExists",
 
2767
  },
2768
  "effect-1b7aa243-30e4-4c9e-bca8-d0d3022b634a": {
2769
  "type": "String",
2770
  "metadata": {
2771
+ "displayName": "Effect for policy: Vulnerability assessment should be enabled on SQL Managed Instance",
2772
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2773
  },
2774
  "allowedValues": [
2775
  "AuditIfNotExists",
 
2779
  },
2780
  "effect-17f4b1cc-c55c-4d94-b1f9-2978f6ac2957": {
2781
  "type": "String",
2782
  "metadata": {
2783
+ "displayName": "Effect for policy: Azure running container images should have vulnerabilities resolved (powered by Microsoft Defender Vulnerability Management)",
2784
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2785
  },
2786
  "allowedValues": [
2787
  "AuditIfNotExists",
 
2791
  },
2792
  "effect-6ba6d016-e7c3-4842-b8f2-4992ebc0d72d": {
2793
  "type": "String",
2794
  "metadata": {
2795
+ "displayName": "Effect for policy: SQL servers on machines should have vulnerability findings resolved",
2796
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2797
  },
2798
  "allowedValues": [
2799
  "AuditIfNotExists",
 
2803
  },
2804
  "effect-ae89ebca-1c92-4898-ac2c-9f63decb045c": {
2805
  "type": "String",
2806
  "metadata": {
2807
+ "displayName": "Effect for policy: Guest Configuration extension should be installed on your machines",
2808
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2809
  },
2810
  "allowedValues": [
2811
  "AuditIfNotExists",
 
2815
  },
2816
  "effect-adbe85b5-83e6-4350-ab58-bf3a4f736e5e": {
2817
  "type": "String",
2818
  "metadata": {
2819
+ "displayName": "Effect for policy: Microsoft Defender for Azure Cosmos DB should be enabled",
2820
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2821
  },
2822
  "allowedValues": [
2823
  "AuditIfNotExists",
 
2827
  },
2828
  "effect-4f4f78b8-e367-4b10-a341-d9a4ad5cf1c7": {
2829
  "type": "String",
2830
  "metadata": {
2831
+ "displayName": "Effect for policy: Subscriptions should have a contact email address for security issues",
2832
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2833
  },
2834
  "allowedValues": [
2835
  "AuditIfNotExists",
 
2988
  },
2989
  "effect-e068b215-0026-4354-b347-8fb2766f73a2": {
2990
  "type": "String",
2991
  "metadata": {
2992
+ "displayName": "Effect for policy: Windows machines should meet requirements for 'User Rights Assignment'",
2993
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
2994
  },
2995
  "allowedValues": [
2996
  "AuditIfNotExists",
 
3000
  },
3001
  "effect-4da35fc9-c9e7-4960-aec9-797fe7d9051d": {
3002
  "type": "String",
3003
  "metadata": {
3004
+ "displayName": "Effect for policy: Azure Defender for servers should be enabled",
3005
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3006
  },
3007
  "allowedValues": [
3008
  "AuditIfNotExists",
 
3012
  },
3013
  "effect-7fe3b40f-802b-4cdd-8bd4-fd799c948cc2": {
3014
  "type": "String",
3015
  "metadata": {
3016
+ "displayName": "Effect for policy: Azure Defender for Azure SQL Database servers should be enabled",
3017
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3018
  },
3019
  "allowedValues": [
3020
  "AuditIfNotExists",
 
3024
  },
3025
  "effect-1f90fc71-a595-4066-8974-d4d0802e8ef0": {
3026
  "type": "String",
3027
  "metadata": {
3028
+ "displayName": "Effect for policy: Microsoft Defender CSPM should be enabled",
3029
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3030
  },
3031
  "allowedValues": [
3032
  "AuditIfNotExists",
 
3036
  },
3037
  "effect-c3d20c29-b36d-48fe-808b-99a87530ad99": {
3038
  "type": "String",
3039
  "metadata": {
3040
+ "displayName": "Effect for policy: Azure Defender for Resource Manager should be enabled",
3041
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3042
  },
3043
  "allowedValues": [
3044
  "AuditIfNotExists",
 
3048
  },
3049
  "effect-0ec47710-77ff-4a3d-9181-6aa50af424d0": {
3050
  "type": "String",
3051
  "metadata": {
3052
+ "displayName": "Effect for policy: Geo-redundant backup should be enabled for Azure Database for MariaDB",
3053
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3054
  },
3055
  "allowedValues": [
3056
  "Audit",
 
3060
  },
3061
  "effect-0b60c0b2-2dc2-4e1c-b5c9-abbed971de53": {
3062
  "type": "String",
3063
  "metadata": {
3064
+ "displayName": "Effect for policy: Key vaults should have deletion protection enabled",
3065
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3066
  },
3067
  "allowedValues": [
3068
  "Audit",
 
3073
  },
3074
  "effect-d38fc420-0735-4ef3-ac11-c806f651a570": {
3075
  "type": "String",
3076
  "metadata": {
3077
+ "displayName": "Effect for policy: Long-term geo-redundant backup should be enabled for Azure SQL Databases",
3078
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3079
  },
3080
  "allowedValues": [
3081
  "AuditIfNotExists",
 
3085
  },
3086
  "effect-32e6bbec-16b6-44c2-be37-c5b672d103cf": {
3087
  "type": "String",
3088
  "metadata": {
3089
+ "displayName": "Effect for policy: Azure SQL Database should be running TLS version 1.2 or newer",
3090
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3091
  },
3092
  "allowedValues": [
3093
  "Audit",
 
3098
  },
3099
  "effect-a8793640-60f7-487c-b5c3-1d37215905c4": {
3100
  "type": "String",
3101
  "metadata": {
3102
+ "displayName": "Effect for policy: SQL Managed Instance should have the minimal TLS version of 1.2",
3103
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3104
  },
3105
  "allowedValues": [
3106
  "Audit",
 
3110
  },
3111
  "effect-013e242c-8828-4970-87b3-ab247555486d": {
3112
  "type": "String",
3113
  "metadata": {
3114
+ "displayName": "Effect for policy: Azure Backup should be enabled for Virtual Machines",
3115
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3116
  },
3117
  "allowedValues": [
3118
  "AuditIfNotExists",
 
3122
  },
3123
  "effect-6b2122c1-8120-4ff5-801b-17625a355590": {
3124
  "type": "String",
3125
  "metadata": {
3126
+ "displayName": "Effect for policy: Azure Arc enabled Kubernetes clusters should have the Azure Policy extension installed",
3127
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3128
  },
3129
  "allowedValues": [
3130
  "AuditIfNotExists",
 
3155
  },
3156
  "effect-95edb821-ddaf-4404-9732-666045e056b4": {
3157
  "type": "String",
3158
  "metadata": {
3159
+ "displayName": "Effect for policy: Kubernetes cluster should not allow privileged containers",
3160
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3161
  },
3162
  "allowedValues": [
3163
  "Audit",
 
3214
  },
3215
  "effect-cb510bfd-1cba-4d9f-a230-cb0976f4bb71": {
3216
  "type": "String",
3217
  "metadata": {
3218
+ "displayName": "Effect for policy: App Service apps should have remote debugging turned off",
3219
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3220
  },
3221
  "allowedValues": [
3222
  "AuditIfNotExists",
 
3226
  },
3227
  "effect-d26f7642-7545-4e18-9b75-8c9bbdee3a9a": {
3228
  "type": "String",
3229
  "metadata": {
3230
+ "displayName": "Effect for policy: Virtual machines' Guest Configuration extension should be deployed with system-assigned managed identity",
3231
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3232
  },
3233
  "allowedValues": [
3234
  "AuditIfNotExists",
 
3238
  },
3239
  "effect-f85bf3e0-d513-442e-89c3-1784ad63382b": {
3240
  "type": "String",
3241
  "metadata": {
3242
+ "displayName": "Effect for policy: System updates should be installed on your machines (powered by Update Center)",
3243
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3244
  },
3245
  "allowedValues": [
3246
  "AuditIfNotExists",
 
3250
  },
3251
  "effect-0da106f2-4ca3-48e8-bc85-c638fe6aea8f": {
3252
  "type": "String",
3253
  "metadata": {
3254
+ "displayName": "Effect for policy: Function apps should use managed identity",
3255
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3256
  },
3257
  "allowedValues": [
3258
  "AuditIfNotExists",
 
3275
  },
3276
  "effect-bf16e0bb-31e1-4646-8202-60a235cc7e74": {
3277
  "type": "String",
3278
  "metadata": {
3279
+ "displayName": "Effect for policy: Audit Windows machines that do not have the password complexity setting enabled",
3280
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3281
  },
3282
  "allowedValues": [
3283
  "AuditIfNotExists",
 
3287
  },
3288
  "effect-b4dec045-250a-48c2-b5cc-e0c4eec8b5b4": {
3289
  "type": "String",
3290
  "metadata": {
3291
+ "displayName": "Effect for policy: A Microsoft Entra administrator should be provisioned for PostgreSQL servers",
3292
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3293
  },
3294
  "allowedValues": [
3295
  "AuditIfNotExists",
 
3336
  },
3337
  "effect-67e010c1-640d-438e-a3a5-feaccb533a98": {
3338
  "type": "String",
3339
  "metadata": {
3340
+ "displayName": "Effect for policy: Windows machines should meet requirements for 'Administrative Templates - Network'",
3341
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3342
  },
3343
  "allowedValues": [
3344
  "AuditIfNotExists",
 
3348
  },
3349
  "effect-e345b6c3-24bd-4c93-9bbb-7e5e49a17b78": {
3350
  "type": "String",
3351
  "metadata": {
3352
+ "displayName": "Effect for policy: Azure VPN gateways should not use 'basic' SKU",
3353
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3354
  },
3355
  "allowedValues": [
3356
  "Audit",
 
3360
  },
3361
  "effect-1c30f9cd-b84c-49cc-aa2c-9288447cc3b3": {
3362
  "type": "String",
3363
  "metadata": {
3364
+ "displayName": "Effect for policy: vTPM should be enabled on supported virtual machines",
3365
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3366
  },
3367
  "allowedValues": [
3368
  "Audit",
 
3425
  },
3426
  "effect-f2143251-70de-4e81-87a8-36cee5a2f29d": {
3427
  "type": "String",
3428
  "metadata": {
3429
+ "displayName": "Effect for policy: Windows machines should meet requirements for 'Security Settings - Account Policies'",
3430
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3431
  },
3432
  "allowedValues": [
3433
  "AuditIfNotExists",
 
3437
  },
3438
  "effect-19dd1db6-f442-49cf-a838-b0786b4401ef": {
3439
  "type": "String",
3440
  "metadata": {
3441
+ "displayName": "Effect for policy: App Service apps should have Client Certificates (Incoming client certificates) enabled",
3442
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3443
  },
3444
  "allowedValues": [
3445
  "AuditIfNotExists",
 
3449
  },
3450
  "effect-81e74cea-30fd-40d5-802f-d72103c2aaaa": {
3451
  "type": "String",
3452
  "metadata": {
3453
+ "displayName": "Effect for policy: Azure Data Explorer encryption at rest should use a customer-managed key",
3454
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3455
  },
3456
  "allowedValues": [
3457
  "Audit",
 
3462
  },
3463
  "effect-3dc5edcd-002d-444c-b216-e123bbfa37c0": {
3464
  "type": "String",
3465
  "metadata": {
3466
+ "displayName": "Effect for policy: Windows virtual machines should enable Azure Disk Encryption or EncryptionAtHost.",
3467
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3468
  },
3469
  "allowedValues": [
3470
  "AuditIfNotExists",
 
3474
  },
3475
  "effect-18adea5e-f416-4d0f-8aa8-d24321e3e274": {
3476
  "type": "String",
3477
  "metadata": {
3478
+ "displayName": "Effect for policy: PostgreSQL servers should use customer-managed keys to encrypt data at rest",
3479
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3480
  },
3481
  "allowedValues": [
3482
  "AuditIfNotExists",
 
3486
  },
3487
  "effect-f4b53539-8df9-40e4-86c6-6b607703bd4e": {
3488
  "type": "String",
3489
  "metadata": {
3490
+ "displayName": "Effect for policy: Disk encryption should be enabled on Azure Data Explorer",
3491
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3492
  },
3493
  "allowedValues": [
3494
  "Audit",
 
3499
  },
3500
  "effect-0aa61e00-0a01-4a3c-9945-e93cffedf0e6": {
3501
  "type": "String",
3502
  "metadata": {
3503
+ "displayName": "Effect for policy: Azure Container Instance container group should use customer-managed key for encryption",
3504
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3505
  },
3506
  "allowedValues": [
3507
  "Audit",
 
3531
  },
3532
  "effect-75c4f823-d65c-4f29-a733-01d0077fdbcb": {
3533
  "type": "String",
3534
  "metadata": {
3535
+ "displayName": "Effect for policy: Keys should be the specified cryptographic type RSA or EC",
3536
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3537
  },
3538
  "allowedValues": [
3539
  "Audit",
 
3544
  },
3545
  "effect-56a5ee18-2ae6-4810-86f7-18e39ce5629b": {
3546
  "type": "String",
3547
  "metadata": {
3548
+ "displayName": "Effect for policy: Azure Automation accounts should use customer-managed keys to encrypt data at rest",
3549
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3550
  },
3551
  "allowedValues": [
3552
  "Audit",
 
3565
  },
3566
  "effect-d461a302-a187-421a-89ac-84acdb4edc04": {
3567
  "type": "String",
3568
  "metadata": {
3569
+ "displayName": "Effect for policy: Managed disks should use a specific set of disk encryption sets for the customer-managed key encryption",
3570
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3571
  },
3572
  "allowedValues": [
3573
  "Audit",
 
3578
  },
3579
  "effect-ca91455f-eace-4f96-be59-e6e2c35b4816": {
3580
  "type": "String",
3581
  "metadata": {
3582
+ "displayName": "Effect for policy: Managed disks should be double encrypted with both platform-managed and customer-managed keys",
3583
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3584
  },
3585
  "allowedValues": [
3586
  "Audit",
 
3591
  },
3592
  "effect-87ba29ef-1ab3-4d82-b763-87fcd4f531f7": {
3593
  "type": "String",
3594
  "metadata": {
3595
+ "displayName": "Effect for policy: Azure Stream Analytics jobs should use customer-managed keys to encrypt data",
3596
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3597
  },
3598
  "allowedValues": [
3599
  "Audit",
 
3604
  },
3605
  "effect-967a4b4b-2da9-43c1-b7d0-f98d0d74d0b1": {
3606
  "type": "String",
3607
  "metadata": {
3608
+ "displayName": "Effect for policy: App Configuration should use a customer-managed key",
3609
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3610
  },
3611
  "allowedValues": [
3612
  "Audit",
 
3636
  },
3637
  "effect-ff25f3c8-b739-4538-9d07-3d6d25cfb255": {
3638
  "type": "String",
3639
  "metadata": {
3640
+ "displayName": "Effect for policy: Keys using elliptic curve cryptography should have the specified curve names",
3641
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3642
  },
3643
  "allowedValues": [
3644
  "Audit",
 
3649
  },
3650
  "effect-ac01ad65-10e5-46df-bdd9-6b0cad13e1d2": {
3651
  "type": "String",
3652
  "metadata": {
3653
+ "displayName": "Effect for policy: SQL managed instances should use customer-managed keys to encrypt data at rest",
3654
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3655
  },
3656
  "allowedValues": [
3657
  "Audit",
 
3662
  },
3663
  "effect-0a370ff3-6cab-4e85-8995-295fd854c5b8": {
3664
  "type": "String",
3665
  "metadata": {
3666
+ "displayName": "Effect for policy: SQL servers should use customer-managed keys to encrypt data at rest",
3667
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3668
  },
3669
  "allowedValues": [
3670
  "Audit",
 
3675
  },
3676
  "effect-47031206-ce96-41f8-861b-6a915f3de284": {
3677
  "type": "String",
3678
  "metadata": {
3679
+ "displayName": "Effect for policy: IoT Hub device provisioning service data should be encrypted using customer-managed keys (CMK)",
3680
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3681
  },
3682
  "allowedValues": [
3683
  "Audit",
 
3688
  },
3689
  "effect-46aa9b05-0e60-4eae-a88b-1e9d374fa515": {
3690
  "type": "String",
3691
  "metadata": {
3692
+ "displayName": "Effect for policy: Cognitive Services accounts should use customer owned storage",
3693
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3694
  },
3695
  "allowedValues": [
3696
  "Audit",
 
3701
  },
3702
  "effect-bfecdea6-31c4-4045-ad42-71b9dc87247d": {
3703
  "type": "String",
3704
  "metadata": {
3705
+ "displayName": "Effect for policy: Storage account encryption scopes should use double encryption for data at rest",
3706
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3707
  },
3708
  "allowedValues": [
3709
  "Audit",
 
3714
  },
3715
  "effect-98728c90-32c7-4049-8429-847dc0f4fe37": {
3716
  "type": "String",
3717
  "metadata": {
3718
+ "displayName": "Effect for policy: Key Vault secrets should have an expiration date",
3719
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3720
  },
3721
  "allowedValues": [
3722
  "Audit",
 
3727
  },
3728
  "effect-152b15f7-8e1f-4c1f-ab71-8c010ba5dbc0": {
3729
  "type": "String",
3730
  "metadata": {
3731
+ "displayName": "Effect for policy: Key Vault keys should have an expiration date",
3732
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3733
  },
3734
  "allowedValues": [
3735
  "Audit",
 
3747
  },
3748
  "effect-d8cf8476-a2ec-4916-896e-992351803c44": {
3749
  "type": "String",
3750
  "metadata": {
3751
+ "displayName": "Effect for policy: Keys should have a rotation policy ensuring that their rotation is scheduled within the specified number of days after creation.",
3752
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3753
  },
3754
  "allowedValues": [
3755
  "Audit",
 
3759
  },
3760
  "effect-044985bb-afe1-42cd-8a36-9d5d42424537": {
3761
  "type": "String",
3762
  "metadata": {
3763
+ "displayName": "Effect for policy: Storage account keys should not be expired",
3764
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3765
  },
3766
  "allowedValues": [
3767
  "Audit",
 
3772
  },
3773
  "effect-a1840de2-8088-4ea8-b153-b4c723e9cb01": {
3774
  "type": "String",
3775
  "metadata": {
3776
+ "displayName": "Effect for policy: Azure Kubernetes Service clusters should have Defender profile enabled",
3777
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3778
  },
3779
  "allowedValues": [
3780
  "Audit",
 
3784
  },
3785
  "effect-9b597639-28e4-48eb-b506-56b05d366257": {
3786
  "type": "String",
3787
  "metadata": {
3788
+ "displayName": "Effect for policy: Microsoft IaaSAntimalware extension should be deployed on Windows servers",
3789
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3790
  },
3791
  "allowedValues": [
3792
  "AuditIfNotExists",
 
3796
  },
3797
  "effect-abfb7388-5bf4-4ad7-ba99-2cd2f41cebb9": {
3798
  "type": "String",
3799
  "metadata": {
3800
+ "displayName": "Effect for policy: Azure Defender for SQL should be enabled for unprotected SQL Managed Instances",
3801
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3802
  },
3803
  "allowedValues": [
3804
  "AuditIfNotExists",
 
3808
  },
3809
  "effect-b02aacc0-b073-424e-8298-42b22829ee0a": {
3810
  "type": "String",
3811
  "metadata": {
3812
+ "displayName": "Effect for policy: Activity log should be retained for at least one year",
3813
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3814
  },
3815
  "allowedValues": [
3816
  "AuditIfNotExists",
 
3820
  },
3821
  "effect-ef2a8f2a-b3d9-49cd-a8a8-9a3aaaf647d9": {
3822
  "type": "String",
3823
  "metadata": {
3824
+ "displayName": "Effect for policy: Vulnerability assessment should be enabled on your SQL servers",
3825
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3826
  },
3827
  "allowedValues": [
3828
  "AuditIfNotExists",
 
3832
  },
3833
  "effect-0049a6b3-a662-4f3e-8635-39cf44ace45a": {
3834
  "type": "String",
3835
  "metadata": {
3836
+ "displayName": "Effect for policy: Vulnerability assessment should be enabled on your Synapse workspaces",
3837
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3838
  },
3839
  "allowedValues": [
3840
  "AuditIfNotExists",
 
3844
  },
3845
  "effect-c43e4a30-77cb-48ab-a4dd-93f175c63b57": {
3846
  "type": "String",
3847
  "metadata": {
3848
+ "displayName": "Effect for policy: Microsoft Antimalware for Azure should be configured to automatically update protection signatures",
3849
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3850
  },
3851
  "allowedValues": [
3852
  "AuditIfNotExists",
 
3856
  },
3857
  "effect-fb893a29-21bb-418c-a157-e99480ec364c": {
3858
  "type": "String",
3859
  "metadata": {
3860
+ "displayName": "Effect for policy: Kubernetes Services should be upgraded to a non-vulnerable Kubernetes version",
3861
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3862
  },
3863
  "allowedValues": [
3864
  "Audit",
 
3868
  },
3869
  "effect-bd876905-5b84-4f73-ab2d-2e7a7c4568d9": {
3870
  "type": "String",
3871
  "metadata": {
3872
+ "displayName": "Effect for policy: Machines should be configured to periodically check for missing system updates",
3873
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3874
  },
3875
  "allowedValues": [
3876
  "Audit",
 
3909
  },
3910
  "effect-e2dd799a-a932-4e9d-ac17-d473bc3c6c10": {
3911
  "type": "String",
3912
  "metadata": {
3913
+ "displayName": "Effect for policy: Dependency agent should be enabled in virtual machine scale sets for listed virtual machine images",
3914
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3915
  },
3916
  "allowedValues": [
3917
  "AuditIfNotExists",
 
3934
  },
3935
  "effect-ea53dbee-c6c9-4f0e-9f9e-de0039b78023": {
3936
  "type": "String",
3937
  "metadata": {
3938
+ "displayName": "Effect for policy: Audit Linux machines that allow remote connections from accounts without passwords",
3939
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3940
  },
3941
  "allowedValues": [
3942
  "AuditIfNotExists",
 
3946
  },
3947
  "effect-a1817ec0-a368-432a-8057-8371e17ac6ee": {
3948
  "type": "String",
3949
  "metadata": {
3950
+ "displayName": "Effect for policy: All authorization rules except RootManageSharedAccessKey should be removed from Service Bus namespace",
3951
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3952
  },
3953
  "allowedValues": [
3954
  "Audit",
 
3980
  },
3981
  "effect-423dd1ba-798e-40e4-9c4d-b6902674b423": {
3982
  "type": "String",
3983
  "metadata": {
3984
+ "displayName": "Effect for policy: Kubernetes clusters should disable automounting API credentials",
3985
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
3986
  },
3987
  "allowedValues": [
3988
  "Audit",
 
4031
  },
4032
  "effect-8c6a50c6-9ffd-4ae7-986f-5fa6111f9a54": {
4033
  "type": "String",
4034
  "metadata": {
4035
+ "displayName": "Effect for policy: Storage accounts should prevent shared key access",
4036
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
4037
  },
4038
  "allowedValues": [
4039
  "Audit",
 
4066
  },
4067
  "effect-f4826e5f-6a27-407c-ae3e-9582eb39891d": {
4068
  "type": "String",
4069
  "metadata": {
4070
+ "displayName": "Effect for policy: Authorization rules on the Event Hub instance should be defined",
4071
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
4072
  },
4073
  "allowedValues": [
4074
  "AuditIfNotExists",
 
4078
  },
4079
  "effect-e96a9a5f-07ca-471b-9bc5-6a0f33cbd68f": {
4080
  "type": "String",
4081
  "metadata": {
4082
+ "displayName": "Effect for policy: Azure Machine Learning Computes should have local authentication methods disabled",
4083
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
4084
  },
4085
  "allowedValues": [
4086
  "Audit",
 
4113
  },
4114
  "effect-4ceb8dc2-559c-478b-a15b-733fbf1e3738": {
4115
  "type": "String",
4116
  "metadata": {
4117
+ "displayName": "Effect for policy: Audit Windows machines that do not have the maximum password age set to specified number of days",
4118
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
4119
  },
4120
  "allowedValues": [
4121
  "AuditIfNotExists",
 
4125
  },
4126
  "effect-8ac833bd-f505-48d5-887e-c993a1d3eea0": {
4127
  "type": "String",
4128
  "metadata": {
4129
+ "displayName": "Effect for policy: API endpoints in Azure API Management should be authenticated",
4130
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
4131
  },
4132
  "allowedValues": [
4133
  "AuditIfNotExists",
 
4137
  },
4138
  "effect-e15effd4-2278-4c65-a0da-4d6f6d1890e2": {
4139
  "type": "String",
4140
  "metadata": {
4141
+ "displayName": "Effect for policy: Log Analytics Workspaces should block non-Azure Active Directory based ingestion.",
4142
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
4143
  },
4144
  "allowedValues": [
4145
  "Deny",
 
4150
  },
4151
  "effect-fdccbe47-f3e3-4213-ad5d-ea459b2fa077": {
4152
  "type": "String",
4153
  "metadata": {
4154
+ "displayName": "Effect for policy: Public network access should be disabled for MariaDB servers",
4155
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
4156
  },
4157
  "allowedValues": [
4158
  "Audit",
 
4163
  },
4164
  "effect-b52376f7-9612-48a1-81cd-1ffe4b61032c": {
4165
  "type": "String",
4166
  "metadata": {
4167
+ "displayName": "Effect for policy: Public network access should be disabled for PostgreSQL servers",
4168
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
4169
  },
4170
  "allowedValues": [
4171
  "Audit",
 
4176
  },
4177
  "effect-d9844e8a-1437-4aeb-a32c-0c992f056095": {
4178
  "type": "String",
4179
  "metadata": {
4180
+ "displayName": "Effect for policy: Public network access should be disabled for MySQL servers",
4181
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
4182
  },
4183
  "allowedValues": [
4184
  "Audit",
 
4189
  },
4190
  "effect-78215662-041e-49ed-a9dd-5385911b3a1f": {
4191
  "type": "String",
4192
  "metadata": {
4193
+ "displayName": "Effect for policy: Azure SQL Managed Instances should have Microsoft Entra-only authentication enabled during creation",
4194
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
4195
  },
4196
  "allowedValues": [
4197
  "Audit",
 
4202
  },
4203
  "effect-5d4e3c65-4873-47be-94f3-6f8b953a3598": {
4204
  "type": "String",
4205
  "metadata": {
4206
+ "displayName": "Effect for policy: Azure Event Hub namespaces should have local authentication methods disabled",
4207
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
4208
  },
4209
  "allowedValues": [
4210
  "Audit",
 
4223
  },
4224
  "effect-0a075868-4c26-42ef-914c-5bc007359560": {
4225
  "type": "String",
4226
  "metadata": {
4227
+ "displayName": "Effect for policy: Certificates should have the specified maximum validity period",
4228
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
4229
  },
4230
  "allowedValues": [
4231
  "Audit",
 
4236
  },
4237
  "effect-12d4fa5e-1f9f-4c21-97a9-b99b3c6611b5": {
4238
  "type": "String",
4239
  "metadata": {
4240
+ "displayName": "Effect for policy: Azure Key Vault should use RBAC permission model",
4241
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
4242
  },
4243
  "allowedValues": [
4244
  "Audit",
 
4249
  },
4250
  "effect-40e85574-ef33-47e8-a854-7a65c7500560": {
4251
  "type": "String",
4252
  "metadata": {
4253
+ "displayName": "Effect for policy: Azure MySQL flexible server should have Microsoft Entra Only Authentication enabled",
4254
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
4255
  },
4256
  "allowedValues": [
4257
  "AuditIfNotExists",
 
4261
  },
4262
  "effect-fc26e2fd-3149-74b4-5988-d64bb90f8ef7": {
4263
  "type": "String",
4264
  "metadata": {
4265
+ "displayName": "Effect for policy: Separately store backup information",
4266
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
4267
  },
4268
  "allowedValues": [
4269
  "Manual",
 
4273
  },
4274
  "effect-7bdb79ea-16b8-453e-4ca4-ad5b16012414": {
4275
  "type": "String",
4276
  "metadata": {
4277
+ "displayName": "Effect for policy: Transfer backup information to an alternate storage site",
4278
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
4279
  },
4280
  "allowedValues": [
4281
  "Manual",
 
4301
  },
4302
  "effect-11ac78e3-31bc-4f0c-8434-37ab963cea07": {
4303
  "type": "String",
4304
  "metadata": {
4305
+ "displayName": "Effect for policy: Dependency agent should be enabled for listed virtual machine images",
4306
  "description": "For more information about effects, visit https://aka.ms/policyeffects"
4307
  },
4308
  "allowedValues": [
4309
  "AuditIfNotExists",
 
8832
  "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/PCI_DSS_v4.0.1_9.5.1.3"
8833
  }
8834
  ],
8835
  "versions": [
8836
+ "1.4.1",
8837
  "1.4.0",
8838
  "1.3.0",
8839
  "1.2.0",
8840
  "1.1.0",
JSON
api-version=2023-04-01
EPAC
{9 items}