Use the filters above each column to filter and limit table data. Advanced searches can be performed by using the following operators: <, <=, >, >=, =, *, !, {, }, ||,&&, [empty], [nonempty], rgx: Learn more
"description": "Payment Card Industry Data Security Standard, focusing on protecting credit card transaction data.",
4
"metadata": {
5
- "version": "1.4.0",
6
"category": "Regulatory Compliance"
7
},
8
- "version": "1.4.0",
9
"parameters": {
10
"effect-5450f5bd-9c72-4390-a9c4-a7aba4edfdd2": {
11
"type": "String",
12
"metadata": {
13
- "displayName": "Effect for policy: Anactivitylogalert should existforspecificAdministrativeoperations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
14
"description": "For more information about effects, visit https://aka.ms/policyeffects"
15
},
16
"allowedValues": [
17
"Audit",
@@ -75,9 +75,9 @@
75
},
76
"effect-1221c620-d201-468c-81e7-2817e6107e84": {
77
"type": "String",
78
"metadata": {
79
- "displayName": "Effect for policy: Anactivitylogalertshouldexist for specificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
80
"description": "For more information about effects, visit https://aka.ms/policyeffects"
81
},
82
"allowedValues": [
83
"AuditIfNotExists",
@@ -87,9 +87,9 @@
87
},
88
"effect-fa498b91-8a7e-4710-9578-da944c68d1fe": {
89
"type": "String",
90
"metadata": {
91
- "displayName": "Effect for policy: Anactivitylogalert should existforspecificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
92
"description": "For more information about effects, visit https://aka.ms/policyeffects"
93
},
94
"allowedValues": [
95
"Audit",
@@ -99,9 +99,9 @@
99
},
100
"effect-d6759c02-b87f-42b7-892e-71b3f471d782": {
101
"type": "String",
102
"metadata": {
103
- "displayName": "Effect for policy: Anactivitylogalert should existforspecificAdministrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
104
"description": "For more information about effects, visit https://aka.ms/policyeffects"
105
},
106
"allowedValues": [
107
"Audit",
@@ -111,9 +111,9 @@
111
},
112
"effect-c9d007d0-c057-4772-b18c-01e546713bcd": {
113
"type": "String",
114
"metadata": {
115
- "displayName": "Effect for policy: Anactivitylog alert should existforspecificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
116
"description": "For more information about effects, visit https://aka.ms/policyeffects"
117
},
118
"allowedValues": [
119
"Audit",
@@ -124,9 +124,9 @@
124
},
125
"effect-60d21c4f-21a3-4d94-85f4-b924e6aeeda4": {
126
"type": "String",
127
"metadata": {
128
- "displayName": "Effect for policy: Anactivitylog alert should existforspecificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
129
"description": "For more information about effects, visit https://aka.ms/policyeffects"
130
},
131
"allowedValues": [
132
"Audit",
@@ -136,9 +136,9 @@
136
},
137
"effect-11e3da8c-1d68-4392-badd-0ff3c43ab5b0": {
138
"type": "String",
139
"metadata": {
140
- "displayName": "Effect for policy: Anactivitylogalert should existforspecific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
141
"description": "For more information about effects, visit https://aka.ms/policyeffects"
142
},
143
"allowedValues": [
144
"Audit",
@@ -148,9 +148,9 @@
148
},
149
"effect-95bccee9-a7f8-4bec-9ee9-62c3473701fc": {
150
"type": "String",
151
"metadata": {
152
- "displayName": "Effect for policy: Anactivitylogalert should existforspecific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
153
"description": "For more information about effects, visit https://aka.ms/policyeffects"
154
},
155
"allowedValues": [
156
"AuditIfNotExists",
@@ -197,9 +197,9 @@
197
},
198
"effect-3ff60f98-7fa4-410a-9f7f-0b00f5afdbdd": {
199
"type": "String",
200
"metadata": {
201
- "displayName": "Effect for policy: Anactivitylogalertshouldexist for specificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
202
"description": "For more information about effects, visit https://aka.ms/policyeffects"
203
},
204
"allowedValues": [
205
"AuditIfNotExists",
@@ -209,9 +209,9 @@
209
},
210
"effect-21a6bc25-125e-4d13-b82d-2e19b7208ab7": {
211
"type": "String",
212
"metadata": {
213
- "displayName": "Effect for policy: Anactivitylog alert should existforspecificAdministrativeoperations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
214
"description": "For more information about effects, visit https://aka.ms/policyeffects"
215
},
216
"allowedValues": [
217
"Audit",
@@ -222,9 +222,9 @@
222
},
223
"effect-deeddb44-9f94-4903-9fa0-081d524406e3": {
224
"type": "String",
225
"metadata": {
226
- "displayName": "Effect for policy: Anactivitylogalert should existforspecificAdministrativeoperations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
227
"description": "For more information about effects, visit https://aka.ms/policyeffects"
228
},
229
"allowedValues": [
230
"Audit",
@@ -234,9 +234,9 @@
234
},
235
"effect-0a15ec92-a229-4763-bb14-0ea34a568f8d": {
236
"type": "String",
237
"metadata": {
238
- "displayName": "Effect for policy: Anactivitylogalert should existforspecificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
239
"description": "For more information about effects, visit https://aka.ms/policyeffects"
240
},
241
"allowedValues": [
242
"Audit",
@@ -246,9 +246,9 @@
246
},
247
"effect-0e60b895-3786-45da-8377-9c6b4b6ac5f9": {
248
"type": "String",
249
"metadata": {
250
- "displayName": "Effect for policy: Anactivitylog alert should existforspecificAdministrativeoperations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
251
"description": "For more information about effects, visit https://aka.ms/policyeffects"
252
},
253
"allowedValues": [
254
"AuditIfNotExists",
@@ -279,9 +279,9 @@
279
},
280
"effect-c26596ff-4d70-4e6a-9a30-c2506bd2f80c": {
281
"type": "String",
282
"metadata": {
283
- "displayName": "Effect for policy: Anactivitylogalert should existforspecificAdministrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
284
"description": "For more information about effects, visit https://aka.ms/policyeffects"
285
},
286
"allowedValues": [
287
"Audit",
@@ -369,9 +369,9 @@
369
},
370
"effect-e6955644-301c-44b5-a4c4-528577de6861": {
371
"type": "String",
372
"metadata": {
373
- "displayName": "Effect for policy: AnactivitylogalertshouldexistforspecificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
374
"description": "For more information about effects, visit https://aka.ms/policyeffects"
375
},
376
"allowedValues": [
377
"AuditIfNotExists",
@@ -402,9 +402,9 @@
402
},
403
"effect-1c6e92c9-99f0-4e55-9cf2-0c234dc48f99": {
404
"type": "String",
405
"metadata": {
406
- "displayName": "Effect for policy: Anactivitylog alert should existforspecificAdministrativeoperations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
407
"description": "For more information about effects, visit https://aka.ms/policyeffects"
408
},
409
"allowedValues": [
410
"Audit",
@@ -461,9 +461,9 @@
461
},
462
"effect-d416745a-506c-48b6-8ab1-83cb814bcaa3": {
463
"type": "String",
464
"metadata": {
465
- "displayName": "Effect for policy: AnactivitylogalertshouldexistforspecificAdministrativeoperations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
466
"description": "For more information about effects, visit https://aka.ms/policyeffects"
467
},
468
"allowedValues": [
469
"Audit",
@@ -526,9 +526,9 @@
526
},
527
"effect-492a29ed-d143-4f03-b6a4-705ce081b463": {
528
"type": "String",
529
"metadata": {
530
- "displayName": "Effect for policy: Anactivitylogalertshouldexist for specificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
531
"description": "For more information about effects, visit https://aka.ms/policyeffects"
532
},
533
"allowedValues": [
534
"AuditIfNotExists",
@@ -695,9 +695,9 @@
695
},
696
"effect-35d9882c-993d-44e6-87d2-db66ce21b636": {
697
"type": "String",
698
"metadata": {
699
- "displayName": "Effect for policy: Anactivitylogalertshouldexist for specificAdministrativeoperations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
700
"description": "For more information about effects, visit https://aka.ms/policyeffects"
701
},
702
"allowedValues": [
703
"AuditIfNotExists",
@@ -720,9 +720,9 @@
720
},
721
"effect-72650e9f-97bc-4b2a-ab5f-9781a9fcecbc": {
722
"type": "String",
723
"metadata": {
724
- "displayName": "Effect for policy: AnactivitylogalertshouldexistforspecificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
725
"description": "For more information about effects, visit https://aka.ms/policyeffects"
726
},
727
"allowedValues": [
728
"AuditIfNotExists",
@@ -732,9 +732,9 @@
732
},
733
"effect-12430be1-6cc8-4527-a9a8-e3d38f250096": {
734
"type": "String",
735
"metadata": {
736
- "displayName": "Effect for policy: Anactivitylogalert should existforspecificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
737
"description": "For more information about effects, visit https://aka.ms/policyeffects"
738
},
739
"allowedValues": [
740
"Audit",
@@ -757,9 +757,9 @@
757
},
758
"effect-22730e10-96f6-4aac-ad84-9383d35b5917": {
759
"type": "String",
760
"metadata": {
761
- "displayName": "Effect for policy: Anactivitylog alert should existforspecificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
762
"description": "For more information about effects, visit https://aka.ms/policyeffects"
763
},
764
"allowedValues": [
765
"AuditIfNotExists",
@@ -769,9 +769,9 @@
769
},
770
"effect-0564d078-92f5-4f97-8398-b9f58a51f70b": {
771
"type": "String",
772
"metadata": {
773
- "displayName": "Effect for policy: Anactivitylogalertshouldexist for specificAdministrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
774
"description": "For more information about effects, visit https://aka.ms/policyeffects"
775
},
776
"allowedValues": [
777
"AuditIfNotExists",
@@ -781,9 +781,9 @@
781
},
782
"effect-0a1302fb-a631-4106-9753-f3d494733990": {
783
"type": "String",
784
"metadata": {
785
- "displayName": "Effect for policy: Anactivitylogalertshouldexist for specificAdministrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
786
"description": "For more information about effects, visit https://aka.ms/policyeffects"
787
},
788
"allowedValues": [
789
"AuditIfNotExists",
@@ -814,9 +814,9 @@
814
},
815
"effect-ee984370-154a-4ee8-9726-19d900e56fc0": {
816
"type": "String",
817
"metadata": {
818
- "displayName": "Effect for policy: Anactivitylogalertshouldexist for specificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
819
"description": "For more information about effects, visit https://aka.ms/policyeffects"
820
},
821
"allowedValues": [
822
"AuditIfNotExists",
@@ -826,9 +826,9 @@
826
},
827
"effect-e71308d3-144b-4262-b144-efdc3cc90517": {
828
"type": "String",
829
"metadata": {
830
- "displayName": "Effect for policy: AnactivitylogalertshouldexistforspecificAdministrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
831
"description": "For more information about effects, visit https://aka.ms/policyeffects"
832
},
833
"allowedValues": [
834
"AuditIfNotExists",
@@ -838,9 +838,9 @@
838
},
839
"effect-564feb30-bf6a-4854-b4bb-0d2d2d1e6c66": {
840
"type": "String",
841
"metadata": {
842
- "displayName": "Effect for policy: Anactivitylogalert should exist for specificAdministrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
843
"description": "For more information about effects, visit https://aka.ms/policyeffects"
844
},
845
"allowedValues": [
846
"Audit",
@@ -872,9 +872,9 @@
872
},
873
"effect-098fc59e-46c7-4d99-9b16-64990e543d75": {
874
"type": "String",
875
"metadata": {
876
- "displayName": "Effect for policy: Anactivitylogalert should existforspecificAdministrativeoperations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
877
"description": "For more information about effects, visit https://aka.ms/policyeffects"
878
},
879
"allowedValues": [
880
"Audit",
@@ -963,9 +963,9 @@
963
},
964
"effect-9f061a12-e40d-4183-a00e-171812443373": {
965
"type": "String",
966
"metadata": {
967
- "displayName": "Effect for policy: Anactivitylog alert should existforspecificAdministrativeoperations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
968
"description": "For more information about effects, visit https://aka.ms/policyeffects"
969
},
970
"allowedValues": [
971
"Audit",
@@ -1007,9 +1007,9 @@
1007
},
1008
"effect-862e97cf-49fc-4a5c-9de4-40d4e2e7c8eb": {
1009
"type": "String",
1010
"metadata": {
1011
- "displayName": "Effect for policy: Anactivitylogalert should existforspecific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1012
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1013
},
1014
"allowedValues": [
1015
"Audit",
@@ -1020,9 +1020,9 @@
1020
},
1021
"effect-9daedab3-fb2d-461e-b861-71790eead4f6": {
1022
"type": "String",
1023
"metadata": {
1024
- "displayName": "Effect for policy: Anactivitylogalert should existforspecificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1025
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1026
},
1027
"allowedValues": [
1028
"AuditIfNotExists",
@@ -1061,9 +1061,9 @@
1061
},
1062
"effect-47a1ee2f-2a2a-4576-bf2a-e0e36709c2b8": {
1063
"type": "String",
1064
"metadata": {
1065
- "displayName": "Effect for policy: Anactivitylogalert should existforspecificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1066
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1067
},
1068
"allowedValues": [
1069
"Audit",
@@ -1112,9 +1112,9 @@
1112
},
1113
"effect-2913021d-f2fd-4f3d-b958-22354e2bdbcb": {
1114
"type": "String",
1115
"metadata": {
1116
- "displayName": "Effect for policy: Anactivitylogalert should existfor specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1117
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1118
},
1119
"allowedValues": [
1120
"AuditIfNotExists",
@@ -1124,9 +1124,9 @@
1124
},
1125
"effect-7804b5c7-01dc-4723-969b-ae300cc07ff1": {
1126
"type": "String",
1127
"metadata": {
1128
- "displayName": "Effect for policy: Anactivitylogalert should existforspecificAdministrativeoperations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1129
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1130
},
1131
"allowedValues": [
1132
"Audit",
@@ -1136,9 +1136,9 @@
1136
},
1137
"effect-8af8f826-edcb-4178-b35f-851ea6fea615": {
1138
"type": "String",
1139
"metadata": {
1140
- "displayName": "Effect for policy: Anactivitylogalert should existforspecificAdministrativeoperations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1141
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1142
},
1143
"allowedValues": [
1144
"Audit",
@@ -1149,9 +1149,9 @@
1149
},
1150
"effect-0fdf0491-d080-4575-b627-ad0e843cba0f": {
1151
"type": "String",
1152
"metadata": {
1153
- "displayName": "Effect for policy: Anactivitylogalert should exist for specificAdministrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1154
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1155
},
1156
"allowedValues": [
1157
"Audit",
@@ -1162,9 +1162,9 @@
1162
},
1163
"effect-404c3081-a854-4457-ae30-26a93ef643f9": {
1164
"type": "String",
1165
"metadata": {
1166
- "displayName": "Effect for policy: Anactivitylogalert should existfor specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1167
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1168
},
1169
"allowedValues": [
1170
"Audit",
@@ -1175,9 +1175,9 @@
1175
},
1176
"effect-1b8ca024-1d5c-4dec-8995-b1a932b41780": {
1177
"type": "String",
1178
"metadata": {
1179
- "displayName": "Effect for policy: AnactivitylogalertshouldexistforspecificAdministrativeoperations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1180
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1181
},
1182
"allowedValues": [
1183
"Audit",
@@ -1188,9 +1188,9 @@
1188
},
1189
"effect-1afada58-8b34-7ac2-a38a-983218635201": {
1190
"type": "String",
1191
"metadata": {
1192
- "displayName": "Effect for policy: Anactivitylogalertshouldexistfor specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1193
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1194
},
1195
"allowedValues": [
1196
"Manual",
@@ -1200,9 +1200,9 @@
1200
},
1201
"effect-797b37f7-06b8-444c-b1ad-fc62867f335a": {
1202
"type": "String",
1203
"metadata": {
1204
- "displayName": "Effect for policy: Anactivitylogalert should existforspecificAdministrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1205
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1206
},
1207
"allowedValues": [
1208
"Audit",
@@ -1213,9 +1213,9 @@
1213
},
1214
"effect-2d21331d-a4c2-4def-a9ad-ee4e1e023beb": {
1215
"type": "String",
1216
"metadata": {
1217
- "displayName": "Effect for policy: Anactivitylogalert should existforspecificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1218
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1219
},
1220
"allowedValues": [
1221
"AuditIfNotExists",
@@ -1225,9 +1225,9 @@
1225
},
1226
"effect-7803067c-7d34-46e3-8c79-0ca68fc4036d": {
1227
"type": "String",
1228
"metadata": {
1229
- "displayName": "Effect for policy: Anactivitylogalert should existforspecific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1230
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1231
},
1232
"allowedValues": [
1233
"AuditIfNotExists",
@@ -1237,9 +1237,9 @@
1237
},
1238
"effect-3d9f5e4c-9947-4579-9539-2a7695fbc187": {
1239
"type": "String",
1240
"metadata": {
1241
- "displayName": "Effect for policy: Anactivitylog alert should existforspecificAdministrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1242
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1243
},
1244
"allowedValues": [
1245
"Audit",
@@ -1250,9 +1250,9 @@
1250
},
1251
"effect-f6de0be7-9a8a-4b8a-b349-43cf02d22f7c": {
1252
"type": "String",
1253
"metadata": {
1254
- "displayName": "Effect for policy: Anactivitylogalert should existforspecificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1255
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1256
},
1257
"allowedValues": [
1258
"AuditIfNotExists",
@@ -1262,9 +1262,9 @@
1262
},
1263
"effect-009a0c92-f5b4-4776-9b66-4ed2b4775563": {
1264
"type": "String",
1265
"metadata": {
1266
- "displayName": "Effect for policy: AnactivitylogalertshouldexistforspecificAdministrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1267
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1268
},
1269
"allowedValues": [
1270
"AuditIfNotExists",
@@ -1274,9 +1274,9 @@
1274
},
1275
"effect-af35e2a4-ef96-44e7-a9ae-853dd97032c4": {
1276
"type": "String",
1277
"metadata": {
1278
- "displayName": "Effect for policy: Anactivitylogalert should existforspecific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1279
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1280
},
1281
"allowedValues": [
1282
"Audit",
@@ -1302,9 +1302,9 @@
1302
},
1303
"effect-2393d2cf-a342-44cd-a2e2-fe0188fd1234": {
1304
"type": "String",
1305
"metadata": {
1306
- "displayName": "Effect for policy: Anactivitylogalert should existforspecific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1307
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1308
},
1309
"allowedValues": [
1310
"Audit",
@@ -1314,9 +1314,9 @@
1314
},
1315
"effect-b8564268-eb4a-4337-89be-a19db070c59d": {
1316
"type": "String",
1317
"metadata": {
1318
- "displayName": "Effect for policy: Anactivitylogalert should existforspecific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1319
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1320
},
1321
"allowedValues": [
1322
"AuditIfNotExists",
@@ -1326,9 +1326,9 @@
1326
},
1327
"effect-4fa4b6c0-31ca-4c0d-b10d-24b96f62a751": {
1328
"type": "String",
1329
"metadata": {
1330
- "displayName": "Effect for policy: Anactivitylogalert should existfor specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1331
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1332
},
1333
"allowedValues": [
1334
"Audit",
@@ -1339,9 +1339,9 @@
1339
},
1340
"effect-55615ac9-af46-4a59-874e-391cc3dfb490": {
1341
"type": "String",
1342
"metadata": {
1343
- "displayName": "Effect for policy: Anactivitylogalert should existforspecificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1344
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1345
},
1346
"allowedValues": [
1347
"Audit",
@@ -1380,9 +1380,9 @@
1380
},
1381
"effect-c4857be7-912a-4c75-87e6-e30292bcdf78": {
1382
"type": "String",
1383
"metadata": {
1384
- "displayName": "Effect for policy: Anactivitylog alert should existforspecificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1385
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1386
},
1387
"allowedValues": [
1388
"Audit",
@@ -1392,9 +1392,9 @@
1392
},
1393
"effect-ae5d2f14-d830-42b6-9899-df6cfe9c71a3": {
1394
"type": "String",
1395
"metadata": {
1396
- "displayName": "Effect for policy: Anactivitylog alert should existforspecificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1397
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1398
},
1399
"allowedValues": [
1400
"AuditIfNotExists",
@@ -1404,9 +1404,9 @@
1404
},
1405
"effect-5e1de0e3-42cb-4ebc-a86d-61d0c619ca48": {
1406
"type": "String",
1407
"metadata": {
1408
- "displayName": "Effect for policy: Anactivitylogalert should exist for specificAdministrativeoperations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1409
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1410
},
1411
"allowedValues": [
1412
"Audit",
@@ -1417,9 +1417,9 @@
1417
},
1418
"effect-c9299215-ae47-4f50-9c54-8a392f68a052": {
1419
"type": "String",
1420
"metadata": {
1421
- "displayName": "Effect for policy: Anactivitylogalert should exist for specificAdministrativeoperations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1422
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1423
},
1424
"allowedValues": [
1425
"Audit",
@@ -1430,9 +1430,9 @@
1430
},
1431
"effect-0820b7b9-23aa-4725-a1ce-ae4558f718e5": {
1432
"type": "String",
1433
"metadata": {
1434
- "displayName": "Effect for policy: AnactivitylogalertshouldexistforspecificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1435
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1436
},
1437
"allowedValues": [
1438
"AuditIfNotExists",
@@ -1442,9 +1442,9 @@
1442
},
1443
"effect-9dfea752-dd46-4766-aed1-c355fa93fb91": {
1444
"type": "String",
1445
"metadata": {
1446
- "displayName": "Effect for policy: Anactivitylogalert should existforspecificAdministrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1447
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1448
},
1449
"allowedValues": [
1450
"Audit",
@@ -1455,9 +1455,9 @@
1455
},
1456
"effect-438c38d2-3772-465a-a9cc-7a6666a275ce": {
1457
"type": "String",
1458
"metadata": {
1459
- "displayName": "Effect for policy: Anactivitylogalert should existforspecificAdministrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1460
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1461
},
1462
"allowedValues": [
1463
"Audit",
@@ -1468,9 +1468,9 @@
1468
},
1469
"effect-0e6763cc-5078-4e64-889d-ff4d9a839047": {
1470
"type": "String",
1471
"metadata": {
1472
- "displayName": "Effect for policy: Anactivitylogalert should existfor specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1473
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1474
},
1475
"allowedValues": [
1476
"AuditIfNotExists",
@@ -1480,9 +1480,9 @@
1480
},
1481
"effect-af99038c-02fd-4a2f-ac24-386b62bf32de": {
1482
"type": "String",
1483
"metadata": {
1484
- "displayName": "Effect for policy: AnactivitylogalertshouldexistforspecificAdministrativeoperations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1485
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1486
},
1487
"allowedValues": [
1488
"AuditIfNotExists",
@@ -1492,9 +1492,9 @@
1492
},
1493
"effect-0fea8f8a-4169-495d-8307-30ec335f387d": {
1494
"type": "String",
1495
"metadata": {
1496
- "displayName": "Effect for policy: AnactivitylogalertshouldexistforspecificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1497
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1498
},
1499
"allowedValues": [
1500
"Audit",
@@ -1504,9 +1504,9 @@
1504
},
1505
"effect-df73bd95-24da-4a4f-96b9-4e8b94b402bd": {
1506
"type": "String",
1507
"metadata": {
1508
- "displayName": "Effect for policy: AnactivitylogalertshouldexistforspecificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1509
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1510
},
1511
"allowedValues": [
1512
"AuditIfNotExists",
@@ -1529,9 +1529,9 @@
1529
},
1530
"effect-1c988dd6-ade4-430f-a608-2a3e5b0a6d38": {
1531
"type": "String",
1532
"metadata": {
1533
- "displayName": "Effect for policy: Anactivitylogalert should existfor specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1534
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1535
},
1536
"allowedValues": [
1537
"AuditIfNotExists",
@@ -1541,9 +1541,9 @@
1541
},
1542
"effect-6c53d030-cc64-46f0-906d-2bc061cd1334": {
1543
"type": "String",
1544
"metadata": {
1545
- "displayName": "Effect for policy: Anactivitylogalert should existforspecificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1546
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1547
},
1548
"allowedValues": [
1549
"Audit",
@@ -1554,9 +1554,9 @@
1554
},
1555
"effect-8405fdab-1faf-48aa-b702-999c9c172094": {
1556
"type": "String",
1557
"metadata": {
1558
- "displayName": "Effect for policy: Anactivitylog alert should existforspecificAdministrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1559
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1560
},
1561
"allowedValues": [
1562
"Audit",
@@ -1566,9 +1566,9 @@
1566
},
1567
"effect-1bc02227-0cb6-4e11-8f53-eb0b22eab7e8": {
1568
"type": "String",
1569
"metadata": {
1570
- "displayName": "Effect for policy: Anactivitylogalert should existforspecificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1571
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1572
},
1573
"allowedValues": [
1574
"Audit",
@@ -1620,9 +1620,9 @@
1620
},
1621
"effect-2a7a701e-dff3-4da9-9ec5-42cb98594c0b": {
1622
"type": "String",
1623
"metadata": {
1624
- "displayName": "Effect for policy: Anactivitylogalertshouldexist for specificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1625
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1626
},
1627
"allowedValues": [
1628
"AuditIfNotExists",
@@ -1632,9 +1632,9 @@
1632
},
1633
"effect-3b980d31-7904-4bb7-8575-5665739a8052": {
1634
"type": "String",
1635
"metadata": {
1636
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1637
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1638
},
1639
"allowedValues": [
1640
"AuditIfNotExists",
@@ -1656,9 +1656,9 @@
1656
},
1657
"effect-c251913d-7d24-4958-af87-478ed3b9ba41": {
1658
"type": "String",
1659
"metadata": {
1660
- "displayName": "Effect for policy: Anactivitylogalertshouldexist for specificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1661
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1662
},
1663
"allowedValues": [
1664
"Audit",
@@ -1668,9 +1668,9 @@
1668
},
1669
"effect-a2a5b911-5617-447e-a49e-59dbe0e0434b": {
1670
"type": "String",
1671
"metadata": {
1672
- "displayName": "Effect for policy: AnactivitylogalertshouldexistforspecificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1673
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1674
},
1675
"allowedValues": [
1676
"AuditIfNotExists",
@@ -1688,9 +1688,9 @@
1688
},
1689
"effect-3e596b57-105f-48a6-be97-03e9243bad6e": {
1690
"type": "String",
1691
"metadata": {
1692
- "displayName": "Effect for policy: AnactivitylogalertshouldexistforspecificAdministrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1693
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1694
},
1695
"allowedValues": [
1696
"AuditIfNotExists",
@@ -1700,9 +1700,9 @@
1700
},
1701
"effect-7ff426e2-515f-405a-91c8-4f2333442eb5": {
1702
"type": "String",
1703
"metadata": {
1704
- "displayName": "Effect for policy: Anactivitylogalert should existforspecificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1705
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1706
},
1707
"allowedValues": [
1708
"AuditIfNotExists",
@@ -1733,9 +1733,9 @@
1733
},
1734
"effect-33936777-f2ac-45aa-82ec-07958ec9ade4": {
1735
"type": "String",
1736
"metadata": {
1737
- "displayName": "Effect for policy: Anactivitylogalertshouldexist for specificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1738
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1739
},
1740
"allowedValues": [
1741
"AuditIfNotExists",
@@ -1745,9 +1745,9 @@
1745
},
1746
"effect-afe0c3be-ba3b-4544-ba52-0c99672a8ad6": {
1747
"type": "String",
1748
"metadata": {
1749
- "displayName": "Effect for policy: AnactivitylogalertshouldexistforspecificAdministrativeoperations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1750
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1751
},
1752
"allowedValues": [
1753
"AuditIfNotExists",
@@ -1778,9 +1778,9 @@
1778
},
1779
"effect-87845465-c458-45f3-af66-dcd62176f397": {
1780
"type": "String",
1781
"metadata": {
1782
- "displayName": "Effect for policy: Anactivitylogalertshouldexist for specificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1783
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1784
},
1785
"allowedValues": [
1786
"AuditIfNotExists",
@@ -1790,9 +1790,9 @@
1790
},
1791
"effect-efbde977-ba53-4479-b8e9-10b957924fbf": {
1792
"type": "String",
1793
"metadata": {
1794
- "displayName": "Effect for policy: Anactivitylogalert should existforspecificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1795
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1796
},
1797
"allowedValues": [
1798
"AuditIfNotExists",
@@ -1815,9 +1815,9 @@
1815
},
1816
"effect-94d9aca8-3757-46df-aa51-f218c5f11954": {
1817
"type": "String",
1818
"metadata": {
1819
- "displayName": "Effect for policy: Anactivitylogalertshouldexist for specificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1820
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1821
},
1822
"allowedValues": [
1823
"AuditIfNotExists",
@@ -1827,9 +1827,9 @@
1827
},
1828
"effect-91a78b24-f231-4a8a-8da9-02c35b2b6510": {
1829
"type": "String",
1830
"metadata": {
1831
- "displayName": "Effect for policy: Anactivitylogalert should existforspecificAdministrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1832
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1833
},
1834
"allowedValues": [
1835
"AuditIfNotExists",
@@ -1847,9 +1847,9 @@
1847
},
1848
"effect-2b9ad585-36bc-4615-b300-fd4435808332": {
1849
"type": "String",
1850
"metadata": {
1851
- "displayName": "Effect for policy: Anactivitylogalert should existforspecific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1852
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1853
},
1854
"allowedValues": [
1855
"AuditIfNotExists",
@@ -1868,9 +1868,9 @@
1868
},
1869
"effect-f47b5582-33ec-4c5c-87c0-b010a6b2e917": {
1870
"type": "String",
1871
"metadata": {
1872
- "displayName": "[Deprecated]: Effect for policy: Anactivitylog alert should existforspecificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1873
"description": "For more information about effects, visit https://aka.ms/policyeffects",
1874
"deprecated": true
1875
},
1876
"allowedValues": [
@@ -1881,9 +1881,9 @@
1881
},
1882
"effect-7796937f-307b-4598-941c-67d3a05ebfe7": {
1883
"type": "String",
1884
"metadata": {
1885
- "displayName": "Effect for policy: Anactivitylogalertshouldexist for specificAdministrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1886
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1887
},
1888
"allowedValues": [
1889
"AuditIfNotExists",
@@ -1893,9 +1893,9 @@
1893
},
1894
"effect-4c3c6c5f-0d47-4402-99b8-aa543dd8bcee": {
1895
"type": "String",
1896
"metadata": {
1897
- "displayName": "Effect for policy: Anactivitylogalertshould exist for specificAdministrativeoperations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1898
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1899
},
1900
"allowedValues": [
1901
"Audit",
@@ -1934,9 +1934,9 @@
1934
},
1935
"effect-c5447c04-a4d7-4ba8-a263-c9ee321a6858": {
1936
"type": "String",
1937
"metadata": {
1938
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1939
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1940
},
1941
"allowedValues": [
1942
"AuditIfNotExists",
@@ -1957,9 +1957,9 @@
1957
},
1958
"effect-41388f1c-2db0-4c25-95b2-35d7f5ccbfa9": {
1959
"type": "String",
1960
"metadata": {
1961
- "displayName": "Effect for policy: Anactivitylog alert should existforspecificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1962
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1963
},
1964
"allowedValues": [
1965
"AuditIfNotExists",
@@ -1996,9 +1996,9 @@
1996
},
1997
"effect-58383b73-94a9-4414-b382-4146eb02611b": {
1998
"type": "String",
1999
"metadata": {
2000
- "displayName": "Effect for policy: Anactivitylogalertshouldexist for specificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2001
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2002
},
2003
"allowedValues": [
2004
"AuditIfNotExists",
@@ -2008,9 +2008,9 @@
2008
},
2009
"effect-13a6c84f-49a5-410a-b5df-5b880c3fe009": {
2010
"type": "String",
2011
"metadata": {
2012
- "displayName": "Effect for policy: Anactivitylogalert should existforspecificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2013
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2014
},
2015
"allowedValues": [
2016
"AuditIfNotExists",
@@ -2020,9 +2020,9 @@
2020
},
2021
"effect-245fc9df-fa96-4414-9a0b-3738c2f7341c": {
2022
"type": "String",
2023
"metadata": {
2024
- "displayName": "Effect for policy: AnactivitylogalertshouldexistforspecificAdministrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2025
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2026
},
2027
"allowedValues": [
2028
"AuditIfNotExists",
@@ -2040,9 +2040,9 @@
2040
},
2041
"effect-672fe5a1-2fcd-42d7-b85d-902b6e28c6ff": {
2042
"type": "String",
2043
"metadata": {
2044
- "displayName": "Effect for policy: Anactivitylogalert should existforspecificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2045
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2046
},
2047
"allowedValues": [
2048
"AuditIfNotExists",
@@ -2052,9 +2052,9 @@
2052
},
2053
"effect-f9be5368-9bf5-4b84-9e0a-7850da98bb46": {
2054
"type": "String",
2055
"metadata": {
2056
- "displayName": "Effect for policy: AnactivitylogalertshouldexistforspecificAdministrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2057
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2058
},
2059
"allowedValues": [
2060
"AuditIfNotExists",
@@ -2072,9 +2072,9 @@
2072
},
2073
"effect-f8d36e2f-389b-4ee4-898d-21aeb69a0f45": {
2074
"type": "String",
2075
"metadata": {
2076
- "displayName": "Effect for policy: Anactivitylogalert should existfor specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2077
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2078
},
2079
"allowedValues": [
2080
"AuditIfNotExists",
@@ -2092,9 +2092,9 @@
2092
},
2093
"effect-b954148f-4c11-4c38-8221-be76711e194a": {
2094
"type": "String",
2095
"metadata": {
2096
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2097
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2098
},
2099
"allowedValues": [
2100
"AuditIfNotExists",
@@ -2123,9 +2123,9 @@
2123
},
2124
"effect-83a214f7-d01a-484b-91a9-ed54470c9a6a": {
2125
"type": "String",
2126
"metadata": {
2127
- "displayName": "Effect for policy: Anactivitylogalert should existfor specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2128
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2129
},
2130
"allowedValues": [
2131
"AuditIfNotExists",
@@ -2143,9 +2143,9 @@
2143
},
2144
"effect-428256e6-1fac-4f48-a757-df34c2b3336d": {
2145
"type": "String",
2146
"metadata": {
2147
- "displayName": "Effect for policy: Anactivitylogalert should existfor specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2148
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2149
},
2150
"allowedValues": [
2151
"AuditIfNotExists",
@@ -2163,9 +2163,9 @@
2163
},
2164
"effect-a6fb4358-5bf4-4ad7-ba82-2cd2f41ce5e9": {
2165
"type": "String",
2166
"metadata": {
2167
- "displayName": "Effect for policy: Anactivitylogalert should existfor specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2168
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2169
},
2170
"allowedValues": [
2171
"AuditIfNotExists",
@@ -2186,9 +2186,9 @@
2186
},
2187
"effect-6e2593d9-add6-4083-9c9b-4b7d2188c899": {
2188
"type": "String",
2189
"metadata": {
2190
- "displayName": "Effect for policy: AnactivitylogalertshouldexistforspecificAdministrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2191
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2192
},
2193
"allowedValues": [
2194
"AuditIfNotExists",
@@ -2198,9 +2198,9 @@
2198
},
2199
"effect-d550e854-df1a-4de9-bf44-cd894b39a95e": {
2200
"type": "String",
2201
"metadata": {
2202
- "displayName": "Effect for policy: Anactivitylogalert should existforspecificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2203
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2204
},
2205
"allowedValues": [
2206
"Audit",
@@ -2211,9 +2211,9 @@
2211
},
2212
"effect-f655e522-adff-494d-95c2-52d4f6d56a42": {
2213
"type": "String",
2214
"metadata": {
2215
- "displayName": "Effect for policy: Anactivitylogalert should existforspecificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2216
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2217
},
2218
"allowedValues": [
2219
"AuditIfNotExists",
@@ -2223,9 +2223,9 @@
2223
},
2224
"effect-a1181c5f-672a-477a-979a-7d58aa086233": {
2225
"type": "String",
2226
"metadata": {
2227
- "displayName": "Effect for policy: Anactivitylogalert should existfor specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2228
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2229
},
2230
"allowedValues": [
2231
"Audit",
@@ -2235,9 +2235,9 @@
2235
},
2236
"effect-1a4e592a-6a6e-44a5-9814-e36264ca96e7": {
2237
"type": "String",
2238
"metadata": {
2239
- "displayName": "Effect for policy: Anactivity log alert should exist for specificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2240
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2241
},
2242
"allowedValues": [
2243
"AuditIfNotExists",
@@ -2247,9 +2247,9 @@
2247
},
2248
"effect-8dfab9c4-fe7b-49ad-85e4-1e9be085358f": {
2249
"type": "String",
2250
"metadata": {
2251
- "displayName": "Effect for policy: Anactivitylogalert should exist for specificAdministrativeoperations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2252
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2253
},
2254
"allowedValues": [
2255
"AuditIfNotExists",
@@ -2259,9 +2259,9 @@
2259
},
2260
"effect-abfb4388-5bf4-4ad7-ba82-2cd2f41ceae9": {
2261
"type": "String",
2262
"metadata": {
2263
- "displayName": "Effect for policy: Anactivitylogalert should exist for specificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2264
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2265
},
2266
"allowedValues": [
2267
"AuditIfNotExists",
@@ -2271,9 +2271,9 @@
2271
},
2272
"effect-3bc8a0d5-38e0-4a3d-a657-2cb64468fc34": {
2273
"type": "String",
2274
"metadata": {
2275
- "displayName": "Effect for policy: Anactivitylogalert should exist for specificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2276
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2277
},
2278
"allowedValues": [
2279
"AuditIfNotExists",
@@ -2283,9 +2283,9 @@
2283
},
2284
"effect-a70ca396-0a34-413a-88e1-b956c1e683be": {
2285
"type": "String",
2286
"metadata": {
2287
- "displayName": "[Deprecated]: Effect for policy: Anactivitylog alert should existforspecificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2288
"description": "For more information about effects, visit https://aka.ms/policyeffects",
2289
"deprecated": true
2290
},
2291
"allowedValues": [
@@ -2296,9 +2296,9 @@
2296
},
2297
"effect-97566dd7-78ae-4997-8b36-1c7bfe0d8121": {
2298
"type": "String",
2299
"metadata": {
2300
- "displayName": "Effect for policy: AnactivitylogalertshouldexistforspecificAdministrativeoperations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2301
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2302
},
2303
"allowedValues": [
2304
"Audit",
@@ -2308,9 +2308,9 @@
2308
},
2309
"effect-6581d072-105e-4418-827f-bd446d56421b": {
2310
"type": "String",
2311
"metadata": {
2312
- "displayName": "Effect for policy: AnactivitylogalertshouldexistforspecificAdministrativeoperations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2313
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2314
},
2315
"allowedValues": [
2316
"AuditIfNotExists",
@@ -2341,9 +2341,9 @@
2341
},
2342
"effect-511f5417-5d12-434d-ab2e-816901e72a5e": {
2343
"type": "String",
2344
"metadata": {
2345
- "displayName": "Effect for policy: Anactivitylogalert should existforspecificAdministrativeoperations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2346
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2347
},
2348
"allowedValues": [
2349
"Audit",
@@ -2411,9 +2411,9 @@
2411
},
2412
"effect-1cb4d9c2-f88f-4069-bee0-dba239a57b09": {
2413
"type": "String",
2414
"metadata": {
2415
- "displayName": "Effect for policy: Anactivitylogalert should existforspecificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2416
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2417
},
2418
"allowedValues": [
2419
"AuditIfNotExists",
@@ -2423,9 +2423,9 @@
2423
},
2424
"effect-7926a6d1-b268-4586-8197-e8ae90c877d7": {
2425
"type": "String",
2426
"metadata": {
2427
- "displayName": "Effect for policy: Anactivitylogalert should existfor specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2428
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2429
},
2430
"allowedValues": [
2431
"AuditIfNotExists",
@@ -2453,9 +2453,9 @@
2453
},
2454
"effect-32133ab0-ee4b-4b44-98d6-042180979d50": {
2455
"type": "String",
2456
"metadata": {
2457
- "displayName": "[Deprecated]: Effect for policy: Anactivitylogalert should exist for specificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2458
"description": "For more information about effects, visit https://aka.ms/policyeffects",
2459
"deprecated": true
2460
},
2461
"allowedValues": [
@@ -2486,9 +2486,9 @@
2486
},
2487
"effect-a21f8c92-9e22-4f09-b759-50500d1d2dda": {
2488
"type": "String",
2489
"metadata": {
2490
- "displayName": "Effect for policy: Anactivitylogalert should existforspecificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2491
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2492
},
2493
"allowedValues": [
2494
"AuditIfNotExists",
@@ -2498,9 +2498,9 @@
2498
},
2499
"effect-d31e5c31-63b2-4f12-887b-e49456834fa1": {
2500
"type": "String",
2501
"metadata": {
2502
- "displayName": "Effect for policy: Anactivitylogalert should exist for specificAdministrativeoperations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2503
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2504
},
2505
"allowedValues": [
2506
"AuditIfNotExists",
@@ -2510,9 +2510,9 @@
2510
},
2511
"effect-0a9fbe0d-c5c4-4da8-87d8-f4fd77338835": {
2512
"type": "String",
2513
"metadata": {
2514
- "displayName": "Effect for policy: AnactivitylogalertshouldexistforspecificAdministrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2515
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2516
},
2517
"allowedValues": [
2518
"AuditIfNotExists",
@@ -2522,9 +2522,9 @@
2522
},
2523
"effect-d38668f5-d155-42c7-ab3d-9b57b50f8fbf": {
2524
"type": "String",
2525
"metadata": {
2526
- "displayName": "Effect for policy: Anactivitylogalert should exist for specificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2527
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2528
},
2529
"allowedValues": [
2530
"AuditIfNotExists",
@@ -2552,9 +2552,9 @@
2552
},
2553
"effect-5c3bc7b8-a64c-4e08-a9cd-7ff0f31e1138": {
2554
"type": "String",
2555
"metadata": {
2556
- "displayName": "[Deprecated]: Effect for policy: Anactivitylogalert should exist for specificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2557
"description": "For more information about effects, visit https://aka.ms/policyeffects",
2558
"deprecated": true
2559
},
2560
"allowedValues": [
@@ -2565,9 +2565,9 @@
2565
},
2566
"effect-e1e5fd5d-3e4c-4ce1-8661-7d1873ae6b15": {
2567
"type": "String",
2568
"metadata": {
2569
- "displayName": "[Deprecated]: Effect for policy: AnactivitylogalertshouldexistforspecificAdministrativeoperations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2570
"description": "For more information about effects, visit https://aka.ms/policyeffects",
2571
"deprecated": true
2572
},
2573
"allowedValues": [
@@ -2598,9 +2598,9 @@
2598
},
2599
"effect-22bee202-a82f-4305-9a2a-6d7f44d4dedb": {
2600
"type": "String",
2601
"metadata": {
2602
- "displayName": "Effect for policy: Anactivitylogalertshouldexist for specificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2603
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2604
},
2605
"allowedValues": [
2606
"Audit",
@@ -2611,9 +2611,9 @@
2611
},
2612
"effect-383856f8-de7f-44a2-81fc-e5135b5c2aa4": {
2613
"type": "String",
2614
"metadata": {
2615
- "displayName": "Effect for policy: Anactivitylogalert should existfor specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2616
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2617
},
2618
"allowedValues": [
2619
"AuditIfNotExists",
@@ -2631,9 +2631,9 @@
2631
},
2632
"effect-cf820ca0-f99e-4f3e-84fb-66e913812d21": {
2633
"type": "String",
2634
"metadata": {
2635
- "displayName": "Effect for policy: Anactivitylogalert should existfor specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2636
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2637
},
2638
"allowedValues": [
2639
"AuditIfNotExists",
@@ -2651,9 +2651,9 @@
2651
},
2652
"effect-34f95f76-5386-4de7-b824-0d8478470c9d": {
2653
"type": "String",
2654
"metadata": {
2655
- "displayName": "Effect for policy: Anactivitylogalert should existfor specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2656
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2657
},
2658
"allowedValues": [
2659
"AuditIfNotExists",
@@ -2671,9 +2671,9 @@
2671
},
2672
"effect-057ef27e-665e-4328-8ea3-04b3122bd9fb": {
2673
"type": "String",
2674
"metadata": {
2675
- "displayName": "Effect for policy: AnactivitylogalertshouldexistforspecificAdministrativeoperations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2676
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2677
},
2678
"allowedValues": [
2679
"AuditIfNotExists",
@@ -2691,9 +2691,9 @@
2691
},
2692
"effect-c95c74d9-38fe-4f0d-af86-0c7d626a315c": {
2693
"type": "String",
2694
"metadata": {
2695
- "displayName": "Effect for policy: AnactivitylogalertshouldexistforspecificAdministrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2696
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2697
},
2698
"allowedValues": [
2699
"AuditIfNotExists",
@@ -2731,9 +2731,9 @@
2731
},
2732
"effect-501541f7-f7e7-4cd6-868c-4190fdad3ac9": {
2733
"type": "String",
2734
"metadata": {
2735
- "displayName": "Effect for policy: Anactivitylogalert should existforspecificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2736
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2737
},
2738
"allowedValues": [
2739
"AuditIfNotExists",
@@ -2743,9 +2743,9 @@
2743
},
2744
"effect-3ac7c827-eea2-4bde-acc7-9568cd320efa": {
2745
"type": "String",
2746
"metadata": {
2747
- "displayName": "Effect for policy: Anactivity log alert should existforspecificAdministrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2748
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2749
},
2750
"allowedValues": [
2751
"AuditIfNotExists",
@@ -2755,9 +2755,9 @@
2755
},
2756
"effect-090c7b07-b4ed-4561-ad20-e9075f3ccaff": {
2757
"type": "String",
2758
"metadata": {
2759
- "displayName": "Effect for policy: Anactivitylogalert should existforspecificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2760
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2761
},
2762
"allowedValues": [
2763
"AuditIfNotExists",
@@ -2767,9 +2767,9 @@
2767
},
2768
"effect-1b7aa243-30e4-4c9e-bca8-d0d3022b634a": {
2769
"type": "String",
2770
"metadata": {
2771
- "displayName": "Effect for policy: Anactivitylog alert should existforspecificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2772
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2773
},
2774
"allowedValues": [
2775
"AuditIfNotExists",
@@ -2779,9 +2779,9 @@
2779
},
2780
"effect-17f4b1cc-c55c-4d94-b1f9-2978f6ac2957": {
2781
"type": "String",
2782
"metadata": {
2783
- "displayName": "Effect for policy: Anactivitylogalert should existforspecificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2784
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2785
},
2786
"allowedValues": [
2787
"AuditIfNotExists",
@@ -2791,9 +2791,9 @@
2791
},
2792
"effect-6ba6d016-e7c3-4842-b8f2-4992ebc0d72d": {
2793
"type": "String",
2794
"metadata": {
2795
- "displayName": "Effect for policy: Anactivitylogalert should existforspecificAdministrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2796
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2797
},
2798
"allowedValues": [
2799
"AuditIfNotExists",
@@ -2803,9 +2803,9 @@
2803
},
2804
"effect-ae89ebca-1c92-4898-ac2c-9f63decb045c": {
2805
"type": "String",
2806
"metadata": {
2807
- "displayName": "Effect for policy: Anactivitylogalert should existforspecificAdministrativeoperations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2808
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2809
},
2810
"allowedValues": [
2811
"AuditIfNotExists",
@@ -2815,9 +2815,9 @@
2815
},
2816
"effect-adbe85b5-83e6-4350-ab58-bf3a4f736e5e": {
2817
"type": "String",
2818
"metadata": {
2819
- "displayName": "Effect for policy: AnactivitylogalertshouldexistforspecificAdministrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2820
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2821
},
2822
"allowedValues": [
2823
"AuditIfNotExists",
@@ -2827,9 +2827,9 @@
2827
},
2828
"effect-4f4f78b8-e367-4b10-a341-d9a4ad5cf1c7": {
2829
"type": "String",
2830
"metadata": {
2831
- "displayName": "Effect for policy: Anactivitylogalertshouldexist for specificAdministrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2832
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2833
},
2834
"allowedValues": [
2835
"AuditIfNotExists",
@@ -2988,9 +2988,9 @@
2988
},
2989
"effect-e068b215-0026-4354-b347-8fb2766f73a2": {
2990
"type": "String",
2991
"metadata": {
2992
- "displayName": "Effect for policy: Anactivitylogalertshouldexist for specificAdministrativeoperations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
2993
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2994
},
2995
"allowedValues": [
2996
"AuditIfNotExists",
@@ -3000,9 +3000,9 @@
3000
},
3001
"effect-4da35fc9-c9e7-4960-aec9-797fe7d9051d": {
3002
"type": "String",
3003
"metadata": {
3004
- "displayName": "Effect for policy: Anactivitylogalert should existfor specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3005
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3006
},
3007
"allowedValues": [
3008
"AuditIfNotExists",
@@ -3012,9 +3012,9 @@
3012
},
3013
"effect-7fe3b40f-802b-4cdd-8bd4-fd799c948cc2": {
3014
"type": "String",
3015
"metadata": {
3016
- "displayName": "Effect for policy: AnactivitylogalertshouldexistforspecificAdministrativeoperations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3017
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3018
},
3019
"allowedValues": [
3020
"AuditIfNotExists",
@@ -3024,9 +3024,9 @@
3024
},
3025
"effect-1f90fc71-a595-4066-8974-d4d0802e8ef0": {
3026
"type": "String",
3027
"metadata": {
3028
- "displayName": "Effect for policy: Anactivitylogalert should existfor specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3029
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3030
},
3031
"allowedValues": [
3032
"AuditIfNotExists",
@@ -3036,9 +3036,9 @@
3036
},
3037
"effect-c3d20c29-b36d-48fe-808b-99a87530ad99": {
3038
"type": "String",
3039
"metadata": {
3040
- "displayName": "Effect for policy: Anactivitylogalert should existfor specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3041
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3042
},
3043
"allowedValues": [
3044
"AuditIfNotExists",
@@ -3048,9 +3048,9 @@
3048
},
3049
"effect-0ec47710-77ff-4a3d-9181-6aa50af424d0": {
3050
"type": "String",
3051
"metadata": {
3052
- "displayName": "Effect for policy: Anactivitylogalertshouldexist for specificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3053
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3054
},
3055
"allowedValues": [
3056
"Audit",
@@ -3060,9 +3060,9 @@
3060
},
3061
"effect-0b60c0b2-2dc2-4e1c-b5c9-abbed971de53": {
3062
"type": "String",
3063
"metadata": {
3064
- "displayName": "Effect for policy: Anactivitylog alert should existforspecificAdministrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3065
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3066
},
3067
"allowedValues": [
3068
"Audit",
@@ -3073,9 +3073,9 @@
3073
},
3074
"effect-d38fc420-0735-4ef3-ac11-c806f651a570": {
3075
"type": "String",
3076
"metadata": {
3077
- "displayName": "Effect for policy: Anactivitylogalert should exist for specificAdministrativeoperations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3078
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3079
},
3080
"allowedValues": [
3081
"AuditIfNotExists",
@@ -3085,9 +3085,9 @@
3085
},
3086
"effect-32e6bbec-16b6-44c2-be37-c5b672d103cf": {
3087
"type": "String",
3088
"metadata": {
3089
- "displayName": "Effect for policy: Anactivitylogalert should existforspecificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3090
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3091
},
3092
"allowedValues": [
3093
"Audit",
@@ -3098,9 +3098,9 @@
3098
},
3099
"effect-a8793640-60f7-487c-b5c3-1d37215905c4": {
3100
"type": "String",
3101
"metadata": {
3102
- "displayName": "Effect for policy: Anactivitylogalert should existforspecificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3103
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3104
},
3105
"allowedValues": [
3106
"Audit",
@@ -3110,9 +3110,9 @@
3110
},
3111
"effect-013e242c-8828-4970-87b3-ab247555486d": {
3112
"type": "String",
3113
"metadata": {
3114
- "displayName": "Effect for policy: Anactivitylogalertshouldexist for specificAdministrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3115
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3116
},
3117
"allowedValues": [
3118
"AuditIfNotExists",
@@ -3122,9 +3122,9 @@
3122
},
3123
"effect-6b2122c1-8120-4ff5-801b-17625a355590": {
3124
"type": "String",
3125
"metadata": {
3126
- "displayName": "Effect for policy: Anactivitylogalert should existforspecificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3127
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3128
},
3129
"allowedValues": [
3130
"AuditIfNotExists",
@@ -3155,9 +3155,9 @@
3155
},
3156
"effect-95edb821-ddaf-4404-9732-666045e056b4": {
3157
"type": "String",
3158
"metadata": {
3159
- "displayName": "Effect for policy: Anactivitylog alert should existforspecificAdministrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3160
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3161
},
3162
"allowedValues": [
3163
"Audit",
@@ -3214,9 +3214,9 @@
3214
},
3215
"effect-cb510bfd-1cba-4d9f-a230-cb0976f4bb71": {
3216
"type": "String",
3217
"metadata": {
3218
- "displayName": "Effect for policy: Anactivitylogalert should existforspecificAdministrativeoperations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3219
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3220
},
3221
"allowedValues": [
3222
"AuditIfNotExists",
@@ -3226,9 +3226,9 @@
3226
},
3227
"effect-d26f7642-7545-4e18-9b75-8c9bbdee3a9a": {
3228
"type": "String",
3229
"metadata": {
3230
- "displayName": "Effect for policy: Anactivitylogalert should existforspecificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3231
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3232
},
3233
"allowedValues": [
3234
"AuditIfNotExists",
@@ -3238,9 +3238,9 @@
3238
},
3239
"effect-f85bf3e0-d513-442e-89c3-1784ad63382b": {
3240
"type": "String",
3241
"metadata": {
3242
- "displayName": "Effect for policy: AnactivitylogalertshouldexistforspecificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3243
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3244
},
3245
"allowedValues": [
3246
"AuditIfNotExists",
@@ -3250,9 +3250,9 @@
3250
},
3251
"effect-0da106f2-4ca3-48e8-bc85-c638fe6aea8f": {
3252
"type": "String",
3253
"metadata": {
3254
- "displayName": "Effect for policy: Anactivitylog alert should existforspecific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3255
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3256
},
3257
"allowedValues": [
3258
"AuditIfNotExists",
@@ -3275,9 +3275,9 @@
3275
},
3276
"effect-bf16e0bb-31e1-4646-8202-60a235cc7e74": {
3277
"type": "String",
3278
"metadata": {
3279
- "displayName": "Effect for policy: AnactivitylogalertshouldexistforspecificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3280
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3281
},
3282
"allowedValues": [
3283
"AuditIfNotExists",
@@ -3287,9 +3287,9 @@
3287
},
3288
"effect-b4dec045-250a-48c2-b5cc-e0c4eec8b5b4": {
3289
"type": "String",
3290
"metadata": {
3291
- "displayName": "Effect for policy: Anactivitylogalert should exist for specificAdministrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3292
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3293
},
3294
"allowedValues": [
3295
"AuditIfNotExists",
@@ -3336,9 +3336,9 @@
3336
},
3337
"effect-67e010c1-640d-438e-a3a5-feaccb533a98": {
3338
"type": "String",
3339
"metadata": {
3340
- "displayName": "Effect for policy: Anactivitylogalertshouldexist for specific Administrative operations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3341
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3342
},
3343
"allowedValues": [
3344
"AuditIfNotExists",
@@ -3348,9 +3348,9 @@
3348
},
3349
"effect-e345b6c3-24bd-4c93-9bbb-7e5e49a17b78": {
3350
"type": "String",
3351
"metadata": {
3352
- "displayName": "Effect for policy: Anactivitylogalert should existforspecificAdministrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3353
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3354
},
3355
"allowedValues": [
3356
"Audit",
@@ -3360,9 +3360,9 @@
3360
},
3361
"effect-1c30f9cd-b84c-49cc-aa2c-9288447cc3b3": {
3362
"type": "String",
3363
"metadata": {
3364
- "displayName": "Effect for policy: Anactivity log alert should existforspecificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3365
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3366
},
3367
"allowedValues": [
3368
"Audit",
@@ -3425,9 +3425,9 @@
3425
},
3426
"effect-f2143251-70de-4e81-87a8-36cee5a2f29d": {
3427
"type": "String",
3428
"metadata": {
3429
- "displayName": "Effect for policy: Anactivitylogalertshouldexist for specificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3430
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3431
},
3432
"allowedValues": [
3433
"AuditIfNotExists",
@@ -3437,9 +3437,9 @@
3437
},
3438
"effect-19dd1db6-f442-49cf-a838-b0786b4401ef": {
3439
"type": "String",
3440
"metadata": {
3441
- "displayName": "Effect for policy: Anactivitylogalert should existforspecificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3442
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3443
},
3444
"allowedValues": [
3445
"AuditIfNotExists",
@@ -3449,9 +3449,9 @@
3449
},
3450
"effect-81e74cea-30fd-40d5-802f-d72103c2aaaa": {
3451
"type": "String",
3452
"metadata": {
3453
- "displayName": "Effect for policy: AnactivitylogalertshouldexistforspecificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3454
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3455
},
3456
"allowedValues": [
3457
"Audit",
@@ -3462,9 +3462,9 @@
3462
},
3463
"effect-3dc5edcd-002d-444c-b216-e123bbfa37c0": {
3464
"type": "String",
3465
"metadata": {
3466
- "displayName": "Effect for policy: Anactivitylogalert should existforspecificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3467
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3468
},
3469
"allowedValues": [
3470
"AuditIfNotExists",
@@ -3474,9 +3474,9 @@
3474
},
3475
"effect-18adea5e-f416-4d0f-8aa8-d24321e3e274": {
3476
"type": "String",
3477
"metadata": {
3478
- "displayName": "Effect for policy: AnactivitylogalertshouldexistforspecificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3479
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3480
},
3481
"allowedValues": [
3482
"AuditIfNotExists",
@@ -3486,9 +3486,9 @@
3486
},
3487
"effect-f4b53539-8df9-40e4-86c6-6b607703bd4e": {
3488
"type": "String",
3489
"metadata": {
3490
- "displayName": "Effect for policy: Anactivitylog alert should existforspecificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3491
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3492
},
3493
"allowedValues": [
3494
"Audit",
@@ -3499,9 +3499,9 @@
3499
},
3500
"effect-0aa61e00-0a01-4a3c-9945-e93cffedf0e6": {
3501
"type": "String",
3502
"metadata": {
3503
- "displayName": "Effect for policy: Anactivitylogalert should existforspecificAdministrativeoperations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3504
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3505
},
3506
"allowedValues": [
3507
"Audit",
@@ -3531,9 +3531,9 @@
3531
},
3532
"effect-75c4f823-d65c-4f29-a733-01d0077fdbcb": {
3533
"type": "String",
3534
"metadata": {
3535
- "displayName": "Effect for policy: AnactivitylogalertshouldexistforspecificAdministrativeoperations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3536
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3537
},
3538
"allowedValues": [
3539
"Audit",
@@ -3544,9 +3544,9 @@
3544
},
3545
"effect-56a5ee18-2ae6-4810-86f7-18e39ce5629b": {
3546
"type": "String",
3547
"metadata": {
3548
- "displayName": "Effect for policy: Anactivitylogalert should existforspecificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3549
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3550
},
3551
"allowedValues": [
3552
"Audit",
@@ -3565,9 +3565,9 @@
3565
},
3566
"effect-d461a302-a187-421a-89ac-84acdb4edc04": {
3567
"type": "String",
3568
"metadata": {
3569
- "displayName": "Effect for policy: Anactivitylogalertshouldexist for specificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3570
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3571
},
3572
"allowedValues": [
3573
"Audit",
@@ -3578,9 +3578,9 @@
3578
},
3579
"effect-ca91455f-eace-4f96-be59-e6e2c35b4816": {
3580
"type": "String",
3581
"metadata": {
3582
- "displayName": "Effect for policy: AnactivitylogalertshouldexistforspecificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3583
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3584
},
3585
"allowedValues": [
3586
"Audit",
@@ -3591,9 +3591,9 @@
3591
},
3592
"effect-87ba29ef-1ab3-4d82-b763-87fcd4f531f7": {
3593
"type": "String",
3594
"metadata": {
3595
- "displayName": "Effect for policy: Anactivitylogalert should existforspecificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3596
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3597
},
3598
"allowedValues": [
3599
"Audit",
@@ -3604,9 +3604,9 @@
3604
},
3605
"effect-967a4b4b-2da9-43c1-b7d0-f98d0d74d0b1": {
3606
"type": "String",
3607
"metadata": {
3608
- "displayName": "Effect for policy: Anactivitylog alert should existforspecificAdministrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3609
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3610
},
3611
"allowedValues": [
3612
"Audit",
@@ -3636,9 +3636,9 @@
3636
},
3637
"effect-ff25f3c8-b739-4538-9d07-3d6d25cfb255": {
3638
"type": "String",
3639
"metadata": {
3640
- "displayName": "Effect for policy: Anactivitylogalert should existforspecificAdministrativeoperations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3641
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3642
},
3643
"allowedValues": [
3644
"Audit",
@@ -3649,9 +3649,9 @@
3649
},
3650
"effect-ac01ad65-10e5-46df-bdd9-6b0cad13e1d2": {
3651
"type": "String",
3652
"metadata": {
3653
- "displayName": "Effect for policy: Anactivitylogalert should existforspecificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3654
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3655
},
3656
"allowedValues": [
3657
"Audit",
@@ -3662,9 +3662,9 @@
3662
},
3663
"effect-0a370ff3-6cab-4e85-8995-295fd854c5b8": {
3664
"type": "String",
3665
"metadata": {
3666
- "displayName": "Effect for policy: AnactivitylogalertshouldexistforspecificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3667
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3668
},
3669
"allowedValues": [
3670
"Audit",
@@ -3675,9 +3675,9 @@
3675
},
3676
"effect-47031206-ce96-41f8-861b-6a915f3de284": {
3677
"type": "String",
3678
"metadata": {
3679
- "displayName": "Effect for policy: Anactivitylogalert should existforspecificAdministrativeoperations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3680
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3681
},
3682
"allowedValues": [
3683
"Audit",
@@ -3688,9 +3688,9 @@
3688
},
3689
"effect-46aa9b05-0e60-4eae-a88b-1e9d374fa515": {
3690
"type": "String",
3691
"metadata": {
3692
- "displayName": "Effect for policy: Anactivitylogalert should existforspecificAdministrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3693
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3694
},
3695
"allowedValues": [
3696
"Audit",
@@ -3701,9 +3701,9 @@
3701
},
3702
"effect-bfecdea6-31c4-4045-ad42-71b9dc87247d": {
3703
"type": "String",
3704
"metadata": {
3705
- "displayName": "Effect for policy: Anactivitylogalert should exist for specificAdministrativeoperations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3706
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3707
},
3708
"allowedValues": [
3709
"Audit",
@@ -3714,9 +3714,9 @@
3714
},
3715
"effect-98728c90-32c7-4049-8429-847dc0f4fe37": {
3716
"type": "String",
3717
"metadata": {
3718
- "displayName": "Effect for policy: Anactivitylogalert should existforspecificAdministrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3719
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3720
},
3721
"allowedValues": [
3722
"Audit",
@@ -3727,9 +3727,9 @@
3727
},
3728
"effect-152b15f7-8e1f-4c1f-ab71-8c010ba5dbc0": {
3729
"type": "String",
3730
"metadata": {
3731
- "displayName": "Effect for policy: Anactivitylogalert should existforspecificAdministrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3732
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3733
},
3734
"allowedValues": [
3735
"Audit",
@@ -3747,9 +3747,9 @@
3747
},
3748
"effect-d8cf8476-a2ec-4916-896e-992351803c44": {
3749
"type": "String",
3750
"metadata": {
3751
- "displayName": "Effect for policy: AnactivitylogalertshouldexistforspecificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3752
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3753
},
3754
"allowedValues": [
3755
"Audit",
@@ -3759,9 +3759,9 @@
3759
},
3760
"effect-044985bb-afe1-42cd-8a36-9d5d42424537": {
3761
"type": "String",
3762
"metadata": {
3763
- "displayName": "Effect for policy: Anactivitylogalert should existforspecific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3764
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3765
},
3766
"allowedValues": [
3767
"Audit",
@@ -3772,9 +3772,9 @@
3772
},
3773
"effect-a1840de2-8088-4ea8-b153-b4c723e9cb01": {
3774
"type": "String",
3775
"metadata": {
3776
- "displayName": "Effect for policy: Anactivitylogalert should existforspecificAdministrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3777
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3778
},
3779
"allowedValues": [
3780
"Audit",
@@ -3784,9 +3784,9 @@
3784
},
3785
"effect-9b597639-28e4-48eb-b506-56b05d366257": {
3786
"type": "String",
3787
"metadata": {
3788
- "displayName": "Effect for policy: Anactivitylogalert should existforspecificAdministrativeoperations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3789
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3790
},
3791
"allowedValues": [
3792
"AuditIfNotExists",
@@ -3796,9 +3796,9 @@
3796
},
3797
"effect-abfb7388-5bf4-4ad7-ba99-2cd2f41cebb9": {
3798
"type": "String",
3799
"metadata": {
3800
- "displayName": "Effect for policy: Anactivitylogalert should exist for specificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3801
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3802
},
3803
"allowedValues": [
3804
"AuditIfNotExists",
@@ -3808,9 +3808,9 @@
3808
},
3809
"effect-b02aacc0-b073-424e-8298-42b22829ee0a": {
3810
"type": "String",
3811
"metadata": {
3812
- "displayName": "Effect for policy: Anactivity log alert should exist for specificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3813
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3814
},
3815
"allowedValues": [
3816
"AuditIfNotExists",
@@ -3820,9 +3820,9 @@
3820
},
3821
"effect-ef2a8f2a-b3d9-49cd-a8a8-9a3aaaf647d9": {
3822
"type": "String",
3823
"metadata": {
3824
- "displayName": "Effect for policy: Anactivitylog alert should existforspecificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3825
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3826
},
3827
"allowedValues": [
3828
"AuditIfNotExists",
@@ -3832,9 +3832,9 @@
3832
},
3833
"effect-0049a6b3-a662-4f3e-8635-39cf44ace45a": {
3834
"type": "String",
3835
"metadata": {
3836
- "displayName": "Effect for policy: Anactivitylog alert should existforspecificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3837
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3838
},
3839
"allowedValues": [
3840
"AuditIfNotExists",
@@ -3844,9 +3844,9 @@
3844
},
3845
"effect-c43e4a30-77cb-48ab-a4dd-93f175c63b57": {
3846
"type": "String",
3847
"metadata": {
3848
- "displayName": "Effect for policy: Anactivitylogalert should existforspecificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3849
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3850
},
3851
"allowedValues": [
3852
"AuditIfNotExists",
@@ -3856,9 +3856,9 @@
3856
},
3857
"effect-fb893a29-21bb-418c-a157-e99480ec364c": {
3858
"type": "String",
3859
"metadata": {
3860
- "displayName": "Effect for policy: AnactivitylogalertshouldexistforspecificAdministrativeoperations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3861
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3862
},
3863
"allowedValues": [
3864
"Audit",
@@ -3868,9 +3868,9 @@
3868
},
3869
"effect-bd876905-5b84-4f73-ab2d-2e7a7c4568d9": {
3870
"type": "String",
3871
"metadata": {
3872
- "displayName": "Effect for policy: Anactivitylogalertshouldexist for specificAdministrativeoperations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3873
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3874
},
3875
"allowedValues": [
3876
"Audit",
@@ -3909,9 +3909,9 @@
3909
},
3910
"effect-e2dd799a-a932-4e9d-ac17-d473bc3c6c10": {
3911
"type": "String",
3912
"metadata": {
3913
- "displayName": "Effect for policy: Anactivitylogalertshouldexist for specificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3914
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3915
},
3916
"allowedValues": [
3917
"AuditIfNotExists",
@@ -3934,9 +3934,9 @@
3934
},
3935
"effect-ea53dbee-c6c9-4f0e-9f9e-de0039b78023": {
3936
"type": "String",
3937
"metadata": {
3938
- "displayName": "Effect for policy: AnactivitylogalertshouldexistforspecificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3939
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3940
},
3941
"allowedValues": [
3942
"AuditIfNotExists",
@@ -3946,9 +3946,9 @@
3946
},
3947
"effect-a1817ec0-a368-432a-8057-8371e17ac6ee": {
3948
"type": "String",
3949
"metadata": {
3950
- "displayName": "Effect for policy: Anactivitylogalert should existforspecificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3951
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3952
},
3953
"allowedValues": [
3954
"Audit",
@@ -3980,9 +3980,9 @@
3980
},
3981
"effect-423dd1ba-798e-40e4-9c4d-b6902674b423": {
3982
"type": "String",
3983
"metadata": {
3984
- "displayName": "Effect for policy: Anactivitylog alert should existforspecificAdministrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
3985
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3986
},
3987
"allowedValues": [
3988
"Audit",
@@ -4031,9 +4031,9 @@
4031
},
4032
"effect-8c6a50c6-9ffd-4ae7-986f-5fa6111f9a54": {
4033
"type": "String",
4034
"metadata": {
4035
- "displayName": "Effect for policy: Anactivitylog alert should existforspecificAdministrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
4036
"description": "For more information about effects, visit https://aka.ms/policyeffects"
4037
},
4038
"allowedValues": [
4039
"Audit",
@@ -4066,9 +4066,9 @@
4066
},
4067
"effect-f4826e5f-6a27-407c-ae3e-9582eb39891d": {
4068
"type": "String",
4069
"metadata": {
4070
- "displayName": "Effect for policy: AnactivitylogalertshouldexistforspecificAdministrativeoperations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
4071
"description": "For more information about effects, visit https://aka.ms/policyeffects"
4072
},
4073
"allowedValues": [
4074
"AuditIfNotExists",
@@ -4078,9 +4078,9 @@
4078
},
4079
"effect-e96a9a5f-07ca-471b-9bc5-6a0f33cbd68f": {
4080
"type": "String",
4081
"metadata": {
4082
- "displayName": "Effect for policy: Anactivitylogalert should existforspecificAdministrativeoperations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
4083
"description": "For more information about effects, visit https://aka.ms/policyeffects"
4084
},
4085
"allowedValues": [
4086
"Audit",
@@ -4113,9 +4113,9 @@
4113
},
4114
"effect-4ceb8dc2-559c-478b-a15b-733fbf1e3738": {
4115
"type": "String",
4116
"metadata": {
4117
- "displayName": "Effect for policy: AnactivitylogalertshouldexistforspecificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
4118
"description": "For more information about effects, visit https://aka.ms/policyeffects"
4119
},
4120
"allowedValues": [
4121
"AuditIfNotExists",
@@ -4125,9 +4125,9 @@
4125
},
4126
"effect-8ac833bd-f505-48d5-887e-c993a1d3eea0": {
4127
"type": "String",
4128
"metadata": {
4129
- "displayName": "Effect for policy: AnactivitylogalertshouldexistforspecificAdministrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
4130
"description": "For more information about effects, visit https://aka.ms/policyeffects"
4131
},
4132
"allowedValues": [
4133
"AuditIfNotExists",
@@ -4137,9 +4137,9 @@
4137
},
4138
"effect-e15effd4-2278-4c65-a0da-4d6f6d1890e2": {
4139
"type": "String",
4140
"metadata": {
4141
- "displayName": "Effect for policy: Anactivitylogalert should existforspecificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
4142
"description": "For more information about effects, visit https://aka.ms/policyeffects"
4143
},
4144
"allowedValues": [
4145
"Deny",
@@ -4150,9 +4150,9 @@
4150
},
4151
"effect-fdccbe47-f3e3-4213-ad5d-ea459b2fa077": {
4152
"type": "String",
4153
"metadata": {
4154
- "displayName": "Effect for policy: Anactivitylogalert should exist for specificAdministrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
4155
"description": "For more information about effects, visit https://aka.ms/policyeffects"
4156
},
4157
"allowedValues": [
4158
"Audit",
@@ -4163,9 +4163,9 @@
4163
},
4164
"effect-b52376f7-9612-48a1-81cd-1ffe4b61032c": {
4165
"type": "String",
4166
"metadata": {
4167
- "displayName": "Effect for policy: Anactivitylogalert should exist for specificAdministrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
4168
"description": "For more information about effects, visit https://aka.ms/policyeffects"
4169
},
4170
"allowedValues": [
4171
"Audit",
@@ -4176,9 +4176,9 @@
4176
},
4177
"effect-d9844e8a-1437-4aeb-a32c-0c992f056095": {
4178
"type": "String",
4179
"metadata": {
4180
- "displayName": "Effect for policy: Anactivitylogalert should exist for specificAdministrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
4181
"description": "For more information about effects, visit https://aka.ms/policyeffects"
4182
},
4183
"allowedValues": [
4184
"Audit",
@@ -4189,9 +4189,9 @@
4189
},
4190
"effect-78215662-041e-49ed-a9dd-5385911b3a1f": {
4191
"type": "String",
4192
"metadata": {
4193
- "displayName": "Effect for policy: Anactivitylogalert should existforspecificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
4194
"description": "For more information about effects, visit https://aka.ms/policyeffects"
4195
},
4196
"allowedValues": [
4197
"Audit",
@@ -4202,9 +4202,9 @@
4202
},
4203
"effect-5d4e3c65-4873-47be-94f3-6f8b953a3598": {
4204
"type": "String",
4205
"metadata": {
4206
- "displayName": "Effect for policy: Anactivitylogalert should existforspecificAdministrativeoperations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
4207
"description": "For more information about effects, visit https://aka.ms/policyeffects"
4208
},
4209
"allowedValues": [
4210
"Audit",
@@ -4223,9 +4223,9 @@
4223
},
4224
"effect-0a075868-4c26-42ef-914c-5bc007359560": {
4225
"type": "String",
4226
"metadata": {
4227
- "displayName": "Effect for policy: Anactivity log alert should existforspecificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
4228
"description": "For more information about effects, visit https://aka.ms/policyeffects"
4229
},
4230
"allowedValues": [
4231
"Audit",
@@ -4236,9 +4236,9 @@
4236
},
4237
"effect-12d4fa5e-1f9f-4c21-97a9-b99b3c6611b5": {
4238
"type": "String",
4239
"metadata": {
4240
- "displayName": "Effect for policy: Anactivitylogalert should existforspecificAdministrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
4241
"description": "For more information about effects, visit https://aka.ms/policyeffects"
4242
},
4243
"allowedValues": [
4244
"Audit",
@@ -4249,9 +4249,9 @@
4249
},
4250
"effect-40e85574-ef33-47e8-a854-7a65c7500560": {
4251
"type": "String",
4252
"metadata": {
4253
- "displayName": "Effect for policy: Anactivitylogalert should existforspecificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
4254
"description": "For more information about effects, visit https://aka.ms/policyeffects"
4255
},
4256
"allowedValues": [
4257
"AuditIfNotExists",
@@ -4261,9 +4261,9 @@
4261
},
4262
"effect-fc26e2fd-3149-74b4-5988-d64bb90f8ef7": {
4263
"type": "String",
4264
"metadata": {
4265
- "displayName": "Effect for policy: Anactivitylogalert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
4266
"description": "For more information about effects, visit https://aka.ms/policyeffects"
4267
},
4268
"allowedValues": [
4269
"Manual",
@@ -4273,9 +4273,9 @@
4273
},
4274
"effect-7bdb79ea-16b8-453e-4ca4-ad5b16012414": {
4275
"type": "String",
4276
"metadata": {
4277
- "displayName": "Effect for policy: Anactivitylogalertshouldexistforspecific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
4278
"description": "For more information about effects, visit https://aka.ms/policyeffects"
4279
},
4280
"allowedValues": [
4281
"Manual",
@@ -4301,9 +4301,9 @@
4301
},
4302
"effect-11ac78e3-31bc-4f0c-8434-37ab963cea07": {
4303
"type": "String",
4304
"metadata": {
4305
- "displayName": "Effect for policy: Anactivitylogalertshouldexist for specificAdministrativeoperations(Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
4306
"description": "For more information about effects, visit https://aka.ms/policyeffects"
"description": "Payment Card Industry Data Security Standard, focusing on protecting credit card transaction data.",
4
"metadata": {
5
+ "version": "1.4.1",
6
"category": "Regulatory Compliance"
7
},
8
+ "version": "1.4.1",
9
"parameters": {
10
"effect-5450f5bd-9c72-4390-a9c4-a7aba4edfdd2": {
11
"type": "String",
12
"metadata": {
13
+ "displayName": "Effect for policy: Cosmos DB database accounts should have local authentication methods disabled",
14
"description": "For more information about effects, visit https://aka.ms/policyeffects"
15
},
16
"allowedValues": [
17
"Audit",
75
},
76
"effect-1221c620-d201-468c-81e7-2817e6107e84": {
77
"type": "String",
78
"metadata": {
79
+ "displayName": "Effect for policy: Windows machines should meet requirements for 'Security Options - Network Security'",
80
"description": "For more information about effects, visit https://aka.ms/policyeffects"
81
},
82
"allowedValues": [
83
"AuditIfNotExists",
87
},
88
"effect-fa498b91-8a7e-4710-9578-da944c68d1fe": {
89
"type": "String",
90
"metadata": {
91
+ "displayName": "Effect for policy: Azure PostgreSQL flexible server should have Microsoft Entra Only Authentication enabled",
92
"description": "For more information about effects, visit https://aka.ms/policyeffects"
93
},
94
"allowedValues": [
95
"Audit",
99
},
100
"effect-d6759c02-b87f-42b7-892e-71b3f471d782": {
101
"type": "String",
102
"metadata": {
103
+ "displayName": "Effect for policy: Azure AI Services resources should use Azure Private Link",
104
"description": "For more information about effects, visit https://aka.ms/policyeffects"
105
},
106
"allowedValues": [
107
"Audit",
111
},
112
"effect-c9d007d0-c057-4772-b18c-01e546713bcd": {
113
"type": "String",
114
"metadata": {
115
+ "displayName": "Effect for policy: Storage accounts should allow access from trusted Microsoft services",
116
"description": "For more information about effects, visit https://aka.ms/policyeffects"
117
},
118
"allowedValues": [
119
"Audit",
124
},
125
"effect-60d21c4f-21a3-4d94-85f4-b924e6aeeda4": {
126
"type": "String",
127
"metadata": {
128
+ "displayName": "Effect for policy: Storage Accounts should use a virtual network service endpoint",
129
"description": "For more information about effects, visit https://aka.ms/policyeffects"
130
},
131
"allowedValues": [
132
"Audit",
136
},
137
"effect-11e3da8c-1d68-4392-badd-0ff3c43ab5b0": {
138
"type": "String",
139
"metadata": {
140
+ "displayName": "Effect for policy: Recovery Services vaults should use private link",
141
"description": "For more information about effects, visit https://aka.ms/policyeffects"
142
},
143
"allowedValues": [
144
"Audit",
148
},
149
"effect-95bccee9-a7f8-4bec-9ee9-62c3473701fc": {
150
"type": "String",
151
"metadata": {
152
+ "displayName": "Effect for policy: App Service apps should have authentication enabled",
153
"description": "For more information about effects, visit https://aka.ms/policyeffects"
154
},
155
"allowedValues": [
156
"AuditIfNotExists",
197
},
198
"effect-3ff60f98-7fa4-410a-9f7f-0b00f5afdbdd": {
199
"type": "String",
200
"metadata": {
201
+ "displayName": "Effect for policy: Windows machines should meet requirements for 'Security Options - Network Access'",
202
"description": "For more information about effects, visit https://aka.ms/policyeffects"
203
},
204
"allowedValues": [
205
"AuditIfNotExists",
209
},
210
"effect-21a6bc25-125e-4d13-b82d-2e19b7208ab7": {
211
"type": "String",
212
"metadata": {
213
+ "displayName": "Effect for policy: VPN gateways should use only Azure Active Directory (Azure AD) authentication for point-to-site users",
214
"description": "For more information about effects, visit https://aka.ms/policyeffects"
215
},
216
"allowedValues": [
217
"Audit",
222
},
223
"effect-deeddb44-9f94-4903-9fa0-081d524406e3": {
224
"type": "String",
225
"metadata": {
226
+ "displayName": "Effect for policy: Azure Recovery Services vaults should use private link for backup",
227
"description": "For more information about effects, visit https://aka.ms/policyeffects"
228
},
229
"allowedValues": [
230
"Audit",
234
},
235
"effect-0a15ec92-a229-4763-bb14-0ea34a568f8d": {
236
"type": "String",
237
"metadata": {
238
+ "displayName": "Effect for policy: Azure Policy Add-on for Kubernetes service (AKS) should be installed and enabled on your clusters",
239
"description": "For more information about effects, visit https://aka.ms/policyeffects"
240
},
241
"allowedValues": [
242
"Audit",
246
},
247
"effect-0e60b895-3786-45da-8377-9c6b4b6ac5f9": {
248
"type": "String",
249
"metadata": {
250
+ "displayName": "Effect for policy: Function apps should have remote debugging turned off",
251
"description": "For more information about effects, visit https://aka.ms/policyeffects"
252
},
253
"allowedValues": [
254
"AuditIfNotExists",
279
},
280
"effect-c26596ff-4d70-4e6a-9a30-c2506bd2f80c": {
281
"type": "String",
282
"metadata": {
283
+ "displayName": "Effect for policy: Kubernetes cluster containers should only use allowed capabilities",
284
"description": "For more information about effects, visit https://aka.ms/policyeffects"
285
},
286
"allowedValues": [
287
"Audit",
369
},
370
"effect-e6955644-301c-44b5-a4c4-528577de6861": {
371
"type": "String",
372
"metadata": {
373
+ "displayName": "Effect for policy: Audit Linux machines that do not have the passwd file permissions set to 0644",
374
"description": "For more information about effects, visit https://aka.ms/policyeffects"
375
},
376
"allowedValues": [
377
"AuditIfNotExists",
402
},
403
"effect-1c6e92c9-99f0-4e55-9cf2-0c234dc48f99": {
404
"type": "String",
405
"metadata": {
406
+ "displayName": "Effect for policy: Kubernetes clusters should not allow container privilege escalation",
407
"description": "For more information about effects, visit https://aka.ms/policyeffects"
408
},
409
"allowedValues": [
410
"Audit",
461
},
462
"effect-d416745a-506c-48b6-8ab1-83cb814bcaa3": {
463
"type": "String",
464
"metadata": {
465
+ "displayName": "Effect for policy: Virtual machines should be connected to an approved virtual network",
466
"description": "For more information about effects, visit https://aka.ms/policyeffects"
467
},
468
"allowedValues": [
469
"Audit",
526
},
527
"effect-492a29ed-d143-4f03-b6a4-705ce081b463": {
528
"type": "String",
529
"metadata": {
530
+ "displayName": "Effect for policy: Windows machines should meet requirements for 'Security Options - User Account Control'",
531
"description": "For more information about effects, visit https://aka.ms/policyeffects"
532
},
533
"allowedValues": [
534
"AuditIfNotExists",
695
},
696
"effect-35d9882c-993d-44e6-87d2-db66ce21b636": {
697
"type": "String",
698
"metadata": {
699
+ "displayName": "Effect for policy: Windows machines should meet requirements for 'Windows Firewall Properties'",
700
"description": "For more information about effects, visit https://aka.ms/policyeffects"
701
},
702
"allowedValues": [
703
"AuditIfNotExists",
720
},
721
"effect-72650e9f-97bc-4b2a-ab5f-9781a9fcecbc": {
722
"type": "String",
723
"metadata": {
724
+ "displayName": "Effect for policy: Windows machines should meet requirements of the Azure compute security baseline",
725
"description": "For more information about effects, visit https://aka.ms/policyeffects"
726
},
727
"allowedValues": [
728
"AuditIfNotExists",
732
},
733
"effect-12430be1-6cc8-4527-a9a8-e3d38f250096": {
734
"type": "String",
735
"metadata": {
736
+ "displayName": "Effect for policy: Web Application Firewall (WAF) should use the specified mode for Application Gateway",
737
"description": "For more information about effects, visit https://aka.ms/policyeffects"
738
},
739
"allowedValues": [
740
"Audit",
757
},
758
"effect-22730e10-96f6-4aac-ad84-9383d35b5917": {
759
"type": "String",
760
"metadata": {
761
+ "displayName": "Effect for policy: Management ports should be closed on your virtual machines",
762
"description": "For more information about effects, visit https://aka.ms/policyeffects"
763
},
764
"allowedValues": [
765
"AuditIfNotExists",
769
},
770
"effect-0564d078-92f5-4f97-8398-b9f58a51f70b": {
771
"type": "String",
772
"metadata": {
773
+ "displayName": "Effect for policy: Private endpoint should be enabled for PostgreSQL servers",
774
"description": "For more information about effects, visit https://aka.ms/policyeffects"
775
},
776
"allowedValues": [
777
"AuditIfNotExists",
781
},
782
"effect-0a1302fb-a631-4106-9753-f3d494733990": {
783
"type": "String",
784
"metadata": {
785
+ "displayName": "Effect for policy: Private endpoint should be enabled for MariaDB servers",
786
"description": "For more information about effects, visit https://aka.ms/policyeffects"
787
},
788
"allowedValues": [
789
"AuditIfNotExists",
814
},
815
"effect-ee984370-154a-4ee8-9726-19d900e56fc0": {
816
"type": "String",
817
"metadata": {
818
+ "displayName": "Effect for policy: Windows machines should meet requirements for 'Security Options - Accounts'",
819
"description": "For more information about effects, visit https://aka.ms/policyeffects"
820
},
821
"allowedValues": [
822
"AuditIfNotExists",
826
},
827
"effect-e71308d3-144b-4262-b144-efdc3cc90517": {
828
"type": "String",
829
"metadata": {
830
+ "displayName": "Effect for policy: Subnets should be associated with a Network Security Group",
831
"description": "For more information about effects, visit https://aka.ms/policyeffects"
832
},
833
"allowedValues": [
834
"AuditIfNotExists",
838
},
839
"effect-564feb30-bf6a-4854-b4bb-0d2d2d1e6c66": {
840
"type": "String",
841
"metadata": {
842
+ "displayName": "Effect for policy: Web Application Firewall (WAF) should be enabled for Application Gateway",
843
"description": "For more information about effects, visit https://aka.ms/policyeffects"
844
},
845
"allowedValues": [
846
"Audit",
872
},
873
"effect-098fc59e-46c7-4d99-9b16-64990e543d75": {
874
"type": "String",
875
"metadata": {
876
+ "displayName": "Effect for policy: Kubernetes cluster pod hostPath volumes should only use allowed host paths",
877
"description": "For more information about effects, visit https://aka.ms/policyeffects"
878
},
879
"allowedValues": [
880
"Audit",
963
},
964
"effect-9f061a12-e40d-4183-a00e-171812443373": {
965
"type": "String",
966
"metadata": {
967
+ "displayName": "Effect for policy: Kubernetes clusters should not use the default namespace",
968
"description": "For more information about effects, visit https://aka.ms/policyeffects"
969
},
970
"allowedValues": [
971
"Audit",
1007
},
1008
"effect-862e97cf-49fc-4a5c-9de4-40d4e2e7c8eb": {
1009
"type": "String",
1010
"metadata": {
1011
+ "displayName": "Effect for policy: Azure Cosmos DB accounts should have firewall rules",
1012
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1013
},
1014
"allowedValues": [
1015
"Audit",
1020
},
1021
"effect-9daedab3-fb2d-461e-b861-71790eead4f6": {
1022
"type": "String",
1023
"metadata": {
1024
+ "displayName": "Effect for policy: All network ports should be restricted on network security groups associated to your virtual machine",
1025
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1026
},
1027
"allowedValues": [
1028
"AuditIfNotExists",
1061
},
1062
"effect-47a1ee2f-2a2a-4576-bf2a-e0e36709c2b8": {
1063
"type": "String",
1064
"metadata": {
1065
+ "displayName": "Effect for policy: Kubernetes cluster containers should not share host process ID or host IPC namespace",
1066
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1067
},
1068
"allowedValues": [
1069
"Audit",
1112
},
1113
"effect-2913021d-f2fd-4f3d-b958-22354e2bdbcb": {
1114
"type": "String",
1115
"metadata": {
1116
+ "displayName": "Effect for policy: Azure Defender for App Service should be enabled",
1117
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1118
},
1119
"allowedValues": [
1120
"AuditIfNotExists",
1124
},
1125
"effect-7804b5c7-01dc-4723-969b-ae300cc07ff1": {
1126
"type": "String",
1127
"metadata": {
1128
+ "displayName": "Effect for policy: Azure Machine Learning Computes should be in a virtual network",
1129
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1130
},
1131
"allowedValues": [
1132
"Audit",
1136
},
1137
"effect-8af8f826-edcb-4178-b35f-851ea6fea615": {
1138
"type": "String",
1139
"metadata": {
1140
+ "displayName": "Effect for policy: Azure Container Instance container group should deploy into a virtual network",
1141
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1142
},
1143
"allowedValues": [
1144
"Audit",
1149
},
1150
"effect-0fdf0491-d080-4575-b627-ad0e843cba0f": {
1151
"type": "String",
1152
"metadata": {
1153
+ "displayName": "Effect for policy: Public network access should be disabled for Container registries",
1154
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1155
},
1156
"allowedValues": [
1157
"Audit",
1162
},
1163
"effect-404c3081-a854-4457-ae30-26a93ef643f9": {
1164
"type": "String",
1165
"metadata": {
1166
+ "displayName": "Effect for policy: Secure transfer to storage accounts should be enabled",
1167
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1168
},
1169
"allowedValues": [
1170
"Audit",
1175
},
1176
"effect-1b8ca024-1d5c-4dec-8995-b1a932b41780": {
1177
"type": "String",
1178
"metadata": {
1179
+ "displayName": "Effect for policy: Public network access on Azure SQL Database should be disabled",
1180
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1181
},
1182
"allowedValues": [
1183
"Audit",
1188
},
1189
"effect-1afada58-8b34-7ac2-a38a-983218635201": {
1190
"type": "String",
1191
"metadata": {
1192
+ "displayName": "Effect for policy: Define acceptable and unacceptable mobile code technologies",
1193
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1194
},
1195
"allowedValues": [
1196
"Manual",
1200
},
1201
"effect-797b37f7-06b8-444c-b1ad-fc62867f335a": {
1202
"type": "String",
1203
"metadata": {
1204
+ "displayName": "Effect for policy: Azure Cosmos DB should disable public network access",
1205
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1206
},
1207
"allowedValues": [
1208
"Audit",
1213
},
1214
"effect-2d21331d-a4c2-4def-a9ad-ee4e1e023beb": {
1215
"type": "String",
1216
"metadata": {
1217
+ "displayName": "Effect for policy: App Service apps should use a virtual network service endpoint",
1218
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1219
},
1220
"allowedValues": [
1221
"AuditIfNotExists",
1225
},
1226
"effect-7803067c-7d34-46e3-8c79-0ca68fc4036d": {
1227
"type": "String",
1228
"metadata": {
1229
+ "displayName": "Effect for policy: Azure Cache for Redis should use private link",
1230
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1231
},
1232
"allowedValues": [
1233
"AuditIfNotExists",
1237
},
1238
"effect-3d9f5e4c-9947-4579-9539-2a7695fbc187": {
1239
"type": "String",
1240
"metadata": {
1241
+ "displayName": "Effect for policy: App Configuration should disable public network access",
1242
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1243
},
1244
"allowedValues": [
1245
"Audit",
1250
},
1251
"effect-f6de0be7-9a8a-4b8a-b349-43cf02d22f7c": {
1252
"type": "String",
1253
"metadata": {
1254
+ "displayName": "Effect for policy: Internet-facing virtual machines should be protected with network security groups",
1255
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1256
},
1257
"allowedValues": [
1258
"AuditIfNotExists",
1262
},
1263
"effect-009a0c92-f5b4-4776-9b66-4ed2b4775563": {
1264
"type": "String",
1265
"metadata": {
1266
+ "displayName": "Effect for policy: Private endpoint connections on Batch accounts should be enabled",
1267
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1268
},
1269
"allowedValues": [
1270
"AuditIfNotExists",
1274
},
1275
"effect-af35e2a4-ef96-44e7-a9ae-853dd97032c4": {
1276
"type": "String",
1277
"metadata": {
1278
+ "displayName": "Effect for policy: Azure Spring Cloud should use network injection",
1279
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1280
},
1281
"allowedValues": [
1282
"Audit",
1302
},
1303
"effect-2393d2cf-a342-44cd-a2e2-fe0188fd1234": {
1304
"type": "String",
1305
"metadata": {
1306
+ "displayName": "Effect for policy: Azure SignalR Service should use private link",
1307
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1308
},
1309
"allowedValues": [
1310
"Audit",
1314
},
1315
"effect-b8564268-eb4a-4337-89be-a19db070c59d": {
1316
"type": "String",
1317
"metadata": {
1318
+ "displayName": "Effect for policy: Event Hub namespaces should use private link",
1319
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1320
},
1321
"allowedValues": [
1322
"AuditIfNotExists",
1326
},
1327
"effect-4fa4b6c0-31ca-4c0d-b10d-24b96f62a751": {
1328
"type": "String",
1329
"metadata": {
1330
+ "displayName": "Effect for policy: Storage account public access should be disallowed",
1331
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1332
},
1333
"allowedValues": [
1334
"Audit",
1339
},
1340
"effect-55615ac9-af46-4a59-874e-391cc3dfb490": {
1341
"type": "String",
1342
"metadata": {
1343
+ "displayName": "Effect for policy: Azure Key Vault should have firewall enabled or public network access disabled",
1344
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1345
},
1346
"allowedValues": [
1347
"Audit",
1380
},
1381
"effect-c4857be7-912a-4c75-87e6-e30292bcdf78": {
1382
"type": "String",
1383
"metadata": {
1384
+ "displayName": "Effect for policy: Container Registry should use a virtual network service endpoint",
1385
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1386
},
1387
"allowedValues": [
1388
"Audit",
1392
},
1393
"effect-ae5d2f14-d830-42b6-9899-df6cfe9c71a3": {
1394
"type": "String",
1395
"metadata": {
1396
+ "displayName": "Effect for policy: SQL Server should use a virtual network service endpoint",
1397
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1398
},
1399
"allowedValues": [
1400
"AuditIfNotExists",
1404
},
1405
"effect-5e1de0e3-42cb-4ebc-a86d-61d0c619ca48": {
1406
"type": "String",
1407
"metadata": {
1408
+ "displayName": "Effect for policy: Public network access should be disabled for PostgreSQL flexible servers",
1409
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1410
},
1411
"allowedValues": [
1412
"Audit",
1417
},
1418
"effect-c9299215-ae47-4f50-9c54-8a392f68a052": {
1419
"type": "String",
1420
"metadata": {
1421
+ "displayName": "Effect for policy: Public network access should be disabled for MySQL flexible servers",
1422
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1423
},
1424
"allowedValues": [
1425
"Audit",
1430
},
1431
"effect-0820b7b9-23aa-4725-a1ce-ae4558f718e5": {
1432
"type": "String",
1433
"metadata": {
1434
+ "displayName": "Effect for policy: Function apps should not have CORS configured to allow every resource to access your apps",
1435
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1436
},
1437
"allowedValues": [
1438
"AuditIfNotExists",
1442
},
1443
"effect-9dfea752-dd46-4766-aed1-c355fa93fb91": {
1444
"type": "String",
1445
"metadata": {
1446
+ "displayName": "Effect for policy: Azure SQL Managed Instances should disable public network access",
1447
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1448
},
1449
"allowedValues": [
1450
"Audit",
1455
},
1456
"effect-438c38d2-3772-465a-a9cc-7a6666a275ce": {
1457
"type": "String",
1458
"metadata": {
1459
+ "displayName": "Effect for policy: Azure Machine Learning Workspaces should disable public network access",
1460
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1461
},
1462
"allowedValues": [
1463
"Audit",
1468
},
1469
"effect-0e6763cc-5078-4e64-889d-ff4d9a839047": {
1470
"type": "String",
1471
"metadata": {
1472
+ "displayName": "Effect for policy: Azure Defender for Key Vault should be enabled",
1473
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1474
},
1475
"allowedValues": [
1476
"AuditIfNotExists",
1480
},
1481
"effect-af99038c-02fd-4a2f-ac24-386b62bf32de": {
1482
"type": "String",
1483
"metadata": {
1484
+ "displayName": "Effect for policy: Machines should have ports closed that might expose attack vectors",
1485
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1486
},
1487
"allowedValues": [
1488
"AuditIfNotExists",
1492
},
1493
"effect-0fea8f8a-4169-495d-8307-30ec335f387d": {
1494
"type": "String",
1495
"metadata": {
1496
+ "displayName": "Effect for policy: CORS should not allow every domain to access your API for FHIR",
1497
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1498
},
1499
"allowedValues": [
1500
"Audit",
1504
},
1505
"effect-df73bd95-24da-4a4f-96b9-4e8b94b402bd": {
1506
"type": "String",
1507
"metadata": {
1508
+ "displayName": "Effect for policy: API Management should disable public network access to the service configuration endpoints",
1509
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1510
},
1511
"allowedValues": [
1512
"AuditIfNotExists",
1529
},
1530
"effect-1c988dd6-ade4-430f-a608-2a3e5b0a6d38": {
1531
"type": "String",
1532
"metadata": {
1533
+ "displayName": "Effect for policy: Microsoft Defender for Containers should be enabled",
1534
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1535
},
1536
"allowedValues": [
1537
"AuditIfNotExists",
1541
},
1542
"effect-6c53d030-cc64-46f0-906d-2bc061cd1334": {
1543
"type": "String",
1544
"metadata": {
1545
+ "displayName": "Effect for policy: Log Analytics workspaces should block log ingestion and querying from public networks",
1546
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1547
},
1548
"allowedValues": [
1549
"Audit",
1554
},
1555
"effect-8405fdab-1faf-48aa-b702-999c9c172094": {
1556
"type": "String",
1557
"metadata": {
1558
+ "displayName": "Effect for policy: Managed disks should disable public network access",
1559
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1560
},
1561
"allowedValues": [
1562
"Audit",
1566
},
1567
"effect-1bc02227-0cb6-4e11-8f53-eb0b22eab7e8": {
1568
"type": "String",
1569
"metadata": {
1570
+ "displayName": "Effect for policy: Application Insights components should block log ingestion and querying from public networks",
1571
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1572
},
1573
"allowedValues": [
1574
"Audit",
1620
},
1621
"effect-2a7a701e-dff3-4da9-9ec5-42cb98594c0b": {
1622
"type": "String",
1623
"metadata": {
1624
+ "displayName": "Effect for policy: Windows machines should meet requirements for 'System Audit Policies - Policy Change'",
1625
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1626
},
1627
"allowedValues": [
1628
"AuditIfNotExists",
1632
},
1633
"effect-3b980d31-7904-4bb7-8575-5665739a8052": {
1634
"type": "String",
1635
"metadata": {
1636
+ "displayName": "Effect for policy: An activity log alert should exist for specific Security operations",
1637
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1638
},
1639
"allowedValues": [
1640
"AuditIfNotExists",
1656
},
1657
"effect-c251913d-7d24-4958-af87-478ed3b9ba41": {
1658
"type": "String",
1659
"metadata": {
1660
+ "displayName": "Effect for policy: Flow logs should be configured for every network security group",
1661
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1662
},
1663
"allowedValues": [
1664
"Audit",
1668
},
1669
"effect-a2a5b911-5617-447e-a49e-59dbe0e0434b": {
1670
"type": "String",
1671
"metadata": {
1672
+ "displayName": "Effect for policy: Resource logs in Azure Key Vault Managed HSM should be enabled",
1673
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1674
},
1675
"allowedValues": [
1676
"AuditIfNotExists",
1688
},
1689
"effect-3e596b57-105f-48a6-be97-03e9243bad6e": {
1690
"type": "String",
1691
"metadata": {
1692
+ "displayName": "Effect for policy: Azure Monitor solution 'Security and Audit' must be deployed",
1693
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1694
},
1695
"allowedValues": [
1696
"AuditIfNotExists",
1700
},
1701
"effect-7ff426e2-515f-405a-91c8-4f2333442eb5": {
1702
"type": "String",
1703
"metadata": {
1704
+ "displayName": "Effect for policy: SQL Auditing settings should have Action-Groups configured to capture critical activities",
1705
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1706
},
1707
"allowedValues": [
1708
"AuditIfNotExists",
1733
},
1734
"effect-33936777-f2ac-45aa-82ec-07958ec9ade4": {
1735
"type": "String",
1736
"metadata": {
1737
+ "displayName": "Effect for policy: Windows machines should meet requirements for 'Security Options - Audit'",
1738
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1739
},
1740
"allowedValues": [
1741
"AuditIfNotExists",
1745
},
1746
"effect-afe0c3be-ba3b-4544-ba52-0c99672a8ad6": {
1747
"type": "String",
1748
"metadata": {
1749
+ "displayName": "Effect for policy: Resource logs in Azure Machine Learning Workspaces should be enabled",
1750
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1751
},
1752
"allowedValues": [
1753
"AuditIfNotExists",
1778
},
1779
"effect-87845465-c458-45f3-af66-dcd62176f397": {
1780
"type": "String",
1781
"metadata": {
1782
+ "displayName": "Effect for policy: Windows machines should meet requirements for 'System Audit Policies - Privilege Use'",
1783
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1784
},
1785
"allowedValues": [
1786
"AuditIfNotExists",
1790
},
1791
"effect-efbde977-ba53-4479-b8e9-10b957924fbf": {
1792
"type": "String",
1793
"metadata": {
1794
+ "displayName": "Effect for policy: The Log Analytics extension should be installed on Virtual Machine Scale Sets",
1795
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1796
},
1797
"allowedValues": [
1798
"AuditIfNotExists",
1815
},
1816
"effect-94d9aca8-3757-46df-aa51-f218c5f11954": {
1817
"type": "String",
1818
"metadata": {
1819
+ "displayName": "Effect for policy: Windows machines should meet requirements for 'System Audit Policies - Account Management'",
1820
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1821
},
1822
"allowedValues": [
1823
"AuditIfNotExists",
1827
},
1828
"effect-91a78b24-f231-4a8a-8da9-02c35b2b6510": {
1829
"type": "String",
1830
"metadata": {
1831
+ "displayName": "Effect for policy: App Service apps should have resource logs enabled",
1832
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1833
},
1834
"allowedValues": [
1835
"AuditIfNotExists",
1847
},
1848
"effect-2b9ad585-36bc-4615-b300-fd4435808332": {
1849
"type": "String",
1850
"metadata": {
1851
+ "displayName": "Effect for policy: App Service apps should use managed identity",
1852
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1853
},
1854
"allowedValues": [
1855
"AuditIfNotExists",
1868
},
1869
"effect-f47b5582-33ec-4c5c-87c0-b010a6b2e917": {
1870
"type": "String",
1871
"metadata": {
1872
+ "displayName": "[Deprecated]: Effect for policy: Virtual machines should be connected to a specified workspace",
1873
"description": "For more information about effects, visit https://aka.ms/policyeffects",
1874
"deprecated": true
1875
},
1876
"allowedValues": [
1881
},
1882
"effect-7796937f-307b-4598-941c-67d3a05ebfe7": {
1883
"type": "String",
1884
"metadata": {
1885
+ "displayName": "Effect for policy: Azure subscriptions should have a log profile for Activity Log",
1886
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1887
},
1888
"allowedValues": [
1889
"AuditIfNotExists",
1893
},
1894
"effect-4c3c6c5f-0d47-4402-99b8-aa543dd8bcee": {
1895
"type": "String",
1896
"metadata": {
1897
+ "displayName": "Effect for policy: Audit flow logs configuration for every virtual network",
1898
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1899
},
1900
"allowedValues": [
1901
"Audit",
1934
},
1935
"effect-c5447c04-a4d7-4ba8-a263-c9ee321a6858": {
1936
"type": "String",
1937
"metadata": {
1938
+ "displayName": "Effect for policy: An activity log alert should exist for specific Policy operations",
1939
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1940
},
1941
"allowedValues": [
1942
"AuditIfNotExists",
1957
},
1958
"effect-41388f1c-2db0-4c25-95b2-35d7f5ccbfa9": {
1959
"type": "String",
1960
"metadata": {
1961
+ "displayName": "Effect for policy: Azure Monitor should collect activity logs from all regions",
1962
"description": "For more information about effects, visit https://aka.ms/policyeffects"
1963
},
1964
"allowedValues": [
1965
"AuditIfNotExists",
1996
},
1997
"effect-58383b73-94a9-4414-b382-4146eb02611b": {
1998
"type": "String",
1999
"metadata": {
2000
+ "displayName": "Effect for policy: Windows machines should meet requirements for 'System Audit Policies - Detailed Tracking'",
2001
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2002
},
2003
"allowedValues": [
2004
"AuditIfNotExists",
2008
},
2009
"effect-13a6c84f-49a5-410a-b5df-5b880c3fe009": {
2010
"type": "String",
2011
"metadata": {
2012
+ "displayName": "Effect for policy: Linux virtual machines should use only signed and trusted boot components",
2013
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2014
},
2015
"allowedValues": [
2016
"AuditIfNotExists",
2020
},
2021
"effect-245fc9df-fa96-4414-9a0b-3738c2f7341c": {
2022
"type": "String",
2023
"metadata": {
2024
+ "displayName": "Effect for policy: Resource logs in Azure Kubernetes Service should be enabled",
2025
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2026
},
2027
"allowedValues": [
2028
"AuditIfNotExists",
2040
},
2041
"effect-672fe5a1-2fcd-42d7-b85d-902b6e28c6ff": {
2042
"type": "String",
2043
"metadata": {
2044
+ "displayName": "Effect for policy: Guest Attestation extension should be installed on supported Linux virtual machines",
2045
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2046
},
2047
"allowedValues": [
2048
"AuditIfNotExists",
2052
},
2053
"effect-f9be5368-9bf5-4b84-9e0a-7850da98bb46": {
2054
"type": "String",
2055
"metadata": {
2056
+ "displayName": "Effect for policy: Resource logs in Azure Stream Analytics should be enabled",
2057
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2058
},
2059
"allowedValues": [
2060
"AuditIfNotExists",
2072
},
2073
"effect-f8d36e2f-389b-4ee4-898d-21aeb69a0f45": {
2074
"type": "String",
2075
"metadata": {
2076
+ "displayName": "Effect for policy: Resource logs in Service Bus should be enabled",
2077
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2078
},
2079
"allowedValues": [
2080
"AuditIfNotExists",
2092
},
2093
"effect-b954148f-4c11-4c38-8221-be76711e194a": {
2094
"type": "String",
2095
"metadata": {
2096
+ "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations",
2097
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2098
},
2099
"allowedValues": [
2100
"AuditIfNotExists",
2123
},
2124
"effect-83a214f7-d01a-484b-91a9-ed54470c9a6a": {
2125
"type": "String",
2126
"metadata": {
2127
+ "displayName": "Effect for policy: Resource logs in Event Hub should be enabled",
2128
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2129
},
2130
"allowedValues": [
2131
"AuditIfNotExists",
2143
},
2144
"effect-428256e6-1fac-4f48-a757-df34c2b3336d": {
2145
"type": "String",
2146
"metadata": {
2147
+ "displayName": "Effect for policy: Resource logs in Batch accounts should be enabled",
2148
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2149
},
2150
"allowedValues": [
2151
"AuditIfNotExists",
2163
},
2164
"effect-a6fb4358-5bf4-4ad7-ba82-2cd2f41ce5e9": {
2165
"type": "String",
2166
"metadata": {
2167
+ "displayName": "Effect for policy: Auditing on SQL server should be enabled",
2168
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2169
},
2170
"allowedValues": [
2171
"AuditIfNotExists",
2186
},
2187
"effect-6e2593d9-add6-4083-9c9b-4b7d2188c899": {
2188
"type": "String",
2189
"metadata": {
2190
+ "displayName": "Effect for policy: Email notification for high severity alerts should be enabled",
2191
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2192
},
2193
"allowedValues": [
2194
"AuditIfNotExists",
2198
},
2199
"effect-d550e854-df1a-4de9-bf44-cd894b39a95e": {
2200
"type": "String",
2201
"metadata": {
2202
+ "displayName": "Effect for policy: Azure Monitor Logs for Application Insights should be linked to a Log Analytics workspace",
2203
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2204
},
2205
"allowedValues": [
2206
"Audit",
2211
},
2212
"effect-f655e522-adff-494d-95c2-52d4f6d56a42": {
2213
"type": "String",
2214
"metadata": {
2215
+ "displayName": "Effect for policy: Guest Attestation extension should be installed on supported Windows virtual machines scale sets",
2216
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2217
},
2218
"allowedValues": [
2219
"AuditIfNotExists",
2223
},
2224
"effect-a1181c5f-672a-477a-979a-7d58aa086233": {
2225
"type": "String",
2226
"metadata": {
2227
+ "displayName": "Effect for policy: Security Center standard pricing tier should be selected",
2228
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2229
},
2230
"allowedValues": [
2231
"Audit",
2235
},
2236
"effect-1a4e592a-6a6e-44a5-9814-e36264ca96e7": {
2237
"type": "String",
2238
"metadata": {
2239
+ "displayName": "Effect for policy: Azure Monitor log profile should collect logs for categories 'write,' 'delete,' and 'action'",
2240
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2241
},
2242
"allowedValues": [
2243
"AuditIfNotExists",
2247
},
2248
"effect-8dfab9c4-fe7b-49ad-85e4-1e9be085358f": {
2249
"type": "String",
2250
"metadata": {
2251
+ "displayName": "Effect for policy: Azure Arc enabled Kubernetes clusters should have Microsoft Defender for Cloud extension installed",
2252
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2253
},
2254
"allowedValues": [
2255
"AuditIfNotExists",
2259
},
2260
"effect-abfb4388-5bf4-4ad7-ba82-2cd2f41ceae9": {
2261
"type": "String",
2262
"metadata": {
2263
+ "displayName": "Effect for policy: Azure Defender for SQL should be enabled for unprotected Azure SQL servers",
2264
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2265
},
2266
"allowedValues": [
2267
"AuditIfNotExists",
2271
},
2272
"effect-3bc8a0d5-38e0-4a3d-a657-2cb64468fc34": {
2273
"type": "String",
2274
"metadata": {
2275
+ "displayName": "Effect for policy: Azure Defender for SQL should be enabled for unprotected MySQL flexible servers",
2276
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2277
},
2278
"allowedValues": [
2279
"AuditIfNotExists",
2283
},
2284
"effect-a70ca396-0a34-413a-88e1-b956c1e683be": {
2285
"type": "String",
2286
"metadata": {
2287
+ "displayName": "[Deprecated]: Effect for policy: Virtual machines should have the Log Analytics extension installed",
2288
"description": "For more information about effects, visit https://aka.ms/policyeffects",
2289
"deprecated": true
2290
},
2291
"allowedValues": [
2296
},
2297
"effect-97566dd7-78ae-4997-8b36-1c7bfe0d8121": {
2298
"type": "String",
2299
"metadata": {
2300
+ "displayName": "Effect for policy: Secure Boot should be enabled on supported Windows virtual machines",
2301
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2302
},
2303
"allowedValues": [
2304
"Audit",
2308
},
2309
"effect-6581d072-105e-4418-827f-bd446d56421b": {
2310
"type": "String",
2311
"metadata": {
2312
+ "displayName": "Effect for policy: Azure Defender for SQL servers on machines should be enabled",
2313
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2314
},
2315
"allowedValues": [
2316
"AuditIfNotExists",
2341
},
2342
"effect-511f5417-5d12-434d-ab2e-816901e72a5e": {
2343
"type": "String",
2344
"metadata": {
2345
+ "displayName": "Effect for policy: Kubernetes cluster containers should only use allowed AppArmor profiles",
2346
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2347
},
2348
"allowedValues": [
2349
"Audit",
2411
},
2412
"effect-1cb4d9c2-f88f-4069-bee0-dba239a57b09": {
2413
"type": "String",
2414
"metadata": {
2415
+ "displayName": "Effect for policy: Guest Attestation extension should be installed on supported Windows virtual machines",
2416
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2417
},
2418
"allowedValues": [
2419
"AuditIfNotExists",
2423
},
2424
"effect-7926a6d1-b268-4586-8197-e8ae90c877d7": {
2425
"type": "String",
2426
"metadata": {
2427
+ "displayName": "Effect for policy: Microsoft Defender for APIs should be enabled",
2428
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2429
},
2430
"allowedValues": [
2431
"AuditIfNotExists",
2453
},
2454
"effect-32133ab0-ee4b-4b44-98d6-042180979d50": {
2455
"type": "String",
2456
"metadata": {
2457
+ "displayName": "[Deprecated]: Effect for policy: Log Analytics Extension should be enabled for listed virtual machine images",
2458
"description": "For more information about effects, visit https://aka.ms/policyeffects",
2459
"deprecated": true
2460
},
2461
"allowedValues": [
2486
},
2487
"effect-a21f8c92-9e22-4f09-b759-50500d1d2dda": {
2488
"type": "String",
2489
"metadata": {
2490
+ "displayName": "Effect for policy: Guest Attestation extension should be installed on supported Linux virtual machines scale sets",
2491
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2492
},
2493
"allowedValues": [
2494
"AuditIfNotExists",
2498
},
2499
"effect-d31e5c31-63b2-4f12-887b-e49456834fa1": {
2500
"type": "String",
2501
"metadata": {
2502
+ "displayName": "Effect for policy: Microsoft Defender for SQL should be enabled for unprotected Synapse workspaces",
2503
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2504
},
2505
"allowedValues": [
2506
"AuditIfNotExists",
2510
},
2511
"effect-0a9fbe0d-c5c4-4da8-87d8-f4fd77338835": {
2512
"type": "String",
2513
"metadata": {
2514
+ "displayName": "Effect for policy: Azure Defender for open-source relational databases should be enabled",
2515
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2516
},
2517
"allowedValues": [
2518
"AuditIfNotExists",
2522
},
2523
"effect-d38668f5-d155-42c7-ab3d-9b57b50f8fbf": {
2524
"type": "String",
2525
"metadata": {
2526
+ "displayName": "Effect for policy: Azure Defender for SQL should be enabled for unprotected PostgreSQL flexible servers",
2527
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2528
},
2529
"allowedValues": [
2530
"AuditIfNotExists",
2552
},
2553
"effect-5c3bc7b8-a64c-4e08-a9cd-7ff0f31e1138": {
2554
"type": "String",
2555
"metadata": {
2556
+ "displayName": "[Deprecated]: Effect for policy: Log Analytics extension should be enabled in virtual machine scale sets for listed virtual machine images",
2557
"description": "For more information about effects, visit https://aka.ms/policyeffects",
2558
"deprecated": true
2559
},
2560
"allowedValues": [
2565
},
2566
"effect-e1e5fd5d-3e4c-4ce1-8661-7d1873ae6b15": {
2567
"type": "String",
2568
"metadata": {
2569
+ "displayName": "[Deprecated]: Effect for policy: Vulnerabilities in security configuration on your machines should be remediated",
2570
"description": "For more information about effects, visit https://aka.ms/policyeffects",
2571
"deprecated": true
2572
},
2573
"allowedValues": [
2598
},
2599
"effect-22bee202-a82f-4305-9a2a-6d7f44d4dedb": {
2600
"type": "String",
2601
"metadata": {
2602
+ "displayName": "Effect for policy: Only secure connections to your Azure Cache for Redis should be enabled",
2603
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2604
},
2605
"allowedValues": [
2606
"Audit",
2611
},
2612
"effect-383856f8-de7f-44a2-81fc-e5135b5c2aa4": {
2613
"type": "String",
2614
"metadata": {
2615
+ "displayName": "Effect for policy: Resource logs in IoT Hub should be enabled",
2616
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2617
},
2618
"allowedValues": [
2619
"AuditIfNotExists",
2631
},
2632
"effect-cf820ca0-f99e-4f3e-84fb-66e913812d21": {
2633
"type": "String",
2634
"metadata": {
2635
+ "displayName": "Effect for policy: Resource logs in Key Vault should be enabled",
2636
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2637
},
2638
"allowedValues": [
2639
"AuditIfNotExists",
2651
},
2652
"effect-34f95f76-5386-4de7-b824-0d8478470c9d": {
2653
"type": "String",
2654
"metadata": {
2655
+ "displayName": "Effect for policy: Resource logs in Logic Apps should be enabled",
2656
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2657
},
2658
"allowedValues": [
2659
"AuditIfNotExists",
2671
},
2672
"effect-057ef27e-665e-4328-8ea3-04b3122bd9fb": {
2673
"type": "String",
2674
"metadata": {
2675
+ "displayName": "Effect for policy: Resource logs in Azure Data Lake Store should be enabled",
2676
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2677
},
2678
"allowedValues": [
2679
"AuditIfNotExists",
2691
},
2692
"effect-c95c74d9-38fe-4f0d-af86-0c7d626a315c": {
2693
"type": "String",
2694
"metadata": {
2695
+ "displayName": "Effect for policy: Resource logs in Data Lake Analytics should be enabled",
2696
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2697
},
2698
"allowedValues": [
2699
"AuditIfNotExists",
2731
},
2732
"effect-501541f7-f7e7-4cd6-868c-4190fdad3ac9": {
2733
"type": "String",
2734
"metadata": {
2735
+ "displayName": "Effect for policy: A vulnerability assessment solution should be enabled on your virtual machines",
2736
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2737
},
2738
"allowedValues": [
2739
"AuditIfNotExists",
2743
},
2744
"effect-3ac7c827-eea2-4bde-acc7-9568cd320efa": {
2745
"type": "String",
2746
"metadata": {
2747
+ "displayName": "Effect for policy: Machines should have secret findings resolved",
2748
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2749
},
2750
"allowedValues": [
2751
"AuditIfNotExists",
2755
},
2756
"effect-090c7b07-b4ed-4561-ad20-e9075f3ccaff": {
2757
"type": "String",
2758
"metadata": {
2759
+ "displayName": "Effect for policy: Azure registry container images should have vulnerabilities resolved (powered by Microsoft Defender Vulnerability Management)",
2760
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2761
},
2762
"allowedValues": [
2763
"AuditIfNotExists",
2767
},
2768
"effect-1b7aa243-30e4-4c9e-bca8-d0d3022b634a": {
2769
"type": "String",
2770
"metadata": {
2771
+ "displayName": "Effect for policy: Vulnerability assessment should be enabled on SQL Managed Instance",
2772
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2773
},
2774
"allowedValues": [
2775
"AuditIfNotExists",
2779
},
2780
"effect-17f4b1cc-c55c-4d94-b1f9-2978f6ac2957": {
2781
"type": "String",
2782
"metadata": {
2783
+ "displayName": "Effect for policy: Azure running container images should have vulnerabilities resolved (powered by Microsoft Defender Vulnerability Management)",
2784
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2785
},
2786
"allowedValues": [
2787
"AuditIfNotExists",
2791
},
2792
"effect-6ba6d016-e7c3-4842-b8f2-4992ebc0d72d": {
2793
"type": "String",
2794
"metadata": {
2795
+ "displayName": "Effect for policy: SQL servers on machines should have vulnerability findings resolved",
2796
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2797
},
2798
"allowedValues": [
2799
"AuditIfNotExists",
2803
},
2804
"effect-ae89ebca-1c92-4898-ac2c-9f63decb045c": {
2805
"type": "String",
2806
"metadata": {
2807
+ "displayName": "Effect for policy: Guest Configuration extension should be installed on your machines",
2808
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2809
},
2810
"allowedValues": [
2811
"AuditIfNotExists",
2815
},
2816
"effect-adbe85b5-83e6-4350-ab58-bf3a4f736e5e": {
2817
"type": "String",
2818
"metadata": {
2819
+ "displayName": "Effect for policy: Microsoft Defender for Azure Cosmos DB should be enabled",
2820
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2821
},
2822
"allowedValues": [
2823
"AuditIfNotExists",
2827
},
2828
"effect-4f4f78b8-e367-4b10-a341-d9a4ad5cf1c7": {
2829
"type": "String",
2830
"metadata": {
2831
+ "displayName": "Effect for policy: Subscriptions should have a contact email address for security issues",
2832
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2833
},
2834
"allowedValues": [
2835
"AuditIfNotExists",
2988
},
2989
"effect-e068b215-0026-4354-b347-8fb2766f73a2": {
2990
"type": "String",
2991
"metadata": {
2992
+ "displayName": "Effect for policy: Windows machines should meet requirements for 'User Rights Assignment'",
2993
"description": "For more information about effects, visit https://aka.ms/policyeffects"
2994
},
2995
"allowedValues": [
2996
"AuditIfNotExists",
3000
},
3001
"effect-4da35fc9-c9e7-4960-aec9-797fe7d9051d": {
3002
"type": "String",
3003
"metadata": {
3004
+ "displayName": "Effect for policy: Azure Defender for servers should be enabled",
3005
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3006
},
3007
"allowedValues": [
3008
"AuditIfNotExists",
3012
},
3013
"effect-7fe3b40f-802b-4cdd-8bd4-fd799c948cc2": {
3014
"type": "String",
3015
"metadata": {
3016
+ "displayName": "Effect for policy: Azure Defender for Azure SQL Database servers should be enabled",
3017
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3018
},
3019
"allowedValues": [
3020
"AuditIfNotExists",
3024
},
3025
"effect-1f90fc71-a595-4066-8974-d4d0802e8ef0": {
3026
"type": "String",
3027
"metadata": {
3028
+ "displayName": "Effect for policy: Microsoft Defender CSPM should be enabled",
3029
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3030
},
3031
"allowedValues": [
3032
"AuditIfNotExists",
3036
},
3037
"effect-c3d20c29-b36d-48fe-808b-99a87530ad99": {
3038
"type": "String",
3039
"metadata": {
3040
+ "displayName": "Effect for policy: Azure Defender for Resource Manager should be enabled",
3041
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3042
},
3043
"allowedValues": [
3044
"AuditIfNotExists",
3048
},
3049
"effect-0ec47710-77ff-4a3d-9181-6aa50af424d0": {
3050
"type": "String",
3051
"metadata": {
3052
+ "displayName": "Effect for policy: Geo-redundant backup should be enabled for Azure Database for MariaDB",
3053
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3054
},
3055
"allowedValues": [
3056
"Audit",
3060
},
3061
"effect-0b60c0b2-2dc2-4e1c-b5c9-abbed971de53": {
3062
"type": "String",
3063
"metadata": {
3064
+ "displayName": "Effect for policy: Key vaults should have deletion protection enabled",
3065
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3066
},
3067
"allowedValues": [
3068
"Audit",
3073
},
3074
"effect-d38fc420-0735-4ef3-ac11-c806f651a570": {
3075
"type": "String",
3076
"metadata": {
3077
+ "displayName": "Effect for policy: Long-term geo-redundant backup should be enabled for Azure SQL Databases",
3078
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3079
},
3080
"allowedValues": [
3081
"AuditIfNotExists",
3085
},
3086
"effect-32e6bbec-16b6-44c2-be37-c5b672d103cf": {
3087
"type": "String",
3088
"metadata": {
3089
+ "displayName": "Effect for policy: Azure SQL Database should be running TLS version 1.2 or newer",
3090
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3091
},
3092
"allowedValues": [
3093
"Audit",
3098
},
3099
"effect-a8793640-60f7-487c-b5c3-1d37215905c4": {
3100
"type": "String",
3101
"metadata": {
3102
+ "displayName": "Effect for policy: SQL Managed Instance should have the minimal TLS version of 1.2",
3103
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3104
},
3105
"allowedValues": [
3106
"Audit",
3110
},
3111
"effect-013e242c-8828-4970-87b3-ab247555486d": {
3112
"type": "String",
3113
"metadata": {
3114
+ "displayName": "Effect for policy: Azure Backup should be enabled for Virtual Machines",
3115
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3116
},
3117
"allowedValues": [
3118
"AuditIfNotExists",
3122
},
3123
"effect-6b2122c1-8120-4ff5-801b-17625a355590": {
3124
"type": "String",
3125
"metadata": {
3126
+ "displayName": "Effect for policy: Azure Arc enabled Kubernetes clusters should have the Azure Policy extension installed",
3127
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3128
},
3129
"allowedValues": [
3130
"AuditIfNotExists",
3155
},
3156
"effect-95edb821-ddaf-4404-9732-666045e056b4": {
3157
"type": "String",
3158
"metadata": {
3159
+ "displayName": "Effect for policy: Kubernetes cluster should not allow privileged containers",
3160
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3161
},
3162
"allowedValues": [
3163
"Audit",
3214
},
3215
"effect-cb510bfd-1cba-4d9f-a230-cb0976f4bb71": {
3216
"type": "String",
3217
"metadata": {
3218
+ "displayName": "Effect for policy: App Service apps should have remote debugging turned off",
3219
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3220
},
3221
"allowedValues": [
3222
"AuditIfNotExists",
3226
},
3227
"effect-d26f7642-7545-4e18-9b75-8c9bbdee3a9a": {
3228
"type": "String",
3229
"metadata": {
3230
+ "displayName": "Effect for policy: Virtual machines' Guest Configuration extension should be deployed with system-assigned managed identity",
3231
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3232
},
3233
"allowedValues": [
3234
"AuditIfNotExists",
3238
},
3239
"effect-f85bf3e0-d513-442e-89c3-1784ad63382b": {
3240
"type": "String",
3241
"metadata": {
3242
+ "displayName": "Effect for policy: System updates should be installed on your machines (powered by Update Center)",
3243
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3244
},
3245
"allowedValues": [
3246
"AuditIfNotExists",
3250
},
3251
"effect-0da106f2-4ca3-48e8-bc85-c638fe6aea8f": {
3252
"type": "String",
3253
"metadata": {
3254
+ "displayName": "Effect for policy: Function apps should use managed identity",
3255
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3256
},
3257
"allowedValues": [
3258
"AuditIfNotExists",
3275
},
3276
"effect-bf16e0bb-31e1-4646-8202-60a235cc7e74": {
3277
"type": "String",
3278
"metadata": {
3279
+ "displayName": "Effect for policy: Audit Windows machines that do not have the password complexity setting enabled",
3280
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3281
},
3282
"allowedValues": [
3283
"AuditIfNotExists",
3287
},
3288
"effect-b4dec045-250a-48c2-b5cc-e0c4eec8b5b4": {
3289
"type": "String",
3290
"metadata": {
3291
+ "displayName": "Effect for policy: A Microsoft Entra administrator should be provisioned for PostgreSQL servers",
3292
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3293
},
3294
"allowedValues": [
3295
"AuditIfNotExists",
3336
},
3337
"effect-67e010c1-640d-438e-a3a5-feaccb533a98": {
3338
"type": "String",
3339
"metadata": {
3340
+ "displayName": "Effect for policy: Windows machines should meet requirements for 'Administrative Templates - Network'",
3341
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3342
},
3343
"allowedValues": [
3344
"AuditIfNotExists",
3348
},
3349
"effect-e345b6c3-24bd-4c93-9bbb-7e5e49a17b78": {
3350
"type": "String",
3351
"metadata": {
3352
+ "displayName": "Effect for policy: Azure VPN gateways should not use 'basic' SKU",
3353
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3354
},
3355
"allowedValues": [
3356
"Audit",
3360
},
3361
"effect-1c30f9cd-b84c-49cc-aa2c-9288447cc3b3": {
3362
"type": "String",
3363
"metadata": {
3364
+ "displayName": "Effect for policy: vTPM should be enabled on supported virtual machines",
3365
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3366
},
3367
"allowedValues": [
3368
"Audit",
3425
},
3426
"effect-f2143251-70de-4e81-87a8-36cee5a2f29d": {
3427
"type": "String",
3428
"metadata": {
3429
+ "displayName": "Effect for policy: Windows machines should meet requirements for 'Security Settings - Account Policies'",
3430
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3431
},
3432
"allowedValues": [
3433
"AuditIfNotExists",
3437
},
3438
"effect-19dd1db6-f442-49cf-a838-b0786b4401ef": {
3439
"type": "String",
3440
"metadata": {
3441
+ "displayName": "Effect for policy: App Service apps should have Client Certificates (Incoming client certificates) enabled",
3442
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3443
},
3444
"allowedValues": [
3445
"AuditIfNotExists",
3449
},
3450
"effect-81e74cea-30fd-40d5-802f-d72103c2aaaa": {
3451
"type": "String",
3452
"metadata": {
3453
+ "displayName": "Effect for policy: Azure Data Explorer encryption at rest should use a customer-managed key",
3454
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3455
},
3456
"allowedValues": [
3457
"Audit",
3462
},
3463
"effect-3dc5edcd-002d-444c-b216-e123bbfa37c0": {
3464
"type": "String",
3465
"metadata": {
3466
+ "displayName": "Effect for policy: Windows virtual machines should enable Azure Disk Encryption or EncryptionAtHost.",
3467
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3468
},
3469
"allowedValues": [
3470
"AuditIfNotExists",
3474
},
3475
"effect-18adea5e-f416-4d0f-8aa8-d24321e3e274": {
3476
"type": "String",
3477
"metadata": {
3478
+ "displayName": "Effect for policy: PostgreSQL servers should use customer-managed keys to encrypt data at rest",
3479
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3480
},
3481
"allowedValues": [
3482
"AuditIfNotExists",
3486
},
3487
"effect-f4b53539-8df9-40e4-86c6-6b607703bd4e": {
3488
"type": "String",
3489
"metadata": {
3490
+ "displayName": "Effect for policy: Disk encryption should be enabled on Azure Data Explorer",
3491
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3492
},
3493
"allowedValues": [
3494
"Audit",
3499
},
3500
"effect-0aa61e00-0a01-4a3c-9945-e93cffedf0e6": {
3501
"type": "String",
3502
"metadata": {
3503
+ "displayName": "Effect for policy: Azure Container Instance container group should use customer-managed key for encryption",
3504
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3505
},
3506
"allowedValues": [
3507
"Audit",
3531
},
3532
"effect-75c4f823-d65c-4f29-a733-01d0077fdbcb": {
3533
"type": "String",
3534
"metadata": {
3535
+ "displayName": "Effect for policy: Keys should be the specified cryptographic type RSA or EC",
3536
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3537
},
3538
"allowedValues": [
3539
"Audit",
3544
},
3545
"effect-56a5ee18-2ae6-4810-86f7-18e39ce5629b": {
3546
"type": "String",
3547
"metadata": {
3548
+ "displayName": "Effect for policy: Azure Automation accounts should use customer-managed keys to encrypt data at rest",
3549
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3550
},
3551
"allowedValues": [
3552
"Audit",
3565
},
3566
"effect-d461a302-a187-421a-89ac-84acdb4edc04": {
3567
"type": "String",
3568
"metadata": {
3569
+ "displayName": "Effect for policy: Managed disks should use a specific set of disk encryption sets for the customer-managed key encryption",
3570
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3571
},
3572
"allowedValues": [
3573
"Audit",
3578
},
3579
"effect-ca91455f-eace-4f96-be59-e6e2c35b4816": {
3580
"type": "String",
3581
"metadata": {
3582
+ "displayName": "Effect for policy: Managed disks should be double encrypted with both platform-managed and customer-managed keys",
3583
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3584
},
3585
"allowedValues": [
3586
"Audit",
3591
},
3592
"effect-87ba29ef-1ab3-4d82-b763-87fcd4f531f7": {
3593
"type": "String",
3594
"metadata": {
3595
+ "displayName": "Effect for policy: Azure Stream Analytics jobs should use customer-managed keys to encrypt data",
3596
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3597
},
3598
"allowedValues": [
3599
"Audit",
3604
},
3605
"effect-967a4b4b-2da9-43c1-b7d0-f98d0d74d0b1": {
3606
"type": "String",
3607
"metadata": {
3608
+ "displayName": "Effect for policy: App Configuration should use a customer-managed key",
3609
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3610
},
3611
"allowedValues": [
3612
"Audit",
3636
},
3637
"effect-ff25f3c8-b739-4538-9d07-3d6d25cfb255": {
3638
"type": "String",
3639
"metadata": {
3640
+ "displayName": "Effect for policy: Keys using elliptic curve cryptography should have the specified curve names",
3641
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3642
},
3643
"allowedValues": [
3644
"Audit",
3649
},
3650
"effect-ac01ad65-10e5-46df-bdd9-6b0cad13e1d2": {
3651
"type": "String",
3652
"metadata": {
3653
+ "displayName": "Effect for policy: SQL managed instances should use customer-managed keys to encrypt data at rest",
3654
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3655
},
3656
"allowedValues": [
3657
"Audit",
3662
},
3663
"effect-0a370ff3-6cab-4e85-8995-295fd854c5b8": {
3664
"type": "String",
3665
"metadata": {
3666
+ "displayName": "Effect for policy: SQL servers should use customer-managed keys to encrypt data at rest",
3667
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3668
},
3669
"allowedValues": [
3670
"Audit",
3675
},
3676
"effect-47031206-ce96-41f8-861b-6a915f3de284": {
3677
"type": "String",
3678
"metadata": {
3679
+ "displayName": "Effect for policy: IoT Hub device provisioning service data should be encrypted using customer-managed keys (CMK)",
3680
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3681
},
3682
"allowedValues": [
3683
"Audit",
3688
},
3689
"effect-46aa9b05-0e60-4eae-a88b-1e9d374fa515": {
3690
"type": "String",
3691
"metadata": {
3692
+ "displayName": "Effect for policy: Cognitive Services accounts should use customer owned storage",
3693
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3694
},
3695
"allowedValues": [
3696
"Audit",
3701
},
3702
"effect-bfecdea6-31c4-4045-ad42-71b9dc87247d": {
3703
"type": "String",
3704
"metadata": {
3705
+ "displayName": "Effect for policy: Storage account encryption scopes should use double encryption for data at rest",
3706
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3707
},
3708
"allowedValues": [
3709
"Audit",
3714
},
3715
"effect-98728c90-32c7-4049-8429-847dc0f4fe37": {
3716
"type": "String",
3717
"metadata": {
3718
+ "displayName": "Effect for policy: Key Vault secrets should have an expiration date",
3719
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3720
},
3721
"allowedValues": [
3722
"Audit",
3727
},
3728
"effect-152b15f7-8e1f-4c1f-ab71-8c010ba5dbc0": {
3729
"type": "String",
3730
"metadata": {
3731
+ "displayName": "Effect for policy: Key Vault keys should have an expiration date",
3732
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3733
},
3734
"allowedValues": [
3735
"Audit",
3747
},
3748
"effect-d8cf8476-a2ec-4916-896e-992351803c44": {
3749
"type": "String",
3750
"metadata": {
3751
+ "displayName": "Effect for policy: Keys should have a rotation policy ensuring that their rotation is scheduled within the specified number of days after creation.",
3752
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3753
},
3754
"allowedValues": [
3755
"Audit",
3759
},
3760
"effect-044985bb-afe1-42cd-8a36-9d5d42424537": {
3761
"type": "String",
3762
"metadata": {
3763
+ "displayName": "Effect for policy: Storage account keys should not be expired",
3764
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3765
},
3766
"allowedValues": [
3767
"Audit",
3772
},
3773
"effect-a1840de2-8088-4ea8-b153-b4c723e9cb01": {
3774
"type": "String",
3775
"metadata": {
3776
+ "displayName": "Effect for policy: Azure Kubernetes Service clusters should have Defender profile enabled",
3777
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3778
},
3779
"allowedValues": [
3780
"Audit",
3784
},
3785
"effect-9b597639-28e4-48eb-b506-56b05d366257": {
3786
"type": "String",
3787
"metadata": {
3788
+ "displayName": "Effect for policy: Microsoft IaaSAntimalware extension should be deployed on Windows servers",
3789
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3790
},
3791
"allowedValues": [
3792
"AuditIfNotExists",
3796
},
3797
"effect-abfb7388-5bf4-4ad7-ba99-2cd2f41cebb9": {
3798
"type": "String",
3799
"metadata": {
3800
+ "displayName": "Effect for policy: Azure Defender for SQL should be enabled for unprotected SQL Managed Instances",
3801
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3802
},
3803
"allowedValues": [
3804
"AuditIfNotExists",
3808
},
3809
"effect-b02aacc0-b073-424e-8298-42b22829ee0a": {
3810
"type": "String",
3811
"metadata": {
3812
+ "displayName": "Effect for policy: Activity log should be retained for at least one year",
3813
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3814
},
3815
"allowedValues": [
3816
"AuditIfNotExists",
3820
},
3821
"effect-ef2a8f2a-b3d9-49cd-a8a8-9a3aaaf647d9": {
3822
"type": "String",
3823
"metadata": {
3824
+ "displayName": "Effect for policy: Vulnerability assessment should be enabled on your SQL servers",
3825
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3826
},
3827
"allowedValues": [
3828
"AuditIfNotExists",
3832
},
3833
"effect-0049a6b3-a662-4f3e-8635-39cf44ace45a": {
3834
"type": "String",
3835
"metadata": {
3836
+ "displayName": "Effect for policy: Vulnerability assessment should be enabled on your Synapse workspaces",
3837
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3838
},
3839
"allowedValues": [
3840
"AuditIfNotExists",
3844
},
3845
"effect-c43e4a30-77cb-48ab-a4dd-93f175c63b57": {
3846
"type": "String",
3847
"metadata": {
3848
+ "displayName": "Effect for policy: Microsoft Antimalware for Azure should be configured to automatically update protection signatures",
3849
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3850
},
3851
"allowedValues": [
3852
"AuditIfNotExists",
3856
},
3857
"effect-fb893a29-21bb-418c-a157-e99480ec364c": {
3858
"type": "String",
3859
"metadata": {
3860
+ "displayName": "Effect for policy: Kubernetes Services should be upgraded to a non-vulnerable Kubernetes version",
3861
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3862
},
3863
"allowedValues": [
3864
"Audit",
3868
},
3869
"effect-bd876905-5b84-4f73-ab2d-2e7a7c4568d9": {
3870
"type": "String",
3871
"metadata": {
3872
+ "displayName": "Effect for policy: Machines should be configured to periodically check for missing system updates",
3873
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3874
},
3875
"allowedValues": [
3876
"Audit",
3909
},
3910
"effect-e2dd799a-a932-4e9d-ac17-d473bc3c6c10": {
3911
"type": "String",
3912
"metadata": {
3913
+ "displayName": "Effect for policy: Dependency agent should be enabled in virtual machine scale sets for listed virtual machine images",
3914
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3915
},
3916
"allowedValues": [
3917
"AuditIfNotExists",
3934
},
3935
"effect-ea53dbee-c6c9-4f0e-9f9e-de0039b78023": {
3936
"type": "String",
3937
"metadata": {
3938
+ "displayName": "Effect for policy: Audit Linux machines that allow remote connections from accounts without passwords",
3939
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3940
},
3941
"allowedValues": [
3942
"AuditIfNotExists",
3946
},
3947
"effect-a1817ec0-a368-432a-8057-8371e17ac6ee": {
3948
"type": "String",
3949
"metadata": {
3950
+ "displayName": "Effect for policy: All authorization rules except RootManageSharedAccessKey should be removed from Service Bus namespace",
3951
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3952
},
3953
"allowedValues": [
3954
"Audit",
3980
},
3981
"effect-423dd1ba-798e-40e4-9c4d-b6902674b423": {
3982
"type": "String",
3983
"metadata": {
3984
+ "displayName": "Effect for policy: Kubernetes clusters should disable automounting API credentials",
3985
"description": "For more information about effects, visit https://aka.ms/policyeffects"
3986
},
3987
"allowedValues": [
3988
"Audit",
4031
},
4032
"effect-8c6a50c6-9ffd-4ae7-986f-5fa6111f9a54": {
4033
"type": "String",
4034
"metadata": {
4035
+ "displayName": "Effect for policy: Storage accounts should prevent shared key access",
4036
"description": "For more information about effects, visit https://aka.ms/policyeffects"
4037
},
4038
"allowedValues": [
4039
"Audit",
4066
},
4067
"effect-f4826e5f-6a27-407c-ae3e-9582eb39891d": {
4068
"type": "String",
4069
"metadata": {
4070
+ "displayName": "Effect for policy: Authorization rules on the Event Hub instance should be defined",
4071
"description": "For more information about effects, visit https://aka.ms/policyeffects"
4072
},
4073
"allowedValues": [
4074
"AuditIfNotExists",
4078
},
4079
"effect-e96a9a5f-07ca-471b-9bc5-6a0f33cbd68f": {
4080
"type": "String",
4081
"metadata": {
4082
+ "displayName": "Effect for policy: Azure Machine Learning Computes should have local authentication methods disabled",
4083
"description": "For more information about effects, visit https://aka.ms/policyeffects"
4084
},
4085
"allowedValues": [
4086
"Audit",
4113
},
4114
"effect-4ceb8dc2-559c-478b-a15b-733fbf1e3738": {
4115
"type": "String",
4116
"metadata": {
4117
+ "displayName": "Effect for policy: Audit Windows machines that do not have the maximum password age set to specified number of days",
4118
"description": "For more information about effects, visit https://aka.ms/policyeffects"
4119
},
4120
"allowedValues": [
4121
"AuditIfNotExists",
4125
},
4126
"effect-8ac833bd-f505-48d5-887e-c993a1d3eea0": {
4127
"type": "String",
4128
"metadata": {
4129
+ "displayName": "Effect for policy: API endpoints in Azure API Management should be authenticated",
4130
"description": "For more information about effects, visit https://aka.ms/policyeffects"
4131
},
4132
"allowedValues": [
4133
"AuditIfNotExists",
4137
},
4138
"effect-e15effd4-2278-4c65-a0da-4d6f6d1890e2": {
4139
"type": "String",
4140
"metadata": {
4141
+ "displayName": "Effect for policy: Log Analytics Workspaces should block non-Azure Active Directory based ingestion.",
4142
"description": "For more information about effects, visit https://aka.ms/policyeffects"
4143
},
4144
"allowedValues": [
4145
"Deny",
4150
},
4151
"effect-fdccbe47-f3e3-4213-ad5d-ea459b2fa077": {
4152
"type": "String",
4153
"metadata": {
4154
+ "displayName": "Effect for policy: Public network access should be disabled for MariaDB servers",
4155
"description": "For more information about effects, visit https://aka.ms/policyeffects"
4156
},
4157
"allowedValues": [
4158
"Audit",
4163
},
4164
"effect-b52376f7-9612-48a1-81cd-1ffe4b61032c": {
4165
"type": "String",
4166
"metadata": {
4167
+ "displayName": "Effect for policy: Public network access should be disabled for PostgreSQL servers",
4168
"description": "For more information about effects, visit https://aka.ms/policyeffects"
4169
},
4170
"allowedValues": [
4171
"Audit",
4176
},
4177
"effect-d9844e8a-1437-4aeb-a32c-0c992f056095": {
4178
"type": "String",
4179
"metadata": {
4180
+ "displayName": "Effect for policy: Public network access should be disabled for MySQL servers",
4181
"description": "For more information about effects, visit https://aka.ms/policyeffects"
4182
},
4183
"allowedValues": [
4184
"Audit",
4189
},
4190
"effect-78215662-041e-49ed-a9dd-5385911b3a1f": {
4191
"type": "String",
4192
"metadata": {
4193
+ "displayName": "Effect for policy: Azure SQL Managed Instances should have Microsoft Entra-only authentication enabled during creation",
4194
"description": "For more information about effects, visit https://aka.ms/policyeffects"
4195
},
4196
"allowedValues": [
4197
"Audit",
4202
},
4203
"effect-5d4e3c65-4873-47be-94f3-6f8b953a3598": {
4204
"type": "String",
4205
"metadata": {
4206
+ "displayName": "Effect for policy: Azure Event Hub namespaces should have local authentication methods disabled",
4207
"description": "For more information about effects, visit https://aka.ms/policyeffects"
4208
},
4209
"allowedValues": [
4210
"Audit",
4223
},
4224
"effect-0a075868-4c26-42ef-914c-5bc007359560": {
4225
"type": "String",
4226
"metadata": {
4227
+ "displayName": "Effect for policy: Certificates should have the specified maximum validity period",
4228
"description": "For more information about effects, visit https://aka.ms/policyeffects"
4229
},
4230
"allowedValues": [
4231
"Audit",
4236
},
4237
"effect-12d4fa5e-1f9f-4c21-97a9-b99b3c6611b5": {
4238
"type": "String",
4239
"metadata": {
4240
+ "displayName": "Effect for policy: Azure Key Vault should use RBAC permission model",
4241
"description": "For more information about effects, visit https://aka.ms/policyeffects"
4242
},
4243
"allowedValues": [
4244
"Audit",
4249
},
4250
"effect-40e85574-ef33-47e8-a854-7a65c7500560": {
4251
"type": "String",
4252
"metadata": {
4253
+ "displayName": "Effect for policy: Azure MySQL flexible server should have Microsoft Entra Only Authentication enabled",
4254
"description": "For more information about effects, visit https://aka.ms/policyeffects"
4255
},
4256
"allowedValues": [
4257
"AuditIfNotExists",
4261
},
4262
"effect-fc26e2fd-3149-74b4-5988-d64bb90f8ef7": {
4263
"type": "String",
4264
"metadata": {
4265
+ "displayName": "Effect for policy: Separately store backup information",
4266
"description": "For more information about effects, visit https://aka.ms/policyeffects"
4267
},
4268
"allowedValues": [
4269
"Manual",
4273
},
4274
"effect-7bdb79ea-16b8-453e-4ca4-ad5b16012414": {
4275
"type": "String",
4276
"metadata": {
4277
+ "displayName": "Effect for policy: Transfer backup information to an alternate storage site",
4278
"description": "For more information about effects, visit https://aka.ms/policyeffects"
4279
},
4280
"allowedValues": [
4281
"Manual",
4301
},
4302
"effect-11ac78e3-31bc-4f0c-8434-37ab963cea07": {
4303
"type": "String",
4304
"metadata": {
4305
+ "displayName": "Effect for policy: Dependency agent should be enabled for listed virtual machine images",
4306
"description": "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Network security: LAN Manager authentication level",
description: "Specify which challenge-response authentication protocol is used for network logons. This choice affects the level of authentication protocol used by clients, the level of session security negotiated, and the level of authentication accepted by servers."
displayName: "Network security: Minimum session security for NTLM SSP based (including secure RPC) clients",
description: "Specifies which behaviors are allowed by clients for applications using the NTLM Security Support Provider (SSP). The SSP Interface (SSPI) is used by applications that need authentication services. See https://docs.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-servers for more information."
displayName: "Network security: Minimum session security for NTLM SSP based (including secure RPC) servers",
description: "Specifies which behaviors are allowed by servers for applications using the NTLM Security Support Provider (SSP). The SSP Interface (SSPI) is used by applications that need authentication services."
description: "Specifies which registry paths will be accessible over the network, regardless of the users or groups listed in the access control list (ACL) of the `winreg` registry key."
displayName: "Network access: Remotely accessible registry paths and sub-paths",
description: "Specifies which registry paths and sub-paths will be accessible over the network, regardless of the users or groups listed in the access control list (ACL) of the `winreg` registry key."
displayName: "Network access: Shares that can be accessed anonymously",
description: "Specifies which network shares can be accessed by anonymous users. The default configuration for this policy setting has little effect because all users have to be authenticated before they can access shared resources on the server."
description: "The source k8s object for constraint evaluation. 'Original' means only evaluate against the specific GroupVersionKind specified in the policy definition. 'Generated' means only evaluate against k8s objects generated by Gatekeeper ExpansionTemplates. 'All' means evaluate against both the original object and any generated ones."
description: "List of Kubernetes namespaces to exclude from policy evaluation. System namespaces "kube-system", "gatekeeper-system" and "azure-arc" are always excluded by design. "azure-extensions-usage-system" is optional to remove."
description: "List of Kubernetes namespaces to only include in policy evaluation. An empty list means the policy is applied to all resources in all namespaces."
description: "The list of InitContainers and Containers to exclude from policy evaluation. The identify is the name of container. Use an empty list to apply this policy to all containers in all namespaces."
description: "The list of InitContainers and Containers to exclude from policy evaluation. The identifier is the image of container. Prefix-matching can be signified with `*`. For example: `myregistry.azurecr.io/istio:*`. It is recommended that users use the fully-qualified Docker image name (e.g. start with a domain name) in order to avoid unexpectedly exempting images from an untrusted repository.",
description: "The source k8s object for constraint evaluation. 'Original' means only evaluate against the specific GroupVersionKind specified in the policy definition. 'Generated' means only evaluate against k8s objects generated by Gatekeeper ExpansionTemplates. 'All' means evaluate against both the original object and any generated ones."
description: "List of Kubernetes namespaces to exclude from policy evaluation. System namespaces "kube-system", "gatekeeper-system" and "azure-arc" are always excluded by design. "azure-extensions-usage-system" is optional to remove."
description: "List of Kubernetes namespaces to only include in policy evaluation. An empty list means the policy is applied to all resources in all namespaces."
description: "The list of InitContainers and Containers to exclude from policy evaluation. The identify is the name of container. Use an empty list to apply this policy to all containers in all namespaces."
description: "The list of InitContainers and Containers to exclude from policy evaluation. The identifier is the image of container. Prefix-matching can be signified with `*`. For example: `myregistry.azurecr.io/istio:*`. It is recommended that users use the fully-qualified Docker image name (e.g. start with a domain name) in order to avoid unexpectedly exempting images from an untrusted repository.",
description: "Resource Id of the virtual network. Example: /subscriptions/YourSubscriptionId/resourceGroups/YourResourceGroupName/providers/Microsoft.Network/virtualNetworks/Name"
displayName: "Windows Firewall (Domain): Use profile settings",
description: "Specifies whether Windows Firewall with Advanced Security uses the settings for the Domain profile to filter network traffic. If you select Off, Windows Firewall with Advanced Security will not use any of the firewall rules or connection security rules for this profile."
displayName: "Windows Firewall (Domain): Behavior for outbound connections",
description: "Specifies the behavior for outbound connections for the Domain profile that do not match an outbound firewall rule. The default value of 0 means to allow connections, and a value of 1 means to block connections."
displayName: "Windows Firewall (Domain): Apply local connection security rules",
description: "Specifies whether local administrators are allowed to create connection security rules that apply together with connection security rules configured by Group Policy for the Domain profile."
displayName: "Windows Firewall (Domain): Apply local firewall rules",
description: "Specifies whether local administrators are allowed to create local firewall rules that apply together with firewall rules configured by Group Policy for the Domain profile."
description: "Specifies whether Windows Firewall with Advanced Security displays notifications to the user when a program is blocked from receiving inbound connections, for the Domain profile."
displayName: "Windows Firewall (Private): Use profile settings",
description: "Specifies whether Windows Firewall with Advanced Security uses the settings for the Private profile to filter network traffic. If you select Off, Windows Firewall with Advanced Security will not use any of the firewall rules or connection security rules for this profile."
displayName: "Windows Firewall (Private): Behavior for outbound connections",
description: "Specifies the behavior for outbound connections for the Private profile that do not match an outbound firewall rule. The default value of 0 means to allow connections, and a value of 1 means to block connections."
displayName: "Windows Firewall (Private): Apply local connection security rules",
description: "Specifies whether local administrators are allowed to create connection security rules that apply together with connection security rules configured by Group Policy for the Private profile."
displayName: "Windows Firewall (Private): Apply local firewall rules",
description: "Specifies whether local administrators are allowed to create local firewall rules that apply together with firewall rules configured by Group Policy for the Private profile."
description: "Specifies whether Windows Firewall with Advanced Security displays notifications to the user when a program is blocked from receiving inbound connections, for the Private profile."
displayName: "Windows Firewall (Public): Use profile settings",
description: "Specifies whether Windows Firewall with Advanced Security uses the settings for the Public profile to filter network traffic. If you select Off, Windows Firewall with Advanced Security will not use any of the firewall rules or connection security rules for this profile."
displayName: "Windows Firewall (Public): Behavior for outbound connections",
description: "Specifies the behavior for outbound connections for the Public profile that do not match an outbound firewall rule. The default value of 0 means to allow connections, and a value of 1 means to block connections."
displayName: "Windows Firewall (Public): Apply local connection security rules",
description: "Specifies whether local administrators are allowed to create connection security rules that apply together with connection security rules configured by Group Policy for the Public profile."
displayName: "Windows Firewall (Public): Apply local firewall rules",
description: "Specifies whether local administrators are allowed to create local firewall rules that apply together with firewall rules configured by Group Policy for the Public profile."
description: "Specifies whether Windows Firewall with Advanced Security displays notifications to the user when a program is blocked from receiving inbound connections, for the Public profile."
description: "Specifies whether Windows Firewall with Advanced Security permits the local computer to receive unicast responses to its outgoing multicast or broadcast messages; for the Domain profile."
description: "Specifies whether Windows Firewall with Advanced Security permits the local computer to receive unicast responses to its outgoing multicast or broadcast messages; for the Private profile."
description: "Specifies whether Windows Firewall with Advanced Security permits the local computer to receive unicast responses to its outgoing multicast or broadcast messages; for the Public profile."
description: "The source k8s object for constraint evaluation. 'Original' means only evaluate against the specific GroupVersionKind specified in the policy definition. 'Generated' means only evaluate against k8s objects generated by Gatekeeper ExpansionTemplates. 'All' means evaluate against both the original object and any generated ones."
description: "List of Kubernetes namespaces to exclude from policy evaluation. System namespaces "kube-system", "gatekeeper-system" and "azure-arc" are always excluded by design. "azure-extensions-usage-system" is optional to remove."
description: "List of Kubernetes namespaces to only include in policy evaluation. An empty list means the policy is applied to all resources in all namespaces."
description: "The list of InitContainers and Containers to exclude from readonly evaluation. It will not exclude the disallowed host path. The identify is the name of container. Use an empty list to apply this policy to all containers in all namespaces."
description: "The list of InitContainers and Containers to exclude from policy evaluation. The identifier is the image of container. Prefix-matching can be signified with `*`. For example: `myregistry.azurecr.io/istio:*`. It is recommended that users use the fully-qualified Docker image name (e.g. start with a domain name) in order to avoid unexpectedly exempting images from an untrusted repository.",
description: "The source k8s object for constraint evaluation. 'Original' means only evaluate against the specific GroupVersionKind specified in the policy definition. 'Generated' means only evaluate against k8s objects generated by Gatekeeper ExpansionTemplates. 'All' means evaluate against both the original object and any generated ones."
description: "List of Kubernetes namespaces to exclude from policy evaluation. System namespaces "kube-system", "gatekeeper-system" and "azure-arc" are always excluded by design. "azure-extensions-usage-system" is optional to remove."
description: "List of Kubernetes namespaces to only include in policy evaluation. An empty list means the policy is applied to all resources in all namespaces."
description: "The resource ID of the virtual network subnet that should have a rule enabled. Example: /subscriptions/00000000-1111-2222-3333-444444444444/resourceGroups/Default/providers/Microsoft.Network/virtualNetworks/testvnet/subnets/testsubnet"
description: "The source k8s object for constraint evaluation. 'Original' means only evaluate against the specific GroupVersionKind specified in the policy definition. 'Generated' means only evaluate against k8s objects generated by Gatekeeper ExpansionTemplates. 'All' means evaluate against both the original object and any generated ones."
description: "List of Kubernetes namespaces to exclude from policy evaluation. System namespaces "kube-system", "gatekeeper-system" and "azure-arc" are always excluded by design. "azure-extensions-usage-system" is optional to remove."
description: "List of Kubernetes namespaces to only include in policy evaluation. An empty list means the policy is applied to all resources in all namespaces."
description: "The list of InitContainers and Containers to exclude from policy evaluation. The identifier is the image of container. Prefix-matching can be signified with `*`. For example: `myregistry.azurecr.io/istio:*`. It is recommended that users use the fully-qualified Docker image name (e.g. start with a domain name) in order to avoid unexpectedly exempting images from an untrusted repository.",
displayName: "Would you like to restrict specific IP addresses?",
description: "Select (Yes) to allow or forbid a list of IP addresses. If (No), the list of IP addresses won't have any effect in the policy enforcement"
description: "Specifies whether audit events are generated when changes are made to authentication policy. This setting is useful for tracking changes in domain-level and forest-level trust and privileges that are granted to user accounts or groups."
description: "Specifies whether audit events are generated for assignment and removal of user rights in user right policies, changes in security token object permission, resource attributes changes and Central Access Policy changes for file system objects."
description: "The source k8s object for constraint evaluation. 'Original' means only evaluate against the specific GroupVersionKind specified in the policy definition. 'Generated' means only evaluate against k8s objects generated by Gatekeeper ExpansionTemplates. 'All' means evaluate against both the original object and any generated ones."
description: "List of Kubernetes namespaces to exclude from policy evaluation. System namespaces "kube-system", "gatekeeper-system" and "azure-arc" are always excluded by design. "azure-extensions-usage-system" is optional to remove."
description: "List of Kubernetes namespaces to only include in policy evaluation. An empty list means the policy is applied to all resources in all namespaces."
description: "The list of AppArmor profiles that containers are allowed to use. E.g. [ "runtime/default", "docker/default" ]. Provide empty list as input to block everything.",
description: "The list of InitContainers and Containers to exclude from policy evaluation. The identify is the name of container. Use an empty list to apply this policy to all containers in all namespaces."
description: "The list of InitContainers and Containers to exclude from policy evaluation. The identifier is the image of container. Prefix-matching can be signified with `*`. For example: `myregistry.azurecr.io/istio:*`. It is recommended that users use the fully-qualified Docker image name (e.g. start with a domain name) in order to avoid unexpectedly exempting images from an untrusted repository.",
description: "A semicolon-separated list of certificate thumbprints that should exist under the Trusted Root certificate store (Cert:\LocalMachine\Root). e.g. THUMBPRINT1;THUMBPRINT2;THUMBPRINT3"
displayName: "[Deprecated]: Effect for policy: Log Analytics extension should be enabled in virtual machine scale sets for listed virtual machine images",
description: "For more information about effects, visit https://aka.ms/policyeffects",
displayName: "Effect for policy: Azure registry container images should have vulnerabilities resolved (powered by Microsoft Defender Vulnerability Management)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: Azure running container images should have vulnerabilities resolved (powered by Microsoft Defender Vulnerability Management)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Users or groups that may log on locally",
description: "Specifies which users or groups can interactively log on to the computer. Users who attempt to log on via Remote Desktop Connection or IIS also require this user right."
displayName: "Users and groups that may restore files and directories",
description: "Specifies which users and groups are permitted to bypass file, directory, registry, and other persistent object permissions when restoring backed up files and directories."
displayName: "Users and groups that may shut down the system",
description: "Specifies which users and groups who are logged on locally to the computers in your environment are permitted to shut down the operating system with the Shut Down command."
displayName: "Users or groups that may take ownership of files or other objects",
description: "Specifies which users and groups are permitted to take ownership of files, folders, registry keys, processes, or threads. This user right bypasses any permissions that are in place to protect objects to give ownership to the specified user."
description: "The source k8s object for constraint evaluation. 'Original' means only evaluate against the specific GroupVersionKind specified in the policy definition. 'Generated' means only evaluate against k8s objects generated by Gatekeeper ExpansionTemplates. 'All' means evaluate against both the original object and any generated ones."
description: "List of Kubernetes namespaces to exclude from policy evaluation. System namespaces "kube-system", "gatekeeper-system" and "azure-arc" are always excluded by design. "azure-extensions-usage-system" is optional to remove."
description: "List of Kubernetes namespaces to only include in policy evaluation. An empty list means the policy is applied to all resources in all namespaces."
description: "The list of InitContainers and Containers to exclude from policy evaluation. The identify is the name of container. Use an empty list to apply this policy to all containers in all namespaces."
description: "The list of InitContainers and Containers to exclude from policy evaluation. The identifier is the image of container. Prefix-matching can be signified with `*`. For example: `myregistry.azurecr.io/istio:*`. It is recommended that users use the fully-qualified Docker image name (e.g. start with a domain name) in order to avoid unexpectedly exempting images from an untrusted repository.",
displayName: "Allow simultaneous connections to the Internet or a Windows Domain",
description: "Specify whether to prevent computers from connecting to both a domain based network and a non-domain based network at the same time. A value of 0 allows simultaneous connections, and a value of 1 blocks them."
displayName: "Turn off multicast name resolution",
description: "Specifies whether LLMNR, a secondary name resolution protocol that transmits using multicast over a local subnet link on a single subnet, is enabled."
description: "Specifies limits on password reuse - how many times a new password must be created for a user account before the password can be repeated."
description: "Specifies the maximum number of days that may elapse before a user account password must be changed. The format of the value is two integers separated by a comma, denoting an inclusive range."
displayName: "Password must meet complexity requirements",
description: "Specifies whether a user account password must be complex. If required, a complex password must not contain part of user's account name or full name; be at least 6 characters long; contain a mix of uppercase, lowercase, number, and non-alphabetic characters."
displayName: "Effect for policy: Keys should have a rotation policy ensuring that their rotation is scheduled within the specified number of days after creation.",
description: "For more information about effects, visit https://aka.ms/policyeffects"
description: "The source k8s object for constraint evaluation. 'Original' means only evaluate against the specific GroupVersionKind specified in the policy definition. 'Generated' means only evaluate against k8s objects generated by Gatekeeper ExpansionTemplates. 'All' means evaluate against both the original object and any generated ones."
description: "The list of InitContainers and Containers to exclude from policy evaluation. The identifier is the image of container. Prefix-matching can be signified with `*`. For example: `myregistry.azurecr.io/istio:*`. It is recommended that users use the fully-qualified Docker image name (e.g. start with a domain name) in order to avoid unexpectedly exempting images from an untrusted repository.",
description: "List of Kubernetes namespaces to exclude from policy evaluation. System namespaces "kube-system", "gatekeeper-system" and "azure-arc" are always excluded by design. "azure-extensions-usage-system" is optional to remove."
description: "List of Kubernetes namespaces to only include in policy evaluation. An empty list means the policy is applied to all resources in all namespaces."
description: "The Maximum password age setting determines the period of time (in days) that a password can be used before the system requires the user to change it.",
description: "A semicolon-separated list of the names of the applications that should be installed. e.g. 'Microsoft SQL Server 2014 (64-bit); Microsoft Visual Studio Code' or 'Microsoft SQL Server 2014*' (to match any application starting with 'Microsoft SQL Server 2014')"