The impact of conflicting Azure Policies

Published 03-22-2021 02:59 AM 3,339 Views
Microsoft

Azure Policy lets you assess resources against certain criteria at different levels in your environment - from the top level management groups containing multiple subscriptions down to resource groups. So what happens if the policies at one level are different from the policies at another level in your environment hierarchy? Sonia explores some scenarios!

 

How Azure Policy assignments work

When you apply an Azure Policy at a certain level (known as assigning it to a scope), that assignment will be inherited by all the child resources under that scope. If I add a policy at the subscription level for example, all of the resources groups under that subscription will also be impacted by that policy. However, existing resources will not be modified by a Deny policy - they will be marked as non-compliant.

 

Azure Policy is an "explicit deny" system. This means that if any policy assignment in the hierarchy would deny a resource configuration, then it will be denied. To manage exceptions (say you want one resource group to be allowed resources of a larger size that aren't allowed anywhere else in the subscription), you can exclude the resource group from the policy that is denying those resource sizes (known as SKUs), and you can assign a different allowed sizes policy to that resource group.

 

Scenarios with the Allowed virtual machine SKUs policy

My test environment started with the following:

Subscription level: No policy assignments

Resource group level: Allowed virtual machine SKUs set to standard_dc2s, standard_dc2s_v2, standard_dc4s, standard_dc4s_v2, standard_dc8_v2 

VM in the resource group: Size Standard_DS1_v2

 

How can there be a VM in that resource group with a size that's not listed in the allowed VM SKUs policy?

The policy is set to Deny, so that tells me that the policy was assigned to the resource group AFTER the VM had been created. Azure Policy is showing that there are some non-compliant resources in this resource group. Assigning a deny policy won't modify existing resources, but it will show them as non-compliant. It will prevent existing resources from being resized to a SKU that's not listed, and it will prevent new resources from being created with a SKU that's not explicitly allowed.

 

So, what happens if I go and add an Azure Policy at the subscription level to allow the Standard_DS1_v2 SKU being used by that VM?

Once assigned and assessed, my VM is showing as compliant with the subscription-level policy but still non-compliant with the resource group level policy assignment.

 

Policy compliance and non-compliance at different assignment scopesPolicy compliance and non-compliance at different assignment scopes

 

What happens if I now add a completely new resource group?  

The new resource group will inherit the subscription level policy, which allows Standard_DS1_v2.

But if I then go and add an allow SKU policy at the resource group level, list Standard_D4s_v3 and try to create a new VM in that resource group with the D4s_v3 SKU - the creation of the VM will fail as it does not meet the more restrictive subscription-level policy.

 

Adding exclusions

If I really want to enable a resource group to allow a SKU that's not listed in the subscription level policy assignment, I can add the resource group to the exclusions at that subscription level. Then I can set a more permissive list of SKUs when I assign the policy at the resource group level. This will allow the creation of new resources that match the SKUS listed at the resource group level.

 

 

Exclude a resource group from an Azure Policy assignmentExclude a resource group from an Azure Policy assignment

 

If I have existing resources in a resource group that I want keep at that size, but I don't want any new resources to be created (or existing resources to be resized) to that SKU, I can exempt single resources from a policy assignment, at any level. This will prevent the resource from being evaluated against that policy. Exclusions are also useful if the resource is in a temporary state of non-compliance, or the policy condition is mitigated by some other method (for example, another vendor's security product). 

 

Scenario with the Allowed locations

My test environment is configured with:

Subscription level: Allowed location Australia East

Resource group level: Allowed location East US 2

 

If I try to add a VM to the resource group and set its location to East US 2, the creation will fail due to that location not being listed in the subscription level's policy assignment. Again, I'd need to add this resource group to the exclusion at the subscription level.

 

VM creation warning on location not meeting Azure Policy assignmentVM creation warning on location not meeting Azure Policy assignment

 

Triggering an Azure Policy compliance scan

Did you know that right in the Azure Portal you can trigger a compliance scan, using Cloud Shell (the first icon)?

Azure portal - CloudShellAzure portal - CloudShell 

There's a PowerShell command for this, but it can take a little while to run on larger environments. So we don't have to wait for it to finish before we get our CloudShell prompt back, we can run it as a job:

 

 

 

$job = Start-AzPolicyComplianceScan -AsJob

 

 

 

 And to check the progress, we run $job

AZPolicyComplianceScan job statusAZPolicyComplianceScan job status

 

Custom non-compliance messages

One of my favorite Azure Policy enhancements is the ability to add a custom message to be displayed when a resource change or creation is denied due to non-compliance against a policy assignment. You can use this to give more clarity to exactly which policy assignment is saying no (such as "Allowed SKUs in SVM-RG-09 are D series only") or to direct people to who to contact for more information or an exemption (such as "Email SKUPolicyOwner@yourcompany.com  for more info") 

 

Do you have any other scenarios?

These are just two little examples - do you have any other suggestions for scenarios where you may have a conflict with your Azure Policy assignments? Let us know if there's anything you'd like to model through or discuss.

 

Learn more:

Overview of Azure Policy

Azure Policy Evaluation Triggers

Understand Azure Policy effects

Evaluate the impact of a new Azure Policy definition

Azure Policy exemption structure

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

1 Comment

Nice informative article. Really helpful. Thanks.

%3CLINGO-SUB%20id%3D%22lingo-sub-2227063%22%20slang%3D%22en-US%22%3EThe%20impact%20of%20conflicting%20Azure%20Policies%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2227063%22%20slang%3D%22en-US%22%3E%3CP%3EAzure%20Policy%20lets%20you%20assess%20resources%20against%20certain%20criteria%20at%20different%20levels%20in%20your%20environment%20-%20from%20the%20top%20level%20management%20groups%20containing%20multiple%20subscriptions%20down%20to%20resource%20groups.%20So%20what%20happens%20if%20the%20policies%20at%20one%20level%20are%20different%20from%20the%20policies%20at%20another%20level%20in%20your%20environment%20hierarchy%3F%20Sonia%20explores%20some%20scenarios!%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--498277784%22%20id%3D%22toc-hId--498275889%22%20id%3D%22toc-hId--498277784%22%3EHow%20Azure%20Policy%20assignments%20work%3C%2FH2%3E%0A%3CP%3EWhen%20you%20apply%20an%20Azure%20Policy%20at%20a%20certain%20level%20(known%20as%20assigning%20it%20to%20a%20scope)%2C%20that%20assignment%20will%20be%20inherited%20by%20all%20the%20child%20resources%20under%20that%20scope.%20If%20I%20add%20a%20policy%20at%20the%20subscription%20level%20for%20example%2C%20all%20of%20the%20resources%20groups%20under%20that%20subscription%20will%20also%20be%20impacted%20by%20that%20policy.%20However%2C%20existing%20resources%20will%20not%20be%20modified%20by%20a%20Deny%20policy%20-%20they%20will%20be%20marked%20as%20non-compliant.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAzure%20Policy%20is%20an%20%22explicit%20deny%22%20system.%20This%20means%20that%20if%20any%20policy%20assignment%20in%20the%20hierarchy%20would%20deny%20a%20resource%20configuration%2C%20then%20it%20will%20be%20denied.%20To%20manage%20exceptions%20(say%20you%20want%20one%20resource%20group%20to%20be%20allowed%20resources%20of%20a%20larger%20size%20that%20aren't%20allowed%20anywhere%20else%20in%20the%20subscription)%2C%20you%20can%20exclude%20the%20resource%20group%20from%20the%20policy%20that%20is%20denying%20those%20resource%20sizes%20(known%20as%20SKUs)%2C%20and%20you%20can%20assign%20a%20different%20allowed%20sizes%20policy%20to%20that%20resource%20group.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-1989235049%22%20id%3D%22toc-hId-1989236944%22%20id%3D%22toc-hId-1989235049%22%3EScenarios%20with%20the%20Allowed%20virtual%20machine%20SKUs%20policy%3C%2FH2%3E%0A%3CP%3EMy%20test%20environment%20started%20with%20the%20following%3A%3C%2FP%3E%0A%3CP%3ESubscription%20level%3A%20No%20policy%20assignments%3C%2FP%3E%0A%3CP%3EResource%20group%20level%3A%20Allowed%20virtual%20machine%20SKUs%20set%20to%26nbsp%3Bstandard_dc2s%2C%20standard_dc2s_v2%2C%20standard_dc4s%2C%20standard_dc4s_v2%2C%20standard_dc8_v2%26nbsp%3B%3C%2FP%3E%0A%3CP%3EVM%20in%20the%20resource%20group%3A%20Size%20Standard_DS1_v2%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH3%20id%3D%22toc-hId--1615170773%22%20id%3D%22toc-hId--1615168878%22%20id%3D%22toc-hId--1615170773%22%3EHow%20can%20there%20be%20a%20VM%20in%20that%20resource%20group%20with%20a%20size%20that's%20not%20listed%20in%20the%20allowed%20VM%20SKUs%20policy%3F%3C%2FH3%3E%0A%3CP%3EThe%20policy%20is%20set%20to%20Deny%2C%20so%20that%20tells%20me%20that%20the%20policy%20was%20assigned%20to%20the%20resource%20group%20AFTER%20the%20VM%20had%20been%20created.%20Azure%20Policy%20is%20showing%20that%20there%20are%20some%20non-compliant%20resources%20in%20this%20resource%20group.%20Assigning%20a%20deny%20policy%20won't%20modify%20existing%20resources%2C%20but%20it%20will%20show%20them%20as%20non-compliant.%20It%20will%20prevent%20existing%20resources%20from%20being%20resized%20to%20a%20SKU%20that's%20not%20listed%2C%20and%20it%20will%20prevent%20new%20resources%20from%20being%20created%20with%20a%20SKU%20that's%20not%20explicitly%20allowed.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH3%20id%3D%22toc-hId-872342060%22%20id%3D%22toc-hId-872343955%22%20id%3D%22toc-hId-872342060%22%3ESo%2C%20what%20happens%20if%20I%20go%20and%20add%20an%20Azure%20Policy%20at%20the%20subscription%20level%20to%20allow%20the%20Standard_DS1_v2%20SKU%20being%20used%20by%20that%20VM%3F%3C%2FH3%3E%0A%3CP%3EOnce%20assigned%20and%20assessed%2C%20my%20VM%20is%20showing%20as%20compliant%20with%20the%20subscription-level%20policy%20but%20still%20non-compliant%20with%20the%20resource%20group%20level%20policy%20assignment.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Policy-RG-Sub-Compliance.PNG%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F265990iF524185499ED32C5%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Policy-RG-Sub-Compliance.PNG%22%20alt%3D%22Policy%20compliance%20and%20non-compliance%20at%20different%20assignment%20scopes%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EPolicy%20compliance%20and%20non-compliance%20at%20different%20assignment%20scopes%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CH3%20id%3D%22toc-hId--935112403%22%20id%3D%22toc-hId--935110508%22%20id%3D%22toc-hId--935112403%22%3E%26nbsp%3B%3C%2FH3%3E%0A%3CH3%20id%3D%22toc-hId-1552400430%22%20id%3D%22toc-hId-1552402325%22%20id%3D%22toc-hId-1552400430%22%3EWhat%20happens%20if%20I%20now%20add%20a%20completely%20new%20resource%20group%3F%26nbsp%3B%26nbsp%3B%3C%2FH3%3E%0A%3CP%3EThe%20new%20resource%20group%20will%20inherit%20the%20subscription%20level%20policy%2C%20which%20allows%20Standard_DS1_v2.%3C%2FP%3E%0A%3CP%3EBut%20if%20I%20then%20go%20and%20add%20an%20allow%20SKU%20policy%20at%20the%20resource%20group%20level%2C%20list%20Standard_D4s_v3%20and%20try%20to%20create%20a%20new%20VM%20in%20that%20resource%20group%20with%20the%20D4s_v3%20SKU%20-%20the%20creation%20of%20the%20VM%20will%20fail%20as%20it%20does%20not%20meet%20the%20more%20restrictive%20subscription-level%20policy.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH3%20id%3D%22toc-hId--255054033%22%20id%3D%22toc-hId--255052138%22%20id%3D%22toc-hId--255054033%22%3EAdding%20exclusions%3C%2FH3%3E%0A%3CP%3EIf%20I%20really%20want%20to%20enable%20a%20resource%20group%20to%20allow%20a%20SKU%20that's%20not%20listed%20in%20the%20subscription%20level%20policy%20assignment%2C%20I%20can%20add%20the%20resource%20group%20to%20the%20exclusions%20at%20that%20subscription%20level.%20Then%20I%20can%20set%20a%20more%20permissive%20list%20of%20SKUs%20when%20I%20assign%20the%20policy%20at%20the%20resource%20group%20level.%20This%20will%20allow%20the%20creation%20of%20new%20resources%20that%20match%20the%20SKUS%20listed%20at%20the%20resource%20group%20level.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Exclude-resource-group-azure-policy.PNG%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F265988i231EB7DA884E7BD7%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Exclude-resource-group-azure-policy.PNG%22%20alt%3D%22Exclude%20a%20resource%20group%20from%20an%20Azure%20Policy%20assignment%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EExclude%20a%20resource%20group%20from%20an%20Azure%20Policy%20assignment%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIf%20I%20have%20existing%20resources%20in%20a%20resource%20group%20that%20I%20want%20keep%20at%20that%20size%2C%20but%20I%20don't%20want%20any%20new%20resources%20to%20be%20created%20(or%20existing%20resources%20to%20be%20resized)%20to%20that%20SKU%2C%20I%20can%20exempt%20single%20resources%20from%20a%20policy%20assignment%2C%20at%20any%20level.%20This%20will%20prevent%20the%20resource%20from%20being%20evaluated%20against%20that%20policy.%20Exclusions%20are%20also%20useful%20if%20the%20resource%20is%20in%20a%20temporary%20state%20of%20non-compliance%2C%20or%20the%20policy%20condition%20is%20mitigated%20by%20some%20other%20method%20(for%20example%2C%20another%20vendor's%20security%20product).%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--265557137%22%20id%3D%22toc-hId--265555242%22%20id%3D%22toc-hId--265557137%22%3EScenario%20with%20the%20Allowed%20locations%3C%2FH2%3E%0A%3CP%3EMy%20test%20environment%20is%20configured%20with%3A%3C%2FP%3E%0A%3CP%3ESubscription%20level%3A%20Allowed%20location%20Australia%20East%3C%2FP%3E%0A%3CP%3EResource%20group%20level%3A%20Allowed%20location%20East%20US%202%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIf%20I%20try%20to%20add%20a%20VM%20to%20the%20resource%20group%20and%20set%20its%20location%20to%20East%20US%202%2C%20the%20creation%20will%20fail%20due%20to%20that%20location%20not%20being%20listed%20in%20the%20subscription%20level's%20policy%20assignment.%20Again%2C%20I'd%20need%20to%20add%20this%20resource%20group%20to%20the%20exclusion%20at%20the%20subscription%20level.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Policy-RG-Location-Denied.PNG%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F265989i57ABFA25C468BD0C%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Policy-RG-Location-Denied.PNG%22%20alt%3D%22VM%20creation%20warning%20on%20location%20not%20meeting%20Azure%20Policy%20assignment%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EVM%20creation%20warning%20on%20location%20not%20meeting%20Azure%20Policy%20assignment%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--2073011600%22%20id%3D%22toc-hId--2073009705%22%20id%3D%22toc-hId--2073011600%22%3ETriggering%20an%20Azure%20Policy%20compliance%20scan%3C%2FH2%3E%0A%3CP%3EDid%20you%20know%20that%20right%20in%20the%20Azure%20Portal%20you%20can%20trigger%20a%20compliance%20scan%2C%20using%20Cloud%20Shell%20(the%20first%20icon)%3F%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Cloud-Shell-icon.PNG%22%20style%3D%22width%3A%20516px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F265986i8BE2038CB26D9AD5%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Cloud-Shell-icon.PNG%22%20alt%3D%22Azure%20portal%20-%20CloudShell%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EAzure%20portal%20-%20CloudShell%3C%2FSPAN%3E%3C%2FSPAN%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThere's%20a%20PowerShell%20command%20for%20this%2C%20but%20it%20can%20take%20a%20little%20while%20to%20run%20on%20larger%20environments.%20So%20we%20don't%20have%20to%20wait%20for%20it%20to%20finish%20before%20we%20get%20our%20CloudShell%20prompt%20back%2C%20we%20can%20run%20it%20as%20a%20job%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CPRE%20class%3D%22lia-code-sample%20language-powershell%22%3E%3CCODE%3E%24job%20%3D%20Start-AzPolicyComplianceScan%20-AsJob%3C%2FCODE%3E%3C%2FPRE%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3BAnd%20to%20check%20the%20progress%2C%20we%20run%20%3CSTRONG%3E%24job%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Job-status-policy-compliance-scan-powershell.PNG%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F265987i38E897F188037F41%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Job-status-policy-compliance-scan-powershell.PNG%22%20alt%3D%22AZPolicyComplianceScan%20job%20status%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EAZPolicyComplianceScan%20job%20status%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-414501233%22%20id%3D%22toc-hId-414503128%22%20id%3D%22toc-hId-414501233%22%3ECustom%20non-compliance%20messages%3C%2FH2%3E%0A%3CP%20data-unlink%3D%22true%22%3EOne%20of%20my%20favorite%20Azure%20Policy%20enhancements%20is%20the%20ability%20to%20add%20a%20custom%20message%20to%20be%20displayed%20when%20a%20resource%20change%20or%20creation%20is%20denied%20due%20to%20non-compliance%20against%20a%20policy%20assignment.%20You%20can%20use%20this%20to%20give%20more%20clarity%20to%20exactly%20which%20policy%20assignment%20is%20saying%20no%20(such%20as%20%22Allowed%20SKUs%20in%20SVM-RG-09%20are%20D%20series%20only%22)%20or%20to%20direct%20people%20to%20who%20to%20contact%20for%20more%20information%20or%20an%20exemption%20(such%20as%20%22Email%20SKUPolicyOwner%40yourcompany.com%26nbsp%3B%26nbsp%3Bfor%20more%20info%22%3CA%20href%3D%22mailto%3Ahelpme%40yourcompany.com%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3E)%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-280816509%22%20id%3D%22toc-hId-280818404%22%20id%3D%22toc-hId-280816509%22%3EDo%20you%20have%20any%20other%20scenarios%3F%3C%2FH2%3E%0A%3CP%3EThese%20are%20just%20two%20little%20examples%20-%20do%20you%20have%20any%20other%20suggestions%20for%20scenarios%20where%20you%20may%20have%20a%20conflict%20with%20your%20Azure%20Policy%20assignments%3F%20Let%20us%20know%20if%20there's%20anything%20you'd%20like%20to%20model%20through%20or%20discuss.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--1526637954%22%20id%3D%22toc-hId--1526636059%22%20id%3D%22toc-hId--1526637954%22%3ELearn%20more%3A%3C%2FH2%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Fgovernance%2Fpolicy%2Foverview%3FWT.mc_id%3Dmodinfra-21296-socuff%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%22%3EOverview%20of%20Azure%20Policy%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Fgovernance%2Fpolicy%2Fhow-to%2Fget-compliance-data%3FWT.mc_id%3Dmodinfra-21296-socuff%23evaluation-triggers%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%22%3EAzure%20Policy%20Evaluation%20Triggers%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Fgovernance%2Fpolicy%2Fconcepts%2Feffects%3FWT.mc_id%3Dmodinfra-21296-socuff%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%22%3EUnderstand%20Azure%20Policy%20effects%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Fgovernance%2Fpolicy%2Fconcepts%2Fevaluate-impact%3FWT.mc_id%3Dmodinfra-21296-socuff%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%22%3EEvaluate%20the%20impact%20of%20a%20new%20Azure%20Policy%20definition%20%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Fgovernance%2Fpolicy%2Fconcepts%2Fexemption-structure%3FWT.mc_id%3Dmodinfra-21296-socuff%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%22%3EAzure%20Policy%20exemption%20structure%20%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-2227063%22%20slang%3D%22en-US%22%3E%3CP%3EIf%20you%20apply%20Azure%20Policy%20with%20different%20settings%20at%20different%20scopes%2C%20what%20is%20the%20result%3F%20Sonia%20explores%20some%20examples.%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22MSC16_slalom_004.jpg%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F265977iE40FA093FC2E916F%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22MSC16_slalom_004.jpg%22%20alt%3D%22MSC16_slalom_004.jpg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-2227063%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAzure%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ESonia%20Cuff%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2232666%22%20slang%3D%22en-US%22%3ERe%3A%20The%20impact%20of%20conflicting%20Azure%20Policies%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2232666%22%20slang%3D%22en-US%22%3E%3CP%3ENice%20informative%20article.%20Really%20helpful.%20Thanks.%3C%2FP%3E%3C%2FLINGO-BODY%3E
Co-Authors
Version history
Last update:
‎Mar 22 2021 02:59 AM
Updated by: