<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>Azure Governance and Management topics</title>
    <link>https://techcommunity.microsoft.com/t5/azure-governance-and-management/bd-p/AzureGovernance</link>
    <description>Azure Governance and Management topics</description>
    <pubDate>Thu, 23 Apr 2026 23:23:22 GMT</pubDate>
    <dc:creator>AzureGovernance</dc:creator>
    <dc:date>2026-04-23T23:23:22Z</dc:date>
    <item>
      <title>Misplacement of schema in AllowedHostPathVolumesInKubernetesClusterList Policy Parameter?</title>
      <link>https://techcommunity.microsoft.com/t5/azure-governance-and-management/misplacement-of-schema-in/m-p/4416565#M346</link>
      <description>&lt;P&gt;In the Microsoft Cloud Security Benchmark, the policy parameter `AllowedHostPathVolumesInKubernetesClusterList` defines a `schema` object nested under metadata. Is this placement intentional, or should the schema be defined at the top level of the parameter&lt;BR /&gt;&lt;BR /&gt;&lt;A class="lia-external-url" href="https://github.com/Azure/azure-policy/blob/303a0000a3b9d1aed7361c69edaafd4340d37df7/built-in-policies/policySetDefinitions/Azure%20Government/Security%20Center/AzureSecurityCenter.json#L4132" target="_blank"&gt;https://github.com/Azure/azure-policy/blob/303a0000a3b9d1aed7361c69edaafd4340d37df7/built-in-policies/policySetDefinitions/Azure%20Government/Security%20Center/AzureSecurityCenter.json#L4132&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 22 May 2025 14:25:34 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-governance-and-management/misplacement-of-schema-in/m-p/4416565#M346</guid>
      <dc:creator>arodindev</dc:creator>
      <dc:date>2025-05-22T14:25:34Z</dc:date>
    </item>
    <item>
      <title>Script or Query for Management Group Compliance Statistics</title>
      <link>https://techcommunity.microsoft.com/t5/azure-governance-and-management/script-or-query-for-management-group-compliance-statistics/m-p/4411591#M344</link>
      <description>&lt;P&gt;I've been trying to reproduce the Azure Portal Compliance statistics for a Management Group in a&lt;/P&gt;&lt;P&gt;&amp;nbsp;PowerShell script or Resource Graph query without much luck. What I'd like to do is reproduce the numbers like compliance percentage, number of compliant / non-compliant resources, in the portal display. And run a daily script or query to track the numbers over time. (Without doing screen shots every day.)&lt;/P&gt;&lt;P&gt;Just to be clear, I've attached a screenshot of a compliance screen for management group TEST1. I want to automate calculation of the Overall Resource Compliance (46%, 317 out of 692), and the policies/initiatives compliance state and resource compliance percentages at the bottom of the screen. I'm only interested in the resource compliance percentages below a threshold like 90% in order to help guide our remediation efforts.&amp;nbsp;&lt;/P&gt;&lt;img /&gt;&lt;P&gt;I've found several scripts and resource graph queries online but none seem to address management group scope. And even the ones that produce numbers for subscription scope don't seem to match the portal numbers.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Has anyone successfully reproduced the portal MG compliance numbers with a script or quiery? Or, is it possible to obtain the logic behind the portals' MG scope compliance code? Seems like we should be able to reproduce the numbers shown by the console.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Wed, 07 May 2025 15:37:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-governance-and-management/script-or-query-for-management-group-compliance-statistics/m-p/4411591#M344</guid>
      <dc:creator>gsutterfield</dc:creator>
      <dc:date>2025-05-07T15:37:00Z</dc:date>
    </item>
    <item>
      <title>Deleting an Immutable, vault-locking enabled Recovery Services Vault in Azure</title>
      <link>https://techcommunity.microsoft.com/t5/azure-governance-and-management/deleting-an-immutable-vault-locking-enabled-recovery-services/m-p/4408369#M342</link>
      <description>&lt;P&gt;Hey everyone, just wanted to share something I confirmed with Microsoft Support - could be useful if you're managing Recovery Services vaults with immutability and vault-locking enabled.&lt;/P&gt;&lt;P&gt;Once immutability and vault-lock are in place, the vault can't normally be deleted until all backup data has passed its retention period. It's meant to protect data and enforce policies.&lt;/P&gt;&lt;P&gt;However, if you have a special case where you really need to delete the vault early, you can submit a request through Microsoft Support.&lt;/P&gt;&lt;P&gt;You’ll need to open a support case.&lt;BR /&gt;Clearly explain the situation and why early deletion is needed (include vault details, customer consent, or strong justification).&lt;BR /&gt;Microsoft reviews these requests individually — it’s not guaranteed, but it's possible.&lt;/P&gt;&lt;P&gt;Also important: costs keep adding up as long as the vault exists. So if you think you might need help, reach out to Support early to avoid unexpected billing.&lt;/P&gt;&lt;P&gt;Hope this helps someone!&lt;/P&gt;</description>
      <pubDate>Sun, 27 Apr 2025 07:16:28 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-governance-and-management/deleting-an-immutable-vault-locking-enabled-recovery-services/m-p/4408369#M342</guid>
      <dc:creator>MathieuVandenHautte</dc:creator>
      <dc:date>2025-04-27T07:16:28Z</dc:date>
    </item>
    <item>
      <title>Restrict Cost Consumption by using Azure Automation, Budget and Policy</title>
      <link>https://techcommunity.microsoft.com/t5/azure-governance-and-management/restrict-cost-consumption-by-using-azure-automation-budget-and/m-p/4392810#M341</link>
      <description>&lt;H2&gt;&lt;U&gt;&lt;STRONG&gt;Video&lt;/STRONG&gt;&lt;/U&gt;&lt;/H2&gt;
&lt;P&gt;See the demo video by using below link&lt;/P&gt;
&lt;P&gt;&lt;A class="lia-external-url" href="https://youtu.be/C8m4ucdo9e4" target="_blank" rel="noopener"&gt;Demonstration Video&lt;/A&gt;&lt;/P&gt;
&lt;H2&gt;&lt;U&gt;&lt;STRONG&gt;Automation Runbook Logic&lt;/STRONG&gt;&lt;/U&gt;&lt;/H2&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;U&gt;&lt;STRONG&gt;Logic which set tag value once threshold exceeds&lt;/STRONG&gt;&lt;/U&gt;&lt;/H2&gt;
&lt;P&gt;#&amp;nbsp;Authenticate&amp;nbsp;using&amp;nbsp;Managed&amp;nbsp;Identity&amp;nbsp;(recommended&amp;nbsp;for&amp;nbsp;Automation&amp;nbsp;Accounts)&lt;/P&gt;
&lt;P&gt;Connect-AzAccount&amp;nbsp;-Identity&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;#&amp;nbsp;Define&amp;nbsp;Subscription&amp;nbsp;ID&amp;nbsp;and&amp;nbsp;Reset&amp;nbsp;Tag&lt;/P&gt;
&lt;P&gt;$subscriptionId&amp;nbsp;=&amp;nbsp;(Get-AzContext).Subscription.Id&lt;/P&gt;
&lt;P&gt;$tags = @{ "cost exceeded" = "yes" }&amp;nbsp;&amp;nbsp;# Resetting the tag value&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;#&amp;nbsp;Update&amp;nbsp;the&amp;nbsp;tag&lt;/P&gt;
&lt;P&gt;Update-AzTag&amp;nbsp;-ResourceId&amp;nbsp;"/subscriptions/$subscriptionId"&amp;nbsp;-Tag&amp;nbsp;$tags&amp;nbsp;-Operation&amp;nbsp;Merge&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Write-Output "Tag 'cost exceeded' reset to 'yes' for subscription $subscriptionId"&lt;/P&gt;
&lt;H2&gt;&lt;U&gt;&lt;STRONG&gt;Logic which reset tag value every month&lt;/STRONG&gt;&lt;/U&gt;&lt;/H2&gt;
&lt;P&gt;#&amp;nbsp;Authenticate&amp;nbsp;using&amp;nbsp;Managed&amp;nbsp;Identity&amp;nbsp;(recommended&amp;nbsp;for&amp;nbsp;Automation&amp;nbsp;Accounts)&lt;/P&gt;
&lt;P&gt;Connect-AzAccount&amp;nbsp;-Identity&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;#&amp;nbsp;Define&amp;nbsp;Subscription&amp;nbsp;ID&amp;nbsp;and&amp;nbsp;Reset&amp;nbsp;Tag&lt;/P&gt;
&lt;P&gt;$subscriptionId&amp;nbsp;=&amp;nbsp;(Get-AzContext).Subscription.Id&lt;/P&gt;
&lt;P&gt;$tags&amp;nbsp;=&amp;nbsp;@{&amp;nbsp;"cost&amp;nbsp;exceeded"&amp;nbsp;=&amp;nbsp;"no"&amp;nbsp;}&amp;nbsp;&amp;nbsp;#&amp;nbsp;Resetting&amp;nbsp;the&amp;nbsp;tag&amp;nbsp;value&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;#&amp;nbsp;Update&amp;nbsp;the&amp;nbsp;tag&lt;/P&gt;
&lt;P&gt;Update-AzTag&amp;nbsp;-ResourceId&amp;nbsp;"/subscriptions/$subscriptionId"&amp;nbsp;-Tag&amp;nbsp;$tags&amp;nbsp;-Operation&amp;nbsp;Merge&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Write-Output "Tag 'cost exceeded' reset to 'no' for subscription $subscriptionId"&lt;/P&gt;
&lt;H2&gt;&lt;U&gt;&lt;STRONG&gt;Azure Policy Logic&lt;/STRONG&gt;&lt;/U&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;{&lt;/P&gt;
&lt;P&gt;&amp;nbsp; "properties": {&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; "displayName": "budget",&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; "policyType": "Custom",&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; "mode": "All",&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; "metadata": {&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; "version": "1.0.0",&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; "createdBy": "f6bb4303-e52d-4cba-9790-01f0798164b7",&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; "createdOn": "2025-03-13T05:08:05.8483517Z",&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; "updatedBy": "f6bb4303-e52d-4cba-9790-01f0798164b7",&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; "updatedOn": "2025-03-13T06:32:35.1740944Z"&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; },&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; "version": "1.0.0",&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; "parameters": {},&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; "policyRule": {&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; "if": {&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; "allOf": [&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; {&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; "field": "type",&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; "notEquals": "Microsoft.Resources/subscriptions"&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; },&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; {&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; "value": "[subscription().tags['cost exceeded']]",&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; "equals": "yes"&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; }&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; ]&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; },&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; "then": {&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; "effect": "Deny"&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; }&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; },&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; "versions": [&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; "1.0.0"&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; ]&lt;/P&gt;
&lt;P&gt;&amp;nbsp; },&lt;/P&gt;
&lt;P&gt;&amp;nbsp; }&lt;/P&gt;</description>
      <pubDate>Thu, 13 Mar 2025 10:43:52 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-governance-and-management/restrict-cost-consumption-by-using-azure-automation-budget-and/m-p/4392810#M341</guid>
      <dc:creator>Aaida_Aboobakkar</dc:creator>
      <dc:date>2025-03-13T10:43:52Z</dc:date>
    </item>
    <item>
      <title>Azure Policy require multiple tags with values</title>
      <link>https://techcommunity.microsoft.com/t5/azure-governance-and-management/azure-policy-require-multiple-tags-with-values/m-p/4267623#M337</link>
      <description>&lt;P&gt;I have a policy that requires specific tag with specific values (json below), but I want to require more tags within the same policy also with specific value and not sure how to do it...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there a way to add more tags with specific values to the same policy?&lt;/P&gt;&lt;P&gt;For example, I want to require two tags:&lt;/P&gt;&lt;P&gt;environment with prod/non-prod and department with Infra/Finance&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is it possible?&lt;/P&gt;&lt;P&gt;Thank you!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;{&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN&gt;"properties"&lt;/SPAN&gt;&lt;SPAN&gt;: {&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;SPAN&gt;"displayName"&lt;/SPAN&gt;&lt;SPAN&gt;: &lt;/SPAN&gt;&lt;SPAN&gt;"Require tag environment and its values on resources "&lt;/SPAN&gt;&lt;SPAN&gt;,&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;SPAN&gt;"policyType"&lt;/SPAN&gt;&lt;SPAN&gt;: &lt;/SPAN&gt;&lt;SPAN&gt;"Custom"&lt;/SPAN&gt;&lt;SPAN&gt;,&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;SPAN&gt;"mode"&lt;/SPAN&gt;&lt;SPAN&gt;: &lt;/SPAN&gt;&lt;SPAN&gt;"Indexed"&lt;/SPAN&gt;&lt;SPAN&gt;,&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;SPAN&gt;"description"&lt;/SPAN&gt;&lt;SPAN&gt;: &lt;/SPAN&gt;&lt;SPAN&gt;"Enforces a required tag environment and its value. Does not apply to resource groups."&lt;/SPAN&gt;&lt;SPAN&gt;,&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;SPAN&gt;"metadata"&lt;/SPAN&gt;&lt;SPAN&gt;: {&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;SPAN&gt;"category"&lt;/SPAN&gt;&lt;SPAN&gt;: &lt;/SPAN&gt;&lt;SPAN&gt;"Tags"&lt;/SPAN&gt;&lt;SPAN&gt;,&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;SPAN&gt;"createdBy"&lt;/SPAN&gt;&lt;SPAN&gt;: ""&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;SPAN&gt;"createdOn"&lt;/SPAN&gt;&lt;SPAN&gt;: ""&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;SPAN&gt;"updatedBy"&lt;/SPAN&gt;&lt;SPAN&gt;: ""&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;SPAN&gt;"updatedOn"&lt;/SPAN&gt;&lt;SPAN&gt;: ""&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; },&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;SPAN&gt;"version"&lt;/SPAN&gt;&lt;SPAN&gt;: &lt;/SPAN&gt;&lt;SPAN&gt;"1.0.0"&lt;/SPAN&gt;&lt;SPAN&gt;,&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;SPAN&gt;"parameters"&lt;/SPAN&gt;&lt;SPAN&gt;: {&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;SPAN&gt;"tagName"&lt;/SPAN&gt;&lt;SPAN&gt;: {&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;SPAN&gt;"type"&lt;/SPAN&gt;&lt;SPAN&gt;: &lt;/SPAN&gt;&lt;SPAN&gt;"String"&lt;/SPAN&gt;&lt;SPAN&gt;,&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;SPAN&gt;"metadata"&lt;/SPAN&gt;&lt;SPAN&gt;: {&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;SPAN&gt;"displayName"&lt;/SPAN&gt;&lt;SPAN&gt;: &lt;/SPAN&gt;&lt;SPAN&gt;"Tag Name1"&lt;/SPAN&gt;&lt;SPAN&gt;,&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;SPAN&gt;"description"&lt;/SPAN&gt;&lt;SPAN&gt;: &lt;/SPAN&gt;&lt;SPAN&gt;"Name of the tag, such as 'environment'"&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; },&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;SPAN&gt;"allowedValues"&lt;/SPAN&gt;&lt;SPAN&gt;: [&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;SPAN&gt;"environment"&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; ]&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; },&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;SPAN&gt;"tagValue"&lt;/SPAN&gt;&lt;SPAN&gt;: {&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;SPAN&gt;"type"&lt;/SPAN&gt;&lt;SPAN&gt;: &lt;/SPAN&gt;&lt;SPAN&gt;"Array"&lt;/SPAN&gt;&lt;SPAN&gt;,&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;SPAN&gt;"metadata"&lt;/SPAN&gt;&lt;SPAN&gt;: {&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;SPAN&gt;"displayName"&lt;/SPAN&gt;&lt;SPAN&gt;: &lt;/SPAN&gt;&lt;SPAN&gt;"Tag Value1"&lt;/SPAN&gt;&lt;SPAN&gt;,&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;SPAN&gt;"description"&lt;/SPAN&gt;&lt;SPAN&gt;: &lt;/SPAN&gt;&lt;SPAN&gt;"Value of the tag, such as 'production'"&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; },&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;SPAN&gt;"allowedValues"&lt;/SPAN&gt;&lt;SPAN&gt;: [&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;SPAN&gt;"prod"&lt;/SPAN&gt;&lt;SPAN&gt;,&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;SPAN&gt;"non-prod"&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; ]&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; }&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; },&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;SPAN&gt;"policyRule"&lt;/SPAN&gt;&lt;SPAN&gt;: {&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;SPAN&gt;"if"&lt;/SPAN&gt;&lt;SPAN&gt;: {&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;SPAN&gt;"not"&lt;/SPAN&gt;&lt;SPAN&gt;: {&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;SPAN&gt;"field"&lt;/SPAN&gt;&lt;SPAN&gt;: &lt;/SPAN&gt;&lt;SPAN&gt;"[concat('tags[', parameters('tagName'), ']')]"&lt;/SPAN&gt;&lt;SPAN&gt;,&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;SPAN&gt;"in"&lt;/SPAN&gt;&lt;SPAN&gt;: &lt;/SPAN&gt;&lt;SPAN&gt;"[parameters('tagValue')]"&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; }&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; },&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;SPAN&gt;"then"&lt;/SPAN&gt;&lt;SPAN&gt;: {&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;SPAN&gt;"effect"&lt;/SPAN&gt;&lt;SPAN&gt;: &lt;/SPAN&gt;&lt;SPAN&gt;"deny"&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; }&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; },&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;SPAN&gt;"versions"&lt;/SPAN&gt;&lt;SPAN&gt;: [&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;SPAN&gt;"1.0.0"&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; ]&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp; },&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp; }&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;}&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Thu, 10 Oct 2024 15:32:39 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-governance-and-management/azure-policy-require-multiple-tags-with-values/m-p/4267623#M337</guid>
      <dc:creator>Oleg_A</dc:creator>
      <dc:date>2024-10-10T15:32:39Z</dc:date>
    </item>
    <item>
      <title>Azure Resource Graph query to get subscription properties</title>
      <link>https://techcommunity.microsoft.com/t5/azure-governance-and-management/azure-resource-graph-query-to-get-subscription-properties/m-p/4258043#M334</link>
      <description>&lt;P&gt;I am very new to ARG queries. I am struggling to figure out how to get a list of our Azure Subscriptions using ARG, &lt;STRONG&gt;&lt;EM&gt;including some of the properties you see on the properties pane when using the azure portal&lt;/EM&gt;&lt;/STRONG&gt;. In particular, I want the property visually labelled "ACCOUNT ADMIN".&lt;BR /&gt;Can anyone point me in the right direction?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;resourcecontainers&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;|&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;where&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;type&amp;nbsp;==&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;'microsoft.resources/subscriptions'&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;|&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;project&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;subscriptionId&lt;/SPAN&gt;&lt;SPAN&gt;,&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;name&lt;/SPAN&gt;&lt;SPAN&gt;,&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;owner&amp;nbsp;=&amp;nbsp;&lt;/SPAN&gt;&lt;FONT color="#DF0000"&gt;&lt;SPAN&gt;???&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Mon, 30 Sep 2024 00:56:17 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-governance-and-management/azure-resource-graph-query-to-get-subscription-properties/m-p/4258043#M334</guid>
      <dc:creator>NotSoNewOzzie</dc:creator>
      <dc:date>2024-09-30T00:56:17Z</dc:date>
    </item>
    <item>
      <title>azure cosmos db for mongo db cluster</title>
      <link>https://techcommunity.microsoft.com/t5/azure-governance-and-management/azure-cosmos-db-for-mongo-db-cluster/m-p/4214027#M327</link>
      <description>&lt;P&gt;Team,&lt;/P&gt;&lt;P&gt;has any one enforced a azure policy to restrict public access along with firewall rule. As Microsoft has not given any build in policy for this new resource type.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Aug 2024 10:59:26 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-governance-and-management/azure-cosmos-db-for-mongo-db-cluster/m-p/4214027#M327</guid>
      <dc:creator>DurgeshS1910</dc:creator>
      <dc:date>2024-08-08T10:59:26Z</dc:date>
    </item>
    <item>
      <title>Azure Inherited roles, but still access denied</title>
      <link>https://techcommunity.microsoft.com/t5/azure-governance-and-management/azure-inherited-roles-but-still-access-denied/m-p/4205139#M326</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In e.g. Key Vault, when looking for the Access Control I can see that user account have custom contributor role inherited from the subscription level. When looking for the role more deeply it shows:&lt;/P&gt;&lt;P&gt;"&lt;EM&gt;Showing 500 of 15937 permissions View all (will take a moment to load)&lt;/EM&gt;"&lt;/P&gt;&lt;P&gt;E.g. having the following permissions: Read Secret Properties and Write Secret. So all should be kind of okay..? &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But when I'm looking for the e.g. secrets in the key vault, it gives me back "&lt;FONT color="#CF3600"&gt;&lt;EM&gt;The operation is not allowed by RBAC.&lt;/EM&gt;&lt;/FONT&gt;" and "&lt;FONT color="#CF3600"&gt;&lt;EM&gt;You are unauthorized to view these contents.&lt;/EM&gt;&lt;/FONT&gt;". I thought there could be a "deny" rules, but nothing in there either.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What could be the trick on here? What might be blocking or missing the access to the resources.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Btw, I just tested, I was able to create the Key Vault by myself.&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jul 2024 14:51:17 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-governance-and-management/azure-inherited-roles-but-still-access-denied/m-p/4205139#M326</guid>
      <dc:creator>Petri-X</dc:creator>
      <dc:date>2024-07-30T14:51:17Z</dc:date>
    </item>
    <item>
      <title>How to get Policy "Windows VMs should enable ADE or EncryptionAtHost." to be compliant?</title>
      <link>https://techcommunity.microsoft.com/t5/azure-governance-and-management/how-to-get-policy-quot-windows-vms-should-enable-ade-or/m-p/4161535#M322</link>
      <description>&lt;P&gt;Advisor noticed that Azure Disk Encryption is missing on my VMs and gave me the following recommendation: "Windows virtual machines should enable Azure Disk Encryption or EncryptionAtHost."&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A couple of weeks ago I installed the AzurePolicyforWindows extension on one of the machines. Its status changed to compliant.&lt;/P&gt;&lt;P&gt;Two days ago, I did the same for all other VMs but their statuses haven't changed.&lt;/P&gt;&lt;P&gt;Am I missing something or are the policies messing with me?&lt;/P&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;&lt;P&gt;&lt;img /&gt;&lt;img /&gt;&lt;/P&gt;&lt;DIV class=""&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Thu, 06 Jun 2024 12:18:56 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-governance-and-management/how-to-get-policy-quot-windows-vms-should-enable-ade-or/m-p/4161535#M322</guid>
      <dc:creator>AzureToujours</dc:creator>
      <dc:date>2024-06-06T12:18:56Z</dc:date>
    </item>
    <item>
      <title>Microsoft Cloud Security Benchmark policies not reporting in Defender for Cloud</title>
      <link>https://techcommunity.microsoft.com/t5/azure-governance-and-management/microsoft-cloud-security-benchmark-policies-not-reporting-in/m-p/4113018#M321</link>
      <description>&lt;P&gt;We enable the MCSB security policy at our tenant level and manage compliance via Defender for Cloud. However, I have found that some of the policies are listed are not showing in the Defender for Cloud recommendations.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For example, the policy "Azure SQL Managed Instance should have Microsoft Entra-only authentication enabled" is visible via Defender for Cloud&amp;gt;Environment Settings&amp;gt;Security Policies&amp;gt;MCSB and is linked to Policy Id&amp;nbsp;0c28c3fb-c244-42d5-a9bf-f35f2999577b. Within Azure Policy Compliance, I can find the policy in the assignment for MCSB and it reports both compliant and non-compliant resources in my tenant.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;However, there is nothing reported in Defender for Cloud for the policy under the Recommendations&amp;gt;All Recommendations.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I have checked the filters applied and know it should be there - the similar policy is showing correctly (named "Azure SQL Managed Instance authentication mode should be Azure Active Directory Only" in the recommendation and security policies, and named "Azure SQL Managed Instances should have Microsoft Entra-only authentication enabled during creation" in Azure Policy -&amp;nbsp;78215662-041e-49ed-a9dd-5385911b3a1f).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Any suggestions on what could be causing this behaviour ?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Regards&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Dominic&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Apr 2024 14:28:34 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-governance-and-management/microsoft-cloud-security-benchmark-policies-not-reporting-in/m-p/4113018#M321</guid>
      <dc:creator>Dominic_Sch</dc:creator>
      <dc:date>2024-04-12T14:28:34Z</dc:date>
    </item>
    <item>
      <title>Microsoft's inconsistent implementation of tagging in Azure</title>
      <link>https://techcommunity.microsoft.com/t5/azure-governance-and-management/microsoft-s-inconsistent-implementation-of-tagging-in-azure/m-p/4104493#M319</link>
      <description>&lt;P&gt;&lt;SPAN&gt;We revamped our Azure resource tagging strategy several years ago and rely on them heavily for&amp;nbsp;&lt;STRONG&gt;#Governance&lt;/STRONG&gt;&amp;nbsp;and&amp;nbsp;&lt;STRONG&gt;#FinOps&lt;/STRONG&gt;.&amp;nbsp; We not only enforce&amp;nbsp;&lt;STRONG&gt;#tags&lt;/STRONG&gt;&amp;nbsp;via&amp;nbsp;&lt;STRONG&gt;#AzurePolicy&lt;/STRONG&gt;, we also enforce tag values based on a set of permissible values for each tag.&amp;nbsp; Even with that in place we experience some drift due to exclusions required in the policy definition or exemptions in the policy assignments.&amp;nbsp; I won't get into why this flexibility is needed here, that's a whole separate discussion.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Establishing a sound&amp;nbsp;&lt;U&gt;tag hygiene&lt;/U&gt;&amp;nbsp;process becomes a vital component of your overall&amp;nbsp;&lt;U&gt;governance and FinOps strategies&lt;/U&gt;.&amp;nbsp;&amp;nbsp;One method we employ for tag hygiene is to surface the non-compliant resources in a&amp;nbsp;&lt;STRONG&gt;#PowerBi&lt;/STRONG&gt;&amp;nbsp;report using an&lt;STRONG&gt;&amp;nbsp;#AzureResourceGraph&lt;/STRONG&gt;&amp;nbsp;(ARG) query.&amp;nbsp; Yes, you can do this in the Compliance section of Azure Policy as well however it lacks ease of use.&amp;nbsp; For example, flipping back and forth between policies, filtering by subscriptions, surfacing other linked metadata is a cumbersome experience in the Azure Policy blade.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Now onto my frustrations with how Microsoft has implemented tagging across Azure.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;1. Inconsistent application of Tag case-sensitivity across tools&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;- In Azure Policy and in the Azure portal, tag names are&amp;nbsp;&lt;U&gt;case-insensitive&lt;/U&gt;&amp;nbsp;whereas tag values are&amp;nbsp;&lt;U&gt;case-sensitive&lt;/U&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;- In Azure Resource Graph Explorer, both tag names and tag values are&amp;nbsp;&lt;U&gt;case-sensitive&lt;/U&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;- Why is there inconsistency with case-sensitivity of tag names?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;2. Inconsistent Tag validation across Resource Types&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;- When deploying a Storage Account, Azure&amp;nbsp;&lt;U&gt;validates my tag policy before&lt;/U&gt;&amp;nbsp;I am able to hit the create button (before it's submitted to ARM) whereas when deploying a resource like a Public IP Address, that&amp;nbsp;&lt;U&gt;validation only occurs after&lt;/U&gt;&amp;nbsp;you hit the create button.&amp;nbsp; This likely happens with other resource types as well.&amp;nbsp; By the way, my tagging policy specifies "Indexed" for mode, so in effect it should apply to any and all resources that support tagging in Azure.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;- Why is does the evaluation of the tag policy differ based on the resource being deployed?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;3. Inconsistent Tag UX across Resource Types&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;- When deploying a Storage Account, the tags input is&amp;nbsp;&lt;U&gt;a drop-down list&lt;/U&gt;.&amp;nbsp; However, when deploying an Azure Virtual Machine, the tags input is&amp;nbsp;&lt;U&gt;a textbox&lt;/U&gt;.&amp;nbsp; Although the latter makes use of predictive text, it's still clearly a different experience.&amp;nbsp; This inconsistency is found across multiple Azure resources.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;- Why is the tag UX different between resource types?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I realize some of this is addressed or is less of a concern when using IaC but that may not be for everyone, or work in all scenarios.&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;It would be great if Microsoft could standardize their implementation of tagging resources uniformly across the entire Azure estate.&amp;nbsp; In my opinion I don't think that's a huge ask.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Apr 2024 16:07:12 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-governance-and-management/microsoft-s-inconsistent-implementation-of-tagging-in-azure/m-p/4104493#M319</guid>
      <dc:creator>Adeelaziz</dc:creator>
      <dc:date>2024-04-03T16:07:12Z</dc:date>
    </item>
    <item>
      <title>Confused on the dispaly after &amp;quot;add lock&amp;quot; on storage</title>
      <link>https://techcommunity.microsoft.com/t5/azure-governance-and-management/confused-on-the-dispaly-after-amp-quot-add-lock-amp-quot-on/m-p/4085811#M316</link>
      <description>&lt;P&gt;I am practising&amp;nbsp;&lt;A href="https://learn.microsoft.com/zh-cn/training/modules/describe-features-tools-azure-for-governance-compliance/5-exercise-configure-resource-lock" target="_blank" rel="noopener"&gt;https://learn.microsoft.com/zh-cn/training/modules/describe-features-tools-azure-for-governance-compliance/5-exercise-configure-resource-lock&lt;/A&gt;. The display don't match the images.&lt;/P&gt;&lt;P&gt;Steps:&lt;/P&gt;&lt;P&gt;1, create storage az900xliu under az900 resource group&lt;/P&gt;&lt;P&gt;2, Add lock lock1 on it&lt;/P&gt;&lt;P&gt;3, add container failed&lt;/P&gt;&lt;P&gt;4, navigate to az900:az900xliu:lock : NO LOCK here ( don't match the material)&lt;/P&gt;&lt;P&gt;5, navigate to az900:lock : lock1 is here&lt;/P&gt;&lt;P&gt;6, delete lock1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I repeated step 2-6 several times. And tried add lock2 under az900:az900xliu:lock, lock2 will disappear after navigate to other tab and back just like lock1. But, lock2 will NOT appear under&amp;nbsp;az900:lock either.&lt;/P&gt;&lt;P&gt;And, I tried add lock2 under&amp;nbsp;az900:lock. It appears, but after navigate to other tab and back, it disappear. Really confused on these behavior.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I tried create container after delete lock1(lock2 don't appear so I cannot delete). After click the &lt;STRONG&gt;link in error message&lt;/STRONG&gt;, I navigate to&amp;nbsp;az900:lock and two lock2 appear. One is under&amp;nbsp;az900:lock, another is under&amp;nbsp;az900:az900xliu:lock. After delete them, I successfully add container.&lt;/P&gt;</description>
      <pubDate>Thu, 14 Mar 2024 21:16:20 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-governance-and-management/confused-on-the-dispaly-after-amp-quot-add-lock-amp-quot-on/m-p/4085811#M316</guid>
      <dc:creator>Xuhui_Liu</dc:creator>
      <dc:date>2024-03-14T21:16:20Z</dc:date>
    </item>
    <item>
      <title>Wish: Add 'Customer Name' to Azure Portal Views as a Column (or 'Group By') Option</title>
      <link>https://techcommunity.microsoft.com/t5/azure-governance-and-management/wish-add-customer-name-to-azure-portal-views-as-a-column-or/m-p/4053282#M315</link>
      <description>&lt;P&gt;I work for a CSP and use Azure Lighthouse to manage many customer environments. All of the Azure portal views are focused on the concept of the subscription being the top level management object in Azure (I'm excluding Management Groups for policy management). I'm sure this works well for single organisations that use Azure portal, but for CSPs we need to be able to order/arrange/group lists based on &lt;STRONG&gt;customer name&lt;/STRONG&gt; first and then by subscription. In other words, our administration view has to start one level above subscription compared with most organisations.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I know you can change the directory filter if you want to work on a single customer's environment and limit the view to their resources, but most often we are managing at scale and operating on multiple customer estates at once and as such we need lists to be built around the customer as the topmost object rather than the subscription.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When we are confronted with a long list of subscriptions (some of which being unhelpfully named 'Subscription 1' or 'Azure' by customers who have not followed CAF...) it is impossible to determine which customer that sub relates to without following each and every subscription link. It's onerous. Not all customers allow us to impress a subscription naming convention on their Azure environment (we might be contracted to only support a subset of their subscriptions and they are unwilling to change them).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;An example would be the Virtual Machines list. Microsoft offers no fewer than 33 'Group By' attribute options, none of which is 'Customer'. Some views allow you to add a column and Group By tag, but a surprisingly small number of views support column manipulation.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I'm hoping someone from the MSFT PG sees this and hears my plea: please keep CSPs in mind when designing Azure Portal and allow us to add a column for 'Customer Name' throughout, it would be of huge benefit to us!&amp;nbsp;&lt;img class="lia-deferred-image lia-image-emoji" src="https://techcommunity.microsoft.com/t5/s/html/@CA22154A147B1DAF74C322D7A94CB893/images/emoticons/smile_40x40.gif" alt=":smile:" title=":smile:" /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 09 Feb 2024 16:21:41 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-governance-and-management/wish-add-customer-name-to-azure-portal-views-as-a-column-or/m-p/4053282#M315</guid>
      <dc:creator>GW999</dc:creator>
      <dc:date>2024-02-09T16:21:41Z</dc:date>
    </item>
    <item>
      <title>How to fix azure policy not showing in definitions.</title>
      <link>https://techcommunity.microsoft.com/t5/azure-governance-and-management/how-to-fix-azure-policy-not-showing-in-definitions/m-p/4049880#M314</link>
      <description>&lt;P&gt;I need to configure the&amp;nbsp; policy for "account with owner/read/write&amp;nbsp;p&lt;SPAN&gt;ermissions on Azure resources should be MFA enabled" but it is not showing here.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;img /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 06 Feb 2024 07:38:38 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-governance-and-management/how-to-fix-azure-policy-not-showing-in-definitions/m-p/4049880#M314</guid>
      <dc:creator>rhotrix</dc:creator>
      <dc:date>2024-02-06T07:38:38Z</dc:date>
    </item>
    <item>
      <title>Azure Advisor aggregate score for 2+ subscriptions - how is it calculated?</title>
      <link>https://techcommunity.microsoft.com/t5/azure-governance-and-management/azure-advisor-aggregate-score-for-2-subscriptions-how-is-it/m-p/4027824#M311</link>
      <description>&lt;P&gt;Dear all,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="x_elementToProof" data-ogsc="rgb(0, 0, 0)"&gt;I would like to understand&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;how Azure Advisor calculates aggregations&lt;/STRONG&gt;&amp;nbsp;for the 5 pillars, for &lt;STRONG&gt;multiple subscriptions&lt;/STRONG&gt;.&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="x_elementToProof" data-ogsc="rgb(0, 0, 0)"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="x_elementToProof" data-ogsc="rgb(0, 0, 0)"&gt;In the example below we have values for Azure Advisor subscription 1 –&lt;BR aria-hidden="true" /&gt;(Cost = 68, Security = 47, Reliability = 86, Operational Excellence = 83, Performance = 100)&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="x_elementToProof"&gt;&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV class="x_elementToProof" data-ogsc="rgb(0, 0, 0)"&gt;And subsequently values for Azure Advisor subscription 2 -&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="x_elementToProof"&gt;&lt;SPAN data-ogsc="rgb(0, 0, 0)" data-ogsb="rgb(255, 255, 255)"&gt;(Cost = 35, Security = 69, Reliability = 91, Operational Excellence = 79, Performance = 100)&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV class="x_elementToProof"&gt;&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV class="x_elementToProof" data-ogsc="rgb(0, 0, 0)"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="x_elementToProof" data-ogsc="rgb(0, 0, 0)"&gt;When selecting both subscriptions, we obtain the aggregate values –&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="x_elementToProof"&gt;&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV class="x_elementToProof" data-ogsc="rgb(0, 0, 0)"&gt;Naively I might have expected that the aggregate advisor scores could be the arithmetic average between the two, but that is not the case.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Any help is much appreciated! &lt;span class="lia-unicode-emoji" title=":red_heart:"&gt;❤️&lt;/span&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Thank you very much in advance,&lt;/DIV&gt;
&lt;DIV class="x_elementToProof" data-ogsc="rgb(0, 0, 0)"&gt;Best Regards,&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="x_elementToProof" data-ogsc="rgb(0, 0, 0)"&gt;Eva&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="x_elementToProof" data-ogsc="rgb(0, 0, 0)"&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Fri, 12 Jan 2024 08:03:02 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-governance-and-management/azure-advisor-aggregate-score-for-2-subscriptions-how-is-it/m-p/4027824#M311</guid>
      <dc:creator>eva1608</dc:creator>
      <dc:date>2024-01-12T08:03:02Z</dc:date>
    </item>
    <item>
      <title>Azure Policy - Configure backup on virtual machines with a given tag</title>
      <link>https://techcommunity.microsoft.com/t5/azure-governance-and-management/azure-policy-configure-backup-on-virtual-machines-with-a-given/m-p/4013057#M310</link>
      <description>&lt;P&gt;I wonder if somebody could sanity check something for me with this please in case it's something I could be missing.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have this existing policy configured in a customers tenant (&lt;A href="https://www.azadvertizer.net/azpolicyadvertizer/345fa903-145c-4fe1-8bcd-93ec2adccde8.html" target="_blank" rel="nofollow noopener noreferrer"&gt;https://www.azadvertizer.net/azpolicyadvertizer/345fa903-145c-4fe1-8bcd-93ec2adccde8.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;After creating a VM and allocating the correct tag etc. it didn't automatically have the backup policy assigned to it. With the policy assignment itself it didn't even appear as a non-compliant resource. I went through the checks to make sure it was the same region, correct tag, correct rsv and policy, which all appeared to look fine. When remediating it still wasn't pulling the resource through.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When I went into the definition detail to see what could be amiss, I noticed the list of WindowServer image SKU's that were listed (image attached here&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://i.stack.imgur.com/1YPpM.png" target="_blank" rel="nofollow noopener noreferrer"&gt;https://i.stack.imgur.com/1YPpM.png&lt;/A&gt;. As I was sanity checking everything, I looked at the VM to see that the SKU wasn't actually in this list (2019-datacenter-smalldisk-g2).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As every SKU is listed specifically it makes me think this image has just been missed off and needs adding? Rather than it getting captured by one of the SKU's listed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I can add the VM manually to the existing RSV for now but for future ref, is there a way I can raise this if my findings are indeed correct?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Dec 2023 16:04:39 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-governance-and-management/azure-policy-configure-backup-on-virtual-machines-with-a-given/m-p/4013057#M310</guid>
      <dc:creator>as-integy</dc:creator>
      <dc:date>2023-12-19T16:04:39Z</dc:date>
    </item>
    <item>
      <title>AWESOME Azure Policy</title>
      <link>https://techcommunity.microsoft.com/t5/azure-governance-and-management/awesome-azure-policy/m-p/3998977#M304</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Azure Policy&lt;/STRONG&gt; is a very powerful, but sometimes frustrating service to learn, adopt, and troubleshoot. Years ago when I first started getting into the technical nitty gritty side of Azure Policy I quickly learnt that I could save myself hours of time in trial and error simply by combining Microsoft sources of information (e.g. Microsoft Docs) with trusted community sources containing examples and how-to-guides.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And so in January of 2022 the &lt;A href="https://github.com/globalbao/awesome-azure-policy" target="_self"&gt;Awesome Azure Policy project&lt;/A&gt; was born -- a&lt;SPAN&gt;&amp;nbsp;curated list of AWESOME blogs, videos, tutorials, code, tools, scripts...anything which can help you learn Azure Policy and quickly get started with designing, planning, and implementing governance controls to your resources. &lt;STRONG&gt;There's currently over 380+ links to awesome Azure Policy content within!&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You're more then welcome to submit pull requests to the project as that's the only way we can keep up with the pace of new content being released globally.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;img /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 02 Dec 2023 13:16:11 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-governance-and-management/awesome-azure-policy/m-p/3998977#M304</guid>
      <dc:creator>Jesse Loudon</dc:creator>
      <dc:date>2023-12-02T13:16:11Z</dc:date>
    </item>
    <item>
      <title>Convert an organization policy into azure policy</title>
      <link>https://techcommunity.microsoft.com/t5/azure-governance-and-management/convert-an-organization-policy-into-azure-policy/m-p/3991409#M302</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I wanted to know that is it possible to convert the current organization policy that are used for servers(Windows, Linux and Redhat) to Azure Policy. This is because there are some policies that is specifically only for their organization. For instance:&lt;/P&gt;&lt;P&gt;Rename administrator account to &amp;lt;company name&amp;gt;support.&lt;/P&gt;</description>
      <pubDate>Fri, 24 Nov 2023 07:15:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-governance-and-management/convert-an-organization-policy-into-azure-policy/m-p/3991409#M302</guid>
      <dc:creator>deloittepocra</dc:creator>
      <dc:date>2023-11-24T07:15:00Z</dc:date>
    </item>
    <item>
      <title>Azure defender</title>
      <link>https://techcommunity.microsoft.com/t5/azure-governance-and-management/azure-defender/m-p/3976666#M301</link>
      <description>&lt;P&gt;Hi, So I am trying to export my subscription and their secure scores to a CSV file. I seem not to find a way to do this on the portal. Does anyone know if there is a command to get this done or steps on how to do it from the portal.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Nov 2023 22:24:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-governance-and-management/azure-defender/m-p/3976666#M301</guid>
      <dc:creator>Francis2043</dc:creator>
      <dc:date>2023-11-08T22:24:00Z</dc:date>
    </item>
    <item>
      <title>Policy trigger for Microsoft.Network/virtualNetworks/subnets/join/action</title>
      <link>https://techcommunity.microsoft.com/t5/azure-governance-and-management/policy-trigger-for-microsoft-network-virtualnetworks-subnets/m-p/3971337#M300</link>
      <description>&lt;P&gt;Hello Team,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have a use case where I do not want any resource to connect to my VNET except a few allowed ones.&lt;/P&gt;
&lt;P&gt;We are designing a secured containerized environment for our customers with very strict access control policies. However, we are not seeing the policy triggered for the network join operation.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For testing purpose, I used the following policy just to capture and deny all the operations on virtual network and assigned this policy to the resource group scope where my VNET is present: -&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;{&lt;/P&gt;
&lt;P&gt;&amp;nbsp; "mode":&amp;nbsp;"All",&lt;/P&gt;
&lt;P&gt;&amp;nbsp; "policyRule":&amp;nbsp;{&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; "if":&amp;nbsp;{&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "field":&amp;nbsp;"type",&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "equals":&amp;nbsp;"Microsoft.Network/virtualNetworks"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; },&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; "then":&amp;nbsp;{&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "effect":&amp;nbsp;"deny"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;/P&gt;
&lt;P&gt;&amp;nbsp; }&lt;/P&gt;
&lt;P&gt;}&lt;/P&gt;
&lt;P&gt;&lt;LI-WRAPPER&gt;&lt;/LI-WRAPPER&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;After this policy is assigned to my resource group, I am not able to create a VNETs in my resource group, however, I am still able to join an existing VNET in this resource group.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Looks like policy is not even getting evaluated/triggered for the network join action. Can you please suggest how can we deny this action?&lt;/P&gt;</description>
      <pubDate>Thu, 02 Nov 2023 17:40:30 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-governance-and-management/policy-trigger-for-microsoft-network-virtualnetworks-subnets/m-p/3971337#M300</guid>
      <dc:creator>Aniruddha1248</dc:creator>
      <dc:date>2023-11-02T17:40:30Z</dc:date>
    </item>
  </channel>
</rss>

