Skip to content

Commit

Permalink
Patch 510 (#531)
Browse files Browse the repository at this point in the history
* Update resource-location-matches-resource-group.md

* Update resource-location-matches-resource-group.md

* updated all images

* Update resource-location-matches-resource-group.md

* Update resource-location-matches-resource-group.md

* Apply suggestions from code review

* Update en/azure/azurepolicy/resource-location-matches-resource-group.md

Co-authored-by: alphadev4 <[email protected]>
  • Loading branch information
shuklaalok87 and alphadev4 authored Nov 4, 2022
1 parent 0a393a4 commit 2cb94b2
Show file tree
Hide file tree
Showing 10 changed files with 10 additions and 12 deletions.
22 changes: 10 additions & 12 deletions en/azure/azurepolicy/resource-location-matches-resource-group.md
Original file line number Diff line number Diff line change
Expand Up @@ -12,19 +12,17 @@
| **Description** | Ensures a policy is configured to audit that deployed resource locations match their resource group locations |
| **More Info** | Using Azure Policy to monitor resource location compliance helps ensure that new resources are not launched into locations that do not match their resource group. |
| **AZURE Link** | https://docs.microsoft.com/en-us/azure/governance/policy/assign-policy-portal |
| **Recommended Action** | Enable the built-in Azure Policy definition: Audit resource location matches resource group location |
| **Recommended Action** | Enable the built-in Azure Policy definition: Audit resource location matches resource group location. |

## Detailed Remediation Steps

1. Log into the Microsoft Azure Management Console.
2. Select the "Search resources, services, and docs" option at the top and search for Policy. </br> <img src="/resources/azure/azurepolicy/resource-location-matches-resource-group/step2.png"/>
3. On the "Policy" page, scroll down the left navigation panel and choose "Assignments" under "Authoring."</br> <img src="/resources/azure/azurepolicy/resource-location-matches-resource-group/step3.png"/>
2. Find the search bar at the top and search for Policy. </br> <img src="/resources/azure/azurepolicy/resource-location-matches-resource-group/step2.png"/>
3. On the "Policy" page, scroll down the left navigation panel and choose "Assignments" under "Authoring".</br> <img src="/resources/azure/azurepolicy/resource-location-matches-resource-group/step3.png"/>
4. On the "Policy - Assignments" page, check the "Policies" listed and if there are no "Policies" for "Resource Location Matches Resource Group" then the selected "Assignment" don't have any "Resource Location Matches Resource Group" policy.</br> <img src="/resources/azure/azurepolicy/resource-location-matches-resource-group/step4.png"/>
5. Repeat steps number 2 - 4 to check different "Policy - Assignments."</br>
6. Navigate to "Policy", scroll down the left navigation panel and choose "Assignemts" and on the "Policy - Assignments" page click on the "Assign Policy" at the top to assign "Resource Location Matches Resource Group" policy.</br> <img src="/resources/azure/azurepolicy/resource-location-matches-resource-group/step6.png"/>
7. On the "Assign Policy" page, select the "Scope" accordingly and click on the "..." dots icon to select the "Policy definition" under the "Basics" option.</br> <img src="/resources/azure/azurepolicy/resource-location-matches-resource-group/step7.png"/>
8. On the "Available Definitions" page, click on the "Search" box at the tab and search for "Allowed locations for resource groups" and click on the "Select" button at the bottom.</br> <img src="/resources/azure/azurepolicy/resource-location-matches-resource-group/step8.png"/>
9. Provide the "Description" accordingly and click on the "Next" button at the bottom.</br> <img src="/resources/azure/azurepolicy/resource-location-matches-resource-group/step9.png"/>
10. On the "Remediation" page, click on the checkbox next to the "Create a Managed Identity" and select the "Managed Identity Location" accordingly.</br> <img src="/resources/azure/azurepolicy/resource-location-matches-resource-group/step11.png"/>
11. Click on the "Review + Create" button to create the specific "Resource Location Matches Resource Group" policy.</br> <img src="/resources/azure/azurepolicy/resource-location-matches-resource-group/step12.png"/>
12. Repeat steps number 6 - 11 to enable the built-in Azure Policy definition: Audit resource location matches resource group location.</br>
5. If there is no policy for "Resource Location Matches Resource Group" then click on "Assign policy" at the top to create a new policy.</br> <img src="/resources/azure/azurepolicy/resource-location-matches-resource-group/step5.png"/>
6. On the "Assign Policy" page, under "Basics" tab, select "Scope" accordingly and click on the "..." dots icon next to "Policy definition".</br> <img src="/resources/azure/azurepolicy/resource-location-matches-resource-group/step6.png"/>
7. On the "Available Definitions" page, click on the "Search" box and search for "Resource Location Matches Resource Group". Click the Policy Definition found and then click "Select" button at the bottom.</br> <img src="/resources/azure/azurepolicy/resource-location-matches-resource-group/step7.png"/>
8. Once back on the "Assign Policy" page, provide a "Description" and click on the "Next" button at the bottom. Now select "Allowed locations" on "Parameters" tab and click Next at the bottom.</br> <img src="/resources/azure/azurepolicy/resource-location-matches-resource-group/step8.png"/>
9. On the "Remediation" tab, click on the checkbox next to the "Create a Managed Identity" and select desired "Managed Identity Location". Click "Review + create" button at the bottom.</br> <img src="/resources/azure/azurepolicy/resource-location-matches-resource-group/step9.png"/>
10. On the "Review + Create" tab, click "Create" button at the bottom to create the specific "Resource Location Matches Resource Group" policy.</br> <img src="/resources/azure/azurepolicy/resource-location-matches-resource-group/step10.png"/>
11. Repeat steps number 6 - 10 to enable the built-in "Azure Policy definition: Audit resource location matches resource group location" for all directories.</br>
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.

0 comments on commit 2cb94b2

Please sign in to comment.