<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>policy Archives - Apostolidis Cloud Corner</title>
	<atom:link href="https://www.cloudcorner.gr/tag/policy/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.cloudcorner.gr/tag/policy/</link>
	<description>Remarks from a Cloud Architect encounters</description>
	<lastBuildDate>Tue, 24 Oct 2023 08:36:57 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>

<image>
	<url>https://www.cloudcorner.gr/wp-content/uploads/2021/04/cropped-cloudcorner2-32x32.png</url>
	<title>policy Archives - Apostolidis Cloud Corner</title>
	<link>https://www.cloudcorner.gr/tag/policy/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Azure Policy to enable network policies for private endpoints</title>
		<link>https://www.cloudcorner.gr/microsoft/azure/azure-policy-to-enable-network-policies-for-private-endpoints/</link>
					<comments>https://www.cloudcorner.gr/microsoft/azure/azure-policy-to-enable-network-policies-for-private-endpoints/#respond</comments>
		
		<dc:creator><![CDATA[Pantelis Apostolidis]]></dc:creator>
		<pubDate>Thu, 23 Feb 2023 07:57:49 +0000</pubDate>
				<category><![CDATA[Azure]]></category>
		<category><![CDATA[IaC]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[automation]]></category>
		<category><![CDATA[azure]]></category>
		<category><![CDATA[azure policy]]></category>
		<category><![CDATA[azurerm]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[policy]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://www.cloudcorner.gr/?p=4003</guid>

					<description><![CDATA[<p>Network security policies are a very handy feature when you use Private Endpoints on Azure. If you enable network security</p>
<p>The post <a href="https://www.cloudcorner.gr/microsoft/azure/azure-policy-to-enable-network-policies-for-private-endpoints/">Azure Policy to enable network policies for private endpoints</a> appeared first on <a href="https://www.cloudcorner.gr">Apostolidis Cloud Corner</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Network security policies are a very handy feature when you use Private Endpoints on Azure. If you enable network security policies for User-Defined Routes, the /32 routes that are generated by the private endpoint and propagated to all the subnets in its own VNet and directly peered VNets will be invalidated if you have User-Defined Routing, which is useful if you want all traffic (including traffic addressed to the private endpoint) to go through a firewall, since otherwise, the /32 route would bypass any other route.</p>



<p>By default, network policies are disabled for a subnet in a virtual network and you need to enable it manually, from the Azure Portal after the VNET creation, or you need to specify it in your script if you are deploying with PowerShell, Cli, Bicep or any other IaC. </p>



<p>To ensure that Network security policies are enabled, and force enable it, we can use an Azure Policy. The below Azure Policy checks if the Network security policies are enabled, and if not it automatically enables it. The result of this policy is:</p>



<ul class="wp-block-list">
<li>for new Virtual Networks, it automatically enables Network security policies to all subnets, even if you forgot to select it upon the creation</li>



<li>for existing virtual Network subnets, it uses a remediation plan to evaluate and enable the Network security policies.</li>
</ul>



<p>The Policy:</p>



<pre class="EnlighterJSRAW" data-enlighter-language="json" data-enlighter-theme="" data-enlighter-highlight="" data-enlighter-linenumbers="" data-enlighter-lineoffset="" data-enlighter-title="" data-enlighter-group="">{
  "mode": "All",
  "policyRule": {
    "if": {
      "field": "Microsoft.Network/virtualNetworks/subnets[*].privateEndpointNetworkPolicies",
      "notEquals": "Enabled"
    },
    "then": {
      "effect": "modify",
      "details": {
        "roleDefinitionIds": [
          "/providers/Microsoft.Authorization/roleDefinitions/4d97b98b-1d4f-4787-a291-c67834d212e7"
        ],
        "operations": [
          {
            "operation": "addOrReplace",
            "field": "Microsoft.Network/virtualNetworks/subnets[*].privateEndpointNetworkPolicies",
            "value": "Enabled"
          }
        ]
      }
    }
  },
  "parameters": {}
}</pre>



<p>To add the Policy to your Azure environment:</p>



<ul class="wp-block-list">
<li>Go to the Azure Policy Definitions blade (shortcut: <a href="https://portal.azure.com/#view/Microsoft_Azure_Policy/PolicyMenuBlade/~/Definitions">Policy &#8211; Microsoft Azure</a> )</li>



<li>Add Policy Definition </li>
</ul>



<figure class="wp-block-image size-full"><a href="https://www.cloudcorner.gr/wp-content/uploads/2023/02/image.png"><img decoding="async" width="138" height="37" src="https://www.cloudcorner.gr/wp-content/uploads/2023/02/image.png" alt="" class="wp-image-4004"/></a></figure>



<ul class="wp-block-list">
<li>Provide a location (subscription) to save the policy object, and give a name and a category. Use the existing Network category.</li>
</ul>



<figure class="wp-block-image size-full"><a href="https://www.cloudcorner.gr/wp-content/uploads/2023/02/image-1.png"><img fetchpriority="high" decoding="async" width="787" height="513" src="https://www.cloudcorner.gr/wp-content/uploads/2023/02/image-1.png" alt="" class="wp-image-4005" srcset="https://www.cloudcorner.gr/wp-content/uploads/2023/02/image-1.png 787w, https://www.cloudcorner.gr/wp-content/uploads/2023/02/image-1-300x196.png 300w, https://www.cloudcorner.gr/wp-content/uploads/2023/02/image-1-768x501.png 768w" sizes="(max-width: 787px) 100vw, 787px" /></a></figure>



<ul class="wp-block-list">
<li>Paste the policy Json</li>
</ul>



<figure class="wp-block-image size-full"><a href="https://www.cloudcorner.gr/wp-content/uploads/2023/02/image-2.png"><img decoding="async" width="790" height="590" src="https://www.cloudcorner.gr/wp-content/uploads/2023/02/image-2.png" alt="" class="wp-image-4006" srcset="https://www.cloudcorner.gr/wp-content/uploads/2023/02/image-2.png 790w, https://www.cloudcorner.gr/wp-content/uploads/2023/02/image-2-300x224.png 300w, https://www.cloudcorner.gr/wp-content/uploads/2023/02/image-2-768x574.png 768w" sizes="(max-width: 790px) 100vw, 790px" /></a></figure>



<ul class="wp-block-list">
<li>Select a Role Assignment. You need a role that will have editor access to the subnet. For my demo, I used the Network Contributor build-in role (4d97b98b-1d4f-4787-a291-c67834d212e7) for the action.</li>



<li>Once the Policy is created, open it and you need to assign it to a scope (MG, Subscription, Resource Group)</li>
</ul>



<figure class="wp-block-image size-full"><a href="https://www.cloudcorner.gr/wp-content/uploads/2023/02/image-3.png"><img loading="lazy" decoding="async" width="84" height="30" src="https://www.cloudcorner.gr/wp-content/uploads/2023/02/image-3.png" alt="" class="wp-image-4007"/></a></figure>



<ul class="wp-block-list">
<li>Assign the policy to the scope you want, like Management Group, Subscription, or Resource Group and one thing that needs attention is to create a remediation task and a Managed Identity.</li>



<li>The remediation task is needed to remediate the existing resources and the Managed Identity for the modification action.</li>
</ul>



<figure class="wp-block-image size-full"><a href="https://www.cloudcorner.gr/wp-content/uploads/2023/02/image-5.png"><img loading="lazy" decoding="async" width="767" height="554" src="https://www.cloudcorner.gr/wp-content/uploads/2023/02/image-5.png" alt="" class="wp-image-4009" srcset="https://www.cloudcorner.gr/wp-content/uploads/2023/02/image-5.png 767w, https://www.cloudcorner.gr/wp-content/uploads/2023/02/image-5-300x217.png 300w" sizes="auto, (max-width: 767px) 100vw, 767px" /></a></figure>



<p>The Policy is in Audit only mode, in case you just need to audit if there are any subnets that don&#8217;t have privateEndpointNetworkPolicies enabled.</p>



<pre class="EnlighterJSRAW" data-enlighter-language="json" data-enlighter-theme="" data-enlighter-highlight="" data-enlighter-linenumbers="" data-enlighter-lineoffset="" data-enlighter-title="" data-enlighter-group="">{
  "mode": "All",
  "policyRule": {
    "if": {
      "allOf": [
        {
          "field": "type",
          "equals": "Microsoft.Network/virtualNetworks/subnets"
        },
        {
          "field": "Microsoft.Network/virtualNetworks/subnets[*].privateEndpointNetworkPolicies",
          "notEquals": "Enabled"
        }
      ]
    },
    "then": {
      "effect": "audit"
    }
  },
  "parameters": {}
}</pre>



<p>You can get the Policy Json files at my Github repo: <a href="https://github.com/proximagr/automation#policy-audit---enable-network-policy-for-private-endpoints-blog-post">https://github.com/proximagr/automation#policy-audit&#8212;enable-network-policy-for-private-endpoints-blog-post</a></p>
<div class="saboxplugin-wrap" itemtype="http://schema.org/Person" itemscope itemprop="author"><div class="saboxplugin-tab"><div class="saboxplugin-gravatar"><img loading="lazy" decoding="async" src="https://www.e-apostolidis.gr/wp-content/uploads/2019/05/mvpsummit2019.jpg" width="100"  height="100" alt="Pantelis Apostolidis" itemprop="image"></div><div class="saboxplugin-authorname"><a href="https://www.cloudcorner.gr/author/admin/" class="vcard author" rel="author"><span class="fn">Pantelis Apostolidis</span></a></div><div class="saboxplugin-desc"><div itemprop="description"><p>Pantelis Apostolidis is a Sr. Specialist, Azure at Microsoft and a former Microsoft Azure MVP. For the last 20 years, Pantelis has been involved to major cloud projects in Greece and abroad, helping companies to adopt and deploy cloud technologies, driving business value. He is entitled to a lot of Microsoft Expert Certifications, demonstrating his proven experience in delivering high quality solutions. He is an author, blogger and he is acting as a spokesperson for conferences, workshops and webinars. He is also an active member of several communities as a moderator in azureheads.gr and autoexec.gr. Follow him on Twitter @papostolidis.</p>
</div></div><div class="saboxplugin-web "><a href="https://www.cloudcorner.gr" target="_self" >www.cloudcorner.gr</a></div><div class="clearfix"></div><div class="saboxplugin-socials "><a title="Facebook" target="_blank" href="https://www.facebook.com/pantelis.apostolidis" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-facebook" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 264 512"><path fill="currentColor" d="M76.7 512V283H0v-91h76.7v-71.7C76.7 42.4 124.3 0 193.8 0c33.3 0 61.9 2.5 70.2 3.6V85h-48.2c-37.8 0-45.1 18-45.1 44.3V192H256l-11.7 91h-73.6v229"></path></svg></span></a><a title="Linkedin" target="_blank" href="https://www.linkedin.com/in/papostolidis/" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-linkedin" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M100.3 480H7.4V180.9h92.9V480zM53.8 140.1C24.1 140.1 0 115.5 0 85.8 0 56.1 24.1 32 53.8 32c29.7 0 53.8 24.1 53.8 53.8 0 29.7-24.1 54.3-53.8 54.3zM448 480h-92.7V334.4c0-34.7-.7-79.2-48.3-79.2-48.3 0-55.7 37.7-55.7 76.7V480h-92.8V180.9h89.1v40.8h1.3c12.4-23.5 42.7-48.3 87.9-48.3 94 0 111.3 61.9 111.3 142.3V480z"></path></svg></span></a><a title="Instagram" target="_blank" href="https://www.instagram.com/proximagr" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-instagram" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M224.1 141c-63.6 0-114.9 51.3-114.9 114.9s51.3 114.9 114.9 114.9S339 319.5 339 255.9 287.7 141 224.1 141zm0 189.6c-41.1 0-74.7-33.5-74.7-74.7s33.5-74.7 74.7-74.7 74.7 33.5 74.7 74.7-33.6 74.7-74.7 74.7zm146.4-194.3c0 14.9-12 26.8-26.8 26.8-14.9 0-26.8-12-26.8-26.8s12-26.8 26.8-26.8 26.8 12 26.8 26.8zm76.1 27.2c-1.7-35.9-9.9-67.7-36.2-93.9-26.2-26.2-58-34.4-93.9-36.2-37-2.1-147.9-2.1-184.9 0-35.8 1.7-67.6 9.9-93.9 36.1s-34.4 58-36.2 93.9c-2.1 37-2.1 147.9 0 184.9 1.7 35.9 9.9 67.7 36.2 93.9s58 34.4 93.9 36.2c37 2.1 147.9 2.1 184.9 0 35.9-1.7 67.7-9.9 93.9-36.2 26.2-26.2 34.4-58 36.2-93.9 2.1-37 2.1-147.8 0-184.8zM398.8 388c-7.8 19.6-22.9 34.7-42.6 42.6-29.5 11.7-99.5 9-132.1 9s-102.7 2.6-132.1-9c-19.6-7.8-34.7-22.9-42.6-42.6-11.7-29.5-9-99.5-9-132.1s-2.6-102.7 9-132.1c7.8-19.6 22.9-34.7 42.6-42.6 29.5-11.7 99.5-9 132.1-9s102.7-2.6 132.1 9c19.6 7.8 34.7 22.9 42.6 42.6 11.7 29.5 9 99.5 9 132.1s2.7 102.7-9 132.1z"></path></svg></span></a><a title="Rss" target="_blank" href="https://wwwcloudcorner.gr/feed/rdf/" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-rss" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M128.081 415.959c0 35.369-28.672 64.041-64.041 64.041S0 451.328 0 415.959s28.672-64.041 64.041-64.041 64.04 28.673 64.04 64.041zm175.66 47.25c-8.354-154.6-132.185-278.587-286.95-286.95C7.656 175.765 0 183.105 0 192.253v48.069c0 8.415 6.49 15.472 14.887 16.018 111.832 7.284 201.473 96.702 208.772 208.772.547 8.397 7.604 14.887 16.018 14.887h48.069c9.149.001 16.489-7.655 15.995-16.79zm144.249.288C439.596 229.677 251.465 40.445 16.503 32.01 7.473 31.686 0 38.981 0 48.016v48.068c0 8.625 6.835 15.645 15.453 15.999 191.179 7.839 344.627 161.316 352.465 352.465.353 8.618 7.373 15.453 15.999 15.453h48.068c9.034-.001 16.329-7.474 16.005-16.504z"></path></svg></span></a><a title="Twitter" target="_blank" href="https://twitter.com/papostolidis" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-twitter" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 30 30"><path d="M26.37,26l-8.795-12.822l0.015,0.012L25.52,4h-2.65l-6.46,7.48L11.28,4H4.33l8.211,11.971L12.54,15.97L3.88,26h2.65 l7.182-8.322L19.42,26H26.37z M10.23,6l12.34,18h-2.1L8.12,6H10.23z" /></svg></span></a><a title="Github" target="_blank" href="https://github.com/proximagr" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-github" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 496 512"><path fill="currentColor" d="M165.9 397.4c0 2-2.3 3.6-5.2 3.6-3.3.3-5.6-1.3-5.6-3.6 0-2 2.3-3.6 5.2-3.6 3-.3 5.6 1.3 5.6 3.6zm-31.1-4.5c-.7 2 1.3 4.3 4.3 4.9 2.6 1 5.6 0 6.2-2s-1.3-4.3-4.3-5.2c-2.6-.7-5.5.3-6.2 2.3zm44.2-1.7c-2.9.7-4.9 2.6-4.6 4.9.3 2 2.9 3.3 5.9 2.6 2.9-.7 4.9-2.6 4.6-4.6-.3-1.9-3-3.2-5.9-2.9zM244.8 8C106.1 8 0 113.3 0 252c0 110.9 69.8 205.8 169.5 239.2 12.8 2.3 17.3-5.6 17.3-12.1 0-6.2-.3-40.4-.3-61.4 0 0-70 15-84.7-29.8 0 0-11.4-29.1-27.8-36.6 0 0-22.9-15.7 1.6-15.4 0 0 24.9 2 38.6 25.8 21.9 38.6 58.6 27.5 72.9 20.9 2.3-16 8.8-27.1 16-33.7-55.9-6.2-112.3-14.3-112.3-110.5 0-27.5 7.6-41.3 23.6-58.9-2.6-6.5-11.1-33.3 2.6-67.9 20.9-6.5 69 27 69 27 20-5.6 41.5-8.5 62.8-8.5s42.8 2.9 62.8 8.5c0 0 48.1-33.6 69-27 13.7 34.7 5.2 61.4 2.6 67.9 16 17.7 25.8 31.5 25.8 58.9 0 96.5-58.9 104.2-114.8 110.5 9.2 7.9 17 22.9 17 46.4 0 33.7-.3 75.4-.3 83.6 0 6.5 4.6 14.4 17.3 12.1C428.2 457.8 496 362.9 496 252 496 113.3 383.5 8 244.8 8zM97.2 352.9c-1.3 1-1 3.3.7 5.2 1.6 1.6 3.9 2.3 5.2 1 1.3-1 1-3.3-.7-5.2-1.6-1.6-3.9-2.3-5.2-1zm-10.8-8.1c-.7 1.3.3 2.9 2.3 3.9 1.6 1 3.6.7 4.3-.7.7-1.3-.3-2.9-2.3-3.9-2-.6-3.6-.3-4.3.7zm32.4 35.6c-1.6 1.3-1 4.3 1.3 6.2 2.3 2.3 5.2 2.6 6.5 1 1.3-1.3.7-4.3-1.3-6.2-2.2-2.3-5.2-2.6-6.5-1zm-11.4-14.7c-1.6 1-1.6 3.6 0 5.9 1.6 2.3 4.3 3.3 5.6 2.3 1.6-1.3 1.6-3.9 0-6.2-1.4-2.3-4-3.3-5.6-2z"></path></svg></span></a><a title="User email" target="_self" href="mailto:&#112;r&#111;&#120;ima&#103;&#114;&#064;&#104;&#111;t&#109;ail&#046;&#099;&#111;m" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-user_email" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M502.3 190.8c3.9-3.1 9.7-.2 9.7 4.7V400c0 26.5-21.5 48-48 48H48c-26.5 0-48-21.5-48-48V195.6c0-5 5.7-7.8 9.7-4.7 22.4 17.4 52.1 39.5 154.1 113.6 21.1 15.4 56.7 47.8 92.2 47.6 35.7.3 72-32.8 92.3-47.6 102-74.1 131.6-96.3 154-113.7zM256 320c23.2.4 56.6-29.2 73.4-41.4 132.7-96.3 142.8-104.7 173.4-128.7 5.8-4.5 9.2-11.5 9.2-18.9v-19c0-26.5-21.5-48-48-48H48C21.5 64 0 85.5 0 112v19c0 7.4 3.4 14.3 9.2 18.9 30.6 23.9 40.7 32.4 173.4 128.7 16.8 12.2 50.2 41.8 73.4 41.4z"></path></svg></span></a></div></div></div><p><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fwww.cloudcorner.gr%2Fmicrosoft%2Fazure%2Fazure-policy-to-enable-network-policies-for-private-endpoints%2F&amp;linkname=Azure%20Policy%20to%20enable%20network%20policies%20for%20private%20endpoints" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_print" href="https://www.addtoany.com/add_to/print?linkurl=https%3A%2F%2Fwww.cloudcorner.gr%2Fmicrosoft%2Fazure%2Fazure-policy-to-enable-network-policies-for-private-endpoints%2F&amp;linkname=Azure%20Policy%20to%20enable%20network%20policies%20for%20private%20endpoints" title="Print" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fwww.cloudcorner.gr%2Fmicrosoft%2Fazure%2Fazure-policy-to-enable-network-policies-for-private-endpoints%2F&#038;title=Azure%20Policy%20to%20enable%20network%20policies%20for%20private%20endpoints" data-a2a-url="https://www.cloudcorner.gr/microsoft/azure/azure-policy-to-enable-network-policies-for-private-endpoints/" data-a2a-title="Azure Policy to enable network policies for private endpoints"><img src="https://static.addtoany.com/buttons/share_save_171_16.png" alt="Share"></a></p><p>The post <a href="https://www.cloudcorner.gr/microsoft/azure/azure-policy-to-enable-network-policies-for-private-endpoints/">Azure Policy to enable network policies for private endpoints</a> appeared first on <a href="https://www.cloudcorner.gr">Apostolidis Cloud Corner</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.cloudcorner.gr/microsoft/azure/azure-policy-to-enable-network-policies-for-private-endpoints/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Azure Policy &#124; Enforce tags for resource creation</title>
		<link>https://www.cloudcorner.gr/microsoft/azure/azure-policy-enforce-tags-for-resource-creation/</link>
					<comments>https://www.cloudcorner.gr/microsoft/azure/azure-policy-enforce-tags-for-resource-creation/#respond</comments>
		
		<dc:creator><![CDATA[Pantelis Apostolidis]]></dc:creator>
		<pubDate>Mon, 02 Sep 2019 14:38:55 +0000</pubDate>
				<category><![CDATA[Azure]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[arm]]></category>
		<category><![CDATA[azure]]></category>
		<category><![CDATA[azure governance]]></category>
		<category><![CDATA[azure policy]]></category>
		<category><![CDATA[azure tags]]></category>
		<category><![CDATA[azurerm]]></category>
		<category><![CDATA[governance]]></category>
		<category><![CDATA[policy]]></category>
		<category><![CDATA[tags]]></category>
		<category><![CDATA[video]]></category>
		<category><![CDATA[webinar]]></category>
		<guid isPermaLink="false">https://www.e-apostolidis.gr/?p=2799</guid>

					<description><![CDATA[<p>Azure Policy &#124; Enforce tags for resource creation Azure Governance After the previous post about how to use Azure Policy</p>
<p>The post <a href="https://www.cloudcorner.gr/microsoft/azure/azure-policy-enforce-tags-for-resource-creation/">Azure Policy | Enforce tags for resource creation</a> appeared first on <a href="https://www.cloudcorner.gr">Apostolidis Cloud Corner</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h1 style="text-align: left;">Azure Policy | Enforce tags for resource creation</h1>
<h2 style="text-align: justify;">Azure Governance</h2>
<p style="text-align: justify;">After the previous post about <a href="https://www.e-apostolidis.gr/microsoft/azure-policy-limit-the-azure-vm-sizes/" target="_blank" rel="noopener noreferrer">how to use Azure Policy to limit the Azure VM sizes</a>, I continue the series of posts about Azure Governance with a video guide on how to enforce tags for resource creation. The idea is to explain through examples and how-to-guides, the tools that Microsoft Azure provides to help the administrators to enforce rules to all subscriptions. Some examples of those rules are, to help the organizations to stay compliant with their corporate standards, to standardize the resources creation and management, to manage the permissions and access controls, etc.</p>
<h2 style="text-align: justify;">Azure Policy</h2>
<p style="text-align: justify;">Azure Policy is a powerful tool for Azure Governance. We can define rules for all Azure Subscriptions the we manage. We can use this rules for simple limitation actions, like permitting only specific VM Series and Sizes that can be created and also more complex rule sets that helps you standardize the whole Azure deployment.</p>
<h3 style="text-align: justify;">Enforce tags for resource creation</h3>
<p style="text-align: justify;">So, why tags? Why we need to add tags to all Azure resources? The Microsoft Azure environments are getting bigger and bigger and managed by multiple people and teams. That makes it difficult to understand who created a resource and what is the purpose of that resource. Another critical matter that we need tags is Cost Management. At the Azure Cost Management Portal, we can sort and arrange the resource cost using the Tags. This way we can provide an expense dashboard with the actual cost of the resources per department, project or whatever tags we have added to the Resource.</p>
<h3 style="text-align: justify;">Guide: Video</h3>
<p style="text-align: justify;">View my video guide on how to use Azure Policy to enforce tags for resource creation</p>
<p><iframe loading="lazy" title="Use Azure Policy to enforce tags for resource creation" width="840" height="473" src="https://www.youtube.com/embed/h6qXy20o0fY?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p style="text-align: justify;">You can find more at Microsoft Docs: <a href="https://docs.microsoft.com/en-us/azure/governance/policy/">https://docs.microsoft.com/en-us/azure/governance/policy/</a></p>
<p style="text-align: justify;">
<div class="saboxplugin-wrap" itemtype="http://schema.org/Person" itemscope itemprop="author">
<div class="saboxplugin-tab">
<div class="saboxplugin-gravatar"><img loading="lazy" decoding="async" src="https://www.e-apostolidis.gr/wp-content/uploads/2019/05/mvpsummit2019.jpg" width="100"  height="100" alt="Pantelis Apostolidis" itemprop="image"></div>
<div class="saboxplugin-authorname"><a href="https://www.cloudcorner.gr/author/admin/" class="vcard author" rel="author"><span class="fn">Pantelis Apostolidis</span></a></div>
<div class="saboxplugin-desc">
<div itemprop="description">
<p>Pantelis Apostolidis is a Sr. Specialist, Azure at Microsoft and a former Microsoft Azure MVP. For the last 20 years, Pantelis has been involved to major cloud projects in Greece and abroad, helping companies to adopt and deploy cloud technologies, driving business value. He is entitled to a lot of Microsoft Expert Certifications, demonstrating his proven experience in delivering high quality solutions. He is an author, blogger and he is acting as a spokesperson for conferences, workshops and webinars. He is also an active member of several communities as a moderator in azureheads.gr and autoexec.gr. Follow him on Twitter @papostolidis.</p>
</div>
</div>
<div class="saboxplugin-web "><a href="https://www.cloudcorner.gr" target="_self" >www.cloudcorner.gr</a></div>
<div class="clearfix"></div>
<div class="saboxplugin-socials "><a title="Facebook" target="_blank" href="https://www.facebook.com/pantelis.apostolidis" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-facebook" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 264 512"><path fill="currentColor" d="M76.7 512V283H0v-91h76.7v-71.7C76.7 42.4 124.3 0 193.8 0c33.3 0 61.9 2.5 70.2 3.6V85h-48.2c-37.8 0-45.1 18-45.1 44.3V192H256l-11.7 91h-73.6v229"></path></svg></span></a><a title="Linkedin" target="_blank" href="https://www.linkedin.com/in/papostolidis/" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-linkedin" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M100.3 480H7.4V180.9h92.9V480zM53.8 140.1C24.1 140.1 0 115.5 0 85.8 0 56.1 24.1 32 53.8 32c29.7 0 53.8 24.1 53.8 53.8 0 29.7-24.1 54.3-53.8 54.3zM448 480h-92.7V334.4c0-34.7-.7-79.2-48.3-79.2-48.3 0-55.7 37.7-55.7 76.7V480h-92.8V180.9h89.1v40.8h1.3c12.4-23.5 42.7-48.3 87.9-48.3 94 0 111.3 61.9 111.3 142.3V480z"></path></svg></span></a><a title="Instagram" target="_blank" href="https://www.instagram.com/proximagr" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-instagram" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M224.1 141c-63.6 0-114.9 51.3-114.9 114.9s51.3 114.9 114.9 114.9S339 319.5 339 255.9 287.7 141 224.1 141zm0 189.6c-41.1 0-74.7-33.5-74.7-74.7s33.5-74.7 74.7-74.7 74.7 33.5 74.7 74.7-33.6 74.7-74.7 74.7zm146.4-194.3c0 14.9-12 26.8-26.8 26.8-14.9 0-26.8-12-26.8-26.8s12-26.8 26.8-26.8 26.8 12 26.8 26.8zm76.1 27.2c-1.7-35.9-9.9-67.7-36.2-93.9-26.2-26.2-58-34.4-93.9-36.2-37-2.1-147.9-2.1-184.9 0-35.8 1.7-67.6 9.9-93.9 36.1s-34.4 58-36.2 93.9c-2.1 37-2.1 147.9 0 184.9 1.7 35.9 9.9 67.7 36.2 93.9s58 34.4 93.9 36.2c37 2.1 147.9 2.1 184.9 0 35.9-1.7 67.7-9.9 93.9-36.2 26.2-26.2 34.4-58 36.2-93.9 2.1-37 2.1-147.8 0-184.8zM398.8 388c-7.8 19.6-22.9 34.7-42.6 42.6-29.5 11.7-99.5 9-132.1 9s-102.7 2.6-132.1-9c-19.6-7.8-34.7-22.9-42.6-42.6-11.7-29.5-9-99.5-9-132.1s-2.6-102.7 9-132.1c7.8-19.6 22.9-34.7 42.6-42.6 29.5-11.7 99.5-9 132.1-9s102.7-2.6 132.1 9c19.6 7.8 34.7 22.9 42.6 42.6 11.7 29.5 9 99.5 9 132.1s2.7 102.7-9 132.1z"></path></svg></span></a><a title="Rss" target="_blank" href="https://wwwcloudcorner.gr/feed/rdf/" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-rss" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M128.081 415.959c0 35.369-28.672 64.041-64.041 64.041S0 451.328 0 415.959s28.672-64.041 64.041-64.041 64.04 28.673 64.04 64.041zm175.66 47.25c-8.354-154.6-132.185-278.587-286.95-286.95C7.656 175.765 0 183.105 0 192.253v48.069c0 8.415 6.49 15.472 14.887 16.018 111.832 7.284 201.473 96.702 208.772 208.772.547 8.397 7.604 14.887 16.018 14.887h48.069c9.149.001 16.489-7.655 15.995-16.79zm144.249.288C439.596 229.677 251.465 40.445 16.503 32.01 7.473 31.686 0 38.981 0 48.016v48.068c0 8.625 6.835 15.645 15.453 15.999 191.179 7.839 344.627 161.316 352.465 352.465.353 8.618 7.373 15.453 15.999 15.453h48.068c9.034-.001 16.329-7.474 16.005-16.504z"></path></svg></span></a><a title="Twitter" target="_blank" href="https://twitter.com/papostolidis" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-twitter" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 30 30"><path d="M26.37,26l-8.795-12.822l0.015,0.012L25.52,4h-2.65l-6.46,7.48L11.28,4H4.33l8.211,11.971L12.54,15.97L3.88,26h2.65 l7.182-8.322L19.42,26H26.37z M10.23,6l12.34,18h-2.1L8.12,6H10.23z" /></svg></span></a><a title="Github" target="_blank" href="https://github.com/proximagr" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-github" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 496 512"><path fill="currentColor" d="M165.9 397.4c0 2-2.3 3.6-5.2 3.6-3.3.3-5.6-1.3-5.6-3.6 0-2 2.3-3.6 5.2-3.6 3-.3 5.6 1.3 5.6 3.6zm-31.1-4.5c-.7 2 1.3 4.3 4.3 4.9 2.6 1 5.6 0 6.2-2s-1.3-4.3-4.3-5.2c-2.6-.7-5.5.3-6.2 2.3zm44.2-1.7c-2.9.7-4.9 2.6-4.6 4.9.3 2 2.9 3.3 5.9 2.6 2.9-.7 4.9-2.6 4.6-4.6-.3-1.9-3-3.2-5.9-2.9zM244.8 8C106.1 8 0 113.3 0 252c0 110.9 69.8 205.8 169.5 239.2 12.8 2.3 17.3-5.6 17.3-12.1 0-6.2-.3-40.4-.3-61.4 0 0-70 15-84.7-29.8 0 0-11.4-29.1-27.8-36.6 0 0-22.9-15.7 1.6-15.4 0 0 24.9 2 38.6 25.8 21.9 38.6 58.6 27.5 72.9 20.9 2.3-16 8.8-27.1 16-33.7-55.9-6.2-112.3-14.3-112.3-110.5 0-27.5 7.6-41.3 23.6-58.9-2.6-6.5-11.1-33.3 2.6-67.9 20.9-6.5 69 27 69 27 20-5.6 41.5-8.5 62.8-8.5s42.8 2.9 62.8 8.5c0 0 48.1-33.6 69-27 13.7 34.7 5.2 61.4 2.6 67.9 16 17.7 25.8 31.5 25.8 58.9 0 96.5-58.9 104.2-114.8 110.5 9.2 7.9 17 22.9 17 46.4 0 33.7-.3 75.4-.3 83.6 0 6.5 4.6 14.4 17.3 12.1C428.2 457.8 496 362.9 496 252 496 113.3 383.5 8 244.8 8zM97.2 352.9c-1.3 1-1 3.3.7 5.2 1.6 1.6 3.9 2.3 5.2 1 1.3-1 1-3.3-.7-5.2-1.6-1.6-3.9-2.3-5.2-1zm-10.8-8.1c-.7 1.3.3 2.9 2.3 3.9 1.6 1 3.6.7 4.3-.7.7-1.3-.3-2.9-2.3-3.9-2-.6-3.6-.3-4.3.7zm32.4 35.6c-1.6 1.3-1 4.3 1.3 6.2 2.3 2.3 5.2 2.6 6.5 1 1.3-1.3.7-4.3-1.3-6.2-2.2-2.3-5.2-2.6-6.5-1zm-11.4-14.7c-1.6 1-1.6 3.6 0 5.9 1.6 2.3 4.3 3.3 5.6 2.3 1.6-1.3 1.6-3.9 0-6.2-1.4-2.3-4-3.3-5.6-2z"></path></svg></span></a><a title="User email" target="_self" href="mailto:proxi&#109;&#097;&#103;r&#064;h&#111;&#116;ma&#105;l&#046;&#099;&#111;m" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-user_email" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M502.3 190.8c3.9-3.1 9.7-.2 9.7 4.7V400c0 26.5-21.5 48-48 48H48c-26.5 0-48-21.5-48-48V195.6c0-5 5.7-7.8 9.7-4.7 22.4 17.4 52.1 39.5 154.1 113.6 21.1 15.4 56.7 47.8 92.2 47.6 35.7.3 72-32.8 92.3-47.6 102-74.1 131.6-96.3 154-113.7zM256 320c23.2.4 56.6-29.2 73.4-41.4 132.7-96.3 142.8-104.7 173.4-128.7 5.8-4.5 9.2-11.5 9.2-18.9v-19c0-26.5-21.5-48-48-48H48C21.5 64 0 85.5 0 112v19c0 7.4 3.4 14.3 9.2 18.9 30.6 23.9 40.7 32.4 173.4 128.7 16.8 12.2 50.2 41.8 73.4 41.4z"></path></svg></span></a></div>
</div>
</div>
<p><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fwww.cloudcorner.gr%2Fmicrosoft%2Fazure%2Fazure-policy-enforce-tags-for-resource-creation%2F&amp;linkname=Azure%20Policy%20%7C%20Enforce%20tags%20for%20resource%20creation" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_print" href="https://www.addtoany.com/add_to/print?linkurl=https%3A%2F%2Fwww.cloudcorner.gr%2Fmicrosoft%2Fazure%2Fazure-policy-enforce-tags-for-resource-creation%2F&amp;linkname=Azure%20Policy%20%7C%20Enforce%20tags%20for%20resource%20creation" title="Print" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fwww.cloudcorner.gr%2Fmicrosoft%2Fazure%2Fazure-policy-enforce-tags-for-resource-creation%2F&#038;title=Azure%20Policy%20%7C%20Enforce%20tags%20for%20resource%20creation" data-a2a-url="https://www.cloudcorner.gr/microsoft/azure/azure-policy-enforce-tags-for-resource-creation/" data-a2a-title="Azure Policy | Enforce tags for resource creation"><img src="https://static.addtoany.com/buttons/share_save_171_16.png" alt="Share"></a></p><p>The post <a href="https://www.cloudcorner.gr/microsoft/azure/azure-policy-enforce-tags-for-resource-creation/">Azure Policy | Enforce tags for resource creation</a> appeared first on <a href="https://www.cloudcorner.gr">Apostolidis Cloud Corner</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.cloudcorner.gr/microsoft/azure/azure-policy-enforce-tags-for-resource-creation/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Azure Policy &#124; Limit the Azure VM Sizes</title>
		<link>https://www.cloudcorner.gr/microsoft/azure/azure-policy-limit-the-azure-vm-sizes/</link>
					<comments>https://www.cloudcorner.gr/microsoft/azure/azure-policy-limit-the-azure-vm-sizes/#respond</comments>
		
		<dc:creator><![CDATA[Pantelis Apostolidis]]></dc:creator>
		<pubDate>Tue, 28 May 2019 13:50:16 +0000</pubDate>
				<category><![CDATA[Azure]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[azure]]></category>
		<category><![CDATA[azure governance]]></category>
		<category><![CDATA[azure policy]]></category>
		<category><![CDATA[azurerm]]></category>
		<category><![CDATA[policy]]></category>
		<guid isPermaLink="false">https://www.e-apostolidis.gr/?p=2629</guid>

					<description><![CDATA[<p>Azure Policy &#124; Limit the Azure VM Sizes Azure Governance This post, Azure Policy, is the first of a series</p>
<p>The post <a href="https://www.cloudcorner.gr/microsoft/azure/azure-policy-limit-the-azure-vm-sizes/">Azure Policy | Limit the Azure VM Sizes</a> appeared first on <a href="https://www.cloudcorner.gr">Apostolidis Cloud Corner</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h1 style="text-align: justify;">Azure Policy | Limit the Azure VM Sizes</h1>
<h2 style="text-align: justify;">Azure Governance</h2>
<p style="text-align: justify;">This post, Azure Policy, is the first of a series of posts about Azure Governance. The idea is to explain through examples and how-to-guides, the tools that Microsoft Azure provides to help the administrators to enforce rules to all subscriptions. Some examples of those rules are, to help the organizations to stay compliant with their corporate standards, to standardize the resources creation and management, to manage the permissions and access controls, etc.</p>
<h2 style="text-align: justify;">Azure Policy</h2>
<p style="text-align: justify;">Azure Policy is a powerful tool for Azure Governance. With Azure Policy we can define rules for all Azure Subscriptions the we manage. We can use this rules for simple limitation actions, like permitting only specific VM Series and Sizes that can be created and also more complex rule sets that helps you standardize the whole Azure deployment.</p>
<h3 style="text-align: justify;">Limit the Azure VM Sizes</h3>
<p style="text-align: justify;">In this fist post we will go through a simple policy, the &#8220;Allowed virtual machine SKUs&#8221;. With this policy  you can control what Azure VM series and sizes are permitted for deployment. You can apply this policy  to a whole Management group, to a Subscription or to a single Resource Group.</p>
<h3 style="text-align: justify;">Step by Step Guide</h3>
<p style="text-align: justify;">Open the Azure portal, https://portal.azure.com, and login with your account. At the top search box write &#8220;policy&#8221;. From the search results select the &#8220;policy&#8221;.</p>
<p id="mLyGndu" style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone wp-image-2630 size-full" src="https://www.e-apostolidis.gr/wp-content/uploads/2019/05/img_5ced2adca1990.png" alt="Azure Policy" width="1044" height="639" srcset="https://www.cloudcorner.gr/wp-content/uploads/2019/05/img_5ced2adca1990.png 1044w, https://www.cloudcorner.gr/wp-content/uploads/2019/05/img_5ced2adca1990-300x184.png 300w, https://www.cloudcorner.gr/wp-content/uploads/2019/05/img_5ced2adca1990-768x470.png 768w, https://www.cloudcorner.gr/wp-content/uploads/2019/05/img_5ced2adca1990-1024x627.png 1024w, https://www.cloudcorner.gr/wp-content/uploads/2019/05/img_5ced2adca1990-600x367.png 600w" sizes="auto, (max-width: 1044px) 100vw, 1044px" /></p>
<p style="text-align: justify;">At the Policy screen, select the &#8220;Definitions&#8221;. To create and apply a policy we need to start from a Policy Definition.</p>
<p id="raUoVTI" style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone wp-image-2631 size-full" src="https://www.e-apostolidis.gr/wp-content/uploads/2019/05/img_5ced2b0eaaac0.png" alt="Azure Policy" width="877" height="495" srcset="https://www.cloudcorner.gr/wp-content/uploads/2019/05/img_5ced2b0eaaac0.png 877w, https://www.cloudcorner.gr/wp-content/uploads/2019/05/img_5ced2b0eaaac0-300x169.png 300w, https://www.cloudcorner.gr/wp-content/uploads/2019/05/img_5ced2b0eaaac0-768x433.png 768w, https://www.cloudcorner.gr/wp-content/uploads/2019/05/img_5ced2b0eaaac0-600x339.png 600w" sizes="auto, (max-width: 877px) 100vw, 877px" /></p>
<p style="text-align: justify;">At the Policy Definition screen, we can filter the definitions by scope, definition type, type and category. The &#8220;Allowed virtual machine SKUs&#8221; definition is under the &#8220;Compute&#8221; category. At the Category drop down menu, deselect everything and select only the &#8220;Compute&#8221;. Press the &#8220;Allowed virtual machine SKUs&#8221; definition.</p>
<p id="rgchCRY" style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone wp-image-2633 size-full" src="https://www.e-apostolidis.gr/wp-content/uploads/2019/05/img_5ced2c02879bd.png" alt="Azure Policy" width="1134" height="491" srcset="https://www.cloudcorner.gr/wp-content/uploads/2019/05/img_5ced2c02879bd.png 1134w, https://www.cloudcorner.gr/wp-content/uploads/2019/05/img_5ced2c02879bd-300x130.png 300w, https://www.cloudcorner.gr/wp-content/uploads/2019/05/img_5ced2c02879bd-768x333.png 768w, https://www.cloudcorner.gr/wp-content/uploads/2019/05/img_5ced2c02879bd-1024x443.png 1024w, https://www.cloudcorner.gr/wp-content/uploads/2019/05/img_5ced2c02879bd-600x260.png 600w" sizes="auto, (max-width: 1134px) 100vw, 1134px" /></p>
<p style="text-align: justify;">The &#8220;Allowed virtual machine SKUs&#8221; definition will open. Here we can see the code beneath the definition. It is written in json format. If we want to make changes at the definition we must first press &#8220;Duplicate definition&#8221;. This will create a copy of the definition. Then we can open the definition duplicatie and press &#8220;Edit definition. We will cover this at a future post.</p>
<p style="text-align: justify;">To select the VM sizes, the scope and apply the definition, press &#8220;Assign&#8221;</p>
<p id="ORMJNZu" style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone wp-image-2634 size-full" src="https://www.e-apostolidis.gr/wp-content/uploads/2019/05/img_5ced2c2b684c6.png" alt="Azure Policy" width="873" height="804" srcset="https://www.cloudcorner.gr/wp-content/uploads/2019/05/img_5ced2c2b684c6.png 873w, https://www.cloudcorner.gr/wp-content/uploads/2019/05/img_5ced2c2b684c6-300x276.png 300w, https://www.cloudcorner.gr/wp-content/uploads/2019/05/img_5ced2c2b684c6-768x707.png 768w, https://www.cloudcorner.gr/wp-content/uploads/2019/05/img_5ced2c2b684c6-600x553.png 600w" sizes="auto, (max-width: 873px) 100vw, 873px" /></p>
<h3 style="text-align: justify;">Set the scope</h3>
<p style="text-align: justify;">At the Assign policy screen, first we need to select the scope. The scope is where the policy definition will apply. To set the scope press the little blue box with the three dots.</p>
<p id="DzuGnPb" style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone wp-image-2635 size-full" src="https://www.e-apostolidis.gr/wp-content/uploads/2019/05/img_5ced2c74f2737.png" alt="Azure Policy" width="849" height="898" srcset="https://www.cloudcorner.gr/wp-content/uploads/2019/05/img_5ced2c74f2737.png 849w, https://www.cloudcorner.gr/wp-content/uploads/2019/05/img_5ced2c74f2737-284x300.png 284w, https://www.cloudcorner.gr/wp-content/uploads/2019/05/img_5ced2c74f2737-768x812.png 768w, https://www.cloudcorner.gr/wp-content/uploads/2019/05/img_5ced2c74f2737-600x635.png 600w" sizes="auto, (max-width: 849px) 100vw, 849px" /></p>
<p style="text-align: justify;">For scope, we can select a whole Management group, a whole subscription or a single Resource Group.</p>
<p id="YmcgGYT" style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone wp-image-2636 size-full" src="https://www.e-apostolidis.gr/wp-content/uploads/2019/05/img_5ced2c91f2c13.png" alt="Azure Policy" width="594" height="370" srcset="https://www.cloudcorner.gr/wp-content/uploads/2019/05/img_5ced2c91f2c13.png 594w, https://www.cloudcorner.gr/wp-content/uploads/2019/05/img_5ced2c91f2c13-300x187.png 300w" sizes="auto, (max-width: 594px) 100vw, 594px" /></p>
<h3 style="text-align: justify;">Select the Azure VM SKUs</h3>
<p style="text-align: justify;">After the scope, we need to select the allowed Azure VM SKUs. Open the drop down menu and select the SKUs that you will allow.</p>
<p id="zgITsSJ" style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone wp-image-2637 size-full" src="https://www.e-apostolidis.gr/wp-content/uploads/2019/05/img_5ced2cec6b7b5.png" alt="Azure Policy" width="826" height="605" srcset="https://www.cloudcorner.gr/wp-content/uploads/2019/05/img_5ced2cec6b7b5.png 826w, https://www.cloudcorner.gr/wp-content/uploads/2019/05/img_5ced2cec6b7b5-300x220.png 300w, https://www.cloudcorner.gr/wp-content/uploads/2019/05/img_5ced2cec6b7b5-768x563.png 768w, https://www.cloudcorner.gr/wp-content/uploads/2019/05/img_5ced2cec6b7b5-600x439.png 600w" sizes="auto, (max-width: 826px) 100vw, 826px" /></p>
<p style="text-align: justify;">At this test policy, I selected all Standard F1-4 series, the Standard F2s &#8211; 4s and the Standard F2s_v2 &#8211; 4s_v2.</p>
<p style="text-align: justify;">We can change the &#8220;Assignment Name&#8221; to easily find the specific assignment at the Assigned Policies list. I changed the name to &#8220;Allowed only F1-4 virtual machine SKUs&#8221;</p>
<p style="text-align: justify;">The next step is the &#8220;Managed Identity&#8221;. Managed identity creates an Azure AD Identity, like a service account, that is used for resource creation. We need this only for some specific policies that must create a resource if it is doesn&#8217;t exists.</p>
<p style="text-align: justify;">We don&#8217;t need a Managed Identity to limit the Azure VM SKU sizes. So now we can press &#8220;Assign&#8221;.</p>
<p id="cgeKNTn" style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone wp-image-2638 size-full" src="https://www.e-apostolidis.gr/wp-content/uploads/2019/05/img_5ced2d0dafe3a.png" alt="Azure Policy" width="840" height="417" srcset="https://www.cloudcorner.gr/wp-content/uploads/2019/05/img_5ced2d0dafe3a.png 840w, https://www.cloudcorner.gr/wp-content/uploads/2019/05/img_5ced2d0dafe3a-300x149.png 300w, https://www.cloudcorner.gr/wp-content/uploads/2019/05/img_5ced2d0dafe3a-768x381.png 768w, https://www.cloudcorner.gr/wp-content/uploads/2019/05/img_5ced2d0dafe3a-600x298.png 600w" sizes="auto, (max-width: 840px) 100vw, 840px" /></p>
<p style="text-align: justify;">A notification will inform you that the Policy will take effect after about 30 minutes. The policy needs this time to apply the rules to the selected scope.</p>
<p id="CbOSkoi" style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone wp-image-2639 size-full" src="https://www.e-apostolidis.gr/wp-content/uploads/2019/05/img_5ced2d39cabda.png" alt="Azure Policy" width="512" height="251" srcset="https://www.cloudcorner.gr/wp-content/uploads/2019/05/img_5ced2d39cabda.png 512w, https://www.cloudcorner.gr/wp-content/uploads/2019/05/img_5ced2d39cabda-300x147.png 300w" sizes="auto, (max-width: 512px) 100vw, 512px" /></p>
<p style="text-align: justify;">Back to the policy Assignments screen, hit refresh and you will see the new Policy Assignment&#8217;s name and the Scope.</p>
<p id="DdEoYdr" style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone wp-image-2643 size-full" src="https://www.e-apostolidis.gr/wp-content/uploads/2019/05/img_5ced352439417.png" alt="Azure Policy" width="930" height="572" srcset="https://www.cloudcorner.gr/wp-content/uploads/2019/05/img_5ced352439417.png 930w, https://www.cloudcorner.gr/wp-content/uploads/2019/05/img_5ced352439417-300x185.png 300w, https://www.cloudcorner.gr/wp-content/uploads/2019/05/img_5ced352439417-768x472.png 768w, https://www.cloudcorner.gr/wp-content/uploads/2019/05/img_5ced352439417-600x369.png 600w" sizes="auto, (max-width: 930px) 100vw, 930px" /></p>
<h3 style="text-align: justify;">Test the policy</h3>
<p style="text-align: justify;">To test the policy, I waited 30 minutes and tried to create a Standard DS1 v2 VM at the devrg Resource Group. Although I am the Subscription Owner, the Service admin, the one that created the policy assignment, the Azure Resource Manager doesn&#8217;t allow me to create this VM.</p>
<p id="RbvPdbR" style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone wp-image-2644 size-full" src="https://www.e-apostolidis.gr/wp-content/uploads/2019/05/img_5ced36916e198.png" alt="Azure Policy" width="738" height="438" srcset="https://www.cloudcorner.gr/wp-content/uploads/2019/05/img_5ced36916e198.png 738w, https://www.cloudcorner.gr/wp-content/uploads/2019/05/img_5ced36916e198-300x178.png 300w, https://www.cloudcorner.gr/wp-content/uploads/2019/05/img_5ced36916e198-600x356.png 600w" sizes="auto, (max-width: 738px) 100vw, 738px" /></p>
<p style="text-align: justify;">And the error details: &#8220;disallowed by policy&#8221;</p>
<p id="CNaPmMi" style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone wp-image-2645 size-full" src="https://www.e-apostolidis.gr/wp-content/uploads/2019/05/img_5ced36b22e986.png" alt="Azure Policy" width="545" height="367" srcset="https://www.cloudcorner.gr/wp-content/uploads/2019/05/img_5ced36b22e986.png 545w, https://www.cloudcorner.gr/wp-content/uploads/2019/05/img_5ced36b22e986-300x202.png 300w, https://www.cloudcorner.gr/wp-content/uploads/2019/05/img_5ced36b22e986-120x80.png 120w" sizes="auto, (max-width: 545px) 100vw, 545px" /></p>
<p style="text-align: justify;">You can find more about Azure Policy at Microsoft Docs: <a href="https://docs.microsoft.com/en-us/azure/governance/policy/">https://docs.microsoft.com/en-us/azure/governance/policy/</a></p>
<p>You can also check my webinar: [embedyt] https://www.youtube.com/watch?v=QHk3XhnomaE[/embedyt]</p>
<div class="saboxplugin-wrap" itemtype="http://schema.org/Person" itemscope itemprop="author">
<div class="saboxplugin-tab">
<div class="saboxplugin-gravatar"><img loading="lazy" decoding="async" src="https://www.e-apostolidis.gr/wp-content/uploads/2019/05/mvpsummit2019.jpg" width="100"  height="100" alt="Pantelis Apostolidis" itemprop="image"></div>
<div class="saboxplugin-authorname"><a href="https://www.cloudcorner.gr/author/admin/" class="vcard author" rel="author"><span class="fn">Pantelis Apostolidis</span></a></div>
<div class="saboxplugin-desc">
<div itemprop="description">
<p>Pantelis Apostolidis is a Sr. Specialist, Azure at Microsoft and a former Microsoft Azure MVP. For the last 20 years, Pantelis has been involved to major cloud projects in Greece and abroad, helping companies to adopt and deploy cloud technologies, driving business value. He is entitled to a lot of Microsoft Expert Certifications, demonstrating his proven experience in delivering high quality solutions. He is an author, blogger and he is acting as a spokesperson for conferences, workshops and webinars. He is also an active member of several communities as a moderator in azureheads.gr and autoexec.gr. Follow him on Twitter @papostolidis.</p>
</div>
</div>
<div class="saboxplugin-web "><a href="https://www.cloudcorner.gr" target="_self" >www.cloudcorner.gr</a></div>
<div class="clearfix"></div>
<div class="saboxplugin-socials "><a title="Facebook" target="_blank" href="https://www.facebook.com/pantelis.apostolidis" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-facebook" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 264 512"><path fill="currentColor" d="M76.7 512V283H0v-91h76.7v-71.7C76.7 42.4 124.3 0 193.8 0c33.3 0 61.9 2.5 70.2 3.6V85h-48.2c-37.8 0-45.1 18-45.1 44.3V192H256l-11.7 91h-73.6v229"></path></svg></span></a><a title="Linkedin" target="_blank" href="https://www.linkedin.com/in/papostolidis/" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-linkedin" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M100.3 480H7.4V180.9h92.9V480zM53.8 140.1C24.1 140.1 0 115.5 0 85.8 0 56.1 24.1 32 53.8 32c29.7 0 53.8 24.1 53.8 53.8 0 29.7-24.1 54.3-53.8 54.3zM448 480h-92.7V334.4c0-34.7-.7-79.2-48.3-79.2-48.3 0-55.7 37.7-55.7 76.7V480h-92.8V180.9h89.1v40.8h1.3c12.4-23.5 42.7-48.3 87.9-48.3 94 0 111.3 61.9 111.3 142.3V480z"></path></svg></span></a><a title="Instagram" target="_blank" href="https://www.instagram.com/proximagr" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-instagram" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M224.1 141c-63.6 0-114.9 51.3-114.9 114.9s51.3 114.9 114.9 114.9S339 319.5 339 255.9 287.7 141 224.1 141zm0 189.6c-41.1 0-74.7-33.5-74.7-74.7s33.5-74.7 74.7-74.7 74.7 33.5 74.7 74.7-33.6 74.7-74.7 74.7zm146.4-194.3c0 14.9-12 26.8-26.8 26.8-14.9 0-26.8-12-26.8-26.8s12-26.8 26.8-26.8 26.8 12 26.8 26.8zm76.1 27.2c-1.7-35.9-9.9-67.7-36.2-93.9-26.2-26.2-58-34.4-93.9-36.2-37-2.1-147.9-2.1-184.9 0-35.8 1.7-67.6 9.9-93.9 36.1s-34.4 58-36.2 93.9c-2.1 37-2.1 147.9 0 184.9 1.7 35.9 9.9 67.7 36.2 93.9s58 34.4 93.9 36.2c37 2.1 147.9 2.1 184.9 0 35.9-1.7 67.7-9.9 93.9-36.2 26.2-26.2 34.4-58 36.2-93.9 2.1-37 2.1-147.8 0-184.8zM398.8 388c-7.8 19.6-22.9 34.7-42.6 42.6-29.5 11.7-99.5 9-132.1 9s-102.7 2.6-132.1-9c-19.6-7.8-34.7-22.9-42.6-42.6-11.7-29.5-9-99.5-9-132.1s-2.6-102.7 9-132.1c7.8-19.6 22.9-34.7 42.6-42.6 29.5-11.7 99.5-9 132.1-9s102.7-2.6 132.1 9c19.6 7.8 34.7 22.9 42.6 42.6 11.7 29.5 9 99.5 9 132.1s2.7 102.7-9 132.1z"></path></svg></span></a><a title="Rss" target="_blank" href="https://wwwcloudcorner.gr/feed/rdf/" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-rss" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M128.081 415.959c0 35.369-28.672 64.041-64.041 64.041S0 451.328 0 415.959s28.672-64.041 64.041-64.041 64.04 28.673 64.04 64.041zm175.66 47.25c-8.354-154.6-132.185-278.587-286.95-286.95C7.656 175.765 0 183.105 0 192.253v48.069c0 8.415 6.49 15.472 14.887 16.018 111.832 7.284 201.473 96.702 208.772 208.772.547 8.397 7.604 14.887 16.018 14.887h48.069c9.149.001 16.489-7.655 15.995-16.79zm144.249.288C439.596 229.677 251.465 40.445 16.503 32.01 7.473 31.686 0 38.981 0 48.016v48.068c0 8.625 6.835 15.645 15.453 15.999 191.179 7.839 344.627 161.316 352.465 352.465.353 8.618 7.373 15.453 15.999 15.453h48.068c9.034-.001 16.329-7.474 16.005-16.504z"></path></svg></span></a><a title="Twitter" target="_blank" href="https://twitter.com/papostolidis" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-twitter" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 30 30"><path d="M26.37,26l-8.795-12.822l0.015,0.012L25.52,4h-2.65l-6.46,7.48L11.28,4H4.33l8.211,11.971L12.54,15.97L3.88,26h2.65 l7.182-8.322L19.42,26H26.37z M10.23,6l12.34,18h-2.1L8.12,6H10.23z" /></svg></span></a><a title="Github" target="_blank" href="https://github.com/proximagr" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-github" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 496 512"><path fill="currentColor" d="M165.9 397.4c0 2-2.3 3.6-5.2 3.6-3.3.3-5.6-1.3-5.6-3.6 0-2 2.3-3.6 5.2-3.6 3-.3 5.6 1.3 5.6 3.6zm-31.1-4.5c-.7 2 1.3 4.3 4.3 4.9 2.6 1 5.6 0 6.2-2s-1.3-4.3-4.3-5.2c-2.6-.7-5.5.3-6.2 2.3zm44.2-1.7c-2.9.7-4.9 2.6-4.6 4.9.3 2 2.9 3.3 5.9 2.6 2.9-.7 4.9-2.6 4.6-4.6-.3-1.9-3-3.2-5.9-2.9zM244.8 8C106.1 8 0 113.3 0 252c0 110.9 69.8 205.8 169.5 239.2 12.8 2.3 17.3-5.6 17.3-12.1 0-6.2-.3-40.4-.3-61.4 0 0-70 15-84.7-29.8 0 0-11.4-29.1-27.8-36.6 0 0-22.9-15.7 1.6-15.4 0 0 24.9 2 38.6 25.8 21.9 38.6 58.6 27.5 72.9 20.9 2.3-16 8.8-27.1 16-33.7-55.9-6.2-112.3-14.3-112.3-110.5 0-27.5 7.6-41.3 23.6-58.9-2.6-6.5-11.1-33.3 2.6-67.9 20.9-6.5 69 27 69 27 20-5.6 41.5-8.5 62.8-8.5s42.8 2.9 62.8 8.5c0 0 48.1-33.6 69-27 13.7 34.7 5.2 61.4 2.6 67.9 16 17.7 25.8 31.5 25.8 58.9 0 96.5-58.9 104.2-114.8 110.5 9.2 7.9 17 22.9 17 46.4 0 33.7-.3 75.4-.3 83.6 0 6.5 4.6 14.4 17.3 12.1C428.2 457.8 496 362.9 496 252 496 113.3 383.5 8 244.8 8zM97.2 352.9c-1.3 1-1 3.3.7 5.2 1.6 1.6 3.9 2.3 5.2 1 1.3-1 1-3.3-.7-5.2-1.6-1.6-3.9-2.3-5.2-1zm-10.8-8.1c-.7 1.3.3 2.9 2.3 3.9 1.6 1 3.6.7 4.3-.7.7-1.3-.3-2.9-2.3-3.9-2-.6-3.6-.3-4.3.7zm32.4 35.6c-1.6 1.3-1 4.3 1.3 6.2 2.3 2.3 5.2 2.6 6.5 1 1.3-1.3.7-4.3-1.3-6.2-2.2-2.3-5.2-2.6-6.5-1zm-11.4-14.7c-1.6 1-1.6 3.6 0 5.9 1.6 2.3 4.3 3.3 5.6 2.3 1.6-1.3 1.6-3.9 0-6.2-1.4-2.3-4-3.3-5.6-2z"></path></svg></span></a><a title="User email" target="_self" href="mailto:p&#114;o&#120;i&#109;agr&#064;ho&#116;&#109;ai&#108;.c&#111;&#109;" rel="nofollow noopener" class="saboxplugin-icon-grey"><svg aria-hidden="true" class="sab-user_email" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M502.3 190.8c3.9-3.1 9.7-.2 9.7 4.7V400c0 26.5-21.5 48-48 48H48c-26.5 0-48-21.5-48-48V195.6c0-5 5.7-7.8 9.7-4.7 22.4 17.4 52.1 39.5 154.1 113.6 21.1 15.4 56.7 47.8 92.2 47.6 35.7.3 72-32.8 92.3-47.6 102-74.1 131.6-96.3 154-113.7zM256 320c23.2.4 56.6-29.2 73.4-41.4 132.7-96.3 142.8-104.7 173.4-128.7 5.8-4.5 9.2-11.5 9.2-18.9v-19c0-26.5-21.5-48-48-48H48C21.5 64 0 85.5 0 112v19c0 7.4 3.4 14.3 9.2 18.9 30.6 23.9 40.7 32.4 173.4 128.7 16.8 12.2 50.2 41.8 73.4 41.4z"></path></svg></span></a></div>
</div>
</div>
<p><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fwww.cloudcorner.gr%2Fmicrosoft%2Fazure%2Fazure-policy-limit-the-azure-vm-sizes%2F&amp;linkname=Azure%20Policy%20%7C%20Limit%20the%20Azure%20VM%20Sizes" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_print" href="https://www.addtoany.com/add_to/print?linkurl=https%3A%2F%2Fwww.cloudcorner.gr%2Fmicrosoft%2Fazure%2Fazure-policy-limit-the-azure-vm-sizes%2F&amp;linkname=Azure%20Policy%20%7C%20Limit%20the%20Azure%20VM%20Sizes" title="Print" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fwww.cloudcorner.gr%2Fmicrosoft%2Fazure%2Fazure-policy-limit-the-azure-vm-sizes%2F&#038;title=Azure%20Policy%20%7C%20Limit%20the%20Azure%20VM%20Sizes" data-a2a-url="https://www.cloudcorner.gr/microsoft/azure/azure-policy-limit-the-azure-vm-sizes/" data-a2a-title="Azure Policy | Limit the Azure VM Sizes"><img src="https://static.addtoany.com/buttons/share_save_171_16.png" alt="Share"></a></p><p>The post <a href="https://www.cloudcorner.gr/microsoft/azure/azure-policy-limit-the-azure-vm-sizes/">Azure Policy | Limit the Azure VM Sizes</a> appeared first on <a href="https://www.cloudcorner.gr">Apostolidis Cloud Corner</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.cloudcorner.gr/microsoft/azure/azure-policy-limit-the-azure-vm-sizes/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
