| Source | Azure Portal | ||||||||||||||||||||||
| Display name | Storage accounts should restrict network access using virtual network rules (excluding storage accounts created by Databricks) | ||||||||||||||||||||||
| Id | db4f9b05-5ffd-4b34-b714-3c710dbb3fd6 | ||||||||||||||||||||||
| Version | 1.0.0 Details on versioning |
||||||||||||||||||||||
| Versioning |
Versions supported for Versioning: 1 1.0.0 Built-in Versioning [Preview] |
||||||||||||||||||||||
| Category | Storage Microsoft Learn |
||||||||||||||||||||||
| Description | Protect your storage accounts from potential threats using virtual network rules as a preferred method instead of IP-based filtering. Disabling IP-based filtering prevents public IPs from accessing your storage accounts. | ||||||||||||||||||||||
| Cloud environments | AzureCloud = true AzureUSGovernment = true AzureChinaCloud = unknown |
||||||||||||||||||||||
| Available in AzUSGov | The Policy is available in AzureUSGovernment cloud. Version: '1.*.*' | ||||||||||||||||||||||
| Mode | Indexed | ||||||||||||||||||||||
| Type | BuiltIn | ||||||||||||||||||||||
| Preview | False | ||||||||||||||||||||||
| Deprecated | False | ||||||||||||||||||||||
| Effect | Default Audit Allowed Audit, Deny, Disabled |
||||||||||||||||||||||
| RBAC role(s) | none | ||||||||||||||||||||||
| Rule aliases | IF (2)
|
||||||||||||||||||||||
| Rule resource types | IF (1) |
||||||||||||||||||||||
| Compliance |
The following 1 compliance controls are associated with this Policy definition 'Storage accounts should restrict network access using virtual network rules (excluding storage accounts created by Databricks)' (db4f9b05-5ffd-4b34-b714-3c710dbb3fd6)
| ||||||||||||||||||||||
| Initiatives usage |
|
||||||||||||||||||||||
| History |
|
||||||||||||||||||||||
| JSON compare | n/a | ||||||||||||||||||||||
| JSON |
|