JSON
api-version=2023-04-01
Copy definition Copy definition 4 EPAC EPAC
{ 9 items displayName: "[Deprecated]: New Zealand ISM Restricted" , policyType: "BuiltIn" , description: "This initiative includes policies that address a subset of New Zealand Information Security Manual controls. Additional policies will be added in upcoming releases. For more information, visit https://aka.ms/nzism-initiative." , metadata: { 3 items version: "11.13.0-deprecated" , category: "Regulatory Compliance" , deprecated: true } , version: "11.13.0" , parameters: { 195 items effect-055aa869-bc98-4af8-bafc-23f1ab6ffe2c: { 4 items type: "String" , metadata: { 3 items displayName: "[Deprecated]: Effect for policy: Web Application Firewall (WAF) should be enabled for Azure Front Door Service" , description: "For more information about effects, visit https://aka.ms/policyeffects" , deprecated: true } , allowedValues: [ 3 items "Audit" , "Deny" , "Disabled" ] , defaultValue: "Disabled" } , effect-057d6cfe-9c4f-4a6d-bc60-14420ea1f1a9: { 4 items type: "String" , metadata: { 3 items displayName: "[Deprecated]: Effect for policy: Vulnerability Assessment settings for SQL server should contain an email address to receive scan reports" , description: "For more information about effects, visit https://aka.ms/policyeffects" , deprecated: true } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , effect-08e6af2d-db70-460a-bfe9-d5bd474ba9d6: { 4 items type: "String" , metadata: { 3 items displayName: "[Deprecated]: Effect for policy: Adaptive network hardening recommendations should be applied on internet facing virtual machines" , description: "For more information about effects, visit https://aka.ms/policyeffects" , deprecated: true } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "Disabled" } , effect-09024ccc-0c5f-475e-9457-b7c0d9ed487b: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: There should be more than one owner assigned to your subscription" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , effect-0961003e-5a0a-4549-abde-af6a37f2724d: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Virtual machines should encrypt temp disks, caches, and data flows between Compute and Storage resources" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , effect-0e60b895-3786-45da-8377-9c6b4b6ac5f9: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Remote debugging should be turned off for Function Apps" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , effect-12430be1-6cc8-4527-a9a8-e3d38f250096: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Web Application Firewall (WAF) should use the specified mode for Application Gateway" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 3 items "Audit" , "Deny" , "Disabled" ] , defaultValue: "Audit" } , modeRequirement-12430be1-6cc8-4527-a9a8-e3d38f250096: { 4 items type: "String" , metadata: { 2 items displayName: "WAF mode requirement for Application Gateway" , description: "The Prevention or Detection mode must be enabled on the Application Gateway service" } , allowedValues: [ 2 items ] , defaultValue: "Detection" } , effect-17k78e20-9358-41c9-923c-fb736d382a12: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Transparent Data Encryption on SQL databases should be enabled" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , effect-1b7aa243-30e4-4c9e-bca8-d0d3022b634a: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Vulnerability assessment should be enabled on SQL Managed Instance" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , listOfImageIdToInclude-1c210e94-a481-4beb-95fa-1571b434fb04: { 3 items type: "Array" , metadata: { 3 items displayName: "[Deprecated]: Optional: List of custom VM images that have supported Windows OS to add to scope additional to the images in the gallery" , description: "For more information on Guest Configuration, visit https://aka.ms/gcpol" , deprecated: true } , defaultValue: [] } , effect-1f314764-cb73-4fc9-b863-8eca98ac36e9: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: An Azure Active Directory administrator should be provisioned for SQL servers" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , effect-22bee202-a82f-4305-9a2a-6d7f44d4dedb: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Only secure connections to your Azure Cache for Redis should be enabled" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 3 items "Audit" , "Deny" , "Disabled" ] , defaultValue: "Audit" } , effect-26a828e1-e88f-464e-bbb3-c134a282b9de: { 4 items type: "String" , metadata: { 3 items displayName: "[Deprecated]: Effect for policy: Endpoint protection solution should be installed on virtual machine scale sets" , description: "For more information about effects, visit https://aka.ms/policyeffects" , deprecated: true } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "Disabled" } , IncludeArcMachines-30f71ea1-ac77-4f26-9fc5-2d926bbd4ba7: { 4 items type: "String" , metadata: { 2 items displayName: "Include Arc-connected servers when evaluating policy: Audit Windows machines missing any of specified members in the Administrators group" , description: "By selecting 'true,' you agree to be charged monthly per Arc connected machine" } , allowedValues: [ 2 items ] , defaultValue: "false" } , MembersToInclude-30f71ea1-ac77-4f26-9fc5-2d926bbd4ba7: { 2 items type: "String" , metadata: { 2 items displayName: "List of users that must be included in Windows VM Administrators group" , description: "A semicolon-separated list of users that should be included in the Administrators local group; Ex: Administrator; myUser1; myUser2" } } , listOfImageIdToInclude_windows-32133ab0-ee4b-4b44-98d6-042180979d50: { 3 items type: "Array" , metadata: { 3 items displayName: "[Deprecated]: Optional: List of custom VM images that have supported Windows OS to add to scope additional to the images in the gallery" , description: "For more information on Guest Configuration, visit https://aka.ms/gcpol" , deprecated: true } , defaultValue: [] } , listOfImageIdToInclude_linux-32133ab0-ee4b-4b44-98d6-042180979d50: { 3 items type: "Array" , metadata: { 3 items displayName: "[Deprecated]: Optional: List of custom VM images that have supported Linux OS to add to scope additional to the images in the gallery" , description: "For more information on Guest Configuration, visit https://aka.ms/gcpol" , deprecated: true } , defaultValue: [] } , effect-34c877ad-507e-4c82-993e-3452a6e0ad3c: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Storage accounts should restrict network access" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 3 items "Audit" , "Deny" , "Disabled" ] , defaultValue: "Audit" } , listOfImageIdToInclude-3be22e3b-d919-47aa-805e-8985dbeb0ad9: { 3 items type: "Array" , metadata: { 3 items displayName: "[Deprecated]: Optional: List of custom VM images that have supported Windows OS to add to scope additional to the images in the gallery" , description: "For more information on Guest Configuration, visit https://aka.ms/gcpol" , deprecated: true } , defaultValue: [] } , effect-3c735d8a-a4ba-4a3a-b7cf-db7754cf57f4: { 4 items type: "String" , metadata: { 3 items displayName: "[Deprecated]: Effect for policy: Vulnerabilities in security configuration on your virtual machine scale sets should be remediated" , description: "For more information about effects, visit https://aka.ms/policyeffects" , deprecated: true } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "Disabled" } , IncludeArcMachines-3d2a3320-2a72-4c67-ac5f-caa40fbee2b2: { 4 items type: "String" , metadata: { 2 items displayName: "Include Arc-connected servers when evaluating policy: Audit Windows machines that have extra accounts in the Administrators group" , description: "By selecting 'true,' you agree to be charged monthly per Arc connected machine" } , allowedValues: [ 2 items ] , defaultValue: "false" } , Members-3d2a3320-2a72-4c67-ac5f-caa40fbee2b2: { 3 items type: "String" , metadata: { 2 items displayName: "List of users that Windows VM Administrators group must only include" , description: "A semicolon-separated list of all the expected members of the Administrators local group; Ex: Administrator; myUser1; myUser2" } , defaultValue: "Administrator" } , effect-404c3081-a854-4457-ae30-26a93ef643f9: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Secure transfer to storage accounts should be enabled" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 3 items "Audit" , "Deny" , "Disabled" ] , defaultValue: "Audit" } , effect-425bea59-a659-4cbb-8d31-34499bd030b8: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Web Application Firewall (WAF) should use the specified mode for Azure Front Door Service" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 3 items "Audit" , "Deny" , "Disabled" ] , defaultValue: "Audit" } , modeRequirement-425bea59-a659-4cbb-8d31-34499bd030b8: { 4 items type: "String" , metadata: { 2 items displayName: "WAF mode requirement for Azure Front Door Service" , description: "The Prevention or Detection mode must be enabled on the Azure Front Door service" } , allowedValues: [ 2 items ] , defaultValue: "Detection" } , effect-47a6b606-51aa-4496-8bb7-64b11cf66adc: { 4 items type: "String" , metadata: { 3 items displayName: "[Deprecated]: Effect for policy: Adaptive application controls for defining safe applications should be enabled on your machines" , description: "For more information about effects, visit https://aka.ms/policyeffects" , deprecated: true } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "Disabled" } , effect-4f11b553-d42e-4e3a-89be-32ca364cad4c: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: A maximum of 3 owners should be designated for your subscription" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , effect-4fa4b6c0-31ca-4c0d-b10d-24b96f62a751: { 4 items type: "String" , metadata: { 3 items displayName: "[Deprecated]: Effect for policy: [Preview]: Storage account public access should be disallowed" , description: "For more information about effects, visit https://aka.ms/policyeffects" , deprecated: true } , allowedValues: [ 3 items "audit" , "deny" , "disabled" ] , defaultValue: "disabled" } , effect-501541f7-f7e7-4cd6-868c-4190fdad3ac9: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: A vulnerability assessment solution should be enabled on your virtual machines" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , effect-564feb30-bf6a-4854-b4bb-0d2d2d1e6c66: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Web Application Firewall (WAF) should be enabled for Application Gateway" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 3 items "Audit" , "Deny" , "Disabled" ] , defaultValue: "Audit" } , effect-5744710e-cc2f-4ee8-8809-3b11e89f4bc9: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: CORS should not allow every resource to access your Web Applications" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , IncludeArcMachines-5752e6d6-1206-46d8-8ab1-ecc2f71a8112: { 4 items type: "String" , metadata: { 2 items displayName: "Include Arc-connected servers when evaluating policy: Audit Windows web servers that are not using secure communication protocols" , description: "By selecting 'true,' you agree to be charged monthly per Arc connected machine" } , allowedValues: [ 2 items ] , defaultValue: "false" } , MinimumTLSVersion-5752e6d6-1206-46d8-8ab1-ecc2f71a8112: { 4 items type: "String" , metadata: { 2 items displayName: "Minimum TLS version for Windows web servers" , description: "Windows web servers with lower TLS versions will be assessed as non-compliant" } , allowedValues: [ 2 items ] , defaultValue: "1.2" } , listOfImageIdToInclude_windows-5c3bc7b8-a64c-4e08-a9cd-7ff0f31e1138: { 3 items type: "Array" , metadata: { 3 items displayName: "[Deprecated]: Optional: List of custom VM images that have supported Windows OS to add to scope additional to the images in the gallery" , description: "For more information on Guest Configuration, visit https://aka.ms/gcpol" , deprecated: true } , defaultValue: [] } , listOfImageIdToInclude_linux-5c3bc7b8-a64c-4e08-a9cd-7ff0f31e1138: { 3 items type: "Array" , metadata: { 3 items displayName: "[Deprecated]: Optional: List of custom VM images that have supported Linux OS to add to scope additional to the images in the gallery" , description: "For more information on Guest Configuration, visit https://aka.ms/gcpol" , deprecated: true } , defaultValue: [] } , effect-5c607a2e-c700-4744-8254-d77e7c9eb5e4: { 4 items type: "String" , metadata: { 3 items displayName: "[Deprecated]: Effect for policy: External accounts with write permissions should be removed from your subscription" , description: "For more information about effects, visit https://aka.ms/policyeffects" , deprecated: true } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , effect-94e1c2ac-cbbe-4cac-a2b5-389c812dee87: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: External accounts with write permissions should be removed from your subscription" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , IncludeArcMachines-69bf4abd-ca1e-4cf6-8b5a-762d42e61d4f: { 4 items type: "String" , metadata: { 2 items displayName: "Include Arc-connected servers when evaluating policy: Audit Windows machines that have the specified members in the Administrators group" , description: "By selecting 'true,' you agree to be charged monthly per Arc connected machine" } , allowedValues: [ 2 items ] , defaultValue: "false" } , MembersToExclude-69bf4abd-ca1e-4cf6-8b5a-762d42e61d4f: { 2 items type: "String" , metadata: { 2 items displayName: "List of users that must be excluded from Windows VM Administrators group" , description: "A semicolon-separated list of users that should be excluded in the Administrators local group; Ex: Administrator; myUser1; myUser2" } } , effect-6b1cbf55-e8b6-442f-ba4c-7246b6381474: { 4 items type: "String" , metadata: { 3 items displayName: "[Deprecated]: Effect for policy: Deprecated accounts should be removed from your subscription" , description: "For more information about effects, visit https://aka.ms/policyeffects" , deprecated: true } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , effect-8d7e1fde-fe26-4b5f-8108-f8e432cbc2be: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Deprecated accounts should be removed from your subscription" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , effect-6d555dd1-86f2-4f1c-8ed7-5abae7c6cbab: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Function App should only be accessible over HTTPS" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items ] , defaultValue: "Audit" } , effect-7796937f-307b-4598-941c-67d3a05ebfe7: { 4 items type: "String" , metadata: { 3 items displayName: "[Deprecated]: Effect for policy: Azure subscriptions should have a log profile for Activity Log" , description: "For more information about effects, visit https://aka.ms/policyeffects" , deprecated: true } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "Disabled" } , listOfResourceTypes-7f89b1eb-583c-429a-8828-af049802c1d9: { 3 items type: "Array" , metadata: { 3 items displayName: "[Deprecated]: List of resource types that should have resource logs enabled" , strongType: "resourceTypes" , deprecated: true } , defaultValue: [ 46 items "Microsoft.AnalysisServices/servers" , "Microsoft.ApiManagement/service" , "Microsoft.Network/applicationGateways" , "Microsoft.Automation/automationAccounts" , "Microsoft.ContainerInstance/containerGroups" , "Microsoft.ContainerRegistry/registries" , "Microsoft.ContainerService/managedClusters" , "Microsoft.Batch/batchAccounts" , "Microsoft.Cdn/profiles/endpoints" , "Microsoft.CognitiveServices/accounts" , "Microsoft.DocumentDB/databaseAccounts" , "Microsoft.DataFactory/factories" , "Microsoft.DataLakeAnalytics/accounts" , "Microsoft.DataLakeStore/accounts" , "Microsoft.EventGrid/eventSubscriptions" , "Microsoft.EventGrid/topics" , "Microsoft.EventHub/namespaces" , "Microsoft.Network/expressRouteCircuits" , "Microsoft.Network/azureFirewalls" , "Microsoft.HDInsight/clusters" , "Microsoft.Devices/IotHubs" , "Microsoft.KeyVault/vaults" , "Microsoft.Network/loadBalancers" , "Microsoft.Logic/integrationAccounts" , "Microsoft.Logic/workflows" , "Microsoft.DBforMySQL/servers" , "Microsoft.Network/networkInterfaces" , "Microsoft.Network/networkSecurityGroups" , "Microsoft.DBforPostgreSQL/servers" , "Microsoft.PowerBIDedicated/capacities" , "Microsoft.Network/publicIPAddresses" , "Microsoft.RecoveryServices/vaults" , "Microsoft.Cache/redis" , "Microsoft.Relay/namespaces" , "Microsoft.Search/searchServices" , "Microsoft.ServiceBus/namespaces" , "Microsoft.SignalRService/SignalR" , "Microsoft.Sql/servers/databases" , "Microsoft.Sql/servers/elasticPools" , "Microsoft.StreamAnalytics/streamingjobs" , "Microsoft.TimeSeriesInsights/environments" , "Microsoft.Network/trafficManagerProfiles" , "Microsoft.Compute/virtualMachines" , "Microsoft.Compute/virtualMachineScaleSets" , "Microsoft.Network/virtualNetworks" , "Microsoft.Network/virtualNetworkGateways" ] } , effect-86b3d65f-7626-441e-b690-81a8b71cff60: { 4 items type: "String" , metadata: { 3 items displayName: "[Deprecated]: Effect for policy: System updates should be installed on your machines" , description: "For more information about effects, visit https://aka.ms/policyeffects" , deprecated: true } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "Disabled" } , effect-8cb6aa8b-9e41-4f4e-aa25-089a7ac2581e: { 4 items type: "String" , metadata: { 3 items displayName: "[Deprecated]: Effect for policy: Latest TLS version should be used in your API App" , description: "For more information about effects, visit https://aka.ms/policyeffects" , deprecated: true } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "Disabled" } , effect-9297c21d-2ed6-4474-b48f-163f75654ce3: { 4 items type: "String" , metadata: { 3 items displayName: "[Deprecated]: Effect for policy: MFA should be enabled accounts with write permissions on your subscription" , description: "For more information about effects, visit https://aka.ms/policyeffects" , deprecated: true } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , effect-931e118d-50a1-4457-a5e4-78550e086c52: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: MFA should be enabled accounts with write permissions on your subscription" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , effect-9b597639-28e4-48eb-b506-56b05d366257: { 4 items type: "String" , metadata: { 3 items displayName: "[Deprecated]: Effect for policy: Microsoft IaaSAntimalware extension should be deployed on Windows servers" , description: "For more information about effects, visit https://aka.ms/policyeffects" , deprecated: true } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "Disabled" } , effect-a4af4a39-4135-47fb-b175-47fbdf85311d: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Web Application should only be accessible over HTTPS" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items ] , defaultValue: "Audit" } , effect-a7aca53f-2ed4-4466-a25e-0b45ade68efd: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Azure DDoS Protection should be enabled" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , effect-aa633080-8b72-40c4-a2d7-d00c03e80bed: { 4 items type: "String" , metadata: { 3 items displayName: "[Deprecated]: Effect for policy: MFA should be enabled on accounts with owner permissions on your subscription" , description: "For more information about effects, visit https://aka.ms/policyeffects" , deprecated: true } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , effect-e3e008c3-56b9-4133-8fd7-d3347377402a: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: MFA should be enabled on accounts with owner permissions on your subscription" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , effect-abfb4388-5bf4-4ad7-ba82-2cd2f41ceae9: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Advanced data security should be enabled on your SQL servers" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , effect-abfb7388-5bf4-4ad7-ba99-2cd2f41cebb9: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Advanced data security should be enabled on SQL Managed Instance" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , effect-af6cd1bd-1635-48cb-bde7-5b15693900b9: { 4 items type: "String" , metadata: { 3 items displayName: "[Deprecated]: Effect for policy: Monitor missing Endpoint Protection in Azure Security Center" , description: "For more information about effects, visit https://aka.ms/policyeffects" , deprecated: true } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "Disabled" } , effect-b02aacc0-b073-424e-8298-42b22829ee0a: { 4 items type: "String" , metadata: { 3 items displayName: "[Deprecated]: Effect for policy: Activity log should be retained for at least one year" , description: "For more information about effects, visit https://aka.ms/policyeffects" , deprecated: true } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "Disabled" } , effect-b0f33259-77d7-4c9e-aac6-3aabcfae693c: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Management ports of virtual machines should be protected with just-in-time network access control" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , effect-b54ed75b-3e1a-44ac-a333-05ba39b99ff0: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Service Fabric clusters should only use Azure Active Directory for client authentication" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 3 items "Audit" , "Deny" , "Disabled" ] , defaultValue: "Audit" } , effect-b7ddfbdc-1260-477d-91fd-98bd9be789a6: { 4 items type: "String" , metadata: { 3 items displayName: "[Deprecated]: Effect for policy: API App should only be accessible over HTTPS" , description: "For more information about effects, visit https://aka.ms/policyeffects" , deprecated: true } , allowedValues: [ 2 items ] , defaultValue: "Disabled" } , IncludeArcMachines-bed48b13-6647-468e-aa2f-1af1d3f4dd40: { 4 items type: "String" , metadata: { 3 items displayName: "[Deprecated]: Include Arc-connected servers when evaluating policy: Audit Windows machines on which Windows Defender Exploit Guard is not enabled" , description: "By selecting 'true,' you agree to be charged monthly per Arc connected machine" , deprecated: true } , allowedValues: [ 2 items ] , defaultValue: "false" } , NotAvailableMachineState-bed48b13-6647-468e-aa2f-1af1d3f4dd40: { 4 items type: "String" , metadata: { 3 items displayName: "[Deprecated]: Compliance state to report for Windows machines on which Windows Defender Exploit Guard is not available" , description: "Windows Defender Exploit Guard is only available starting with Windows 10/Windows Server with update 1709. Setting this value to 'Non-Compliant' shows machines with older versions on which Windows Defender Exploit Guard is not available (such as Windows Server 2012 R2) as non-compliant. Setting this value to 'Compliant' shows these machines as compliant." , deprecated: true } , allowedValues: [ 2 items "Compliant" , "Non-Compliant" ] , defaultValue: "Non-Compliant" } , effect-bed48b13-6647-468e-aa2f-1af1d3f4dd40: { 4 items type: "String" , metadata: { 3 items displayName: "[Deprecated]: Effect for policy: Audit Windows machines on which Windows Defender Exploit Guard is not enabled" , description: "For more information about effects, visit https://aka.ms/policyeffects" , deprecated: true } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "Disabled" } , effect-c3f317a7-a95c-4547-b7e7-11017ebdf2fe: { 4 items type: "String" , metadata: { 3 items displayName: "[Deprecated]: Effect for policy: System updates on virtual machine scale sets should be installed" , description: "For more information about effects, visit https://aka.ms/policyeffects" , deprecated: true } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "Disabled" } , effect-cb510bfd-1cba-4d9f-a230-cb0976f4bb71: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Remote debugging should be turned off for Web Applications" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , effect-e1e5fd5d-3e4c-4ce1-8661-7d1873ae6b15: { 4 items type: "String" , metadata: { 3 items displayName: "[Deprecated]: Effect for policy: Vulnerabilities in security configuration on your machines should be remediated" , description: "For more information about effects, visit https://aka.ms/policyeffects" , deprecated: true } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "Disabled" } , effect-e3576e28-8b17-4677-84c3-db2990658d64: { 4 items type: "String" , metadata: { 3 items displayName: "[Deprecated]: Effect for policy: MFA should be enabled on accounts with read permissions on your subscription" , description: "For more information about effects, visit https://aka.ms/policyeffects" , deprecated: true } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , effect-81b3ccb4-e6e8-4e4a-8d05-5df25cd29fd4: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: MFA should be enabled on accounts with read permissions on your subscription" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , listOfAllowedLocations-e56962a6-4747-49cd-b67b-bf8b01975c4c: { 4 items type: "Array" , metadata: { 4 items displayName: "[Deprecated]: Allowed locations for resources (deployments to other locations will be denied)" , description: "Locations for NZISM Restricted are New Zealand North, Australia East, Australia Southeast, Australia Central and Australia Central 2." , strongType: "location" , deprecated: true } , allowedValues: [ 4 items "australiaeast" , "australiasoutheast" , "australiacentral" , "australiacentral2" ] , defaultValue: [] } , listOfAllowedLocations-e765b5de-1225-4ba3-bd56-1ac6695af988: { 4 items type: "Array" , metadata: { 4 items displayName: "[Deprecated]: Allowed locations for resource groups (deployments to other locations will be denied)" , description: "Locations for NZISM Restricted are New Zealand North, Australia East, Australia Southeast, Australia Central and Australia Central 2." , strongType: "location" , deprecated: true } , allowedValues: [ 4 items "australiaeast" , "australiasoutheast" , "australiacentral" , "australiacentral2" ] , defaultValue: [] } , effect-e8cbc669-f12d-49eb-93e7-9273119e9933: { 4 items type: "String" , metadata: { 3 items displayName: "[Deprecated]: Effect for policy: Vulnerabilities in container security configurations should be remediated" , description: "For more information about effects, visit https://aka.ms/policyeffects" , deprecated: true } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "Disabled" } , effect-e9c8d085-d9cc-4b17-9cdc-059f1f01f19e: { 4 items type: "String" , metadata: { 3 items displayName: "[Deprecated]: Effect for policy: Remote debugging should be turned off for API Apps" , description: "For more information about effects, visit https://aka.ms/policyeffects" , deprecated: true } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "Disabled" } , IncludeArcMachines-ea53dbee-c6c9-4f0e-9f9e-de0039b78023: { 4 items type: "String" , metadata: { 2 items displayName: "Include Arc-connected servers when evaluating policy: Audit Linux machines that allow remote connections from accounts without passwords" , description: "By selecting 'true,' you agree to be charged monthly per Arc connected machine" } , allowedValues: [ 2 items ] , defaultValue: "false" } , effect-ea53dbee-c6c9-4f0e-9f9e-de0039b78023: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Audit Linux machines that allow remote connections from accounts without passwords" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , effect-ebb62a0c-3560-49e1-89ed-27e074e9f8ad: { 4 items type: "String" , metadata: { 3 items displayName: "[Deprecated]: Effect for policy: Deprecated accounts with owner permissions should be removed from your subscription" , description: "For more information about effects, visit https://aka.ms/policyeffects" , deprecated: true } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , effect-0cfea604-3201-4e14-88fc-fae4c427a6c5: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Deprecated accounts with owner permissions should be removed from your subscription" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , effect-ef2a8f2a-b3d9-49cd-a8a8-9a3aaaf647d9: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Vulnerability assessment should be enabled on your SQL servers" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , effect-f0e6e85b-9b9f-4a4b-b67b-f730d42f1b0b: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Latest TLS version should be used in your Web App" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , IncludeArcMachines-f2143251-70de-4e81-87a8-36cee5a2f29d: { 4 items type: "String" , metadata: { 2 items displayName: "Include Arc-connected servers when evaluating policy: Windows machines should meet requirements for 'Security Settings - Account Policies'" , description: "By selecting 'true,' you agree to be charged monthly per Arc connected machine" } , allowedValues: [ 2 items ] , defaultValue: "false" } , EnforcePasswordHistory-f2143251-70de-4e81-87a8-36cee5a2f29d: { 3 items type: "String" , metadata: { 2 items displayName: "Enforce password history for Windows VM local accounts" , description: "Specifies limits on password reuse - how many times a new password must be created for a user account before the password can be repeated" } , defaultValue: "24" } , MaximumPasswordAge-f2143251-70de-4e81-87a8-36cee5a2f29d: { 3 items type: "String" , metadata: { 2 items displayName: "Maximum password age for Windows VM local accounts" , description: "Specifies the maximum number of days that may elapse before a user account password must be changed; the format of the value is two integers separated by a comma, denoting an inclusive range" } , defaultValue: "1,70" } , MinimumPasswordAge-f2143251-70de-4e81-87a8-36cee5a2f29d: { 3 items type: "String" , metadata: { 2 items displayName: "Minimum password age for Windows VM local accounts" , description: "Specifies the minimum number of days that must elapse before a user account password can be changed" } , defaultValue: "1" } , MinimumPasswordLength-f2143251-70de-4e81-87a8-36cee5a2f29d: { 3 items type: "String" , metadata: { 2 items displayName: "Minimum password length for Windows VM local accounts" , description: "Specifies the minimum number of characters that a user account password may contain" } , defaultValue: "14" } , PasswordMustMeetComplexityRequirements-f2143251-70de-4e81-87a8-36cee5a2f29d: { 3 items type: "String" , metadata: { 2 items displayName: "Password must meet complexity requirements for Windows VM local accounts" , description: "Specifies whether a user account password must be complex; if required, a complex password must not contain part of the user's account name or full name; be at least 6 characters long; contain a mix of uppercase, lowercase, number, and non-alphabetic characters" } , defaultValue: "1" } , effect-f2143251-70de-4e81-87a8-36cee5a2f29d: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Windows machines should meet requirements for 'Security Settings - Account Policies'" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , logAnalyticsWorkspaceId-f47b5582-33ec-4c5c-87c0-b010a6b2e917: { 3 items type: "String" , metadata: { 3 items displayName: "[Deprecated]: Log Analytics workspace ID for VM agent reporting" , description: "ID (GUID) of the Log Analytics workspace where VMs agents should report" , deprecated: true } , defaultValue: "" } , effect-f6de0be7-9a8a-4b8a-b349-43cf02d22f7c: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Internet-facing virtual machines should be protected with network security groups" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , IncludeArcMachines-f6ec09a3-78bf-4f8f-99dc-6c77182d0f99: { 4 items type: "String" , metadata: { 2 items displayName: "Include Arc-connected servers when evaluating policy: Audit Linux machines that have accounts without passwords" , description: "By selecting 'true,' you agree to be charged monthly per Arc connected machine" } , allowedValues: [ 2 items ] , defaultValue: "false" } , effect-f6ec09a3-78bf-4f8f-99dc-6c77182d0f99: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Audit Linux machines that have accounts without passwords" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , effect-f8456c1c-aa66-4dfb-861a-25d127b775c9: { 4 items type: "String" , metadata: { 3 items displayName: "[Deprecated]: Effect for policy: External accounts with owner permissions should be removed from your subscription" , description: "For more information about effects, visit https://aka.ms/policyeffects" , deprecated: true } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , effect-339353f6-2387-4a45-abe4-7f529d121046: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: External accounts with owner permissions should be removed from your subscription" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , effect-f9d614c5-c173-4d56-95a7-b4437057d193: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Latest TLS version should be used in your Function App" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , effect-fc5e4038-4584-4632-8c85-c0448d374b2c: { 4 items type: "String" , metadata: { 3 items displayName: "[Deprecated]: Effect for policy: [Preview]: All Internet traffic should be routed via your deployed Azure Firewall" , description: "For more information about effects, visit https://aka.ms/policyeffects" , deprecated: true } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "Disabled" } , effect-feedbf84-6b99-488c-acc2-71c829aa5ffc: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Vulnerabilities on your SQL databases should be remediated" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , effect-d62cfe2b-3ab0-4d41-980d-76803b58ca65: { 4 items type: "String" , metadata: { 3 items displayName: "[Deprecated]: Effect for policy: Log Analytics agent health issues should be resolved on your machines" , description: "For more information about effects, visit https://aka.ms/policyeffects" , deprecated: true } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , effect-a1817ec0-a368-432a-8057-8371e17ac6ee: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: All authorization rules except RootManageSharedAccessKey should be removed from Service Bus namespace" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 3 items "Audit" , "Deny" , "Disabled" ] , defaultValue: "Audit" } , effect-044985bb-afe1-42cd-8a36-9d5d42424537: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Storage account keys should not be expired" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 3 items "Audit" , "Deny" , "Disabled" ] , defaultValue: "Audit" } , effect-1ee56206-5dd1-42ab-b02d-8aae8b1634ce: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Azure API for FHIR should use private link" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items ] , defaultValue: "Audit" } , effect-2913021d-f2fd-4f3d-b958-22354e2bdbcb: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Azure Defender for App Service should be enabled" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , effect-7fe3b40f-802b-4cdd-8bd4-fd799c948cc2: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Azure Defender for Azure SQL Database servers should be enabled" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , effect-c25d9a16-bc35-4e15-a7e5-9db606bf9ed4: { 4 items type: "String" , metadata: { 3 items displayName: "[Deprecated]: Effect for policy: Azure Defender for container registries should be enabled" , description: "For more information about effects, visit https://aka.ms/policyeffects" , deprecated: true } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "Disabled" } , effect-1c988dd6-ade4-430f-a608-2a3e5b0a6d38: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Microsoft Defender for Containers should be enabled" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , effect-0e6763cc-5078-4e64-889d-ff4d9a839047: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Azure Defender for Key Vault should be enabled" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , effect-523b5cd1-3e23-492f-a539-13118b6d1e3a: { 4 items type: "String" , metadata: { 3 items displayName: "[Deprecated]: Effect for policy: Azure Defender for Kubernetes should be enabled" , description: "For more information about effects, visit https://aka.ms/policyeffects" , deprecated: true } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "Disabled" } , effect-4da35fc9-c9e7-4960-aec9-797fe7d9051d: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Azure Defender for servers should be enabled" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , effect-6581d072-105e-4418-827f-bd446d56421b: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Azure Defender for SQL servers on machines should be enabled" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , effect-308fbb08-4ab8-4e67-9b29-592e93fb94fa: { 4 items type: "String" , metadata: { 3 items displayName: "[Deprecated]: Effect for policy: Azure Defender for Storage should be enabled" , description: "For more information about effects, visit https://aka.ms/policyeffects" , deprecated: true } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "Disabled" } , effect-640d2586-54d2-465f-877f-9ffc1d2109f4: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Microsoft Defender for Storage should be enabled" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , effect-a451c1ef-c6ca-483d-87ed-f49761e3ffb5: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Audit usage of custom RBAC rules" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items ] , defaultValue: "Audit" } , effect-a6fb4358-5bf4-4ad7-ba82-2cd2f41ce5e9: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Auditing on SQL server should be enabled" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , setting-a6fb4358-5bf4-4ad7-ba82-2cd2f41ce5e9: { 4 items } , effect-b607c5de-e7d9-4eee-9e5c-83f1bcee4fa0: { 4 items type: "String" , metadata: { 3 items displayName: "[Deprecated]: Effect for policy: Diagnostic logs in App Services should be enabled" , description: "For more information about effects, visit https://aka.ms/policyeffects" , deprecated: true } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , effect-91a78b24-f231-4a8a-8da9-02c35b2b6510: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Resource logs in App Services should be enabled" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , requiredRetentionDays-91a78b24-f231-4a8a-8da9-02c35b2b6510: { 3 items type: "String" , metadata: { 1 item displayName: "Required retention (days) for resource logs in App Services" } , defaultValue: "365" } , effect-057ef27e-665e-4328-8ea3-04b3122bd9fb: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Diagnostic logs in Azure Data Lake Store should be enabled" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , requiredRetentionDays: { 3 items type: "String" , metadata: { 1 item displayName: "Required retention period (days) for resource logs" } , defaultValue: "365" } , effect-f9be5368-9bf5-4b84-9e0a-7850da98bb46: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Diagnostic logs in Azure Stream Analytics should be enabled" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , effect-428256e6-1fac-4f48-a757-df34c2b3336d: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Diagnostic logs in Batch accounts should be enabled" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , effect-c95c74d9-38fe-4f0d-af86-0c7d626a315c: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Diagnostic logs in Data Lake Analytics should be enabled" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , effect-83a214f7-d01a-484b-91a9-ed54470c9a6a: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Diagnostic logs in Event Hub should be enabled" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , effect-383856f8-de7f-44a2-81fc-e5135b5c2aa4: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Diagnostic logs in IoT Hub should be enabled" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , effect-cf820ca0-f99e-4f3e-84fb-66e913812d21: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Diagnostic logs in Key Vault should be enabled" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , effect-34f95f76-5386-4de7-b824-0d8478470c9d: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Diagnostic logs in Logic Apps should be enabled" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , effect-b4330a05-a843-4bc8-bf9a-cacce50c67f4: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Diagnostic logs in Search services should be enabled" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , effect-f8d36e2f-389b-4ee4-898d-21aeb69a0f45: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Diagnostic logs in Service Bus should be enabled" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , effect-7c1b1214-f927-48bf-8882-84f0af6588b1: { 4 items type: "String" , metadata: { 3 items displayName: "[Deprecated]: Effect for policy: Diagnostic logs in Virtual Machine Scale Sets should be enabled" , description: "For more information about effects, visit https://aka.ms/policyeffects" , deprecated: true } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , includeAKSClusters-7c1b1214-f927-48bf-8882-84f0af6588b1: { 3 items type: "Boolean" , metadata: { 3 items displayName: "[Deprecated]: Include AKS clusters when auditing if virtual machine scale set diagnostic logs are enabled" , description: "For more information, visit https://aka.ms/kubepolicydoc" , deprecated: true } , defaultValue: false } , effect-123a3936-f020-408a-ba0c-47873faf1534: { 4 items type: "String" , metadata: { 3 items displayName: "[Deprecated]: Effect for policy: Allowlist rules in your adaptive application control policy should be updated" , description: "For more information about effects, visit https://aka.ms/policyeffects" , deprecated: true } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "Disabled" } , effect-c4d441f8-f9d9-4a9e-9cef-e82117cb3eef: { 4 items type: "String" , metadata: { 3 items displayName: "[Deprecated]: Effect for policy: Managed identity should be used in your API App" , description: "For more information about effects, visit https://aka.ms/policyeffects" , deprecated: true } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "Disabled" } , effect-0da106f2-4ca3-48e8-bc85-c638fe6aea8f: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Managed identity should be used in your Function App" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , effect-2b9ad585-36bc-4615-b300-fd4435808332: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Managed identity should be used in your Web App" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , effect-5f0f936f-2f01-4bf5-b6be-d423792fa562: { 4 items type: "String" , metadata: { 3 items displayName: "[Deprecated]: Effect for policy: Vulnerabilities in Azure Container Registry images should be remediated" , description: "For more information about effects, visit https://aka.ms/policyeffects" , deprecated: true } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "Disabled" } , effect-6ba6d016-e7c3-4842-b8f2-4992ebc0d72d: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: SQL servers on machines should have vulnerability findings resolved" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , effect-22730e10-96f6-4aac-ad84-9383d35b5917: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Management ports should be closed on your virtual machines" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , effect-358c20a6-3f9e-4f0e-97ff-c6ce485e2aac: { 4 items type: "String" , metadata: { 3 items displayName: "[Deprecated]: Effect for policy: CORS should not allow every resource to access your API App" , description: "For more information about effects, visit https://aka.ms/policyeffects" , deprecated: true } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "Disabled" } , effect-0820b7b9-23aa-4725-a1ce-ae4558f718e5: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: CORS should not allow every resource to access your Function Apps" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , IncludeArcMachines-630c64f9-8b6b-4c64-b511-6544ceff6fd6: { 4 items type: "String" , metadata: { 2 items displayName: "Include Arc-connected servers when evaluating policy: Audit Linux machines that are not using SSH key for authentication" , description: "By selecting 'true,' you agree to be charged monthly per Arc connected machine" } , allowedValues: [ 2 items ] , defaultValue: "false" } , effect-630c64f9-8b6b-4c64-b511-6544ceff6fd6: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Audit Linux machines that are not using SSH key for authentication" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , effect-1f905d99-2ab7-462c-a6b0-f709acca6c8f: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Azure Cosmos DB account should use customer-managed keys to encrypt data at rest" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 3 items "audit" , "deny" , "disabled" ] , defaultValue: "audit" } , effect-ba769a63-b8cc-4b2d-abf6-ac33c7204be8: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Azure Machine Learning workspaces should be encrypted with a customer-managed key (CMK)" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 3 items "Audit" , "Deny" , "Disabled" ] , defaultValue: "Audit" } , effect-83cef61d-dbd1-4b20-a4fc-5fbc7da10833: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Bring your own key data protection should be enabled for MySQL servers" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , effect-18adea5e-f416-4d0f-8aa8-d24321e3e274: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Bring your own key data protection should be enabled for PostgreSQL servers" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , effect-67121cc7-ff39-4ab8-b7e3-95b84dab487d: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Cognitive Services accounts should enable data encryption with customer-managed key" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 3 items "Audit" , "Deny" , "Disabled" ] , defaultValue: "Audit" } , effect-5b9159ae-1701-4a6f-9a7a-aa9c8ddd0580: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Container registries should be encrypted with a customer-managed key (CMK)" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 3 items "Audit" , "Deny" , "Disabled" ] , defaultValue: "Audit" } , effect-0d134df8-db83-46fb-ad72-fe0c9428c8dd: { 4 items type: "String" , metadata: { 3 items displayName: "[Deprecated]: Effect for policy: SQL servers should use customer-managed keys to encrypt data at rest" , description: "For more information about effects, visit https://aka.ms/policyeffects" , deprecated: true } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "Disabled" } , effect-048248b0-55cd-46da-b1ff-39efd52db260: { 4 items type: "String" , metadata: { 3 items displayName: "[Deprecated]: Effect for policy: SQL managed instances should use customer-managed keys to encrypt data at rest" , description: "For more information about effects, visit https://aka.ms/policyeffects" , deprecated: true } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "Disabled" } , effect-ac01ad65-10e5-46df-bdd9-6b0cad13e1d2: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: SQL managed instances should use customer-managed keys to encrypt data at rest" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 3 items "Audit" , "Deny" , "Disabled" ] , defaultValue: "Audit" } , effect-0a370ff3-6cab-4e85-8995-295fd854c5b8: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: SQL servers should use customer-managed keys to encrypt data at rest" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 3 items "Audit" , "Deny" , "Disabled" ] , defaultValue: "Audit" } , effect-6fac406b-40ca-413b-bf8e-0bf964659c25: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Storage account should use customer-managed key for encryption" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items ] , defaultValue: "Audit" } , effect-862e97cf-49fc-4a5c-9de4-40d4e2e7c8eb: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Azure Cosmos DB accounts should have firewall rules" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 3 items "Audit" , "Deny" , "Disabled" ] , defaultValue: "Audit" } , effect-e71308d3-144b-4262-b144-efdc3cc90517: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Subnets should be associated with a Network Security Group" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , effect-bd352bd5-2853-4985-bf0d-73806b4a5744: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: IP Forwarding on your virtual machine should be disabled" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , effect-9daedab3-fb2d-461e-b861-71790eead4f6: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: All network ports should be restricted on network security groups associated to your virtual machine" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , effect-0b60c0b2-2dc2-4e1c-b5c9-abbed971de53: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Key vault should have purge protection enabled" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 3 items "Audit" , "Deny" , "Disabled" ] , defaultValue: "Audit" } , effect-1e66c121-a66a-4b1f-9b83-0fd99bf0fc2d: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Key vault should have soft delete enabled" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 3 items "Audit" , "Deny" , "Disabled" ] , defaultValue: "Audit" } , effect-88999f4c-376a-45c8-bcb3-4058f713cf39: { 4 items type: "String" , metadata: { 3 items displayName: "[Deprecated]: Effect for policy: Ensure that 'Java version' is the latest, if used as a part of the API app" , description: "For more information about effects, visit https://aka.ms/policyeffects" , deprecated: true } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "Disabled" } , effect-9d0b6ea4-93e2-4578-bf2f-6bb17d22b4bc: { 4 items type: "String" , metadata: { 3 items displayName: "[Deprecated]: Effect for policy: Ensure that 'Java version' is the latest, if used as a part of the Function app" , description: "For more information about effects, visit https://aka.ms/policyeffects" , deprecated: true } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "Disabled" } , effect-496223c3-ad65-4ecd-878a-bae78737e9ed: { 4 items type: "String" , metadata: { 3 items displayName: "[Deprecated]: Effect for policy: Ensure that 'Java version' is the latest, if used as a part of the Web app" , description: "For more information about effects, visit https://aka.ms/policyeffects" , deprecated: true } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "Disabled" } , effect-1bc1795e-d44a-4d48-9b3b-6fff0fd5f9ba: { 4 items type: "String" , metadata: { 3 items displayName: "[Deprecated]: Effect for policy: Ensure that 'PHP version' is the latest, if used as a part of the API app" , description: "For more information about effects, visit https://aka.ms/policyeffects" , deprecated: true } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "Disabled" } , effect-7261b898-8a84-4db8-9e04-18527132abb3: { 4 items type: "String" , metadata: { 3 items displayName: "[Deprecated]: Effect for policy: Ensure that 'PHP version' is the latest, if used as a part of the WEB app" , description: "For more information about effects, visit https://aka.ms/policyeffects" , deprecated: true } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "Disabled" } , effect-74c3584d-afae-46f7-a20a-6f8adba71a16: { 4 items type: "String" , metadata: { 3 items displayName: "[Deprecated]: Effect for policy: Ensure that 'Python version' is the latest, if used as a part of the API app" , description: "For more information about effects, visit https://aka.ms/policyeffects" , deprecated: true } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "Disabled" } , effect-7238174a-fd10-4ef0-817e-fc820a951d73: { 4 items type: "String" , metadata: { 3 items displayName: "[Deprecated]: Effect for policy: Ensure that 'Python version' is the latest, if used as a part of the Function app" , description: "For more information about effects, visit https://aka.ms/policyeffects" , deprecated: true } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "Disabled" } , effect-7008174a-fd10-4ef0-817e-fc820a951d73: { 4 items type: "String" , metadata: { 3 items displayName: "[Deprecated]: Effect for policy: Ensure that 'Python version' is the latest, if used as a part of the Web app" , description: "For more information about effects, visit https://aka.ms/policyeffects" , deprecated: true } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "Disabled" } , effect-ef619a2c-cc4d-4d03-b2ba-8c94a834d85b: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: API Management services should use a virtual network" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items ] , defaultValue: "Audit" } , evaluatedSkuNames-ef619a2c-cc4d-4d03-b2ba-8c94a834d85b: { 4 items } , effect-ca610c1d-041c-4332-9d88-7ed3094967c7: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: App Configuration should use a private link" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , effect-7d092e0a-7acd-40d2-a975-dca21cae48c4: { 4 items type: "String" , metadata: { 3 items displayName: "[Deprecated]: Effect for policy: Azure Cache for Redis should reside within a virtual network" , description: "For more information about effects, visit https://aka.ms/policyeffects" , deprecated: true } , allowedValues: [ 3 items "Audit" , "Deny" , "Disabled" ] , defaultValue: "Audit" } , effect-9830b652-8523-49cc-b1b3-e17dce1127ca: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Azure Event Grid domains should use private links" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items ] , defaultValue: "Audit" } , effect-4b90e17e-8448-49db-875e-bd83fb6f804f: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Azure Event Grid topics should use private links" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items ] , defaultValue: "Audit" } , effect-c39ba22d-4428-4149-b981-70acb31fc383: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Azure Key Vault Managed HSM should have purge protection enabled" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 3 items "Audit" , "Deny" , "Disabled" ] , defaultValue: "Audit" } , effect-40cec1dd-a100-4920-b15b-3024fe8901ab: { 4 items type: "String" , metadata: { 3 items displayName: "[Deprecated]: (Deprecated) Effect for policy: Azure Machine Learning workspaces should use private link" , description: "This policy has been deprecated to remove a parameter's allowed value, replacement policy is 45e05259-1eb5-4f70-9574-baf73e9d219b." , deprecated: true } , allowedValues: [ 3 items "Audit" , "Deny" , "Disabled" ] , defaultValue: "Disabled" } , effect-45e05259-1eb5-4f70-9574-baf73e9d219b: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Azure Machine Learning workspaces should use private link" , description: "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items ] , defaultValue: "Audit" } , effect-53503636-bcc9-4748-9663-5348217f160f: { 4 items type: "String" , metadata: { 3 items displayName: "[Deprecated]: Effect for policy: Azure SignalR Service should use private links" , description: "For more information about effects, visit https://aka.ms/policyeffects" , deprecated: true } , allowedValues: [ 3 items "Audit" , "Deny" , "Disabled" ] , defaultValue: "Audit" } , effect-af35e2a4-ef96-44e7-a9ae-853dd97032c4: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Azure Spring Cloud should use network injection" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 3 items "Audit" , "Disabled" , "Deny" ] , defaultValue: "Audit" } , evaluatedSkuNames-af35e2a4-ef96-44e7-a9ae-853dd97032c4: { 4 items } , effect-0725b4dd-7e76-479c-a735-68e7ee23d5ca: { 4 items type: "String" , metadata: { 3 items displayName: "[Deprecated]: Effect for policy: Public network access should be disabled for Cognitive Services accounts" , description: "For more information about effects, visit https://aka.ms/policyeffects" , deprecated: true } , allowedValues: [ 3 items "Audit" , "Deny" , "Disabled" ] , defaultValue: "Disabled" } , effect-037eea7a-bd0a-46c5-9a66-03aea78705d3: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Cognitive Services accounts should restrict network access" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 3 items "Audit" , "Deny" , "Disabled" ] , defaultValue: "Audit" } , effect-d0793b48-0edc-4296-a390-4c75d1bdfd71: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Container registries should not allow unrestricted network access" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 3 items "Audit" , "Deny" , "Disabled" ] , defaultValue: "Audit" } , effect-e8eef0a8-67cf-4eb4-9386-14b0e78733d4: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Container registries should use private links" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items ] , defaultValue: "Audit" } , effect-7698e800-9299-47a6-b3b6-5a0fee576eed: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Private endpoint connections on Azure SQL Database should be enabled" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items ] , defaultValue: "Audit" } , effect-009a0c92-f5b4-4776-9b66-4ed2b4775563: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Private endpoint connections on Batch accounts should be enabled" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , effect-0a1302fb-a631-4106-9753-f3d494733990: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Private endpoint should be enabled for MariaDB servers" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , effect-7595c971-233d-4bcf-bd18-596129188c49: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Private endpoint should be enabled for MySQL servers" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , effect-0564d078-92f5-4f97-8398-b9f58a51f70b: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Private endpoint should be enabled for PostgreSQL servers" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , effect-1b8ca024-1d5c-4dec-8995-b1a932b41780: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Public network access on Azure SQL Database should be disabled" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 3 items "Audit" , "Deny" , "Disabled" ] , defaultValue: "Audit" } , effect-fdccbe47-f3e3-4213-ad5d-ea459b2fa077: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Public network access should be disabled for MariaDB servers" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items ] , defaultValue: "Audit" } , effect-d9844e8a-1437-4aeb-a32c-0c992f056095: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Public network access should be disabled for MySQL servers" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items ] , defaultValue: "Audit" } , effect-b52376f7-9612-48a1-81cd-1ffe4b61032c: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Public network access should be disabled for PostgreSQL servers" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items ] , defaultValue: "Audit" } , effect-2a1a9cdf-e04d-429a-8416-3bfb72a1b26f: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Storage accounts should restrict network access using virtual network rules" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 3 items "Audit" , "Deny" , "Disabled" ] , defaultValue: "Audit" } , effect-6edd7eda-6dd8-40f7-810d-67160c639cd9: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: Storage account should use a private link connection" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , effect-2154edb9-244f-4741-9970-660785bccdaa: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: VM Image Builder templates should use private link" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 3 items "Audit" , "Disabled" , "Deny" ] , defaultValue: "Audit" } , effect-9a1b8c48-453a-4044-86c3-d8bfd823e4f5: { 4 items type: "String" , metadata: { 3 items displayName: "[Deprecated]: Effect for policy: FTPS only should be required in your API App" , description: "For more information about effects, visit https://aka.ms/policyeffects" , deprecated: true } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "Disabled" } , effect-399b2637-a50f-4f95-96f8-3a145476eb15: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: FTPS only should be required in your Function App" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } , effect-4d24b6d4-5e53-4a4f-a7f4-618fa573ee4b: { 4 items type: "String" , metadata: { 2 items displayName: "Effect for policy: FTPS should be required in your Web App" , description: "For more information about effects, visit https://aka.ms/policyeffects" } , allowedValues: [ 2 items "AuditIfNotExists" , "Disabled" ] , defaultValue: "AuditIfNotExists" } } , policyDefinitions: [ 114 items { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 4 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } ] , policyDefinitionGroups: [ 154 items { 2 items name: "NZISM_Security_Benchmark_v1.1_AC-1" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_AC-1" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_AC-10" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_AC-10" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_AC-11" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_AC-11" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_AC-12" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_AC-12" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_AC-13" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_AC-13" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_AC-14" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_AC-14" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_AC-15" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_AC-15" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_AC-16" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_AC-16" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_AC-17" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_AC-17" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_AC-18" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_AC-18" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_AC-19" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_AC-19" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_AC-2" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_AC-2" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_AC-20" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_AC-20" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_AC-3" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_AC-3" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_AC-4" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_AC-4" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_AC-5" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_AC-5" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_AC-6" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_AC-6" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_AC-7" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_AC-7" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_AC-8" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_AC-8" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_AC-9" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_AC-9" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_AIS-1" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_AIS-1" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_AIS-2" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_AIS-2" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_CR-1" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_CR-1" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_CR-10" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_CR-10" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_CR-11" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_CR-11" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_CR-12" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_CR-12" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_CR-13" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_CR-13" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_CR-14" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_CR-14" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_CR-15" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_CR-15" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_CR-2" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_CR-2" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_CR-3" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_CR-3" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_CR-4" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_CR-4" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_CR-5" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_CR-5" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_CR-6" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_CR-6" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_CR-7" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_CR-7" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_CR-8" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_CR-8" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_CR-9" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_CR-9" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_CSD-1" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_CSD-1" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_CSD-2" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_CSD-2" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_CSD-3" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_CSD-3" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_CSD-4" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_CSD-4" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_CSD-5" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_CSD-5" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_CSD-6" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_CSD-6" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_CSD-7" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_CSD-7" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_DM-1" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_DM-1" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_DM-2" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_DM-2" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_DM-3" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_DM-3" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_DM-4" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_DM-4" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_DM-5" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_DM-5" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_DM-6" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_DM-6" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_ES-1" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_ES-1" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_ES-2" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_ES-2" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_ESS-1" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_ESS-1" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_ESS-2" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_ESS-2" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_ESS-3" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_ESS-3" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_ESS-4" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_ESS-4" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_ESS-5" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_ESS-5" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_GS-1" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_GS-1" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_GS-2" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_GS-2" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_GS-3" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_GS-3" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_GS-4" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_GS-4" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_GS-5" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_GS-5" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_GS-6" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_GS-6" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_GS-7" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_GS-7" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_GS-8" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_GS-8" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_GS-9" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_GS-9" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_INF-1" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_INF-1" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_INF-2" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_INF-2" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_INF-3" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_INF-3" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_INF-4" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_INF-4" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_INF-5" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_INF-5" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_INF-6" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_INF-6" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_INF-7" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_INF-7" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_INF-8" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_INF-8" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_INF-9" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_INF-9" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_ISD-1" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_ISD-1" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_ISD-2" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_ISD-2" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_ISD-3" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_ISD-3" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_ISD-4" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_ISD-4" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_ISD-5" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_ISD-5" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_ISD-6" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_ISD-6" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_ISD-7" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_ISD-7" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_ISD-8" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_ISD-8" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_ISG-1" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_ISG-1" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_ISG-2" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_ISG-2" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_ISG-3" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_ISG-3" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_ISG-4" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_ISG-4" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_ISG-5" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_ISG-5" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_ISGV-1" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_ISGV-1" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_ISGV-2" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_ISGV-2" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_ISGV-3" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_ISGV-3" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_ISI-1" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_ISI-1" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_ISI-2" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_ISI-2" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_ISI-3" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_ISI-3" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_ISM-1" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_ISM-1" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_ISM-2" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_ISM-2" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_ISM-3" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_ISM-3" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_ISM-4" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_ISM-4" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_ISM-5" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_ISM-5" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_ISM-6" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_ISM-6" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_ISM-7" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_ISM-7" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_MDD-1" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_MDD-1" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_MDD-2" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_MDD-2" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_MDD-3" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_MDD-3" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_MDD-4" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_MDD-4" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_MDD-5" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_MDD-5" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_MDD-6" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_MDD-6" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_NS-1" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_NS-1" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_NS-10" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_NS-10" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_NS-2" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_NS-2" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_NS-3" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_NS-3" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_NS-4" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_NS-4" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_NS-5" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_NS-5" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_NS-6" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_NS-6" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_NS-7" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_NS-7" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_NS-8" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_NS-8" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_NS-9" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_NS-9" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_PRS-1" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_PRS-1" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_PRS-2" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_PRS-2" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_PRS-3" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_PRS-3" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_PRS-4" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_PRS-4" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_PRS-5" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_PRS-5" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_PRS-6" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_PRS-6" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_PRS-7" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_PRS-7" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_PRS-8" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_PRS-8" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_PS-1" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_PS-1" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_PS-2" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_PS-2" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_PS-3" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_PS-3" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_PS-4" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_PS-4" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_PS-5" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_PS-5" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_PS-6" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_PS-6" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_PSS-1" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_PSS-1" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_PSS-2" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_PSS-2" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_PSS-3" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_PSS-3" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_PSS-4" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_PSS-4" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_PSS-5" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_PSS-5" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_SCA-1" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_SCA-1" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_SCA-2" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_SCA-2" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_SCA-3" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_SCA-3" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_SCA-4" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_SCA-4" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_SCA-5" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_SCA-5" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_SS-1" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_SS-1" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_SS-2" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_SS-2" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_SS-3" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_SS-3" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_SS-4" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_SS-4" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_SS-5" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_SS-5" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_SS-6" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_SS-6" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_SS-7" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_SS-7" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_SS-8" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_SS-8" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_SS-9" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_SS-9" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_WO-1" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_WO-1" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_WO-2" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_WO-2" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_WO-3" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_WO-3" } , { 2 items name: "NZISM_Security_Benchmark_v1.1_WO-4" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/NZISM_Security_Benchmark_v1.1_WO-4" } ] , versions: [ 10 items "11.13.0" , "11.12.0" , "11.11.0" , "11.10.0" , "11.9.0" , "11.8.0" , "11.7.0" , "11.6.2" , "11.6.1" , "11.5.0" ] }