Unknown, no evidence if PolicySet definition is/not available in AzureUSGovernment
Type
BuiltIn
Deprecated
False
Preview
False
Policy-used summary
Policy types
Policy states
Policy categories
Total Policies: 99
Builtin Policies: 99
Static Policies: 0
GA: 95 Preview: 4
29 categories:
API for FHIR: 1 API Management: 1 App Configuration: 2 App Service: 3 Automation: 1 Azure Data Explorer: 2 Batch: 1 Cache: 2 Compute: 5 Container Instance: 1 Cosmos DB: 2 Data Lake: 2 Event Hub: 3 General: 1 Guest Configuration: 12 Internet of Things: 2 Key Vault: 6 Kubernetes: 4 Logic Apps: 1 Machine Learning: 2 Monitoring: 11 Network: 4 Regulatory Compliance: 2 Security Center: 5 Service Bus: 2 SignalR: 1 SQL: 13 Storage: 5 Stream Analytics: 2
Policy-used
Rows: 1-10 / 99
Records:
Use the filters above each column to filter and limit table data. Advanced searches can be performed by using the following operators: <, <=, >, >=, =, *, !, {, }, ||,&&, [empty], [nonempty], rgx: Learn more
- "displayName": "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1549
- "description": "For more information about effects, visit https://aka.ms/policyeffects"
+ "displayName": "[Deprecated]: Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
1551
+ "description": "For more information about effects, visit https://aka.ms/policyeffects",
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
description: "The source k8s object for constraint evaluation. 'Original' means only evaluate against the specific GroupVersionKind specified in the policy definition. 'Generated' means only evaluate against k8s objects generated by Gatekeeper ExpansionTemplates. 'All' means evaluate against both the original object and any generated ones."
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
description: "List of Kubernetes namespaces to exclude from policy evaluation. System namespaces "kube-system", "gatekeeper-system" and "azure-arc" are always excluded by design. "azure-extensions-usage-system" is optional to remove."
description: "List of Kubernetes namespaces to only include in policy evaluation. An empty list means the policy is applied to all resources in all namespaces."
description: "The list of InitContainers and Containers to exclude from policy evaluation. The identify is the name of container. Use an empty list to apply this policy to all containers in all namespaces."
description: "The list of InitContainers and Containers to exclude from policy evaluation. The identifier is the image of container. Prefix-matching can be signified with `*`. For example: `myregistry.azurecr.io/istio:*`. It is recommended that users use the fully-qualified Docker image name (e.g. start with a domain name) in order to avoid unexpectedly exempting images from an untrusted repository.",
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Network security: LAN Manager authentication level",
description: "Specify which challenge-response authentication protocol is used for network logons. This choice affects the level of authentication protocol used by clients, the level of session security negotiated, and the level of authentication accepted by servers."
displayName: "Network security: Minimum session security for NTLM SSP based (including secure RPC) clients",
description: "Specifies which behaviors are allowed by clients for applications using the NTLM Security Support Provider (SSP). The SSP Interface (SSPI) is used by applications that need authentication services. See https://docs.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-servers for more information."
displayName: "Network security: Minimum session security for NTLM SSP based (including secure RPC) servers",
description: "Specifies which behaviors are allowed by servers for applications using the NTLM Security Support Provider (SSP). The SSP Interface (SSPI) is used by applications that need authentication services."
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
description: "The source k8s object for constraint evaluation. 'Original' means only evaluate against the specific GroupVersionKind specified in the policy definition. 'Generated' means only evaluate against k8s objects generated by Gatekeeper ExpansionTemplates. 'All' means evaluate against both the original object and any generated ones."
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
description: "The list of InitContainers and Containers to exclude from policy evaluation. The identifier is the image of container. Prefix-matching can be signified with `*`. For example: `myregistry.azurecr.io/istio:*`. It is recommended that users use the fully-qualified Docker image name (e.g. start with a domain name) in order to avoid unexpectedly exempting images from an untrusted repository.",
description: "List of Kubernetes namespaces to exclude from policy evaluation. System namespaces "kube-system", "gatekeeper-system" and "azure-arc" are always excluded by design. "azure-extensions-usage-system" is optional to remove."
description: "List of Kubernetes namespaces to only include in policy evaluation. An empty list means the policy is applied to all resources in all namespaces."
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "[Deprecated]: Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects",
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Users or groups that may log on locally",
description: "Specifies which users or groups can interactively log on to the computer. Users who attempt to log on via Remote Desktop Connection or IIS also require this user right."
displayName: "Users and groups that may restore files and directories",
description: "Specifies which users and groups are permitted to bypass file, directory, registry, and other persistent object permissions when restoring backed up files and directories."
displayName: "Users and groups that may shut down the system",
description: "Specifies which users and groups who are logged on locally to the computers in your environment are permitted to shut down the operating system with the Shut Down command."
displayName: "Users or groups that may take ownership of files or other objects",
description: "Specifies which users and groups are permitted to take ownership of files, folders, registry keys, processes, or threads. This user right bypasses any permissions that are in place to protect objects to give ownership to the specified user."
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
description: "Resource Id of the virtual network. Example: /subscriptions/YourSubscriptionId/resourceGroups/YourResourceGroupName/providers/Microsoft.Network/virtualNetworks/Name"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
description: "Specifies whether audit events are generated when changes are made to authentication policy. This setting is useful for tracking changes in domain-level and forest-level trust and privileges that are granted to user accounts or groups."
description: "Specifies whether audit events are generated for assignment and removal of user rights in user right policies, changes in security token object permission, resource attributes changes and Central Access Policy changes for file system objects."
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
description: "A semicolon-separated list of the names of the applications that should be installed. e.g. 'Microsoft SQL Server 2014 (64-bit); Microsoft Visual Studio Code' or 'Microsoft SQL Server 2014*' (to match any application starting with 'Microsoft SQL Server 2014')"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
description: "Specifies limits on password reuse - how many times a new password must be created for a user account before the password can be repeated."
description: "Specifies the maximum number of days that may elapse before a user account password must be changed. The format of the value is two integers separated by a comma, denoting an inclusive range."
displayName: "Password must meet complexity requirements",
description: "Specifies whether a user account password must be complex. If required, a complex password must not contain part of user's account name or full name; be at least 6 characters long; contain a mix of uppercase, lowercase, number, and non-alphabetic characters."
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "[Deprecated]: Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects",
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "[Deprecated]: Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects",
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"
displayName: "Effect for policy: An activity log alert should exist for specific Administrative operations (Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write)",
description: "For more information about effects, visit https://aka.ms/policyeffects"