Azure landing zone Documentation
Home GitHub Issue Toggle Dark/Light/Auto mode Toggle Dark/Light/Auto mode Toggle Dark/Light/Auto mode Back to homepage

Policy Assignments

As part of a default deployment configuration, policy and policy set definitions are deployed at multiple levels within the Azure landing zone Management Group hierarchy as depicted within the below diagram.

Azure Landing Zone Management Group Hierarchy
Important
As part of the ALZ portal deployment/configuration, policy and policy set definitions are created only at the intermediate management group, e.g. contoso that is a child of the tenant root management group, created during the ALZ deployment. Our automation does not assign any policies to the tenant root management group scope, only the ALZ hierarchy it deploys and its children, e.g. contoso and below. This approach aligns with the Cloud Adoption Framework’s best practices for Azure Policy assignment, ensuring clear delineation of policy application and avoiding unintended policy inheritance across the entire tenant. By placing policies only at the intermediary root and its child management groups, we maintain compliance, flexibility, and alignment with organizational governance requirements. And also allow multiple management groups hierarchies to exist in a single tenant such as the canary approach
Tip
For convenience, an Excel version of the below information is available here.

Default Policy Assignments

Note
The below table is scrollable. On smaller screens, please scroll horizontally to view all columns.
Assignment Scope (MG)Assignment NameDefinition NameTypeCustom/BuiltinDescriptionEffectGitHub Assignment FileAzAdvertizer LinkReleaseStatus
Intermediate RootDeploy Microsoft Defender for Cloud configurationDeploy Microsoft Defender for Cloud configurationInitiativeCustomConfigures all the MDFC settings, such as Microsoft Defender for Cloud per individual service, security contacts, and export from MDFC to Log Analytics workspaceDeployIfNotExistsDINE-MDFCConfigPolicyAssignment.jsonDeploy Microsoft Defender for Cloud configuration (azadvertizer.net)2023-04-02
Intermediate RootDeploy-MDEndpoints[Preview]: Deploy Microsoft Defender for Endpoint agentInitiativeBuilt-inDeploy Microsoft Defender for Endpoint agent on applicable images.DeployIfNotExistsDINE-MDEndpointsPolicyAssignment.json[Preview]: Deploy Microsoft Defender for Endpoint agent (azadvertizer.net)2023-04-02
Intermediate RootDeploy-MDEndpointsAMAConfigure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for CloudInitiativeBuilt-inConfigure the multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud (WDATP, WDATP_EXCLUDE_LINUX_PUBLIC_PREVIEW, WDATP_UNIFIED_SOLUTION etc.). See: https://learn.microsoft.com/azure/defender-for-cloud/integration-defender-for-endpoint for more information.DeployIfNotExistsDINE-MDEndpointsAMAPolicyAssignment.jsonConfigure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud - 77b391e3-2d5d-40c3-83bf-65c846b3c6a3 (azadvertizer.net)2024-05-15
Intermediate RootDeploy-Diag-LogsEnable allLogs category group resource logging for supported resources to Log AnalyticsInitiativeBuilt-inResource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This initiative deploys diagnostic setting using the allLogs category group to route logs to Log Analytics Workspace for all supported resourcesDeployIfNotExistsDINE-ResourceDiagnosticsPolicyAssignment.jsonEnable allLogs category group resource logging for supported resources to Log Analytics - 0884adba-2312-4468-abeb-5422caed1038 (azadvertizer.net)2024-05-15
Intermediate RootMicrosoft Cloud Security BenchmarkAzure Security BenchmarkInitiativeBuilt-inThe Azure Security Benchmark initiative represents the policies and controls implementing security recommendations defined in Azure Security Benchmark v2, see https://aka.ms/azsecbm. This also serves as the Azure Security Center default policy initiative. You can directly assign this initiative, or manage its policies and compliance results within Azure Security Center.Audit, AuditIfNotExists, DisabledDINE-ASBPolicyAssignment.jsonAzure Security Benchmark (azadvertizer.net)2023-04-02
Intermediate RootMicrosoft Cloud Security Benchmark v2[Preview]: Microsoft cloud security benchmark v2InitiativeBuilt-inThe Microsoft cloud security benchmark initiative represents the policies and controls implementing security recommendations defined in Microsoft cloud security benchmark, see https://aka.ms/azsecbm. This also serves as the Microsoft Defender for Cloud default policy initiative. You can directly assign this initiative, or manage its policies and compliance results within Microsoft Defender for Cloud.Audit, AuditIfNotExists, DisabledDINE-ASB2PolicyAssignment.jsonhttps://www.azadvertizer.net/azpolicyinitiativesadvertizer/e3ec7e09-768c-4b64-882c-fcada3772047.html2025-12-01
Intermediate RootConfigure Advanced Threat Protection to be enabled on open-source relational databasesConfigure Advanced Threat Protection to be enabled on open-source relational databasesInitiativeBuilt-inEnable Advanced Threat Protection on your non-Basic tier open-source relational databases to detect anomalous activities indicating unusual and potentially harmful attempts to access or exploit databases. See https://aka.ms/AzDforOpenSourceDBsDocu.DeployIfNotExistsDINE-AtpOssDbPolicyAssignment.jsonConfigure Advanced Threat Protection to be enabled on open-source relational databases (azadvertizer.net)2023-04-02
Intermediate RootConfigure Azure Defender to be enabled on SQL Servers and SQL Managed InstancesConfigure Azure Defender to be enabled on SQL Servers and SQL Managed InstancesInitiativeBuilt-inEnable Azure Defender on your SQL Servers and SQL Managed Instances to detect anomalous activities indicating unusual and potentially harmful attempts to access or exploit databases.DeployIfNotExistsDINE-AtpSqlDbPolicyAssignment.jsonConfigure Azure Defender to be enabled on SQL Servers and SQL Managed Instances (azadvertizer.net)2023-04-02
Intermediate RootDeploy Diagnostic Settings for Activity Log to Log Analytics workspaceConfigure Azure Activity logs to stream to specified Log Analytics workspacePolicyBuilt-inDeploys the diagnostic settings for Azure Activity to stream subscriptions audit logs to a Log Analytics workspace to monitor subscription-level eventsDeployIfNotExistsDINE-ActivityLogPolicyAssignment.jsonConfigure Azure Activity logs to stream to specified Log Analytics workspace (azadvertizer.net)2023-04-02
Intermediate RootDeny the deployment of classic resourcesDeny the deployment of classic resourcesPolicyCustomDenies deployment of classic resource types under the assigned scope.DenyDENY-ClassicResourceTypesPolicyAssignment.jsonNot allowed resource types (azadvertizer.net)2023-04-02
Intermediate RootEnforce Azure Compute Security Baseline compliance auditingEnforce Azure Compute Security Baseline compliance auditingInitiativeCustomThis initiative assignment enables Azure Compute Security Baseline compliance auditing for Windows and Linux virtual machines.AuditIfNotExistsENFORCE-AcsbPolicyAssignment.jsonEnforce Azure Compute Security Benchmark compliance auditing (azadvertizer.net)2023-04-02
Intermediate RootDeny virtual machines and virtual machine scale sets that do not use managed diskDeny virtual machines and virtual machine scale sets not using OS Managed DiskPolicyCustomDeny virtual machines not using managed disk. It checks the managedDisk property on virtual machine OS Disk fields.DenyDENY-VMUnmanagedDiskPolicyAssignment.jsonAudit VMs that do not use managed disks (azadvertizer.net)2023-04-02
Intermediate RootUnused resources driving cost should be avoidedUnused resources driving cost should be avoidedInitiativeCustomThis Policy initiative is a group of Policy definitions that help optimize cost by detecting unused but chargeable resources. Leverage this Policy initiative as a cost control to reveal orphaned resources that are driving cost.AuditAUDIT-UnusedResourcesPolicyAssignment.jsonUnused resources driving cost should be avoided (azadvertizer.net)2023-04-02
Intermediate RootDeploy Azure Monitor Baseline Alerts for Service HealthDeploy Azure Monitor Baseline Alerts for Service HealthInitiativeCustomInitiative to deploy AMBA Service Health alerts to Azure servicesDeployIfNotExistsDINE-ServiceHealthAssignment.jsonDeploy Azure Monitor Baseline Alerts for Service Health - Alerting-ServiceHealth (azadvertizer.net)2023-09-11
Intermediate RootResources should be Zone ResilientResources should be Zone ResilientInitiativeBuilt-inSome resource types can be deployed Zone Redundant (e.g. SQL Databases); some can be deploy Zone Aligned (e.g. Virtual Machines); and some can be deployed either Zone Aligned or Zone Redundant (e.g. Virtual Machine Scale Sets). Being zone aligned does not guarantee resilience, but it is the foundation on which a resilient solution can be built (e.g. three Virtual Machine Scale Sets zone aligned to three different zones in the same region with a load balancer). See https://aka.ms/AZResilience for more info.AuditAUDIT-ZoneResilientPolicyAssignment.json[Preview]: Resources should be Zone Resilient - 130fb88f-0fc9-4678-bfe1-31022d71c7d5 (azadvertizer.net)2023-12-06
Intermediate RootAudit-TrustedLaunchAudit-TrustedLaunchInitiativeCustomTrusted Launch improves security of a Virtual Machine which requires VM SKU, OS Disk & OS Image to support it (Gen 2). To learn more about Trusted Launch, visit https://aka.ms/trustedlaunch.AuditAUDIT-TrustedLauchPolicyAssignment.jsonAudit-TrustedLaunch2024-05-15
Intermediate RootConfigure subscriptions to enable service health alert monitoring rule[Preview]: Configure subscriptions to enable service health alert monitoring rulePolicyBuilt-inAssignable at the subscription or management group level, this policy ensures that each subscription has a service health alert rule configured with alert conditions and mapping to action groups as specified in the policy parameters. By default creates a resource group, alert rule and action group configured to send emails to subscription owners for all service health events.DeployIfNotExistsDINE-ServiceHealthBuiltInPolicyAssignment.json[Preview]: Configure subscriptions to enable service health alert monitoring ruleFY25H2
PlatformEnforce recommended guardrails for Azure Key VaultEnforce recommended guardrails for Azure Key VaultInitiativeCustomThis initiative assignment enables recommended ALZ guardrails for Azure Key Vault.Deny, AuditENFORCE-GuardrailsKeyVaultPolicyAssignment.jsonEnforce recommended guardrails for Azure Key Vault (azadvertizer.net)2023-07-17Updated 260203
PlatformEnforce enhanced recovery and backup policiesEnforce enhanced recovery and backup policiesInitiativeCustomThis initiative assignment enables recommended audit policies for Azure Backup and Site Recovery.AuditEnforce-BackupPolicyAssignment.jsonEnforce-Backup2024-03-12
PlatformSubnets should be privateSubnets should be privatePolicyBuilt-inEnsure your subnets are secure by default by preventing default outbound access. For more information go to https://aka.ms/defaultoutboundaccessretirementAudit, DenyENFORCE-SubnetPrivatePolicyAssignment.jsonSubnets should be private - 7bca8353-aa3b-429b-904a-9229c4385837 (azadvertizer.net)2024-08-15
Platform/ConnectivityVirtual networks should be protected by Azure DDoS Protection StandardVirtual networks should be protected by Azure DDoS Protection StandardPolicyBuilt-inProtect your virtual networks against volumetric and protocol attacks with Azure DDoS Protection Standard. For more information, visit https://aka.ms/ddosprotectiondocs.ModifyMODIFY-DDoSPolicyAssignment.jsonVirtual networks should be protected by Azure DDoS Protection Standard (azadvertizer.net)2023-04-02
Platform/ConnectivityDeploy Azure Monitor Baseline Alerts for ConnectivityDeploy Azure Monitor Baseline Alerts for ConnectivityInitiativeCustomInitiative to deploy AMBA alerts relevant to the ALZ Connectivity management groupDeployIfNotExistsDINE-ConnectivityAssignment.jsonDeploy Azure Monitor Baseline Alerts for Connectivity - Alerting-Connectivity (azadvertizer.net)2023-09-11
Platform/ManagementDeploy Azure Monitor Baseline Alerts for ManagementDeploy Azure Monitor Baseline Alerts for ManagementInitiativeCustomInitiative to deploy AMBA alerts relevant to the ALZ Management management groupDeployIfNotExistsDINE-ManagementAssignment.jsonDeploy Azure Monitor Baseline Alerts for Management - Alerting-Management (azadvertizer.net)2023-09-18
Platform/IdentityDeny the creation of public IPDeny the creation of public IPPolicyCustomThis policy denies creation of Public IPs under the assigned scope.DenyDENY-PublicIpAddressPolicyAssignment.jsonDeny the creation of public IP (azadvertizer.net)2023-04-02
Platform/IdentityManagement port access from the Internet should be blockedManagement port access from the Internet should be blockedPolicyCustomThis policy denies any network security rule that allows management port access from the InternetDenyDENY-MgmtPortsFromInternetPolicyAssignment.jsonManagement port access from the Internet should be blocked (azadvertizer.net)2023-04-02
Platform/IdentitySubnets should have a Network Security GroupSubnets should have a Network Security GroupPolicyCustomThis policy denies the creation of a subnet without a Network Security Group. NSG help to protect traffic across subnet-level.DenyDENY-SubnetWithoutNsgPolicyAssignment.jsonSubnets should have a Network Security Group (azadvertizer.net)2023-04-02
Platform/IdentityConfigure backup on virtual machines without a given tag to a new recovery services vault with a default policyConfigure backup on virtual machines without a given tag to a new recovery services vault with a default policyPolicyBuilt-inEnforce backup for all virtual machines by deploying a recovery services vault in the same location and resource group as the virtual machine.DeployIfNotExistsDINE-VMBackupPolicyAssignment.jsonConfigure backup on virtual machines without a given tag to a new recovery services vault with a default policy (azadvertizer.net)2023-04-02
Platform/IdentityDeploy Azure Monitor Baseline Alerts for IdentityDeploy Azure Monitor Baseline Alerts for IdentityInitiativeCustomInitiative to deploy AMBA alerts relevant to the ALZ Identity management groupDeployIfNotExistsDINE-IdentityAssignment.jsonDeploy Azure Monitor Baseline Alerts for Identity - Alerting-Identity (azadvertizer.net)2023-09-11
Landing ZonesDeny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transitDeny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transitInitiativeCustomTBCAudit, AuditIfNotExists, DeployIfNotExists, DenyDENY-DINE-APPEND-TLS-SSL-PolicyAssignment.jsonDeny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (azadvertizer.net)2025-01-28
Landing ZonesManagement port access from the Internet should be blockedManagement port access from the Internet should be blockedPolicyCustomThis policy denies any network security rule that allows management port access from the InternetDenyDENY-MgmtPortsFromInternetPolicyAssignment.jsonManagement port access from the Internet should be blocked (azadvertizer.net)2023-04-02
Landing ZonesSubnets should have a Network Security GroupSubnets should have a Network Security GroupPolicyCustomThis policy denies the creation of a subnet without a Network Security Group. NSG help to protect traffic across subnet-level.DenyDENY-SubnetWithoutNsgPolicyAssignment.jsonSubnets should have a Network Security Group (azadvertizer.net)2023-04-02
Landing ZonesNetwork interfaces should disable IP forwardingNetwork interfaces should disable IP forwardingPolicyBuilt-inThis policy denies the network interfaces which enabled IP forwarding. The setting of IP forwarding disables Azure's check of the source and destination for a network interface.DenyDENY-IPForwardingPolicyAssignment.jsonNetwork interfaces should disable IP forwarding (azadvertizer.net)2023-04-02
Landing ZonesSecure transfer to storage accounts should be enabledSecure transfer to storage accounts should be enabledPolicyBuilt-inAudit requirement of Secure transfer in your storage account. Secure transfer is an option that forces your storage account to accept requests only from secure connections (HTTPS). Use of HTTPS ensures authentication between the server and the service and protects data in transit from network layer attacks such as man-in-the-middle, eavesdropping, and session-hijackingDenyDENY-StorageWithoutHttpsPolicyAssignment.jsonSecure transfer to storage accounts should be enabled (azadvertizer.net)2023-04-02
Landing ZonesDeploy Azure Policy Add-on to Azure Kubernetes Service clustersDeploy Azure Policy Add-on to Azure Kubernetes Service clustersPolicyBuilt-inUse Azure Policy Add-on to manage and report on the compliance state of your Azure Kubernetes Service (AKS) clusters.DeployIfNotExistsDINE-AksPolicyPolicyAssignment.jsonDeploy Azure Policy Add-on to Azure Kubernetes Service clusters (azadvertizer.net)2023-04-02
Landing ZonesConfigure SQL servers to have auditing enabled to Log Analytics workspaceConfigure SQL servers to have auditing enabled to Log Analytics workspacePolicyBuilt-inTo ensure the operations performed against your SQL assets are captured, SQL servers should have auditing enabled. If auditing is not enabled, this policy will configure auditing events to flow to the specified Log Analytics workspace.DeployIfNotExistsDINE-SQLAuditingPolicyAssignment.jsonConfigure SQL servers to have auditing enabled to Log Analytics workspace - 25da7dfb-0666-4a15-a8f5-402127efd8bb (azadvertizer.net)2023-04-02
Landing ZonesDeploy Threat Detection on SQL serversConfigure Azure Defender to be enabled on SQL serversPolicyBuilt-inEnable Azure Defender on your Azure SQL Servers to detect anomalous activities indicating unusual and potentially harmful attempts to access or exploit databases.DeployIfNotExistsDINE-SQLThreatPolicyAssignment.jsonConfigure Azure Defender to be enabled on SQL servers (azadvertizer.net)2023-06-07
Landing ZonesDeploy TDE on SQL serversDeploy TDE on SQL serversPolicyBuilt-inThis policy ensures that Transparent Data Encryption is enabled on SQL Servers.DeployIfNotExistsDINE-SQLEncryptionPolicyAssignment.jsonDeploy SQL DB transparent data encryption (azadvertizer.net)2023-06-07
Landing ZonesVirtual networks should be protected by Azure DDoS Protection StandardVirtual networks should be protected by Azure DDoS Protection StandardPolicyBuilt-inProtect your virtual networks against volumetric and protocol attacks with Azure DDoS Protection Standard.ModifyMODIFY-DDoSPolicyAssignment.jsonVirtual networks should be protected by Azure DDoS Protection Standard (azadvertizer.net)2023-04-02
Landing ZonesKubernetes cluster should not allow privileged containersKubernetes cluster should not allow privileged containersPolicyBuilt-inDo not allow privileged containers creation in a Kubernetes cluster. This recommendation is part of CIS 5.2.1 which is intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes.DenyDENY-AksPrivilegedPolicyAssignment.jsonKubernetes cluster should not allow privileged containers (azadvertizer.net)2023-04-02
Landing ZonesKubernetes clusters should not allow container privilege escalationKubernetes clusters should not allow container privilege escalationPolicyBuilt-inDo not allow containers to run with privilege escalation to root in a Kubernetes cluster. This recommendation is part of CIS 5.2.5 which is intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes.DenyDENY-AksPrivEscalationPolicyAssignment.jsonKubernetes clusters should not allow container privilege escalation (azadvertizer.net)2023-04-02
Landing ZonesKubernetes clusters should be accessible only over HTTPSKubernetes clusters should be accessible only over HTTPSPolicyBuilt-inUse of HTTPS ensures authentication and protects data in transit from network layer eavesdropping attacks. This capability is currently generally available for Kubernetes Service (AKS), and in preview for AKS Engine and Azure Arc enabled Kubernetes.DenyDENY-AksWithoutHttpsPolicyAssignment.jsonKubernetes clusters should be accessible only over HTTPS (azadvertizer.net)2023-04-02
Landing ZonesEnforce recommended guardrails for Azure Key VaultEnforce recommended guardrails for Azure Key VaultInitiativeCustomThis initiative assignment enables recommended ALZ guardrails for Azure Key Vault.Deny, AuditENFORCE-GuardrailsKeyVaultPolicyAssignment.jsonEnforce recommended guardrails for Azure Key Vault (azadvertizer.net)2023-04-02Updated 260203
Landing ZonesEnforce enhanced recovery and backup policiesEnforce enhanced recovery and backup policiesInitiativeCustomThis initiative assignment enables recommended audit policies for Azure Backup and Site Recovery.AuditEnforce-BackupPolicyAssignment.jsonEnforce-Backup2024-03-12
Landing ZonesWeb Application Firewall (WAF) should be enabled for Application GatewayWeb Application Firewall (WAF) should be enabled for Application GatewayPolicyBuilt-inAssign the WAF should be enabled for Application Gateway audit policy.AuditAUDIT-AppGwWafPolicyAssignment.jsonWeb Application Firewall (WAF) should be enabled for Application Gateway (azadvertizer.net)2023-09-11
Landing ZonesDeploy Azure Monitor Baseline Alerts for Landing ZoneDeploy Azure Monitor Baseline Alerts for Landing ZoneInitiativeCustomInitiative to deploy AMBA alerts relevant to the ALZ LandingZone management groupDeployIfNotExistsDINE-LandingZoneAssignment.jsonDeploy Azure Monitor Baseline Alerts for Landing Zone - Alerting-LandingZone (azadvertizer.net)2023-04-02
Landing ZonesConfigure backup on virtual machines without a given tag to a new recovery services vault with a default policyConfigure backup on virtual machines without a given tag to a new recovery services vault with a default policyPolicyBuilt-inEnforce backup for all virtual machines by deploying a recovery services vault in the same location and resource group as the virtual machine. Doing this is useful when different application teams in your organization are allocated separate resource groups and need to manage their own backups and restores. You can optionally exclude virtual machines containing a specified tag to control the scope of assignment. See https://aka.ms/AzureVMAppCentricBackupExcludeTag.DeployIfNotExistsDINE-VMBackupPolicyAssignment.jsonConfigure backup on virtual machines without a given tag to a new recovery services vault with a default policy - 98d0b9f8-fd90-49c9-88e2-d3baf3b0dd86 (azadvertizer.net)2023-04-02
Landing ZonesSubnets should be privateSubnets should be privatePolicyBuilt-inEnsure your subnets are secure by default by preventing default outbound access. For more information go to https://aka.ms/defaultoutboundaccessretirementAudit, DenyENFORCE-SubnetPrivatePolicyAssignment.jsonSubnets should be private - 7bca8353-aa3b-429b-904a-9229c4385837 (azadvertizer.net)2024-08-15
Landing Zones/CorpPublic network access should be disabled for PaaS servicesPublic network access should be disabled for PaaS servicesInitiativeCustomThis policy initiative is a group of policies that prevents creation of Azure PaaS services with exposed public endpointsDenyDENY-PublicEndpointPolicyAssignment.jsonPublic network access should be disabled for PaaS services (azadvertizer.net)2023-04-02
Landing Zones/CorpConfigure Azure PaaS services to use private DNS zonesConfigure Azure PaaS services to use private DNS zonesInitiativeCustomThis policy initiative is a group of policies that ensures private endpoints to Azure PaaS services are integrated with Azure Private DNS zonesDeployIfNotExistsDINE-PrivateDNSZonesPolicyAssignment.jsonConfigure Azure PaaS services to use private DNS zones (azadvertizer.net)2023-04-02
Landing Zones/CorpDeny network interfaces having a public IP associatedNetwork interfaces should not have public IpsPolicyBuilt-inThis policy denies network interfaces from having a public IP associated to it under the assigned scope.DenyDENY-PublicIpAddressOnNICPolicyAssignment.jsonNetwork interfaces should not have public IPs (azadvertizer.net)2023-04-02
Landing Zones/CorpAudit the creation of Private Link Private DNS ZonesAudit the creation of Private Link Private DNS ZonesPolicyBuilt-inAudits the deployment of Private Link Private DNS Zone resources in the Corp landing zone.AuditAUDIT-PeDnsZonesPolicyAssignment.jsonAudit the creation of Private Link Private DNS Zones (azadvertizer.net)2023-04-02
Landing Zones/CorpDeny the deployment of vWAN/ER/VPN gateway resourcesDeny the deployment of vWAN/ER/VPN gateway resourcesPolicyBuilt-inDenies deployment of vWAN/ER/VPN gateway resources in the Corp landing zone.DenyDENY-HybridNetworkingPolicyAssignment.jsonNot allowed resource types (azadvertizer.net)2023-04-02
Landing Zones/OnlineN/AN/AN/AN/AN/AN/AN/AN/A2023-04-02
DecommissionedEnforce ALZ Decommissioned GuardrailsEnforce ALZ Decommissioned GuardrailsInitiativeCustomThis initiative will help enforce and govern subscriptions that are placed within the decommissioned Management Group as part of your Subscription decommissioning process. See https://aka.ms/alz/policies for more information.Deny, DeployIfNotExistsENFORCE-ALZ-DecommissionedPolicyAssignment.jsonEnforce policies in the Decommissioned Landing Zone (azadvertizer.net)2023-04-02
SandboxEnforce ALZ Sandbox GuardrailsEnforce ALZ Sandbox GuardrailsInitiativeCustomThis initiative will help enforce and govern subscriptions that are placed within the Sandbox Management Group. See https://aka.ms/alz/policies for more information.DenyENFORCE-ALZ-SandboxPolicyAssignment.jsonEnforce policies in the Sandbox Landing Zone (azadvertizer.net)2023-04-02
PlatformEnable Azure Monitor for VMsEnable Azure Monitor for VMs with Azure Monitoring Agent(AMA)InitiativeBuilt-inThis policy initiative installs the Azure Monitoring Agent (AMA) on the virtual machines (VMs) and enables Azure Monitor for them. Azure Monitor collects and analyzes data from the VMs, such as performance metrics, logs, and dependencies.DeployIfNotExistsDINE-VMMonitoringPolicyAssignment.jsonEnable Azure Monitor for VMs with Azure Monitoring Agent(AMA) - 924bfe3a-762f-40e7-86dd-5c8b95eb09e6 (azadvertizer.net)2024-01-31
PlatformEnable Azure Monitor for Virtual Machine Scale SetsEnable Azure Monitor for VMSS with Azure Monitoring Agent(AMA)InitiativeBuilt-inThis policy initiative installs the Azure Monitoring Agent (AMA) on the virtual machines scale sets (VMSS) and enables Azure Monitor for them. Azure Monitor collects and analyzes data from the VMs, such as performance metrics, logs, and dependencies.DeployIfNotExistsDINE-VMSSMonitoringPolicyAssignment.jsonEnable Azure Monitor for VMSS with Azure Monitoring Agent(AMA) - f5bf694c-cca7-4033-b883-3a23327d5485 (azadvertizer.net)2024-01-31
PlatformEnable Azure Monitor for Hybrid Virtual MachinesEnable Azure Monitor for Hybrid VMs with AMAInitiativeBuilt-inThis policy initiative installs the Azure Monitoring Agent (AMA) on Arc-enabled servers (Hybrid) and enables Azure Monitor for them. Azure Monitor collects and analyzes data from the VMs, such as performance metrics, logs, and dependencies.DeployIfNotExistsDINE-VMHybridMonitoringPolicyAssignment.jsonEnable Azure Monitor for Hybrid VMs with AMA - 2b00397d-c309-49c4-aa5a-f0b2c5bc6321 (azadvertizer.net)2024-01-31
PlatformEnable ChangeTracking and Inventory for virtual machines[Preview]: Enable ChangeTracking and Inventory for virtual machinesInitiativeBuilt-inThis policy initiative enables ChangeTracking and Inventory for virtual machines. It uses a Data Collection Rule to define what data to collect and where to send it, and a user-assigned identity to authenticate the Azure Monitor Agent.DeployIfNotExistsDINE-ChangeTrackingVMPolicyAssignment.json[Preview]: Enable ChangeTracking and Inventory for virtual machines - 92a36f05-ebc9-4bba-9128-b47ad2ea3354 (azadvertizer.net)2024-01-31
PlatformEnable ChangeTracking and Inventory for virtual machine scale sets[Preview]: Enable ChangeTracking and Inventory for virtual machine scale setsInitiativeBuilt-inThis policy initiative enables ChangeTracking and Inventory for virtual machines scale sets. It uses a Data Collection Rule to define what data to collect and where to send it, and a user-assigned identity to authenticate the Azure Monitor Agent.DeployIfNotExistsDINE-ChangeTrackingVMSSPolicyAssignment.json[Preview]: Enable ChangeTracking and Inventory for virtual machine scale sets - c4a70814-96be-461c-889f-2b27429120dc (azadvertizer.net)2024-01-31
PlatformEnable ChangeTracking and Inventory for Arc-enabled virtual machines[Preview]: Enable ChangeTracking and Inventory for Arc-enabled virtual machinesInitiativeBuilt-inThis policy initiative enables ChangeTracking and Inventory for Arc-enabled servers. It uses a Data Collection Rule to define what data to collect and where to send it, and a user-assigned identity to authenticate the Azure Monitor Agent.DeployIfNotExistsDINE-ChangeTrackingVMArcPolicyAssignment.json[Preview]: Enable ChangeTracking and Inventory for Arc-enabled virtual machines - 53448c70-089b-4f52-8f38-89196d7f2de1 (azadvertizer.net)2024-01-31
PlatformEnable Defender for SQL on SQL VMs and Arc-enabled SQL ServersConfigure SQL VMs and Arc-enabled SQL Servers to install Microsoft Defender for SQL and AMA with a user-defined LA workspaceInitiativeBuilt-inThis policy initiative enables Microsoft Defender for SQL and AMA on SQL VMs and Arc-enabled SQL Servers.DeployIfNotExistsDINE-MDFCDefenderSQLAMAPolicyAssignment.jsonConfigure SQL VMs and Arc-enabled SQL Servers to install Microsoft Defender for SQL and AMA with a user-defined LA workspace - de01d381-bae9-4670-8870-786f89f49e26 (azadvertizer.net)2024-01-31
PlatformDo not allow deletion of resource typesDo not allow deletion of resource typesPolicyBuilt-inThis policy enables you to specify the resource types that your organization can protect from accidentals deletion by blocking delete calls using deny action effect. Assigned to deny the deletion of the User Assignment Managed Identity that is used for AMA.DenyActionDENYACTION-ResourceDeletionPolicyAssignment.jsonDo not allow deletion of resource types - 78460a36-508a-49a4-b2b2-2f5ec564f4bb (azadvertizer.net)2024-01-31
PlatformConfigure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machinesConfigure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machinesInitiativeCustomWith this policy initiative, you can enable automatic OS updates assessment every 24 hours. This is a custom initiative of built-in policies.ModifyMODIFY-AUM-CheckUpdatesPolicyAssignment.jsonConfigure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines - Deploy-AUM-CheckUpdates (azadvertizer.net)2024-01-31
Landing ZonesEnable Azure Monitor for VMsEnable Azure Monitor for VMs with Azure Monitoring Agent(AMA)InitiativeBuilt-inThis policy initiative installs the Azure Monitoring Agent (AMA) on the virtual machines (VMs) and enables Azure Monitor for them. Azure Monitor collects and analyzes data from the VMs, such as performance metrics, logs, and dependencies.DeployIfNotExistsDINE-VMMonitoringPolicyAssignment.jsonEnable Azure Monitor for VMs with Azure Monitoring Agent(AMA) - 924bfe3a-762f-40e7-86dd-5c8b95eb09e6 (azadvertizer.net)2024-01-31
Landing ZonesEnable Azure Monitor for Virtual Machine Scale SetsEnable Azure Monitor for VMSS with Azure Monitoring Agent(AMA)InitiativeBuilt-inThis policy initiative installs the Azure Monitoring Agent (AMA) on the virtual machines scale sets (VMSS) and enables Azure Monitor for them. Azure Monitor collects and analyzes data from the VMs, such as performance metrics, logs, and dependencies.DeployIfNotExistsDINE-VMSSMonitoringPolicyAssignment.jsonEnable Azure Monitor for VMSS with Azure Monitoring Agent(AMA) - f5bf694c-cca7-4033-b883-3a23327d5485 (azadvertizer.net)2024-01-31
Landing ZonesEnable Azure Monitor for Hybrid Virtual MachinesEnable Azure Monitor for Hybrid VMs with AMAInitiativeBuilt-inThis policy initiative installs the Azure Monitoring Agent (AMA) on Arc-enabled servers (Hybrid) and enables Azure Monitor for them. Azure Monitor collects and analyzes data from the VMs, such as performance metrics, logs, and dependencies.DeployIfNotExistsDINE-VMHybridMonitoringPolicyAssignment.jsonEnable Azure Monitor for Hybrid VMs with AMA - 2b00397d-c309-49c4-aa5a-f0b2c5bc6321 (azadvertizer.net)2024-01-31
Landing ZonesEnable ChangeTracking and Inventory for virtual machines[Preview]: Enable ChangeTracking and Inventory for virtual machinesInitiativeBuilt-inThis policy initiative enables ChangeTracking and Inventory for virtual machines. It uses a Data Collection Rule to define what data to collect and where to send it, and a user-assigned identity to authenticate the Azure Monitor Agent.DeployIfNotExistsDINE-ChangeTrackingVMPolicyAssignment.json[Preview]: Enable ChangeTracking and Inventory for virtual machines - 92a36f05-ebc9-4bba-9128-b47ad2ea3354 (azadvertizer.net)2024-01-31
Landing ZonesEnable ChangeTracking and Inventory for virtual machine scale sets[Preview]: Enable ChangeTracking and Inventory for virtual machine scale setsInitiativeBuilt-inThis policy initiative enables ChangeTracking and Inventory for virtual machines scale sets. It uses a Data Collection Rule to define what data to collect and where to send it, and a user-assigned identity to authenticate the Azure Monitor Agent.DeployIfNotExistsDINE-ChangeTrackingVMSSPolicyAssignment.json[Preview]: Enable ChangeTracking and Inventory for virtual machine scale sets - c4a70814-96be-461c-889f-2b27429120dc (azadvertizer.net)2024-01-31
Landing ZonesEnable ChangeTracking and Inventory for Arc-enabled virtual machines[Preview]: Enable ChangeTracking and Inventory for Arc-enabled virtual machinesInitiativeBuilt-inThis policy initiative enables ChangeTracking and Inventory for Arc-enabled servers. It uses a Data Collection Rule to define what data to collect and where to send it, and a user-assigned identity to authenticate the Azure Monitor Agent.DeployIfNotExistsDINE-ChangeTrackingVMArcPolicyAssignment.json[Preview]: Enable ChangeTracking and Inventory for Arc-enabled virtual machines - 53448c70-089b-4f52-8f38-89196d7f2de1 (azadvertizer.net)2024-01-31
Landing ZonesEnable Defender for SQL on SQL VMs and Arc-enabled SQL ServersConfigure SQL VMs and Arc-enabled SQL Servers to install Microsoft Defender for SQL and AMA with a user-defined LA workspaceInitiativeBuilt-inThis policy initiative enables Microsoft Defender for SQL and AMA on SQL VMs and Arc-enabled SQL Servers.DeployIfNotExistsDINE-MDFCDefenderSQLAMAPolicyAssignment.jsonConfigure SQL VMs and Arc-enabled SQL Servers to install Microsoft Defender for SQL and AMA with a user-defined LA workspace - de01d381-bae9-4670-8870-786f89f49e26 (azadvertizer.net)2024-01-31
Landing ZonesConfigure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machinesConfigure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machinesInitiativeCustomWith this policy initiative, you can enable automatic OS updates assessment every 24 hours. This is a custom initiative of built-in policies.ModifyMODIFY-AUM-CheckUpdatesPolicyAssignment.jsonConfigure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines - Deploy-AUM-CheckUpdates (azadvertizer.net)2024-01-31
Landing ZonesConfigure prerequisites to enable Guest Attestation on Trusted Launch enabled VMs[Preview]: Configure prerequisites to enable Guest Attestation on Trusted Launch enabled VMsInitiativeBuilt-inWith this policy initiative, you can enable Guest Attestation on Trusted Launch enabled VMs.DeployIfNotExists, ModifyDINE-TrustedLaunchGuestAttestationAssignment.json[Preview]: Configure prerequisites to enable Guest Attestation on Trusted Launch enabled VMs - 281d9e47-d14d-4f05-b8eb-18f2c4a034ff2025-05-07
PlatformConfigure prerequisites to enable Guest Attestation on Trusted Launch enabled VMs[Preview]: Configure prerequisites to enable Guest Attestation on Trusted Launch enabled VMsInitiativeBuilt-inWith this policy initiative, you can enable Guest Attestation on Trusted Launch enabled VMs.DeployIfNotExists, ModifyDINE-TrustedLaunchGuestAttestationAssignment.json[Preview]: Configure prerequisites to enable Guest Attestation on Trusted Launch enabled VMs - 281d9e47-d14d-4f05-b8eb-18f2c4a034ff2025-05-08
Note
Be sure to also review the Extra Policies and Information document that describes additional ALZ custom policy definitions and initiatives that are not assigned by default in ALZ, but are provided as they may assist some consumers of ALZ in specific scenarios where they can assign these additional policies to help them meet their objectives.