You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Address Acrolinx feedback for 04-operations-troubleshooting.md
Clarity improvements:
- Simplified complex sentence about guest assignment resources by breaking it into clearer parts
- Improved active voice usage and sentence structure
- Replaced 'This is especially true' with more specific language
Spelling and grammar fixes:
- Fixed spelling error: 'Confgiguration' → 'Configuration'
- Improved present tense usage instead of present perfect
Tone improvements:
- Added contractions to make content less formal: 'do not' → 'don't', 'is not' → 'isn't'
- Removed unnecessary filler words: 'Please check' → 'Check'
Terminology improvements:
- Added acronym definitions: STIG (Security Technical Implementation Guide), OMI (Open Management Infrastructure), DSC (Desired State Configuration), VM (Virtual Machine)
- First occurrence of each acronym now includes full definition
Document structure improvements:
- Improved readability and flow
- Maintained technical accuracy while enhancing clarity
Copy file name to clipboardExpand all lines: articles/governance/machine-configuration/overview/04-operations-troubleshooting.md
+15-15Lines changed: 15 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,13 +12,13 @@ ms.custom: references_regions
12
12
13
13
Customers designing a highly available solution should consider the redundancy planning
14
14
requirements for [virtual machines][28] because guest assignments are extensions of machine
15
-
resources in Azure. When guest assignment resources are provisioned into an Azure region that's
16
-
[paired][29], you can view guest assignment reports if at least one region in the pair is
15
+
resources in Azure. Guest assignment resources can be provisioned into Azure regions that are
16
+
[paired][29]. You can view guest assignment reports if at least one region in the pair is
17
17
available. When the Azure region isn't paired and it becomes unavailable, you can't access reports
18
18
for a guest assignment. When the region is restored, you can access the reports again.
19
19
20
20
It's best practice to assign the same policy definitions with the same parameters to all machines
21
-
in the solution for highly available applications. This is especially true for scenarios where
21
+
in the solution for highly available applications. These considerations are especially important for scenarios where
22
22
virtual machines are provisioned in [Availability Sets][30] behind a load balancer solution. A
23
23
single policy assignment spanning all machines has the least administrative overhead.
24
24
@@ -55,16 +55,16 @@ assignments:
55
55
| /providers/Microsoft.Authorization/policyDefinitions/63594bb8-43bb-4bf0-bbf8-c67e5c28cb65 |[Preview]: Linux machines should meet STIG compliance requirement for Azure compute |
56
56
| /providers/Microsoft.Authorization/policyDefinitions/50c52fc9-cb21-4d99-9031-d6a0c613361c |[Preview]: Windows machines should meet STIG compliance requirements for Azure compute |
57
57
| /providers/Microsoft.Authorization/policyDefinitions/e79ffbda-ff85-465d-ab8e-7e58a557660f |[Preview]: Linux machines with OMI installed should have version 1.6.8-1 or later |
58
-
| /providers/Microsoft.Authorization/policyDefinitions/934345e1-4dfb-4c70-90d7-41990dc9608b | Audit Windows machines that do not contain the specified certificates in Trusted Root |
59
-
| /providers/Microsoft.Authorization/policyDefinitions/08a2f2d2-94b2-4a7b-aa3b-bb3f523ee6fd | Audit Windows machines on which the DSC configuration is not compliant |
60
-
| /providers/Microsoft.Authorization/policyDefinitions/c648fbbb-591c-4acd-b465-ce9b176ca173 | Audit Windows machines that do not have the specified Windows PowerShell execution policy |
61
-
| /providers/Microsoft.Authorization/policyDefinitions/3e4e2bd5-15a2-4628-b3e1-58977e9793f3 | Audit Windows machines that do not have the specified Windows PowerShell modules installed |
62
-
| /providers/Microsoft.Authorization/policyDefinitions/58c460e9-7573-4bb2-9676-339c2f2486bb | Audit Windows machines on which Windows Serial Console is not enabled |
63
-
| /providers/Microsoft.Authorization/policyDefinitions/e6ebf138-3d71-4935-a13b-9c7fdddd94df | Audit Windows machines on which the specified services are not installed and 'Running' |
64
-
| /providers/Microsoft.Authorization/policyDefinitions/c633f6a2-7f8b-4d9e-9456-02f0f04f5505 | Audit Windows machines that are not set to the specified time zone |
58
+
| /providers/Microsoft.Authorization/policyDefinitions/934345e1-4dfb-4c70-90d7-41990dc9608b | Audit Windows machines that don't contain the specified certificates in Trusted Root |
59
+
| /providers/Microsoft.Authorization/policyDefinitions/08a2f2d2-94b2-4a7b-aa3b-bb3f523ee6fd | Audit Windows machines on which the DSC configuration isn't compliant |
60
+
| /providers/Microsoft.Authorization/policyDefinitions/c648fbbb-591c-4acd-b465-ce9b176ca173 | Audit Windows machines that don't have the specified Windows PowerShell execution policy |
61
+
| /providers/Microsoft.Authorization/policyDefinitions/3e4e2bd5-15a2-4628-b3e1-58977e9793f3 | Audit Windows machines that don't have the specified Windows PowerShell modules installed |
62
+
| /providers/Microsoft.Authorization/policyDefinitions/58c460e9-7573-4bb2-9676-339c2f2486bb | Audit Windows machines on which Windows Serial Console isn't enabled |
63
+
| /providers/Microsoft.Authorization/policyDefinitions/e6ebf138-3d71-4935-a13b-9c7fdddd94df | Audit Windows machines on which the specified services aren't installed and 'Running' |
64
+
| /providers/Microsoft.Authorization/policyDefinitions/c633f6a2-7f8b-4d9e-9456-02f0f04f5505 | Audit Windows machines that aren't set to the specified time zone |
65
65
66
66
> [!NOTE]
67
-
> Please check this page periodically for updates to the list of built-in machine configuration
67
+
> Check this page periodically for updates to the list of built-in machine configuration
68
68
> policy definitions that support multiple assignments.
69
69
70
70
### Assignments to Azure management groups
@@ -73,15 +73,15 @@ Azure Policy definitions in the category `Guest Configuration` can be assigned t
73
73
when the effect is `AuditIfNotExists` or `DeployIfNotExists`.
74
74
75
75
> [!IMPORTANT]
76
-
> When [policy exemptions][47] are created on a Machine Confgiguration policy, the associated guest assignment will need to be deleted in order to stop the agent from scanning.
76
+
> When [policy exemptions][47] are created on a Machine Configuration policy, the associated guest assignment needs to be deleted to stop the agent from scanning.
77
77
78
78
### Client log files
79
79
80
80
The machine configuration extension writes log files to the following locations:
0 commit comments