Skip to content

Commit 8757af0

Browse files
author
Mutemwa Masheke
committed
Fix Acrolinx validation issues: Add metadata headers and complete lightbox implementation
- Added ms.custom: references_regions to metadata headers for 4 key documentation files - Removed empty ms.custom fields and build-2025 values as per Acrolinx feedback - Completed lightbox syntax implementation across all image references - All images now have proper alt text beginning with 'Screenshot of' and ending with periods - Improved accessibility and compliance with Azure documentation standards
1 parent 81b6329 commit 8757af0

8 files changed

Lines changed: 50 additions & 49 deletions

File tree

articles/governance/machine-configuration/how-to/assign-built-in-policies.md

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@ title: Discover And Assign Built In Machine Configuration Policies
33
description: Learn how to discover, configure, and assign built-in Azure Machine Configuration policies to audit and enforce compliance across Windows and Linux machines in your environment.
44
ms.date: 11/07/2025
55
ms.topic: conceptual
6+
ms.custom: references_regions
67
---
78

89
# Discover and Assign Built-In Machine Configuration Policies
@@ -24,7 +25,7 @@ To view and explore these built-in policies:
2425

2526
3. Open the **Category** filter and select **Guest Configuration** and **Built-in** on Policy Type to display all built-in policies related to OS auditing and compliance.
2627

27-
![Azure Policy Definitions page with Guest Configuration filter applied showing built-in policies](../media/discover-and-assign-built-in-machine-configuration-policies/azure-policy-definitions-guest-config-filter.png)
28+
[![Screenshot of Azure Policy Definitions page with Guest Configuration filter applied.](../media/discover-and-assign-built-in-machine-configuration-policies/azure-policy-definitions-guest-config-filter.png)](../media/discover-and-assign-built-in-machine-configuration-policies/azure-policy-definitions-guest-config-filter.png#lightbox)
2829

2930
4. Browse the list to review available definitions, such as:
3031

@@ -42,7 +43,7 @@ To view and explore these built-in policies:
4243

4344
3. Metadata such as category, mode, and required providers
4445

45-
![Policy definition details page showing JSON definition and parameters for a Machine Configuration policy](../media/discover-and-assign-built-in-machine-configuration-policies/policy-definition-details-json-parameters.png)
46+
[![Screenshot of policy definition details page showing JSON definition and parameters.](../media/discover-and-assign-built-in-machine-configuration-policies/policy-definition-details-json-parameters.png)](../media/discover-and-assign-built-in-machine-configuration-policies/policy-definition-details-json-parameters.png#lightbox)
4647

4748
## Assign a Built-In Machine Configuration Policy
4849

@@ -66,22 +67,22 @@ Let’s use one of the built-in Machine Configuration policies—**Audit Windows
6667

6768
3. Optionally specify exclusions if certain resources shouldn't be evaluated.
6869

69-
![Policy assignment Basics tab showing scope selection and prerequisites configuration](../media/discover-and-assign-built-in-machine-configuration-policies/policy-assignment-basics-scope-prerequisites.png)
70+
[![Screenshot of policy assignment Basics tab showing scope selection and prerequisites.](../media/discover-and-assign-built-in-machine-configuration-policies/policy-assignment-basics-scope-prerequisites.png)](../media/discover-and-assign-built-in-machine-configuration-policies/policy-assignment-basics-scope-prerequisites.png#lightbox)
7071

7172
4. In the **Parameters** tab:
7273

7374
1. Set **Include Arc connected servers** to true if your environment includes Arc-enabled machines.
7475

7576
2. Choose the desired **Time zone** (for example, "Pacific Time (US & Canada)").
7677

77-
![Policy assignment Parameters tab showing Arc servers option and time zone selection](../media/discover-and-assign-built-in-machine-configuration-policies/policy-assignment-parameters-arc-timezone.png)
78+
[![Screenshot of policy assignment Parameters tab showing Arc servers option and time zone selection.](../media/discover-and-assign-built-in-machine-configuration-policies/policy-assignment-parameters-arc-timezone.png)](../media/discover-and-assign-built-in-machine-configuration-policies/policy-assignment-parameters-arc-timezone.png#lightbox)
7879

7980
5. Review your configuration under **Review + create**, then click **Create**.
8081

8182
Once assigned, the policy will automatically begin evaluating machines within scope. Compliance results will surface in the **Policy → Compliance** view, where you can drill down to specific resources or export results.
8283

83-
*Note:* The same process applies to other built-in Machine Configuration policies—such as those auditing Linux baselines, password settings, or required applications.
84-
Parameters vary by definition and allow you to customize the audit scope without creating new policies.
84+
> [!NOTE]
85+
> The same process applies to other built-in Machine Configuration policies—such as those auditing Linux baselines, password settings, or required applications. Parameters vary by definition and allow you to customize the audit scope without creating new policies.
8586
8687
## Programmatic Access and Automation
8788

articles/governance/machine-configuration/how-to/assign-security-baselines/deploy-a-baseline-policy-assignment.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@ title: Deploy A Baseline Policy Assignment
33
description: Learn how to deploy a security baseline policy assignment for continuous security compliance tracking across Azure and Arc-enabled machines using Azure Policy and Machine Configuration.
44
ms.date: 11/07/2025
55
ms.topic: conceptual
6+
ms.custom: references_regions
67
---
78

89
# Deploy a Security Baseline Policy Assignment
@@ -63,7 +64,7 @@ Use this file later when creating the assignment.
6364

6465
3. Under the **Parameters** tab, locate **Baseline Settings**. You may need to uncheck *"Only show parameters that need input or review"*
6566

66-
![Baseline Settings parameter configuration](../../media/deploy-a-baseline-policy-assignment/baseline-settings-parameter-configuration.png)
67+
[![Screenshot of Baseline Settings parameter configuration.](../../media/deploy-a-baseline-policy-assignment/baseline-settings-parameter-configuration.png)](../../media/deploy-a-baseline-policy-assignment/baseline-settings-parameter-configuration.png#lightbox)
6768

6869
4. Click **Browse** → Upload the JSON file you downloaded earlier.
6970

@@ -107,7 +108,7 @@ You can find other examples in [Assign policy with Azure CLI][04].
107108

108109
After deploying your customized baseline, you can verify its status and scope in the **Assignments** tab under **Policy → Machine Configuration** in the Azure portal.
109110

110-
![Policy assignments view showing deployed baseline policies](../../media/deploy-a-baseline-policy-assignment/policy-assignments-view-deployed-baselines.png)
111+
[![Screenshot of policy assignments view showing deployed baseline policies.](../../media/deploy-a-baseline-policy-assignment/policy-assignments-view-deployed-baselines.png)](../../media/deploy-a-baseline-policy-assignment/policy-assignments-view-deployed-baselines.png#lightbox)
111112

112113
This view lists all baseline policy assignments, including their policy definition, management group or subscription, and resource group. You can use filters (for example, by policy name, subscription, or scope) to quickly locate your assignment. Selecting a specific assignment opens its details, where you can review parameter input (such as your imported JSON file), scope, and compliance status once evaluations complete.
113114

articles/governance/machine-configuration/how-to/assign-security-baselines/overview-page.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -11,19 +11,19 @@ Customizable security baselines built on Azure Policy and Machine Configuration
1111

1212
This capability introduces *audit* baselines for both Windows and Linux, empowering customers to align security posture with internal compliance frameworks and regulatory standards. By passing custom baseline parameter input directly into Azure Policy, you can now represent organization-specific controls at scale.
1313

14-
These baselines deliver a cloud-native governance experience for both Azure machines and non-Azure machines connected through [Azure Arc][01], including machines running on-premises, in other public clouds, or at the edge. Together, Policy and Machine Configuration establish a unified control plane for compliance visibility, enabling you to assess, monitor, and enforce consistent security standards across your entire estate, regardless of location or platform. This approach reflects Microsoft's Secure by Design and Secure by Default principles, ensuring robust security and compliance everywhere your workloads run.
14+
These baselines deliver a cloud-native governance experience for both Azure machines and non-Azure machines connected through [Azure Arc][01]. This includes machines running on-premises, in other public clouds, or at the edge. Together, Policy and Machine Configuration establish a unified control plane for compliance visibility. This approach enables you to assess, monitor, and enforce consistent security standards across your entire estate, regardless of location or platform. This approach reflects Microsoft's Secure by Design and Secure by Default principles, ensuring robust security and compliance everywhere your workloads run.
1515

1616
## Key Scenarios
1717

1818
### Baseline Customization
19-
Create tailored baselines using the *Modify Settings* wizard under **Policy \> Machine Configuration**. Administrators can enable, exclude, or adjust rules from industry benchmarks (like CIS Benchmarks or Microsoft baselines) to match internal standards. Each customization builds a downloadable JSON file that captures configuration intenta reusable artifact compatible for policy-as-code workflows.
19+
Create tailored baselines using the *Modify Settings* wizard under **Policy \> Machine Configuration**. Administrators can enable, exclude, or adjust rules from industry benchmarks (like CIS Benchmarks or Microsoft baselines) to match internal standards. Each customization builds a downloadable JSON file that captures configuration intenta reusable artifact compatible for policy-as-code workflows.
2020

2121
### Assign Audit Policies
2222

23-
Use Azure Policy to deploy your customized baseline parameters across Azure and Arc-connected machines. When an audit policy is assigned, Azure Policy evaluates configuration states against selected benchmarks, reports compliance in real time, and surfaces findings across Azure Policy, Azure Resource Graph (ARG), and the Guest Assignments view.
23+
Use Azure Policy to deploy your customized baseline parameters across Azure and Arc-connected machines. Azure Policy evaluates configuration states against selected benchmarks when an audit policy is assigned. It reports compliance in real time and surfaces findings across Azure Policy, Azure Resource Graph (ARG), and the Guest Assignments view.
2424

2525
### Integration and Automation
26-
Integrate baselines into CI/CD pipelines or configuration management workflows. Each baseline produces a declarative settings catalog (JSON) that can be version-controlled and deployed using CLI, ARM, or Bicep templatesensuring reproducible compliance configurations across environments.
26+
Integrate baselines into CI/CD pipelines or configuration management workflows. Each baseline produces a declarative settings catalog (JSON) that can be version-controlled and deployed using CLI, ARM, or Bicep templatesensuring reproducible compliance configurations across environments.
2727

2828
## Supported Standards
2929

@@ -33,14 +33,14 @@ Integrate baselines into CI/CD pipelines or configuration management workflows.
3333
| **Azure Compute Security Baseline for Windows** | Applies customized values for Windows Server 2022 and Windows Server 2025. |
3434
| **Azure Compute Security Baseline for Linux** | Enforces consistent security controls aligned with Azure Compute guidance. |
3535

36-
Additional standards (e.g., STIG), operating systems, and remediation capabilities will be introduced in future releases.
36+
More standards (for example, STIG), operating systems, and remediation capabilities are planned for future releases.
3737

3838
## Availability
3939

4040
All public Azure regions are supported.
4141

4242
> [!NOTE]
43-
> Support for Azure Government and Sovereign Clouds will be added closer to General Availability.
43+
> Support for Azure Government and Sovereign Clouds is planned for General Availability.
4444
4545
## Getting Started
4646

@@ -50,17 +50,17 @@ The end-to-end experience for configuring Customizable Security Baselines follow
5050

5151
1. **Select a baseline** from the *Machine Configuration* blade under Azure Policy.
5252

53-
2. **Modify settings**enable, exclude, or parameterize rules to match your internal requirements.
53+
2. **Modify settings**enable, exclude, or parameterize rules to match your internal requirements.
5454

5555
3. **Download the JSON file** representing your configured baseline.
5656

57-
4. **Assign the baseline policy** using the Azure Portal, CLI, or CI/CD integration.
57+
4. **Assign the baseline policy** using the Azure portal, CLI, or CI/CD integration.
5858

5959
5. **Review compliance results** through Azure Policy, Azure Resource Graph, or the Guest Assignments page.
6060

6161
### Prerequisites
6262

63-
- Azure Machine Configuration prerequisite policy initiative must be deployed. This enables Guest Configuration policies and installs the required extension on VMs.
63+
- Azure Machine Configuration prerequisite policy initiative must be deployed. The capability enables Guest Configuration policies and installs the required extension on VMs.
6464

6565
- An Azure subscription or management group containing supported Windows and Linux VMs.
6666

0 commit comments

Comments
 (0)