You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
- Added ms.custom: references_regions to metadata headers for 4 key documentation files
- Removed empty ms.custom fields and build-2025 values as per Acrolinx feedback
- Completed lightbox syntax implementation across all image references
- All images now have proper alt text beginning with 'Screenshot of' and ending with periods
- Improved accessibility and compliance with Azure documentation standards
Copy file name to clipboardExpand all lines: articles/governance/machine-configuration/how-to/assign-built-in-policies.md
+7-6Lines changed: 7 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,6 +3,7 @@ title: Discover And Assign Built In Machine Configuration Policies
3
3
description: Learn how to discover, configure, and assign built-in Azure Machine Configuration policies to audit and enforce compliance across Windows and Linux machines in your environment.
4
4
ms.date: 11/07/2025
5
5
ms.topic: conceptual
6
+
ms.custom: references_regions
6
7
---
7
8
8
9
# Discover and Assign Built-In Machine Configuration Policies
@@ -24,7 +25,7 @@ To view and explore these built-in policies:
24
25
25
26
3. Open the **Category** filter and select **Guest Configuration** and **Built-in** on Policy Type to display all built-in policies related to OS auditing and compliance.
[](../media/discover-and-assign-built-in-machine-configuration-policies/azure-policy-definitions-guest-config-filter.png#lightbox)
28
29
29
30
4. Browse the list to review available definitions, such as:
30
31
@@ -42,7 +43,7 @@ To view and explore these built-in policies:
42
43
43
44
3. Metadata such as category, mode, and required providers
44
45
45
-

46
+
[](../media/discover-and-assign-built-in-machine-configuration-policies/policy-definition-details-json-parameters.png#lightbox)
46
47
47
48
## Assign a Built-In Machine Configuration Policy
48
49
@@ -66,22 +67,22 @@ Let’s use one of the built-in Machine Configuration policies—**Audit Windows
66
67
67
68
3. Optionally specify exclusions if certain resources shouldn't be evaluated.
68
69
69
-

70
+
[](../media/discover-and-assign-built-in-machine-configuration-policies/policy-assignment-basics-scope-prerequisites.png#lightbox)
70
71
71
72
4. In the **Parameters** tab:
72
73
73
74
1. Set **Include Arc connected servers** to true if your environment includes Arc-enabled machines.
74
75
75
76
2. Choose the desired **Time zone** (for example, "Pacific Time (US & Canada)").
76
77
77
-

78
+
[](../media/discover-and-assign-built-in-machine-configuration-policies/policy-assignment-parameters-arc-timezone.png#lightbox)
78
79
79
80
5. Review your configuration under **Review + create**, then click **Create**.
80
81
81
82
Once assigned, the policy will automatically begin evaluating machines within scope. Compliance results will surface in the **Policy → Compliance** view, where you can drill down to specific resources or export results.
82
83
83
-
*Note:* The same process applies to other built-in Machine Configuration policies—such as those auditing Linux baselines, password settings, or required applications.
84
-
Parameters vary by definition and allow you to customize the audit scope without creating new policies.
84
+
> [!NOTE]
85
+
> The same process applies to other built-in Machine Configuration policies—such as those auditing Linux baselines, password settings, or required applications. Parameters vary by definition and allow you to customize the audit scope without creating new policies.
Copy file name to clipboardExpand all lines: articles/governance/machine-configuration/how-to/assign-security-baselines/deploy-a-baseline-policy-assignment.md
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,6 +3,7 @@ title: Deploy A Baseline Policy Assignment
3
3
description: Learn how to deploy a security baseline policy assignment for continuous security compliance tracking across Azure and Arc-enabled machines using Azure Policy and Machine Configuration.
4
4
ms.date: 11/07/2025
5
5
ms.topic: conceptual
6
+
ms.custom: references_regions
6
7
---
7
8
8
9
# Deploy a Security Baseline Policy Assignment
@@ -63,7 +64,7 @@ Use this file later when creating the assignment.
63
64
64
65
3. Under the **Parameters** tab, locate **Baseline Settings**. You may need to uncheck *"Only show parameters that need input or review"*
[](../../media/deploy-a-baseline-policy-assignment/baseline-settings-parameter-configuration.png#lightbox)
67
68
68
69
4. Click **Browse** → Upload the JSON file you downloaded earlier.
69
70
@@ -107,7 +108,7 @@ You can find other examples in [Assign policy with Azure CLI][04].
107
108
108
109
After deploying your customized baseline, you can verify its status and scope in the **Assignments** tab under **Policy → Machine Configuration** in the Azure portal.
[](../../media/deploy-a-baseline-policy-assignment/policy-assignments-view-deployed-baselines.png#lightbox)
111
112
112
113
This view lists all baseline policy assignments, including their policy definition, management group or subscription, and resource group. You can use filters (for example, by policy name, subscription, or scope) to quickly locate your assignment. Selecting a specific assignment opens its details, where you can review parameter input (such as your imported JSON file), scope, and compliance status once evaluations complete.
Copy file name to clipboardExpand all lines: articles/governance/machine-configuration/how-to/assign-security-baselines/overview-page.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,19 +11,19 @@ Customizable security baselines built on Azure Policy and Machine Configuration
11
11
12
12
This capability introduces *audit* baselines for both Windows and Linux, empowering customers to align security posture with internal compliance frameworks and regulatory standards. By passing custom baseline parameter input directly into Azure Policy, you can now represent organization-specific controls at scale.
13
13
14
-
These baselines deliver a cloud-native governance experience for both Azure machines and non-Azure machines connected through [Azure Arc][01], including machines running on-premises, in other public clouds, or at the edge. Together, Policy and Machine Configuration establish a unified control plane for compliance visibility, enabling you to assess, monitor, and enforce consistent security standards across your entire estate, regardless of location or platform. This approach reflects Microsoft's Secure by Design and Secure by Default principles, ensuring robust security and compliance everywhere your workloads run.
14
+
These baselines deliver a cloud-native governance experience for both Azure machines and non-Azure machines connected through [Azure Arc][01]. This includes machines running on-premises, in other public clouds, or at the edge. Together, Policy and Machine Configuration establish a unified control plane for compliance visibility. This approach enables you to assess, monitor, and enforce consistent security standards across your entire estate, regardless of location or platform. This approach reflects Microsoft's Secure by Design and Secure by Default principles, ensuring robust security and compliance everywhere your workloads run.
15
15
16
16
## Key Scenarios
17
17
18
18
### Baseline Customization
19
-
Create tailored baselines using the *Modify Settings* wizard under **Policy \> Machine Configuration**. Administrators can enable, exclude, or adjust rules from industry benchmarks (like CIS Benchmarks or Microsoft baselines) to match internal standards. Each customization builds a downloadable JSON file that captures configuration intent — a reusable artifact compatible for policy-as-code workflows.
19
+
Create tailored baselines using the *Modify Settings* wizard under **Policy \> Machine Configuration**. Administrators can enable, exclude, or adjust rules from industry benchmarks (like CIS Benchmarks or Microsoft baselines) to match internal standards. Each customization builds a downloadable JSON file that captures configuration intent—a reusable artifact compatible for policy-as-code workflows.
20
20
21
21
### Assign Audit Policies
22
22
23
-
Use Azure Policy to deploy your customized baseline parameters across Azure and Arc-connected machines. When an audit policy is assigned, Azure Policy evaluates configuration states against selected benchmarks, reports compliance in real time, and surfaces findings across Azure Policy, Azure Resource Graph (ARG), and the Guest Assignments view.
23
+
Use Azure Policy to deploy your customized baseline parameters across Azure and Arc-connected machines. Azure Policy evaluates configuration states against selected benchmarks when an audit policy is assigned. It reports compliance in real time and surfaces findings across Azure Policy, Azure Resource Graph (ARG), and the Guest Assignments view.
24
24
25
25
### Integration and Automation
26
-
Integrate baselines into CI/CD pipelines or configuration management workflows. Each baseline produces a declarative settings catalog (JSON) that can be version-controlled and deployed using CLI, ARM, or Bicep templates — ensuring reproducible compliance configurations across environments.
26
+
Integrate baselines into CI/CD pipelines or configuration management workflows. Each baseline produces a declarative settings catalog (JSON) that can be version-controlled and deployed using CLI, ARM, or Bicep templates—ensuring reproducible compliance configurations across environments.
27
27
28
28
## Supported Standards
29
29
@@ -33,14 +33,14 @@ Integrate baselines into CI/CD pipelines or configuration management workflows.
33
33
|**Azure Compute Security Baseline for Windows**| Applies customized values for Windows Server 2022 and Windows Server 2025. |
34
34
|**Azure Compute Security Baseline for Linux**| Enforces consistent security controls aligned with Azure Compute guidance. |
35
35
36
-
Additional standards (e.g., STIG), operating systems, and remediation capabilities will be introduced in future releases.
36
+
More standards (for example, STIG), operating systems, and remediation capabilities are planned for future releases.
37
37
38
38
## Availability
39
39
40
40
All public Azure regions are supported.
41
41
42
42
> [!NOTE]
43
-
> Support for Azure Government and Sovereign Clouds will be added closer to General Availability.
43
+
> Support for Azure Government and Sovereign Clouds is planned for General Availability.
44
44
45
45
## Getting Started
46
46
@@ -50,17 +50,17 @@ The end-to-end experience for configuring Customizable Security Baselines follow
50
50
51
51
1.**Select a baseline** from the *Machine Configuration* blade under Azure Policy.
52
52
53
-
2.**Modify settings** — enable, exclude, or parameterize rules to match your internal requirements.
53
+
2.**Modify settings**—enable, exclude, or parameterize rules to match your internal requirements.
54
54
55
55
3.**Download the JSON file** representing your configured baseline.
56
56
57
-
4.**Assign the baseline policy** using the Azure Portal, CLI, or CI/CD integration.
57
+
4.**Assign the baseline policy** using the Azure portal, CLI, or CI/CD integration.
58
58
59
59
5.**Review compliance results** through Azure Policy, Azure Resource Graph, or the Guest Assignments page.
60
60
61
61
### Prerequisites
62
62
63
-
- Azure Machine Configuration prerequisite policy initiative must be deployed. This enables Guest Configuration policies and installs the required extension on VMs.
63
+
- Azure Machine Configuration prerequisite policy initiative must be deployed. The capability enables Guest Configuration policies and installs the required extension on VMs.
64
64
65
65
- An Azure subscription or management group containing supported Windows and Linux VMs.
0 commit comments