Skip to content

Commit a9c55a2

Browse files
author
Mutemwa Masheke
committed
Rename all images to descriptive names and update document references
Renamed images across 4 documentation files: Deploy baseline policy assignment (2 images): - img-ac7fbee604f41b62c868a5bb65c0e4db3a063efd.png → baseline-settings-parameter-configuration.png - img-6c568abe762c9bc5c6174a54f3b93ccae84db8b4.png → policy-assignments-view-deployed-baselines.png Specify custom parameters (9 images): - img-70552accb81b064d8eb5154e3db0a07883f3e336.png → policy-machine-configuration-definitions-tab.png - img-af335da50e8c406e8da1a6a767b38c324bef2edf.png → modify-settings-button-baseline-configuration.png - img-88df9e6de728e403ee3db6580e616049c3744a72.png → cis-linux-distribution-selection-versions.png - img-ee20054ef65f2587d2090949b1175dc5f00c0385.png → azure-security-baseline-version-selection.png - img-045f78dbb4cced276113efc11ed26093f3ebaee7.png → security-baseline-rules-list-checkboxes.png - img-325b504563492223316abbbfd8aa3c59341a1174.png → rule-metadata-context-pane-details.png - img-da620a40a5b0afb02dc2e6a321b2e3c3fc95aed3.png → cis-linux-parameter-structured-input-format.png - img-61888be031b1619545527d02c423351ff1eacb9c.png → windows-baseline-parameter-server-roles-format.png - img-8214ea961e6a47de263b9fd1a47c1530662ccc74.png → review-download-customized-baseline-summary.png View compliance (6 images): - img-7c99df5b8d6aa64d4207da2f38000070cd0fc3e8.png → azure-policy-compliance-page-filters-export.png - img-ccdc2b626230dd8cd5dc298e3054e411470abe50.png → policy-assignment-compliance-status-resources.png - img-cd2a0ef578e7c4aad47f4ce72c275633a942428c.png → resource-compliance-details-evaluated-link.png - img-a671227d7b1dc5d0814326abbe41b47c16eeaaa2.png → guest-assignments-list-compliance-indicators.png - img-d96eaa8a8f7d9606a2f13df37b037138fb682532.png → detailed-rule-compliance-results-benchmarks.png - img-29cb9141f8ce1454c010b868cd2c8317d3cc07c6.png → azure-resource-graph-explorer-guestconfig.png Assign built-in policies (4 images): - img-3f3ce788ba90429512e3fee4e20276cb966e4538.png → azure-policy-definitions-guest-config-filter.png - img-2ad297ad1246e4c27f777c98825b67a1bafda438.png → policy-definition-details-json-parameters.png - img-85d4e71787ec57907ee20ed9d74e68b576f1f36f.png → policy-assignment-basics-scope-prerequisites.png - img-2b911c2eff35ab65d1c208c98d84a30c23fb4d3b.png → policy-assignment-parameters-arc-timezone.png Also renamed media folder: - understand-the-baseline-json-format → understand-the-baseline-settings-parameter All documentation references updated to match new descriptive image names.
1 parent 3a8186b commit a9c55a2

29 files changed

Lines changed: 25 additions & 25 deletions

File tree

articles/governance/machine-configuration/how-to/assign-built-in-policies.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ To view and explore these built-in policies:
2424

2525
3. Open the **Category** filter and select **Guest Configuration** and **Built-in** on Policy Type to display all built-in policies related to OS auditing and compliance.
2626

27-
![Azure Policy Definitions page with Guest Configuration filter applied showing built-in policies](../media/discover-and-assign-built-in-machine-configuration-policies/img-3f3ce788ba90429512e3fee4e20276cb966e4538.png)
27+
![Azure Policy Definitions page with Guest Configuration filter applied showing built-in policies](../media/discover-and-assign-built-in-machine-configuration-policies/azure-policy-definitions-guest-config-filter.png)
2828

2929
4. Browse the list to review available definitions, such as:
3030

@@ -42,7 +42,7 @@ To view and explore these built-in policies:
4242

4343
3. Metadata such as category, mode, and required providers
4444

45-
![Policy definition details page showing JSON definition and parameters for a Machine Configuration policy](../media/discover-and-assign-built-in-machine-configuration-policies/img-2ad297ad1246e4c27f777c98825b67a1bafda438.png)
45+
![Policy definition details page showing JSON definition and parameters for a Machine Configuration policy](../media/discover-and-assign-built-in-machine-configuration-policies/policy-definition-details-json-parameters.png)
4646

4747
## Assign a Built-In Machine Configuration Policy
4848

@@ -66,15 +66,15 @@ Let’s use one of the built-in Machine Configuration policies—**Audit Windows
6666

6767
3. Optionally specify exclusions if certain resources shouldn't be evaluated.
6868

69-
![Policy assignment Basics tab showing scope selection and prerequisites configuration](../media/discover-and-assign-built-in-machine-configuration-policies/img-85d4e71787ec57907ee20ed9d74e68b576f1f36f.png)
69+
![Policy assignment Basics tab showing scope selection and prerequisites configuration](../media/discover-and-assign-built-in-machine-configuration-policies/policy-assignment-basics-scope-prerequisites.png)
7070

7171
4. In the **Parameters** tab:
7272

7373
1. Set **Include Arc connected servers** to true if your environment includes Arc-enabled machines.
7474

7575
2. Choose the desired **Time zone** (for example, "Pacific Time (US & Canada)").
7676

77-
![Policy assignment Parameters tab showing Arc servers option and time zone selection](../media/discover-and-assign-built-in-machine-configuration-policies/img-2b911c2eff35ab65d1c208c98d84a30c23fb4d3b.png)
77+
![Policy assignment Parameters tab showing Arc servers option and time zone selection](../media/discover-and-assign-built-in-machine-configuration-policies/policy-assignment-parameters-arc-timezone.png)
7878

7979
5. Review your configuration under **Review + create**, then click **Create**.
8080

articles/governance/machine-configuration/how-to/assign-security-baselines/deploy-a-baseline-policy-assignment.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,7 @@ Use this file later when creating the assignment.
6363

6464
3. Under the **Parameters** tab, locate **Baseline Settings**. You may need to uncheck *"Only show parameters that need input or review"*
6565

66-
![Baseline Settings parameter configuration](../../media/deploy-a-baseline-policy-assignment/img-ac7fbee604f41b62c868a5bb65c0e4db3a063efd.png)
66+
![Baseline Settings parameter configuration](../../media/deploy-a-baseline-policy-assignment/baseline-settings-parameter-configuration.png)
6767

6868
4. Click **Browse** → Upload the JSON file you downloaded earlier.
6969

@@ -107,7 +107,7 @@ You can find other examples in [Assign policy with Azure CLI][04].
107107

108108
After deploying your customized baseline, you can verify its status and scope in the **Assignments** tab under **Policy → Machine Configuration** in the Azure portal.
109109

110-
![Policy assignments view showing deployed baseline policies](../../media/deploy-a-baseline-policy-assignment/img-6c568abe762c9bc5c6174a54f3b93ccae84db8b4.png)
110+
![Policy assignments view showing deployed baseline policies](../../media/deploy-a-baseline-policy-assignment/policy-assignments-view-deployed-baselines.png)
111111

112112
This view lists all baseline policy assignments, including their policy definition, management group or subscription, and resource group. You can use filters (for example, by policy name, subscription, or scope) to quickly locate your assignment. Selecting a specific assignment opens its details, where you can review parameter input (such as your imported JSON file), scope, and compliance status once evaluations complete.
113113

articles/governance/machine-configuration/how-to/assign-security-baselines/overview-page.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -80,6 +80,6 @@ The end-to-end experience for configuring Customizable Security Baselines follow
8080
[03]: https://www.cisecurity.org/
8181
[04]: ./deploy-a-baseline-policy-assignment.md
8282
[05]: ./specify-custom-parameters-for-baseline-policy.md
83-
[06]: ./understand-the-baseline-json-format.md
83+
[06]: ./understand-the-baseline-settings-parameter.md
8484
[07]: ../view-compliance.md
8585
[08]: ../assign-built-in-policies.md

articles/governance/machine-configuration/how-to/assign-security-baselines/specify-custom-parameters-for-baseline-policy.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ The new Azure Policy Settings Picker experience streamlines this process, allowi
2222

2323
2. Select the **Definitions** tab.
2424

25-
![Azure portal showing Policy Machine Configuration Definitions tab](../../media/specify-custom-parameters-for-baseline-policy/img-70552accb81b064d8eb5154e3db0a07883f3e336.png)
25+
![Azure portal showing Policy Machine Configuration Definitions tab](../../media/specify-custom-parameters-for-baseline-policy/policy-machine-configuration-definitions-tab.png)
2626

2727
3. Choose one of the built-in baselines:
2828

@@ -34,17 +34,17 @@ The new Azure Policy Settings Picker experience streamlines this process, allowi
3434

3535
4. Click **Modify settings**.
3636

37-
![Modify settings button for security baseline configuration](../../media/specify-custom-parameters-for-baseline-policy/img-af335da50e8c406e8da1a6a767b38c324bef2edf.png)
37+
![Modify settings button for security baseline configuration](../../media/specify-custom-parameters-for-baseline-policy/modify-settings-button-baseline-configuration.png)
3838

3939
## Select baselines and versions
4040

4141
The configuration experience differs slightly between Linux and Windows baselines:
4242

4343
- **CIS Benchmarks for Linux:** You can enable one or more supported distributions (such as RHEL, Alma Linux, Rocky Linux, or Ubuntu). Unselected distributions are excluded from evaluation. For each enabled distro, select the CIS Benchmark version you want to apply.
44-
![CIS Benchmarks Linux distribution selection with version options](../../media/specify-custom-parameters-for-baseline-policy/img-88df9e6de728e403ee3db6580e616049c3744a72.png)
44+
![CIS Benchmarks Linux distribution selection with version options](../../media/specify-custom-parameters-for-baseline-policy/cis-linux-distribution-selection-versions.png)
4545

4646
- **For Azure Baselines (Windows or Linux):** These baselines apply uniformly across operating systems and don't require distro selection. Simply confirm the baseline version under **Basics** and continue.
47-
![Azure Security Baseline version selection interface](../../media/specify-custom-parameters-for-baseline-policy/img-ee20054ef65f2587d2090949b1175dc5f00c0385.png)
47+
![Azure Security Baseline version selection interface](../../media/specify-custom-parameters-for-baseline-policy/azure-security-baseline-version-selection.png)
4848

4949
## Modify settings
5050

@@ -54,11 +54,11 @@ On the **Modify settings** tab, review and adjust configuration rules for your s
5454

5555
- For configurable rules, edit the **Parameter value** field to define your organization's required state.
5656

57-
![Security baseline rules list with checkboxes and parameter value fields](../../media/specify-custom-parameters-for-baseline-policy/img-045f78dbb4cced276113efc11ed26093f3ebaee7.png)
57+
![Security baseline rules list with checkboxes and parameter value fields](../../media/specify-custom-parameters-for-baseline-policy/security-baseline-rules-list-checkboxes.png)
5858

5959
- View per rule Metadata by clicking on a highlighted rule, which will open the context pane showing details such as **Rule ID**, **Description**, **Severity**, and **Compliance Standard**.
6060

61-
![Rule metadata context pane showing details like Rule ID and compliance standard](../../media/specify-custom-parameters-for-baseline-policy/img-325b504563492223316abbbfd8aa3c59341a1174.png)
61+
![Rule metadata context pane showing details like Rule ID and compliance standard](../../media/specify-custom-parameters-for-baseline-policy/rule-metadata-context-pane-details.png)
6262

6363
These features are available uniformly for all benchmarks and baselines in Machine Configuration.
6464

@@ -80,7 +80,7 @@ serviceName=named.service expectedUnitFileState=enabled expectedActiveState=acti
8080

8181
This enables fine-grained control, allowing you to model complex configurations that align with your existing Linux environment.
8282

83-
![CIS Linux benchmark parameter with structured input format example](../../media/specify-custom-parameters-for-baseline-policy/img-da620a40a5b0afb02dc2e6a321b2e3c3fc95aed3.png)
83+
![CIS Linux benchmark parameter with structured input format example](../../media/specify-custom-parameters-for-baseline-policy/cis-linux-parameter-structured-input-format.png)
8484

8585
### Custom Input for Azure Security Baseline (Windows)
8686

@@ -103,7 +103,7 @@ WindowsServer\2025\DomainController:1;WindowsServer\2025\MemberServer:1;WindowsS
103103

104104
This provides precise scoping for your rule application—for example, applying a setting only to *Domain Controllers* on *Windows Server 2025*, or across all roles on *Windows Server 2022*.
105105

106-
![Windows Security Baseline parameter with formatted string input for server roles](../../media/specify-custom-parameters-for-baseline-policy/img-61888be031b1619545527d02c423351ff1eacb9c.png)
106+
![Windows Security Baseline parameter with formatted string input for server roles](../../media/specify-custom-parameters-for-baseline-policy/windows-baseline-parameter-server-roles-format.png)
107107

108108
## Review and download
109109

@@ -113,7 +113,7 @@ After completing your changes:
113113

114114
2. Review any edited or excluded settings.
115115

116-
![Review and download tab showing customized baseline settings summary](../../media/specify-custom-parameters-for-baseline-policy/img-8214ea961e6a47de263b9fd1a47c1530662ccc74.png)
116+
![Review and download tab showing customized baseline settings summary](../../media/specify-custom-parameters-for-baseline-policy/review-download-customized-baseline-summary.png)
117117

118118
3. Click **Download All Baselines** to export your customized configuration as a JSON file.
119119

@@ -131,6 +131,6 @@ This JSON artifact defines all active settings for your baseline, making it easy
131131
<!-- Link reference definitions -->
132132
[01]: https://learn.microsoft.com/azure/azure-arc/overview
133133
[02]: ./deploy-a-baseline-policy-assignment.md
134-
[03]: ./understand-the-baseline-json-format.md
134+
[03]: ./understand-the-baseline-settings-parameter.md
135135
[04]: ../view-compliance.md
136136
[05]: ../assign-built-in-policies.md

articles/governance/machine-configuration/how-to/assign-security-baselines/understand-the-baseline-json-format.md renamed to articles/governance/machine-configuration/how-to/assign-security-baselines/understand-the-baseline-settings-parameter.md

File renamed without changes.

articles/governance/machine-configuration/how-to/view-compliance.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ Use this view to validate which policies are deployed, where they're scoped, and
2121

2222
- Use filters such as **Policy definition equals all,** or **Subscription ID equals all** to narrow the list.
2323

24-
![Azure Policy Compliance page showing policy assignments with filters and export options](../media/view-machine-configuration-compliance-reporting/img-7c99df5b8d6aa64d4207da2f38000070cd0fc3e8.png)
24+
![Azure Policy Compliance page showing policy assignments with filters and export options](../media/view-machine-configuration-compliance-reporting/azure-policy-compliance-page-filters-export.png)
2525

2626
*Use **Export to CSV** to generate quick audit reports or share assignment inventories with your compliance team.*
2727

@@ -36,13 +36,13 @@ From the Compliance view:
3636

3737
1. Select a policy assignment.
3838

39-
![Policy assignment selection showing compliance status and resource details](../media/view-machine-configuration-compliance-reporting/img-ccdc2b626230dd8cd5dc298e3054e411470abe50.png)
39+
![Policy assignment selection showing compliance status and resource details](../media/view-machine-configuration-compliance-reporting/policy-assignment-compliance-status-resources.png)
4040

4141
2. In the **Resource compliance** tab, click "**Details**" next to the resource name.
4242

4343
3. In the details pane, select **Last evaluated resource**.
4444

45-
![Resource compliance details pane with Last evaluated resource link highlighted](../media/view-machine-configuration-compliance-reporting/img-cd2a0ef578e7c4aad47f4ce72c275633a942428c.png)
45+
![Resource compliance details pane with Last evaluated resource link highlighted](../media/view-machine-configuration-compliance-reporting/resource-compliance-details-evaluated-link.png)
4646

4747
This opens the corresponding **Guest Assignment**, providing traceability between the Azure Policy rule and on-machine configuration evidence.
4848

@@ -60,7 +60,7 @@ Use this view to investigate machine-level compliance for each assigned policy a
6060

6161
- The **Status** column indicates whether the machine is *Compliant*, *NonCompliant*, or *Pending*.
6262

63-
![Guest Assignments list showing machines with compliance status indicators](../media/view-machine-configuration-compliance-reporting/img-a671227d7b1dc5d0814326abbe41b47c16eeaaa2.png)
63+
![Guest Assignments list showing machines with compliance status indicators](../media/view-machine-configuration-compliance-reporting/guest-assignments-list-compliance-indicators.png)
6464

6565
### Explore Rule-Level Results
6666

@@ -75,7 +75,7 @@ The results table includes:
7575

7676
*Use this view to perform root-cause analysis and prepare evidence for internal or external security audits.*
7777

78-
![Detailed rule-level compliance results showing configuration items and benchmark references](../media/view-machine-configuration-compliance-reporting/img-d96eaa8a8f7d9606a2f13df37b037138fb682532.png)
78+
![Detailed rule-level compliance results showing configuration items and benchmark references](../media/view-machine-configuration-compliance-reporting/detailed-rule-compliance-results-benchmarks.png)
7979

8080
### Relationship to Azure Policy
8181

@@ -94,7 +94,7 @@ This enables you to build dashboards, automate compliance summaries, and integra
9494

9595
3. Search for the **guestconfigurationresources** table.
9696

97-
![Azure Resource Graph Explorer showing guestconfigurationresources table selection](../media/view-machine-configuration-compliance-reporting/img-29cb9141f8ce1454c010b868cd2c8317d3cc07c6.png)
97+
![Azure Resource Graph Explorer showing guestconfigurationresources table selection](../media/view-machine-configuration-compliance-reporting/azure-resource-graph-explorer-guestconfig.png)
9898

9999
### Example Query: Identify Non-Compliant Machines
100100

articles/governance/machine-configuration/index.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,4 +60,4 @@ landingContent:
6060
- text: Specify custom parameters for baseline policy
6161
url: ./how-to/assign-security-baselines/specify-custom-parameters-for-baseline-policy.md
6262
- text: Understand the baseline JSON format
63-
url: ./how-to/assign-security-baselines/understand-the-baseline-json-format.md
63+
url: ./how-to/assign-security-baselines/understand-the-baseline-settings-parameter.md

articles/governance/machine-configuration/media/deploy-a-baseline-policy-assignment/img-ac7fbee604f41b62c868a5bb65c0e4db3a063efd.png renamed to articles/governance/machine-configuration/media/deploy-a-baseline-policy-assignment/baseline-settings-parameter-configuration.png

File renamed without changes.

articles/governance/machine-configuration/media/deploy-a-baseline-policy-assignment/img-6c568abe762c9bc5c6174a54f3b93ccae84db8b4.png renamed to articles/governance/machine-configuration/media/deploy-a-baseline-policy-assignment/policy-assignments-view-deployed-baselines.png

File renamed without changes.

articles/governance/machine-configuration/media/discover-and-assign-built-in-machine-configuration-policies/img-3f3ce788ba90429512e3fee4e20276cb966e4538.png renamed to articles/governance/machine-configuration/media/discover-and-assign-built-in-machine-configuration-policies/azure-policy-definitions-guest-config-filter.png

File renamed without changes.

0 commit comments

Comments
 (0)