Skip to content

Commit 6579741

Browse files
yml's added
1 parent cab423a commit 6579741

6 files changed

Lines changed: 113 additions & 0 deletions

File tree

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.explore-ai-governance-ai-ready-infrastructure.introduction
3+
title: "Introduction"
4+
metadata:
5+
title: "Introduction"
6+
description: "Discover how to balance innovation with responsible AI practices using Microsoft Foundry for governance, compliance, and cost control."
7+
ms.date: 02/02/2026
8+
author: wwlpublish
9+
ms.author: bradj
10+
ms.topic: unit
11+
durationInMinutes: 3
12+
content: |
13+
[!include[](includes/1-introduction.md)]
Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.explore-ai-governance-ai-ready-infrastructure.microsoft-foundry-governance-capability
3+
title: "Understand Microsoft Foundry governance capabilities"
4+
metadata:
5+
title: "Understand Microsoft Foundry Governance Capabilities"
6+
description: "Learn how Microsoft Foundry centralizes governance for AI infrastructure, ensuring compliance, cost control, and audit readiness across Azure resources."
7+
ms.date: 02/02/2026
8+
author: wwlpublish
9+
ms.author: bradj
10+
ms.topic: unit
11+
durationInMinutes: 13
12+
content: |
13+
[!include[](includes/2-microsoft-foundry-governance-capability.md)]
Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.explore-ai-governance-ai-ready-infrastructure.configure-governance-policy-workloads
3+
title: "Configure governance policies for AI workloads"
4+
metadata:
5+
title: "Configure Governance Policies for AI Workloads"
6+
description: "Learn how to configure governance policies for AI workloads, ensuring compliance, cost control, and operational efficiency with Microsoft Foundry."
7+
ms.date: 02/02/2026
8+
author: wwlpublish
9+
ms.author: bradj
10+
ms.topic: unit
11+
durationInMinutes: 13
12+
content: |
13+
[!include[](includes/3-configure-governance-policy-workloads.md)]
Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.explore-ai-governance-ai-ready-infrastructure.exercise-configure-governance-controls
3+
title: "Exercise: Implement AI workload governance with Microsoft Foundry"
4+
metadata:
5+
title: "Exercise: Implement AI Workload Governance with Microsoft Foundry"
6+
description: "Learn how to configure governance controls for AI workloads using Microsoft Foundry and Azure services to ensure compliance and innovation."
7+
ms.date: 02/02/2026
8+
author: wwlpublish
9+
ms.author: bradj
10+
ms.topic: unit
11+
durationInMinutes: 75
12+
content: |
13+
[!include[](includes/4-exercise-configure-governance-controls.md)]
Lines changed: 48 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,48 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.explore-ai-governance-ai-ready-infrastructure.knowledge-check
3+
title: "Module assessment"
4+
metadata:
5+
title: "Knowledge check"
6+
description: "Knowledge check"
7+
ms.date: 02/02/2026
8+
author: wwlpublish
9+
ms.author: bradj
10+
ms.topic: unit
11+
module_assessment: true
12+
durationInMinutes: 3
13+
content: "Choose the best response for each of the following questions."
14+
quiz:
15+
questions:
16+
- content: "Your data science team complains that Microsoft Foundry policies block their Azure OpenAI deployments for experimentation, slowing innovation. They request that you disable all governance policies for development subscriptions. Your compliance officer insists that data residency policies must apply everywhere. What approach balances these competing requirements?"
17+
choices:
18+
- content: "Assign regional restriction policies in deny mode to all subscriptions to meet compliance requirements, but configure tagging and SKU policies in audit mode for development subscriptions so teams receive visibility without deployment blocking"
19+
isCorrect: true
20+
explanation: "The first option correctly applies different enforcement modes based on policy criticality. Regional restrictions in deny mode satisfy non-negotiable compliance requirements, while audit mode for other policies in development provides visibility and learning opportunities without blocking experimentation. The second option creates compliance risk by allowing violations that require costly remediation, and the third option unnecessarily restricts innovation when audit mode would achieve governance objectives for noncritical policies in development environments."
21+
- content: "Disable all policies in development subscriptions to maximize innovation velocity, then rely on monthly compliance reviews to identify and remediate any data residency violations that occurred"
22+
isCorrect: false
23+
explanation: "The second option creates compliance risk by allowing violations that require costly remediation."
24+
- content: "Apply all policies identically across development and production subscriptions using deny mode to ensure consistent governance, accepting that development velocity may decrease to maintain compliance"
25+
isCorrect: false
26+
explanation: "The third option unnecessarily restricts innovation when audit mode would achieve governance objectives for noncritical policies in development environments."
27+
- content: "During a compliance audit, you discover that several Azure OpenAI deployments in your production subscription lack the required CostCenter tag, even though you assigned a tagging policy months ago. When you check Microsoft Foundry, the policy shows Active status with deny enforcement mode. What is the most likely cause of this compliance gap?"
28+
choices:
29+
- content: "The tagging policy was assigned after the noncompliant resources were deployed, so existing resources weren't affected by the policy and only new deployments are evaluated"
30+
isCorrect: true
31+
explanation: "The first option identifies the correct behavior: Azure Policy evaluates resources only at deployment time, so policies assigned after resource creation don't retroactively enforce compliance on existing resources. Organizations must run remediation tasks or manually update existing resources to achieve compliance."
32+
- content: "The policy enforcement mode was incorrectly set to audit instead of deny when it was assigned, allowing noncompliant deployments to proceed with warning logs"
33+
isCorrect: false
34+
explanation: "The second option is unlikely if the current policy status shows deny mode."
35+
- content: "Microsoft Foundry policy evaluation experienced a service outage during the deployment window, temporarily bypassing policy checks for those specific resources"
36+
isCorrect: false
37+
explanation: "The third option represents a rare event that wouldn't affect multiple deployments over time without generating service health alerts."
38+
- content: "Your finance team reports that AI infrastructure costs exceeded the approved $20,000 monthly budget by 45% last quarter, despite budget alerts configured in Microsoft Foundry. Investigation reveals that teams received alert notifications but continued deploying resources because alerts don't prevent deployments. How should you strengthen cost governance while maintaining operational flexibility?"
39+
choices:
40+
- content: "Implement Azure Policy definitions that deny creation of premium AI service SKUs (GPT-4, high-throughput instances) in all subscriptions, forcing teams to use cost-effective alternatives unless they request exceptions through a documented approval process"
41+
isCorrect: true
42+
explanation: "The first option provides proactive cost control through policy enforcement while maintaining a documented exception process for legitimate premium SKU needs. This approach prevents unplanned spending at deployment time rather than reacting after costs accumulate."
43+
- content: "Configure spending limits at the subscription level that automatically suspend all deployments when the budget threshold is reached, preventing any resource creation until the next billing period"
44+
isCorrect: false
45+
explanation: "The second option creates operational risk by suspending all deployments, potentially blocking critical production updates when budget limits are reached."
46+
- content: "Transition budget alerts from notification-only mode to automated response mode that scales down or stops existing AI resources when spending reaches 90% of the monthly limit, preserving budget while maintaining deployed services"
47+
isCorrect: false
48+
explanation: "The third option addresses existing resources but doesn't prevent new high-cost deployments, and automatically stopping production AI services could cause service disruptions."
Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.explore-ai-governance-ai-ready-infrastructure.summary
3+
title: "Summary"
4+
metadata:
5+
title: "Summary"
6+
description: "Learn how centralized governance with Microsoft Foundry ensures compliance, cost control, and security for AI workloads in your organization."
7+
ms.date: 02/02/2026
8+
author: wwlpublish
9+
ms.author: bradj
10+
ms.topic: unit
11+
durationInMinutes: 3
12+
content: |
13+
[!include[](includes/6-summary.md)]

0 commit comments

Comments
 (0)