title | description | services | author | ms.author | ms.date | ms.topic | ms.service | ms.custom | manager |
---|---|---|---|---|---|---|---|---|---|
Quickstart - Use PowerShell to create a policy assignment to identify non-compliant resources in your Azure environment |
In this quickstart, you use PowerShell to create an Azure Policy assignment to identify non-compliant resources. |
azure-policy |
DCtheGeek |
dacoulte |
09/18/2018 |
quickstart |
azure-policy |
mvc |
carmonm |
Quickstart: Create a policy assignment to identify non-compliant resources using the Azure RM PowerShell module
The first step in understanding compliance in Azure is to identify the status of your resources. In this quickstart, you create a policy assignment to identify virtual machines that are not using managed disks. When complete, you'll identify virtual machines that are non-compliant with the policy assignment.
The AzureRM PowerShell module is used to create and manage Azure resources from the command line or in scripts. This guide explains how to use AzureRM to create a policy assignment. The policy identifies non-compliant resources in your Azure environment.
If you don't have an Azure subscription, create a free account before you begin.
-
If you haven't already, install the ARMClient. It's a tool that sends HTTP requests to Azure Resource Manager-based APIs.
-
Before you start, make sure that the latest version of PowerShell is installed. See How to install and configure Azure PowerShell for detailed information.
-
Update your AzureRM PowerShell module to the latest version. If you need to install or upgrade, see Install Azure PowerShell module.
-
Register the Policy Insights resource provider using Azure PowerShell. Registering the resource provider makes sure that your subscription works with it. To register a resource provider, you must have permission to perform the register action operation for the resource provider. This operation is included in the Contributor and Owner roles. Run the following command to register the resource provider:
Register-AzureRmResourceProvider -ProviderNamespace 'Microsoft.PolicyInsights'
For more information about registering and viewing resource providers, see Resource Providers and Types
In this quickstart, you create a policy assignment and assign the Audit Virtual Machines without Managed Disks definition. This policy definition identifies resources that don't comply with the conditions set in the policy definition.
Run the following commands to create a new policy assignment:
$rg = Get-AzureRmResourceGroup -Name '<resourceGroupName>'
$definition = Get-AzureRmPolicyDefinition | Where-Object { $_.Properties.DisplayName -eq 'Audit VMs that do not use managed disks' }
New-AzureRmPolicyAssignment -Name 'audit-vm-manageddisks' -DisplayName 'Audit Virtual Machines without Managed Disks Assignment' -Scope $rg.ResourceId -PolicyDefinition $definition
The preceding commands use the following information:
- Name - The actual name of the assignment. For this example, audit-vm-manageddisks was used.
- DisplayName - Display name for the policy assignment. In this case, you're using Audit Virtual Machines without Managed Disks Assignment.
- Definition – The policy definition, based on which you're using to create the assignment. In this case, it is the ID of policy definition Audit VMs that do not use managed disks.
- Scope - A scope determines what resources or grouping of resources the policy assignment gets enforced on. It could range from a subscription to resource groups. Be sure to replace <scope> with the name of your resource group.
You’re now ready to identify non-compliant resources to understand the compliance state of your environment.
Use the following information to identify resources that aren't compliant with the policy assignment you created. Run the following commands:
$policyAssignment = Get-AzureRmPolicyAssignment | Where-Object { $_.Properties.DisplayName -eq 'Audit Virtual Machines without Managed Disks Assignment' }
$policyAssignment.PolicyAssignmentId
For more information about policy assignment IDs, see Get-AzureRmPolicyAssignment.
Next, run the following command to get the resource IDs of the non-compliant resources that are output into a JSON file:
armclient post "/subscriptions/<subscriptionID>/resourceGroups/<rgName>/providers/Microsoft.PolicyInsights/policyStates/latest/queryResults?api-version=2017-12-12-preview&$filter=IsCompliant eq false and PolicyAssignmentId eq '<policyAssignmentID>'&$apply=groupby((ResourceId))" > <json file to direct the output with the resource IDs into>
Your results resemble the following example:
{
"@odata.context": "https://management.azure.com/subscriptions/<subscriptionId>/providers/Microsoft.PolicyInsights/policyStates/$metadata#latest",
"@odata.count": 3,
"value": [{
"@odata.id": null,
"@odata.context": "https://management.azure.com/subscriptions/<subscriptionId>/providers/Microsoft.PolicyInsights/policyStates/$metadata#latest/$entity",
"ResourceId": "/subscriptions/<subscriptionId>/resourcegroups/<rgname>/providers/microsoft.compute/virtualmachines/<virtualmachineId>"
},
{
"@odata.id": null,
"@odata.context": "https://management.azure.com/subscriptions/<subscriptionId>/providers/Microsoft.PolicyInsights/policyStates/$metadata#latest/$entity",
"ResourceId": "/subscriptions/<subscriptionId>/resourcegroups/<rgname>/providers/microsoft.compute/virtualmachines/<virtualmachine2Id>"
},
{
"@odata.id": null,
"@odata.context": "https://management.azure.com/subscriptions/<subscriptionId>/providers/Microsoft.PolicyInsights/policyStates/$metadata#latest/$entity",
"ResourceId": "/subscriptions/<subscriptionName>/resourcegroups/<rgname>/providers/microsoft.compute/virtualmachines/<virtualmachine3ID>"
}
]
}
The results are comparable to what you'd typically see listed under Non-compliant resources in the Azure portal view.
Subsequent guides in this collection build on this quickstart. If you plan to continue to work with other tutorials, do not clean up the resources created in this quickstart. If you don't plan to continue, you can delete the assignment you created by running this command:
Remove-AzureRmPolicyAssignment -Name 'audit-vm-manageddisks' -Scope '/subscriptions/<subscriptionID>/resourceGroups/<resourceGroupName>'
In this quickstart, you assigned a policy definition to identify non-compliant resources in your Azure environment.
To learn more about assigning policies and ensure that future resources that get created are compliant, continue to the tutorial for:
[!div class="nextstepaction"] Creating and managing policies