mirror of
https://github.com/MicrosoftLearning/AZ-104-MicrosoftAzureAdministrator.git
synced 2026-02-06 16:49:09 +00:00
Update LAB_02b-Manage_Governance_via_Azure_Policy.md
This commit is contained in:
parent
355b80633e
commit
07d54f83b6
@ -258,3 +258,4 @@ Congratulations on completing the lab. Here are the main takeaways for this lab.
|
|||||||
+ The Azure Policy remediation task feature is used to bring resources into compliance based on a definition and assignment. Resources that are non-compliant to a modify or deployIfNotExist definition assignment, can be brought into compliance using a remediation task.
|
+ The Azure Policy remediation task feature is used to bring resources into compliance based on a definition and assignment. Resources that are non-compliant to a modify or deployIfNotExist definition assignment, can be brought into compliance using a remediation task.
|
||||||
+ You can configure a resource lock on a subscription, resource group, or resource. The lock can protect a resource from accidental user deletions and modifications. The lock overrides any user permissions.
|
+ You can configure a resource lock on a subscription, resource group, or resource. The lock can protect a resource from accidental user deletions and modifications. The lock overrides any user permissions.
|
||||||
+ Azure Policy is pre-deployment security practice. RBAC and resource locks are post-deployment security practice.
|
+ Azure Policy is pre-deployment security practice. RBAC and resource locks are post-deployment security practice.
|
||||||
|
|
||||||
|
|||||||
Loading…
x
Reference in New Issue
Block a user