Troubleshooting Common Custom Policy Issues in Policy Development
If you're looking to troubleshoot common issues with creating Azure custom policies, this blog post is here to guide you through the process. While Azure's built-in policies are useful, custom policies offer a level of flexibility that can't be achieved by the standard offerings. However, developers often run into problems with policy definitions, compliance reports, and alias availability.
The article covers a range of common issues and provides tips and tricks on how to resolve them. One common issue is using an incorrect or nonexistent alias in a policy definition. Developers can use PowerShell Get-AzPolicyAlias command to check the correct policy Alias. Another issue may arise when resources are not found in compliance reports. To fix this, developers are advised to ensure they have provided the correct resource type and that read operation is available in policy definitions.
The article also covers the problem of having incorrect compliance reports and provides tips on how to fix it. To solve this issue, developers will need to check if their policy rule is correct, adjust the policy rules and effects. The blog post also advises that developers report cases where the Alias is not available to the PG team and await further assistance. Lastly, there is the issue of using incorrect Mode in policy definitions. To avoid incompatible resources, developers are advised to always use Mode as "All" in policy definitions.
By following the troubleshooting tips outlined in the article, developers can work around the most common issues and create custom policies with ease.
The post is originally published on Microsoft Developer Community. You can access the full article here.
Published on:
Learn moreRelated posts
Microsoft Purview compliance portal: Cloud Policy service audit logs for policy changes
Microsoft Purview compliance portal now offers a new feature allowing administrators to track policy change activities. Specifically, any acti...
Azure Policy – an underrated component of a scalable data platform (part1)
This post, authored by Tomasz Kostyrka, discusses the value of Azure Policy as a crucial yet underappreciated element of a scalable data platf...
Azure Policy – an underrated component of a scalable data platform (part2)
In this article, the author delves into the concept of Azure Policy, an often neglected but powerful component of a scalable data platform. Th...
Breaking Security Change: Ability to chat with bots based on custom app policy
In a breaking security change, Microsoft will block the ability to chat with bots that are not connected to a Microsoft Teams app. From Januar...
Group Policy Assignment Support for Additional Policies in Teams Powershell Module
Microsoft is extending the support for group policy assignment to additional policy types through Teams PowerShell Module (TPM). This capabili...
Group Policy Assignment Support to Additional Policy Types in Microsoft Teams admin center
Microsoft Teams admin center is expanding its group policy assignment support to include additional policy types. The update allows admins to ...
File policy/filter ‘policy’ retirement
If your organization is utilizing the File policy/filter ‘policy’ in the MDA file policy page, this important message concerns you. This featu...
Communication Compliance: Prioritize analysis of policy-driven alerts with Azure Cognitive Services (public preview)
Azure Cognitive Services are set to offer text analysis capabilities to Communication Compliance, thereby helping businesses prioritize and in...
Ownerless group policy cmdlets replacement
Recently, Microsoft introduced the Ownerless Group Policy feature, covered in detail by Tony at Practical 365. Initially, during the preview, ...
Everything you need to know about Azure Policy
In this informative episode, Michael, Sarah, Gladys, and Mark chat with Liz Kim about all things Azure Policy. Liz shares her expert insights ...