Source | Azure Portal | ||||||||||||||
Display name | Azure Managed Grafana workspaces should disable public network access | ||||||||||||||
Id | e8775d5a-73b7-4977-a39b-833ef0114628 | ||||||||||||||
Version | 1.0.0 Details on versioning |
||||||||||||||
Versioning |
Versions supported for Versioning: 1 1.0.0 Built-in Versioning [Preview] |
||||||||||||||
Category | Managed Grafana Microsoft Learn |
||||||||||||||
Description | Disabling public network access improves security by ensuring that your Azure Managed Grafana workspace isn't exposed on the public internet. Creating private endpoints can limit exposure of your workspaces. | ||||||||||||||
Mode | Indexed | ||||||||||||||
Type | BuiltIn | ||||||||||||||
Preview | False | ||||||||||||||
Deprecated | False | ||||||||||||||
Effect | Default Audit Allowed Audit, Deny, Disabled |
||||||||||||||
RBAC role(s) | none | ||||||||||||||
Rule aliases | IF (1)
|
||||||||||||||
Rule resource types | IF (1) Microsoft.Dashboard/grafana |
||||||||||||||
Compliance | Not a Compliance control | ||||||||||||||
Initiatives usage |
|
||||||||||||||
History |
|
||||||||||||||
JSON compare | n/a | ||||||||||||||
JSON |
|