@@ -192,10 +192,10 @@ This policy requires that resources have a specific tag with a specific value.
192192
1931931 . Navigate to ** Policy** > ** Assignments**
1941942 . Click ** Assign policy**
195- 3 . Search for "Require a tag and its value"
195+ 3 . Search for "Require a tag and its value on resources "
1961964 . Configure:
197197 - ** Scope** : Your resource group
198- - ** Assignment name** : "Require Data Classification Tag"
198+ - ** Assignment name** : "labuser-xx - Require Data Classification Tag" (replace xx with your labuser value)
199199 - ** Parameters** :
200200 - ** Tag name** : ` DataClassification `
201201 - ** Tag value** : ` Sovereign `
@@ -274,7 +274,7 @@ Azure provides several policies to control public network access:
2742743 . Search for "Not allowed resource types"
2752754 . Configure:
276276 - ** Scope** : Your resource group (e.g., ` labuser-01 ` ). ** Do NOT select the subscription.**
277- - ** Assignment name** : "Block Public IP Addresses"
277+ - ** Assignment name** : "labuser-xx - Block Public IP Addresses" (replace xx with your labuser value)
278278 - ** Parameters** :
279279 - ** Not allowed resource types** : Select ` Microsoft.Network/publicIPAddresses `
2802805 . Click ** Review + create** and ** Create**
@@ -820,7 +820,7 @@ TAG_INHERIT_POLICY="cd3aa116-8754-49c9-a813-ad46512ece54"
820820az policy assignment create \
821821 --name " ${ATTENDEE_ID} -inherit-dataclassification-tag" \
822822 --display-name " ${DISPLAY_PREFIX} - Inherit DataClassification Tag from RG" \
823- --scope " /subscriptions/$SUBSCRIPTION_ID " \
823+ --scope " /subscriptions/$SUBSCRIPTION_ID /resourceGroups/ $RESOURCE_GROUP " \
824824 --policy " $TAG_INHERIT_POLICY " \
825825 --params ' {
826826 "tagName": {
0 commit comments