Microsoft Compute
Best practices and references below are based on published guidance from the cloud service provider and may reference native capabilities the cloud service provider offers. If you are not using the native security capabilities, the same security requirement can be met using other security capabilities your organization utilizes
Design Guidance:
Name | ||
Tags | ||
Os Disk-Name | ||
Data Disks-Name | ||
Os Profile-Computer Name |
Name | ||
Tags | ||
Os Disk-Name | ||
Data Disks-Name | ||
Public Ipaddress Configuration-Ip Tags | ||
Ip Tags-Ip Tag Type | ||
Ip Tags-Tag |
Name | |
Tags | |
Os Profile-Computer Name | |
Dns Settings-Dns Servers | |
Public Ipaddress Configuration-Ip Tags | |
Ip Tags-Ip Tag Type | |
Ip Tags-Tag | |
Plan-Name |
Name | ||
Tags | ||
Instance View-Name |
Design Guidance:
Availability Set-Id |
Zones | ||
Health Probe-Id |
Availability Set-Id |
Os Disk-Os Type | ||
Os Profile-Windows Configuration | ||
Os Profile-Linux Configuration |
Os Profile-Windows Configuration | ||
Os Profile-Linux Configuration | ||
Os Disk-Os Type |
Os Profile-Windows Configuration | |
Os Profile-Linux Configuration |
Win Rm-Listeners |
Win Rm-Listeners |
Design Guidance:
Encryption Settings-Enabled | ||
Security Profile-Encryption At Host | ||
Managed Disk-Id | ||
Disk Encryption Set-Id | ||
Disk Encryption Set-Id |
Security Profile-Encryption At Host |