HierarchyMap


TenantSummary

Anything which can help you learn Azure Policy GitHub
Download CSV semicolon | comma
Scope Scope Id Policy DisplayName Policy Name PolicyId Category ALZ Policy Effect Role definitions Unique assignments Used in PolicySets CreatedOn CreatedBy UpdatedOn UpdatedBy
Mg mibelle-mg [Deprecated] Azure Machine Learning should have disabled public network access Deny-MachineLearning-PublicNetworkAccess /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-machinelearning-publicnetworkaccess Machine Learning true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 0 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated] Deny the creation of public IP Deny-PublicIP /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-publicip Network true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 0 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated] Deploy SQL Database Transparent Data Encryption Deploy-Sql-Tde /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-sql-tde SQL true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled SQL Security Manager 0 0 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated] Deploys NSG flow logs and traffic analytics Deploy-Nsg-FlowLogs /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-nsg-flowlogs Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 0 06/12/2025 11:17:56 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated] Deploys NSG flow logs and traffic analytics to Log Analytics Deploy-Nsg-FlowLogs-to-LA /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-nsg-flowlogs-to-la Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Storage Account Contributor, Network Contributor, Storage Account Key Operator Service Role, Log Analytics Contributor, Contributor 0 0 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated] Diagnostic Settings for MariaDB to Log Analytics Workspace Deploy-Diagnostics-MariaDB /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-mariadb Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics)) 06/12/2025 11:18:06 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated] Public network access should be disabled for MariaDB Deny-PublicEndpoint-MariaDB /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-publicendpoint-mariadb SQL true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 0 06/12/2025 11:17:55 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated] RDP access from the Internet should be blocked Deny-RDP-From-Internet /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-rdp-from-internet Network true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 0 06/12/2025 11:18:19 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated] Storage Account set to minimum TLS and Secure transfer should be enabled Deny-Storage-minTLS /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-storage-mintls Storage true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 1 ([Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit)) 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated]: Configure Arc-enabled SQL Servers to auto install Microsoft Defender for SQL and DCR with a user-defined LAW Deploy-MDFC-Arc-Sql-DefenderSQL-DCR /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-mdfc-arc-sql-defendersql-dcr Security Center true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Contributor 0 1 ([Deprecated]: Configure SQL VM and Arc-enabled SQL Servers to install Microsoft Defender for SQL and AMA with a user-defined LAW (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-mdfc-defendersql-ama)) 06/12/2025 11:18:21 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated]: Configure Arc-enabled SQL Servers with DCR Association to Microsoft Defender for SQL user-defined DCR Deploy-MDFC-Arc-SQL-DCR-Association /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-mdfc-arc-sql-dcr-association Security Center true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Configure SQL VM and Arc-enabled SQL Servers to install Microsoft Defender for SQL and AMA with a user-defined LAW (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-mdfc-defendersql-ama)) 06/12/2025 11:18:21 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated]: Configure SQL Virtual Machines to auto install Microsoft Defender for SQL and DCR with a user-defined LAW Deploy-MDFC-SQL-DefenderSQL-DCR /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-mdfc-sql-defendersql-dcr Security Center true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Contributor 0 1 ([Deprecated]: Configure SQL VM and Arc-enabled SQL Servers to install Microsoft Defender for SQL and AMA with a user-defined LAW (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-mdfc-defendersql-ama)) 06/12/2025 11:17:55 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated]: Configure SQL Virtual Machines to automatically install Azure Monitor Agent Deploy-MDFC-SQL-AMA /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-mdfc-sql-ama Security Center true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Virtual Machine Contributor 0 1 ([Deprecated]: Configure SQL VM and Arc-enabled SQL Servers to install Microsoft Defender for SQL and AMA with a user-defined LAW (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-mdfc-defendersql-ama)) 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated]: Configure SQL Virtual Machines to automatically install Microsoft Defender for SQL Deploy-MDFC-SQL-DefenderSQL /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-mdfc-sql-defendersql Security Center true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Configure SQL VM and Arc-enabled SQL Servers to install Microsoft Defender for SQL and AMA with a user-defined LAW (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-mdfc-defendersql-ama)) 06/12/2025 11:17:55 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated]: Deploy Diagnostic Settings for Analysis Services to Log Analytics workspace Deploy-Diagnostics-AnalysisService /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-analysisservice Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics)) 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated]: Deploy Diagnostic Settings for API Management to Log Analytics workspace Deploy-Diagnostics-APIMgmt /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-apimgmt Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics)) 06/12/2025 11:18:19 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated]: Deploy Diagnostic Settings for App Service Plan to Log Analytics workspace Deploy-Diagnostics-WebServerFarm /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-webserverfarm Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics)) 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated]: Deploy Diagnostic Settings for App Service to Log Analytics workspace Deploy-Diagnostics-Website /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-website Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics)) 06/12/2025 11:17:55 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated]: Deploy Diagnostic Settings for Application Gateway to Log Analytics workspace Deploy-Diagnostics-ApplicationGateway /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-applicationgateway Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics)) 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated]: Deploy Diagnostic Settings for Automation to Log Analytics workspace Deploy-Diagnostics-AA /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-aa Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics)) 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated]: Deploy Diagnostic Settings for AVD Application group to Log Analytics workspace Deploy-Diagnostics-WVDAppGroup /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-wvdappgroup Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics)) 06/12/2025 11:17:56 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated]: Deploy Diagnostic Settings for AVD Host Pools to Log Analytics workspace Deploy-Diagnostics-WVDHostPools /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-wvdhostpools Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics)) 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated]: Deploy Diagnostic Settings for AVD Scaling Plans to Log Analytics workspace Deploy-Diagnostics-AVDScalingPlans /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-avdscalingplans Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics)) 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated]: Deploy Diagnostic Settings for AVD Workspace to Log Analytics workspace Deploy-Diagnostics-WVDWorkspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-wvdworkspace Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics)) 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated]: Deploy Diagnostic Settings for Azure API for FHIR to Log Analytics workspace Deploy-Diagnostics-ApiForFHIR /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-apiforfhir Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics)) 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated]: Deploy Diagnostic Settings for Azure Bastion to Log Analytics workspace Deploy-Diagnostics-Bastion /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-bastion Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics)) 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated]: Deploy Diagnostic Settings for Azure Data Explorer Cluster to Log Analytics workspace Deploy-Diagnostics-DataExplorerCluster /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-dataexplorercluster Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics)) 06/12/2025 11:18:19 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated]: Deploy Diagnostic Settings for Azure Function App to Log Analytics workspace Deploy-Diagnostics-Function /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-function Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics)) 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated]: Deploy Diagnostic Settings for Azure Media Service to Log Analytics workspace Deploy-Diagnostics-MediaService /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-mediaservice Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics)) 06/12/2025 11:18:19 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated]: Deploy Diagnostic Settings for CDN Endpoint to Log Analytics workspace Deploy-Diagnostics-CDNEndpoints /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-cdnendpoints Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics)) 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated]: Deploy Diagnostic Settings for Cognitive Services to Log Analytics workspace Deploy-Diagnostics-CognitiveServices /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-cognitiveservices Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics)) 06/12/2025 11:18:21 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated]: Deploy Diagnostic Settings for Container Instances to Log Analytics workspace Deploy-Diagnostics-ACI /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-aci Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics)) 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated]: Deploy Diagnostic Settings for Container Registry to Log Analytics workspace Deploy-Diagnostics-ACR /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-acr Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics)) 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated]: Deploy Diagnostic Settings for Cosmos DB to Log Analytics workspace Deploy-Diagnostics-CosmosDB /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-cosmosdb Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics)) 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated]: Deploy Diagnostic Settings for Data Factory to Log Analytics workspace Deploy-Diagnostics-DataFactory /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-datafactory Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics)) 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated]: Deploy Diagnostic Settings for Data Lake Analytics to Log Analytics workspace Deploy-Diagnostics-DLAnalytics /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-dlanalytics Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics)) 06/12/2025 11:18:23 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated]: Deploy Diagnostic Settings for Database for MySQL to Log Analytics workspace Deploy-Diagnostics-MySQL /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-mysql Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics)) 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated]: Deploy Diagnostic Settings for Database for PostgreSQL to Log Analytics workspace Deploy-Diagnostics-PostgreSQL /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-postgresql Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics)) 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated]: Deploy Diagnostic Settings for Databricks to Log Analytics workspace Deploy-Diagnostics-Databricks /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-databricks Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics)) 06/12/2025 11:18:19 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated]: Deploy Diagnostic Settings for Event Grid subscriptions to Log Analytics workspace Deploy-Diagnostics-EventGridSub /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-eventgridsub Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics)) 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated]: Deploy Diagnostic Settings for Event Grid System Topic to Log Analytics workspace Deploy-Diagnostics-EventGridSystemTopic /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-eventgridsystemtopic Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics)) 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated]: Deploy Diagnostic Settings for Event Grid Topic to Log Analytics workspace Deploy-Diagnostics-EventGridTopic /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-eventgridtopic Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics)) 06/12/2025 11:18:06 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated]: Deploy Diagnostic Settings for ExpressRoute to Log Analytics workspace Deploy-Diagnostics-ExpressRoute /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-expressroute Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics)) 06/12/2025 11:17:56 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated]: Deploy Diagnostic Settings for Firewall to Log Analytics workspace Deploy-Diagnostics-Firewall /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-firewall Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics)) 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated]: Deploy Diagnostic Settings for Front Door to Log Analytics workspace Deploy-Diagnostics-FrontDoor /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-frontdoor Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics)) 06/12/2025 11:17:56 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated]: Deploy Diagnostic Settings for HDInsight to Log Analytics workspace Deploy-Diagnostics-HDInsight /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-hdinsight Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics)) 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated]: Deploy Diagnostic Settings for IoT Hub to Log Analytics workspace Deploy-Diagnostics-iotHub /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-iothub Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics)) 06/12/2025 11:17:56 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated]: Deploy Diagnostic Settings for Load Balancer to Log Analytics workspace Deploy-Diagnostics-LoadBalancer /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-loadbalancer Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics)) 06/12/2025 11:18:19 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated]: Deploy Diagnostic Settings for Log Analytics to Log Analytics workspace Deploy-Diagnostics-LogAnalytics /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-loganalytics Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics)) 06/12/2025 11:18:21 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated]: Deploy Diagnostic Settings for Logic Apps integration service environment to Log Analytics workspace Deploy-Diagnostics-LogicAppsISE /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-logicappsise Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics)) 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated]: Deploy Diagnostic Settings for Machine Learning workspace to Log Analytics workspace Deploy-Diagnostics-MlWorkspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-mlworkspace Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics)) 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated]: Deploy Diagnostic Settings for Network Interfaces to Log Analytics workspace Deploy-Diagnostics-NIC /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-nic Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics)) 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated]: Deploy Diagnostic Settings for Network Security Groups to Log Analytics workspace Deploy-Diagnostics-NetworkSecurityGroups /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-networksecuritygroups Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics)) 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated]: Deploy Diagnostic Settings for Power BI Embedded to Log Analytics workspace Deploy-Diagnostics-PowerBIEmbedded /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-powerbiembedded Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics)) 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated]: Deploy Diagnostic Settings for Redis Cache to Log Analytics workspace Deploy-Diagnostics-RedisCache /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-rediscache Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics)) 06/12/2025 11:18:21 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated]: Deploy Diagnostic Settings for Relay to Log Analytics workspace Deploy-Diagnostics-Relay /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-relay Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics)) 06/12/2025 11:18:06 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated]: Deploy Diagnostic Settings for SignalR to Log Analytics workspace Deploy-Diagnostics-SignalR /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-signalr Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics)) 06/12/2025 11:17:56 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated]: Deploy Diagnostic Settings for SQL Elastic Pools to Log Analytics workspace Deploy-Diagnostics-SQLElasticPools /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-sqlelasticpools Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics)) 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated]: Deploy Diagnostic Settings for SQL Managed Instances to Log Analytics workspace Deploy-Diagnostics-SQLMI /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-sqlmi Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics)) 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated]: Deploy Diagnostic Settings for Time Series Insights to Log Analytics workspace Deploy-Diagnostics-TimeSeriesInsights /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-timeseriesinsights Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics)) 06/12/2025 11:18:21 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated]: Deploy Diagnostic Settings for Traffic Manager to Log Analytics workspace Deploy-Diagnostics-TrafficManager /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-trafficmanager Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics)) 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated]: Deploy Diagnostic Settings for Virtual Machine Scale Sets to Log Analytics workspace Deploy-Diagnostics-VMSS /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-vmss Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics)) 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated]: Deploy Diagnostic Settings for Virtual Machines to Log Analytics workspace Deploy-Diagnostics-VM /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-vm Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics)) 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated]: Deploy Diagnostic Settings for Virtual Network to Log Analytics workspace Deploy-Diagnostics-VirtualNetwork /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-virtualnetwork Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics)) 06/12/2025 11:17:56 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated]: Deploy Diagnostic Settings for VPN Gateway to Log Analytics workspace Deploy-Diagnostics-VNetGW /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-vnetgw Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics)) 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated]: Deploy Diagnostic Settings for VWAN S2S VPN Gateway to Log Analytics workspace Deploy-Diagnostics-VWanS2SVPNGW /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-vwans2svpngw Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics)) 06/12/2025 11:18:19 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated]: Deploy SQL Database vulnerability Assessments Deploy-Sql-vulnerabilityAssessments /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-sql-vulnerabilityassessments SQL true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled SQL Security Manager, Storage Account Contributor, Monitoring Contributor 0 1 ([Deprecated]: Deploy SQL Database built-in SQL security configuration (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-sql-security)) 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated]: Deploy User Assigned Managed Identity for VM Insights Deploy-UserAssignedManagedIdentity-VMInsights /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-userassignedmanagedidentity-vminsights Managed Identity true Default: DeployIfNotExists; Allowed: AuditIfNotExists,DeployIfNotExists,Disabled Contributor 0 0 06/12/2025 11:18:23 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Allowed Copy scope should be restricted for Storage Accounts Deny-Storage-CopyScope /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-storage-copyscope Storage true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 1 (Enforce recommended guardrails for Storage Account (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-storage)) 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg API App should only be accessible over HTTPS Deny-AppServiceApiApp-http /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-appserviceapiapp-http App Service true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 3 ([Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20240509), [Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit), Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20241211)) 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg API Management services should use TLS version 1.2 Deny-APIM-TLS /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-apim-tls API Management true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 1 (Enforce recommended guardrails for API Management (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-apim)) 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg App Service certificates must be stored in Key Vault Deny-AppService-without-BYOC /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-appservice-without-byoc App Service true Default: Audit; Allowed: Audit,Deny,Disabled n/a 0 1 (Enforce recommended guardrails for App Service (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-appservices)) 06/12/2025 11:17:56 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Application Gateway should be deployed with predefined Microsoft policy that is using TLS version 1.2 Deny-AppGw-Without-Tls /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-appgw-without-tls Network true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 1 (Enforce recommended guardrails for Network and Networking services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-network)) 06/12/2025 11:17:56 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Application Gateway should be deployed with WAF enabled Deny-AppGW-Without-WAF /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-appgw-without-waf Network true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 0 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg AppService append enable https only setting to enforce https setting. Append-AppService-httpsonly /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/append-appservice-httpsonly App Service true Default: Append; Allowed: Append,Disabled n/a 0 3 ([Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20240509), [Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit), Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20241211)) 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg AppService append sites with minimum TLS version to enforce. Append-AppService-latestTLS /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/append-appservice-latesttls App Service true Default: Append; Allowed: Append,Disabled n/a 0 3 ([Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20240509), [Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit), Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20241211)) 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Audit AHUB for eligible VMs Audit-AzureHybridBenefit /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/audit-azurehybridbenefit Cost Optimization true Default: Audit; Allowed: Audit,Disabled n/a 0 1 (Unused resources driving cost should be avoided (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/audit-unusedresourcescostoptimization)) 06/12/2025 11:18:19 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Audit for mandatory tags on resource groups Audit-Tags-Mandatory-Rg /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/audit-tags-mandatory-rg Tags true Default: Audit; Allowed: Audit,Deny,Disabled n/a 0 0 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Audit for mandatory tags on resources Audit-Tags-Mandatory /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/audit-tags-mandatory Tags true Default: Audit; Allowed: Audit,Deny,Disabled n/a 0 0 06/12/2025 11:17:56 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Audit or Deny the creation of Private Link Private DNS Zones Audit-PrivateLinkDnsZones /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/audit-privatelinkdnszones Network true Default: Audit; Allowed: Audit,Deny,Disabled n/a 0 0 06/12/2025 11:18:24 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Azure Cache for Redis Append a specific min TLS version requirement and enforce TLS. Append-Redis-sslEnforcement /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/append-redis-sslenforcement Cache true Default: Append; Allowed: Append,Disabled n/a 0 3 ([Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20240509), [Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit), Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20241211)) 06/12/2025 11:17:55 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Azure Cache for Redis Append and the enforcement that enableNonSslPort is disabled. Append-Redis-disableNonSslPort /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/append-redis-disablenonsslport Cache true Default: Append; Allowed: Append,Disabled n/a 0 3 ([Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20240509), [Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit), Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20241211)) 06/12/2025 11:17:56 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Azure Cache for Redis only secure connections should be enabled Deny-Redis-http /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-redis-http Cache true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 3 ([Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20240509), [Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit), Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20241211)) 06/12/2025 11:17:55 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Azure Database for MySQL server deploy a specific min TLS version and enforce SSL. Deploy-MySQL-sslEnforcement /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-mysql-sslenforcement SQL true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Contributor 0 3 ([Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20240509), [Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit), Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20241211)) 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Azure Database for PostgreSQL server deploy a specific min TLS version requirement and enforce SSL Deploy-PostgreSQL-sslEnforcement /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-postgresql-sslenforcement SQL true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Contributor 0 3 ([Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20240509), [Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit), Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20241211)) 06/12/2025 11:17:56 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Azure Firewall should have a default Firewall Policy Deny-AzFw-Without-Policy /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-azfw-without-policy Network true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 0 06/12/2025 11:18:19 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Azure SQL Database should have the minimal TLS version set to the highest version Deny-Sql-minTLS /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-sql-mintls SQL true Default: Audit; Allowed: Audit,Deny,Disabled n/a 0 3 ([Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20240509), [Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit), Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20241211)) 06/12/2025 11:18:21 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Azure Storage deploy a specific min TLS version requirement and enforce SSL/HTTPS Deploy-Storage-sslEnforcement /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-storage-sslenforcement Storage true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Storage Account Contributor 0 3 ([Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20240509), [Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit), Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20241211)) 06/12/2025 11:18:06 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Configure Logic apps to use the latest TLS version Deploy-LogicApp-TLS /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-logicapp-tls Logic Apps true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Website Contributor 0 2 ([Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20240509), Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20241211)) 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Control private endpoint connections to Azure Machine Learning Audit-MachineLearning-PrivateEndpointId /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/audit-machinelearning-privateendpointid Machine Learning true Default: Audit; Allowed: Audit,Deny,Disabled n/a 0 0 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Deny AKS cluster creation in Azure Machine Learning Deny-MachineLearning-Aks /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-machinelearning-aks Machine Learning true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 0 06/12/2025 11:17:55 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Deny Databricks workspaces without Vnet injection Deny-Databricks-VirtualNetwork /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-databricks-virtualnetwork Databricks true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 0 06/12/2025 11:18:23 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Deny non-premium Databricks sku Deny-Databricks-Sku /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-databricks-sku Databricks true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 0 06/12/2025 11:18:23 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Deny or Audit service endpoints on subnets Deny-Service-Endpoints /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-service-endpoints Network true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 1 (Enforce recommended guardrails for Network and Networking services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-network)) 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Deny public access behind vnet to Azure Machine Learning workspace Deny-MachineLearning-PublicAccessWhenBehindVnet /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-machinelearning-publicaccesswhenbehindvnet Machine Learning true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 0 06/12/2025 11:17:56 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Deny public access of Azure Machine Learning clusters via SSH Deny-MachineLearning-ComputeCluster-RemoteLoginPortPublicAccess /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-machinelearning-computecluster-remoteloginportpublicaccess Machine Learning true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 0 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Deny public IPs for Databricks cluster Deny-Databricks-NoPublicIp /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-databricks-nopublicip Databricks true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 0 06/12/2025 11:18:43 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Deny the creation of private DNS Deny-Private-DNS-Zones /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-private-dns-zones Network true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 0 06/12/2025 11:17:55 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Deny vNet peering Deny-VNet-Peering /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-vnet-peering Network true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 0 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Deny vNet peering cross subscription. Deny-VNET-Peer-Cross-Sub /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-vnet-peer-cross-sub Network true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 1 (Enforce policies in the Sandbox Landing Zone (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-alz-sandbox)) 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Deny vNet peering to non-approved vNets Deny-VNET-Peering-To-Non-Approved-VNETs /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-vnet-peering-to-non-approved-vnets Network true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 0 06/12/2025 11:18:19 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg DenyAction implementation on Activity Logs DenyAction-ActivityLogs /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/denyaction-activitylogs Monitoring true Fixed: denyAction n/a 0 1 (DenyAction Delete - Activity Log Settings and Diagnostic Settings (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/denyaction-deleteprotection)) 06/12/2025 11:18:06 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg DenyAction implementation on Diagnostic Logs. DenyAction-DiagnosticLogs /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/denyaction-diagnosticlogs Monitoring true Fixed: denyAction n/a 0 1 (DenyAction Delete - Activity Log Settings and Diagnostic Settings (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/denyaction-deleteprotection)) 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Deploy a default budget on all subscriptions under the assigned scope Deploy-Budget /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-budget Budget true Default: DeployIfNotExists; Allowed: AuditIfNotExists,DeployIfNotExists,Disabled Contributor 0 0 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Deploy a route table with specific user defined routes Deploy-Custom-Route-Table /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-custom-route-table Network true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Network Contributor 0 0 06/12/2025 11:17:56 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Deploy an Azure DDoS Network Protection Deploy-DDoSProtection /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-ddosprotection Network true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Network Contributor 0 0 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Deploy Azure Firewall Manager policy in the subscription Deploy-FirewallPolicy /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-firewallpolicy Network true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Contributor 0 0 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Deploy Microsoft Defender for Cloud Security Contacts Deploy-ASC-SecurityContacts /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-asc-securitycontacts Security Center true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Security Admin 0 2 ([Deprecated]: Deploy Microsoft Defender for Cloud configuration (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-mdfc-config), Deploy Microsoft Defender for Cloud configuration (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-mdfc-config_20240319)) 06/12/2025 11:18:21 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Deploy SQL database auditing settings Deploy-Sql-AuditingSettings /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-sql-auditingsettings SQL true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled SQL Security Manager 0 2 ([Deprecated]: Deploy SQL Database built-in SQL security configuration (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-sql-security), Deploy SQL Database built-in SQL security configuration (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-sql-security_20240529)) 06/12/2025 11:18:06 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Deploy SQL Database security Alert Policies configuration with email admin accounts Deploy-Sql-SecurityAlertPolicies /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-sql-securityalertpolicies SQL true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled SQL Security Manager 0 2 ([Deprecated]: Deploy SQL Database built-in SQL security configuration (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-sql-security), Deploy SQL Database built-in SQL security configuration (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-sql-security_20240529)) 06/12/2025 11:18:19 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Deploy SQL Database Vulnerability Assessments Deploy-Sql-vulnerabilityAssessments_20230706 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-sql-vulnerabilityassessments_20230706 SQL true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled SQL Security Manager, Storage Account Contributor, Monitoring Contributor 0 1 (Deploy SQL Database built-in SQL security configuration (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-sql-security_20240529)) 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Deploy Virtual Machine Auto Shutdown Schedule Deploy-Vm-autoShutdown /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-vm-autoshutdown Compute true Fixed: deployIfNotExists Virtual Machine Contributor 0 1 (Enforce policies in the Decommissioned Landing Zone (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-alz-decomm)) 06/12/2025 11:18:19 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Deploy Virtual Network with peering to the hub Deploy-VNET-HubSpoke /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-vnet-hubspoke Network true Fixed: deployIfNotExists Contributor 0 0 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Deploy Windows Domain Join Extension with keyvault configuration Deploy-Windows-DomainJoin /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-windows-domainjoin Guest Configuration true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Virtual Machine Contributor 0 0 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Deploy-Private-DNS-Generic Deploy-Private-DNS-Generic /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-private-dns-generic Networking true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Network Contributor 0 0 06/12/2025 11:18:23 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Do not allow deletion of specified resource and resource type DenyAction-DeleteResources /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/denyaction-deleteresources General true Default: DenyAction; Allowed: DenyAction,Disabled n/a 1 (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/denyaction-deleteuamiama) 0 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Encryption for storage services should be enforced for Storage Accounts Deny-Storage-ServicesEncryption /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-storage-servicesencryption Storage true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 1 (Enforce recommended guardrails for Storage Account (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-storage)) 06/12/2025 11:17:55 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Enforce scale settings for Azure Machine Learning compute clusters Deny-MachineLearning-ComputeCluster-Scale /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-machinelearning-computecluster-scale Budget true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 0 06/12/2025 11:17:56 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Enforce specific configuration of Network Security Groups (NSG) Modify-NSG /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/modify-nsg Network true Default: Modify; Allowed: Disabled,Modify Network Contributor 0 1 (Enforce recommended guardrails for Network and Networking services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-network)) 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Enforce specific configuration of User-Defined Routes (UDR) Modify-UDR /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/modify-udr Network true Default: Modify; Allowed: Disabled,Modify Network Contributor 0 1 (Enforce recommended guardrails for Network and Networking services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-network)) 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Enforce subnet connectivity for Azure Machine Learning compute clusters and compute instances Deny-MachineLearning-Compute-SubnetId /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-machinelearning-compute-subnetid Machine Learning true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 0 06/12/2025 11:17:56 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Enforces high business impact Azure Machine Learning Workspaces Deny-MachineLearning-HbiWorkspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-machinelearning-hbiworkspace Machine Learning true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 0 06/12/2025 11:18:19 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Event Hub namespaces (Premium) should use a customer-managed key for encryption Deny-EH-Premium-CMK /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-eh-premium-cmk Event Hub true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 2 ([Deprecated]: Deny or Audit resources without Encryption with a customer-managed key (CMK) (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encryption-cmk), Deny or Audit resources without Encryption with a customer-managed key (CMK) (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encryption-cmk_20250218)) 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Event Hub namespaces should use a valid TLS version Deny-EH-minTLS /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-eh-mintls Event Hub true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 2 ([Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20240509), Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20241211)) 06/12/2025 11:17:55 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg File Services with insecure authentication methods should be denied Deny-FileServices-InsecureAuth /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-fileservices-insecureauth Storage true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 0 06/12/2025 11:17:56 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg File Services with insecure Kerberos ticket encryption should be denied Deny-FileServices-InsecureKerberos /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-fileservices-insecurekerberos Storage true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 0 06/12/2025 11:18:19 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg File Services with insecure SMB channel encryption should be denied Deny-FileServices-InsecureSmbChannel /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-fileservices-insecuresmbchannel Storage true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 0 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg File Services with insecure SMB versions should be denied Deny-FileServices-InsecureSmbVersions /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-fileservices-insecuresmbversions Storage true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 0 06/12/2025 11:18:23 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Function App should only be accessible over HTTPS Deny-AppServiceFunctionApp-http /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-appservicefunctionapp-http App Service true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 3 ([Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20240509), [Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit), Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20241211)) 06/12/2025 11:18:19 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg KeyVault SoftDelete should be enabled Append-KV-SoftDelete /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/append-kv-softdelete Key Vault true Fixed: append n/a 0 0 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Limit allowed vm sizes for Azure Machine Learning compute clusters and compute instances Deny-MachineLearning-Compute-VmSize /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-machinelearning-compute-vmsize Budget true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 0 06/12/2025 11:18:19 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Local users should be restricted for Storage Accounts Deny-Storage-LocalUser /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-storage-localuser Storage true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 1 (Enforce recommended guardrails for Storage Account (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-storage)) 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Logic app should only be accessible over HTTPS Deny-LogicApps-Without-Https /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-logicapps-without-https Logic Apps true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 2 ([Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20240509), Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20241211)) 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Logic apps should disable public network access Deny-LogicApp-Public-Network /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-logicapp-public-network Logic Apps true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 1 (Public network access should be disabled for PaaS services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deny-publicpaasendpoints)) 06/12/2025 11:18:23 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Management port access from the Internet should be blocked Deny-MgmtPorts-From-Internet /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-mgmtports-from-internet Network true Default: Deny; Allowed: Audit,Deny,Disabled n/a 2 (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deny-mgmtports-internet, /providers/microsoft.management/managementgroups/mibelle-platform-identity-mg/providers/microsoft.authorization/policyassignments/deny-mgmtports-internet) 1 (Enforce recommended guardrails for Network and Networking services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-network)) 06/12/2025 11:18:19 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg MySQL database servers enforce SSL connections. Deny-MySql-http /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-mysql-http SQL true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 3 ([Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20240509), [Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit), Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20241211)) 06/12/2025 11:18:06 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Network ACL bypass option should be restricted for Storage Accounts Deny-Storage-NetworkAclsBypass /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-storage-networkaclsbypass Storage true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 1 (Enforce recommended guardrails for Storage Account (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-storage)) 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Network ACLs should be restricted for Cognitive Services Deny-CognitiveServices-NetworkAcls /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-cognitiveservices-networkacls Cognitive Services true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 1 (Enforce recommended guardrails for Open AI (Cognitive Service) (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-openai)) 06/12/2025 11:18:19 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg No child resources in Automation Account Deny-AA-child-resources /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-aa-child-resources Automation true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 0 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Only explicit kinds for Cognitive Services should be allowed Deny-CognitiveServices-Resource-Kinds /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-cognitiveservices-resource-kinds Cognitive Services true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 0 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Outbound network access should be restricted for Cognitive Services Deny-CognitiveServices-RestrictOutboundNetworkAccess /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-cognitiveservices-restrictoutboundnetworkaccess Cognitive Services true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 1 (Enforce recommended guardrails for Open AI (Cognitive Service) (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-openai)) 06/12/2025 11:17:55 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg PostgreSQL database servers enforce SSL connection. Deny-PostgreSql-http /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-postgresql-http SQL true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 3 ([Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20240509), [Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit), Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20241211)) 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Resource Access Rules resource IDs should be restricted for Storage Accounts Deny-Storage-ResourceAccessRulesResourceId /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-storage-resourceaccessrulesresourceid Storage true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 1 (Enforce recommended guardrails for Storage Account (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-storage)) 06/12/2025 11:17:56 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Resource Access Rules Tenants should be restricted for Storage Accounts Deny-Storage-ResourceAccessRulesTenantId /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-storage-resourceaccessrulestenantid Storage true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 1 (Enforce recommended guardrails for Storage Account (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-storage)) 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg SQL Managed Instance should have the minimal TLS version set to the highest version Deny-SqlMi-minTLS /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-sqlmi-mintls SQL true Default: Audit; Allowed: Audit,Deny,Disabled n/a 0 3 ([Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20240509), [Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit), Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20241211)) 06/12/2025 11:18:23 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg SQL managed instances deploy a specific min TLS version requirement. Deploy-SqlMi-minTLS /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-sqlmi-mintls SQL true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled SQL Managed Instance Contributor 0 3 ([Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20240509), [Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit), Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20241211)) 06/12/2025 11:18:19 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg SQL servers deploys a specific min TLS version requirement. Deploy-SQL-minTLS /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-sql-mintls SQL true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled SQL Server Contributor 0 3 ([Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20240509), [Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit), Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20241211)) 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Storage Accounts should restrict CORS rules Deny-Storage-CorsRules /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-storage-corsrules Storage true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 1 (Enforce recommended guardrails for Storage Account (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-storage)) 06/12/2025 11:17:55 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Storage Accounts should use a container delete retention policy Deny-Storage-ContainerDeleteRetentionPolicy /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-storage-containerdeleteretentionpolicy Storage true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 1 (Enforce recommended guardrails for Storage Account (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-storage)) 06/12/2025 11:18:06 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Storage Accounts with custom domains assigned should be denied Deny-StorageAccount-CustomDomain /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-storageaccount-customdomain Storage true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 0 06/12/2025 11:18:19 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Storage Accounts with SFTP enabled should be denied Deny-Storage-SFTP /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-storage-sftp Storage true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 1 (Enforce recommended guardrails for Storage Account (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-storage)) 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Subnets should have a Network Security Group Deny-Subnet-Without-Nsg /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-subnet-without-nsg Network true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 1 (Enforce recommended guardrails for Network and Networking services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-network)) 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Subnets should have a User Defined Route Deny-Subnet-Without-Udr /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-subnet-without-udr Network true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 1 (Enforce recommended guardrails for Network and Networking services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-network)) 06/12/2025 11:18:20 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Subnets without Private Endpoint Network Policies enabled should be denied Deny-Subnet-Without-Penp /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-subnet-without-penp Network true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 0 06/12/2025 11:18:06 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Unused App Service plans driving cost should be avoided Audit-ServerFarms-UnusedResourcesCostOptimization /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/audit-serverfarms-unusedresourcescostoptimization Cost Optimization true Default: Audit; Allowed: Audit,Disabled n/a 0 1 (Unused resources driving cost should be avoided (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/audit-unusedresourcescostoptimization)) 06/12/2025 11:18:21 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Unused Disks driving cost should be avoided Audit-Disks-UnusedResourcesCostOptimization /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/audit-disks-unusedresourcescostoptimization Cost Optimization true Default: Audit; Allowed: Audit,Disabled n/a 0 1 (Unused resources driving cost should be avoided (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/audit-unusedresourcescostoptimization)) 06/12/2025 11:18:18 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Unused Public IP addresses driving cost should be avoided Audit-PublicIpAddresses-UnusedResourcesCostOptimization /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/audit-publicipaddresses-unusedresourcescostoptimization Cost Optimization true Default: Audit; Allowed: Audit,Disabled n/a 0 1 (Unused resources driving cost should be avoided (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/audit-unusedresourcescostoptimization)) 06/12/2025 11:18:19 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg User Defined Routes with 'Next Hop Type' set to 'Internet' or 'VirtualNetworkGateway' should be denied Deny-UDR-With-Specific-NextHop /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-udr-with-specific-nexthop Network true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 0 06/12/2025 11:18:21 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Virtual network rules should be restricted for Storage Accounts Deny-Storage-NetworkAclsVirtualNetworkRules /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-storage-networkaclsvirtualnetworkrules Storage true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 1 (Enforce recommended guardrails for Storage Account (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-storage)) 06/12/2025 11:18:23 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Web Application should only be accessible over HTTPS Deny-AppServiceWebApp-http /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-appservicewebapp-http App Service true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 3 ([Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20240509), [Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit), Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20241211)) 06/12/2025 11:17:56 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Download CSV semicolon | comma
Policy DisplayName PolicyId
KeyVault SoftDelete should be enabled /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/append-kv-softdelete
Control private endpoint connections to Azure Machine Learning /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/audit-machinelearning-privateendpointid
Audit or Deny the creation of Private Link Private DNS Zones /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/audit-privatelinkdnszones
Audit for mandatory tags on resources /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/audit-tags-mandatory
Audit for mandatory tags on resource groups /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/audit-tags-mandatory-rg
No child resources in Automation Account /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-aa-child-resources
Application Gateway should be deployed with WAF enabled /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-appgw-without-waf
Azure Firewall should have a default Firewall Policy /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-azfw-without-policy
Only explicit kinds for Cognitive Services should be allowed /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-cognitiveservices-resource-kinds
Deny public IPs for Databricks cluster /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-databricks-nopublicip
Deny non-premium Databricks sku /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-databricks-sku
Deny Databricks workspaces without Vnet injection /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-databricks-virtualnetwork
File Services with insecure authentication methods should be denied /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-fileservices-insecureauth
File Services with insecure Kerberos ticket encryption should be denied /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-fileservices-insecurekerberos
File Services with insecure SMB channel encryption should be denied /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-fileservices-insecuresmbchannel
File Services with insecure SMB versions should be denied /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-fileservices-insecuresmbversions
Deny AKS cluster creation in Azure Machine Learning /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-machinelearning-aks
Enforce subnet connectivity for Azure Machine Learning compute clusters and compute instances /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-machinelearning-compute-subnetid
Limit allowed vm sizes for Azure Machine Learning compute clusters and compute instances /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-machinelearning-compute-vmsize
Deny public access of Azure Machine Learning clusters via SSH /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-machinelearning-computecluster-remoteloginportpublicaccess
Enforce scale settings for Azure Machine Learning compute clusters /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-machinelearning-computecluster-scale
Enforces high business impact Azure Machine Learning Workspaces /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-machinelearning-hbiworkspace
Deny public access behind vnet to Azure Machine Learning workspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-machinelearning-publicaccesswhenbehindvnet
[Deprecated] Azure Machine Learning should have disabled public network access /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-machinelearning-publicnetworkaccess
Deny the creation of private DNS /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-private-dns-zones
[Deprecated] Public network access should be disabled for MariaDB /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-publicendpoint-mariadb
[Deprecated] Deny the creation of public IP /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-publicip
[Deprecated] RDP access from the Internet should be blocked /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-rdp-from-internet
Storage Accounts with custom domains assigned should be denied /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-storageaccount-customdomain
Subnets without Private Endpoint Network Policies enabled should be denied /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-subnet-without-penp
User Defined Routes with 'Next Hop Type' set to 'Internet' or 'VirtualNetworkGateway' should be denied /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-udr-with-specific-nexthop
Deny vNet peering /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-vnet-peering
Deny vNet peering to non-approved vNets /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-vnet-peering-to-non-approved-vnets
Deploy a default budget on all subscriptions under the assigned scope /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-budget
Deploy a route table with specific user defined routes /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-custom-route-table
Deploy an Azure DDoS Network Protection /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-ddosprotection
Deploy Azure Firewall Manager policy in the subscription /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-firewallpolicy
[Deprecated] Deploys NSG flow logs and traffic analytics /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-nsg-flowlogs
[Deprecated] Deploys NSG flow logs and traffic analytics to Log Analytics /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-nsg-flowlogs-to-la
Deploy-Private-DNS-Generic /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-private-dns-generic
[Deprecated] Deploy SQL Database Transparent Data Encryption /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-sql-tde
[Deprecated]: Deploy User Assigned Managed Identity for VM Insights /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-userassignedmanagedidentity-vminsights
Deploy Virtual Network with peering to the hub /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-vnet-hubspoke
Deploy Windows Domain Join Extension with keyvault configuration /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-windows-domainjoin
Download CSV semicolon | comma
Scope Scope Id PolicySet DisplayName PolicySet Name PolicySetId Category ALZ Unique assignments Policies used in PolicySet CreatedOn CreatedBy UpdatedOn UpdatedBy
Mg mibelle-mg [Deprecated]: Configure SQL VM and Arc-enabled SQL Servers to install Microsoft Defender for SQL and AMA with a user-defined LAW Deploy-MDFC-DefenderSQL-AMA /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-mdfc-defendersql-ama Security Center true 0 7 (Configure Arc-enabled SQL Servers to automatically install Azure Monitor Agent (/providers/microsoft.authorization/policydefinitions/3592ff98-9787-443a-af59-4505d0fe0786), Configure Arc-enabled SQL Servers to automatically install Microsoft Defender for SQL (/providers/microsoft.authorization/policydefinitions/65503269-6a54-4553-8a28-0065a8e6d929), [Deprecated]: Configure Arc-enabled SQL Servers to auto install Microsoft Defender for SQL and DCR with a user-defined LAW (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-mdfc-arc-sql-defendersql-dcr), [Deprecated]: Configure Arc-enabled SQL Servers with DCR Association to Microsoft Defender for SQL user-defined DCR (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-mdfc-arc-sql-dcr-association), [Deprecated]: Configure SQL Virtual Machines to auto install Microsoft Defender for SQL and DCR with a user-defined LAW (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-mdfc-sql-defendersql-dcr), [Deprecated]: Configure SQL Virtual Machines to automatically install Azure Monitor Agent (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-mdfc-sql-ama), [Deprecated]: Configure SQL Virtual Machines to automatically install Microsoft Defender for SQL (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-mdfc-sql-defendersql)) 06/12/2025 11:18:47 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated]: Deny or Audit resources without Encryption with a customer-managed key (CMK) Enforce-Encryption-CMK /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encryption-cmk Encryption true 0 30 (Azure API for FHIR should use a customer-managed key to encrypt data at rest (/providers/microsoft.authorization/policydefinitions/051cba44-2429-45b9-9649-46cec11c7119), [Deprecated]: Virtual machines should encrypt temp disks, caches, and data flows between Compute and Storage resources (/providers/microsoft.authorization/policydefinitions/0961003e-5a0a-4549-abde-af6a37f2724d), SQL servers should use customer-managed keys to encrypt data at rest (/providers/microsoft.authorization/policydefinitions/0a370ff3-6cab-4e85-8995-295fd854c5b8), Azure Container Instance container group should use customer-managed key for encryption (/providers/microsoft.authorization/policydefinitions/0aa61e00-0a01-4a3c-9945-e93cffedf0e6), PostgreSQL servers should use customer-managed keys to encrypt data at rest (/providers/microsoft.authorization/policydefinitions/18adea5e-f416-4d0f-8aa8-d24321e3e274), Azure Cosmos DB accounts should use customer-managed keys to encrypt data at rest (/providers/microsoft.authorization/policydefinitions/1f905d99-2ab7-462c-a6b0-f709acca6c8f), Service Bus Premium namespaces should use a customer-managed key for encryption (/providers/microsoft.authorization/policydefinitions/295fc8b1-dc9f-4f53-9c61-3f313ceab40a), [Preview]: Azure Recovery Services vaults should use customer-managed keys for encrypting backup data (/providers/microsoft.authorization/policydefinitions/2e94d99a-8a36-4563-bc77-810d8893b671), Azure data factories should be encrypted with a customer-managed key (/providers/microsoft.authorization/policydefinitions/4ec52d6d-beb7-40c4-9a9e-fe753254690e), Bot Service should be encrypted with a customer-managed key (/providers/microsoft.authorization/policydefinitions/51522a96-0869-4791-82f3-981000c2c67f), Azure Automation accounts should use customer-managed keys to encrypt data at rest (/providers/microsoft.authorization/policydefinitions/56a5ee18-2ae6-4810-86f7-18e39ce5629b), Container registries should be encrypted with a customer-managed key (/providers/microsoft.authorization/policydefinitions/5b9159ae-1701-4a6f-9a7a-aa9c8ddd0580), Azure AI Services resources should encrypt data at rest with a customer-managed key (CMK) (/providers/microsoft.authorization/policydefinitions/67121cc7-ff39-4ab8-b7e3-95b84dab487d), Storage accounts should use customer-managed key for encryption (/providers/microsoft.authorization/policydefinitions/6fac406b-40ca-413b-bf8e-0bf964659c25), OS and data disks should be encrypted with a customer-managed key (/providers/microsoft.authorization/policydefinitions/702dd420-7fcc-42c5-afe8-4026edd20fe0), Azure AI Search services should use customer-managed keys to encrypt data at rest (/providers/microsoft.authorization/policydefinitions/76a56461-9dc0-40f0-82f5-2453283afa2f), Table Storage should use customer-managed key for encryption (/providers/microsoft.authorization/policydefinitions/7c322315-e26d-4174-a99e-f49d351b4688), Both operating systems and data disks in Azure Kubernetes Service clusters should be encrypted by customer-managed keys (/providers/microsoft.authorization/policydefinitions/7d7be79c-23ba-4033-84dd-45e2a5ccdd67), Azure Data Explorer encryption at rest should use a customer-managed key (/providers/microsoft.authorization/policydefinitions/81e74cea-30fd-40d5-802f-d72103c2aaaa), MySQL servers should use customer-managed keys to encrypt data at rest (/providers/microsoft.authorization/policydefinitions/83cef61d-dbd1-4b20-a4fc-5fbc7da10833), Azure Data Box jobs should use a customer-managed key to encrypt the device unlock password (/providers/microsoft.authorization/policydefinitions/86efb160-8de7-451d-bc08-5d475b0aadae), Azure Stream Analytics jobs should use customer-managed keys to encrypt data (/providers/microsoft.authorization/policydefinitions/87ba29ef-1ab3-4d82-b763-87fcd4f531f7), Azure Batch account should use customer-managed keys to encrypt data (/providers/microsoft.authorization/policydefinitions/99e9ccd8-3db9-4592-b0d1-14b1715a4d8a), Event Hub namespaces should use a customer-managed key for encryption (/providers/microsoft.authorization/policydefinitions/a1ad735a-e96f-45d2-a7b2-9a4932cab7ec), SQL managed instances should use customer-managed keys to encrypt data at rest (/providers/microsoft.authorization/policydefinitions/ac01ad65-10e5-46df-bdd9-6b0cad13e1d2), Storage account encryption scopes should use customer-managed keys to encrypt data at rest (/providers/microsoft.authorization/policydefinitions/b5ec538c-daa0-4006-8596-35468b9148e8), Azure Machine Learning workspaces should be encrypted with a customer-managed key (/providers/microsoft.authorization/policydefinitions/ba769a63-b8cc-4b2d-abf6-ac33c7204be8), Queue Storage should use customer-managed key for encryption (/providers/microsoft.authorization/policydefinitions/f0e5abd0-2554-4736-b7c0-4ffef23475ef), Azure Synapse workspaces should use customer-managed keys to encrypt data at rest (/providers/microsoft.authorization/policydefinitions/f7d52b2d-e161-4dfa-a82b-55e564167385), Event Hub namespaces (Premium) should use a customer-managed key for encryption (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-eh-premium-cmk)) 06/12/2025 11:18:48 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit Enforce-EncryptTransit /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit Encryption true 0 22 (Container Apps should only be accessible over HTTPS (/providers/microsoft.authorization/policydefinitions/0e80e269-43a4-4ae9-b5bc-178126b8a5cb), Kubernetes clusters should be accessible only over HTTPS (/providers/microsoft.authorization/policydefinitions/1a5b4dca-0b6f-4cf5-907c-56316bc1bf3d), App Service apps should use the latest TLS version (/providers/microsoft.authorization/policydefinitions/f0e6e85b-9b9f-4a4b-b67b-f730d42f1b0b), Function apps should use the latest TLS version (/providers/microsoft.authorization/policydefinitions/f9d614c5-c173-4d56-95a7-b4437057d193), [Deprecated] Storage Account set to minimum TLS and Secure transfer should be enabled (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-storage-mintls), API App should only be accessible over HTTPS (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-appserviceapiapp-http), AppService append enable https only setting to enforce https setting. (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/append-appservice-httpsonly), AppService append sites with minimum TLS version to enforce. (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/append-appservice-latesttls), Azure Cache for Redis Append a specific min TLS version requirement and enforce TLS. (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/append-redis-sslenforcement), Azure Cache for Redis Append and the enforcement that enableNonSslPort is disabled. (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/append-redis-disablenonsslport), Azure Cache for Redis only secure connections should be enabled (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-redis-http), Azure Database for MySQL server deploy a specific min TLS version and enforce SSL. (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-mysql-sslenforcement), Azure Database for PostgreSQL server deploy a specific min TLS version requirement and enforce SSL (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-postgresql-sslenforcement), Azure SQL Database should have the minimal TLS version set to the highest version (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-sql-mintls), Azure Storage deploy a specific min TLS version requirement and enforce SSL/HTTPS (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-storage-sslenforcement), Function App should only be accessible over HTTPS (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-appservicefunctionapp-http), MySQL database servers enforce SSL connections. (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-mysql-http), PostgreSQL database servers enforce SSL connection. (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-postgresql-http), SQL Managed Instance should have the minimal TLS version set to the highest version (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-sqlmi-mintls), SQL managed instances deploy a specific min TLS version requirement. (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-sqlmi-mintls), SQL servers deploys a specific min TLS version requirement. (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-sql-mintls), Web Application should only be accessible over HTTPS (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-appservicewebapp-http)) 06/12/2025 11:18:48 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit Enforce-EncryptTransit_20240509 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20240509 Encryption true 0 38 (Configure App Service app slots to use the latest TLS version (/providers/microsoft.authorization/policydefinitions/014664e7-e348-41a3-aeb9-566e4ff6a9df), Container Apps should only be accessible over HTTPS (/providers/microsoft.authorization/policydefinitions/0e80e269-43a4-4ae9-b5bc-178126b8a5cb), Container Apps should only be accessible over HTTPS (/providers/microsoft.authorization/policydefinitions/0e80e269-43a4-4ae9-b5bc-178126b8a5cb), Kubernetes clusters should be accessible only over HTTPS (/providers/microsoft.authorization/policydefinitions/1a5b4dca-0b6f-4cf5-907c-56316bc1bf3d), Configure Function apps to use the latest TLS version (/providers/microsoft.authorization/policydefinitions/1f01f1c7-539c-49b5-9ef4-d4ffa37d22e0), Azure SQL Database should be running TLS version 1.2 or newer (/providers/microsoft.authorization/policydefinitions/32e6bbec-16b6-44c2-be37-c5b672d103cf), Function app slots should only be accessible over HTTPS (/providers/microsoft.authorization/policydefinitions/5e5dbe3f-2702-4ffc-8b1e-0cae008a5c71), Function apps should only be accessible over HTTPS (/providers/microsoft.authorization/policydefinitions/6d555dd1-86f2-4f1c-8ed7-5abae7c6cbab), App Service apps should only be accessible over HTTPS (/providers/microsoft.authorization/policydefinitions/a4af4a39-4135-47fb-b175-47fbdf85311d), SQL Managed Instance should have the minimal TLS version of 1.2 (/providers/microsoft.authorization/policydefinitions/a8793640-60f7-487c-b5c3-1d37215905c4), App Service app slots should only be accessible over HTTPS (/providers/microsoft.authorization/policydefinitions/ae1b9a8c-dfce-4605-bd91-69213b4a26fc), Configure App Service apps to use the latest TLS version (/providers/microsoft.authorization/policydefinitions/ae44c1d1-0df2-4ca9-98fa-a3d3ae5b409d), Azure Synapse Workspace SQL Server should be running TLS version 1.2 or newer (/providers/microsoft.authorization/policydefinitions/cb3738a6-82a2-4a18-b87b-15217b9deff4), App Service Environment should have TLS 1.0 and 1.1 disabled (/providers/microsoft.authorization/policydefinitions/d6545c6b-dd9d-4265-91e6-0b451e2f1c50), App Service apps should use the latest TLS version (/providers/microsoft.authorization/policydefinitions/f0e6e85b-9b9f-4a4b-b67b-f730d42f1b0b), Function apps should use the latest TLS version (/providers/microsoft.authorization/policydefinitions/f9d614c5-c173-4d56-95a7-b4437057d193), Configure Function app slots to use the latest TLS version (/providers/microsoft.authorization/policydefinitions/fa3a6357-c6d6-4120-8429-855577ec0063), Storage accounts should have the specified minimum TLS version (/providers/microsoft.authorization/policydefinitions/fe83a0eb-a853-422d-aac2-1bffd182c5d0), API App should only be accessible over HTTPS (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-appserviceapiapp-http), AppService append enable https only setting to enforce https setting. (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/append-appservice-httpsonly), AppService append sites with minimum TLS version to enforce. (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/append-appservice-latesttls), Azure Cache for Redis Append a specific min TLS version requirement and enforce TLS. (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/append-redis-sslenforcement), Azure Cache for Redis Append and the enforcement that enableNonSslPort is disabled. (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/append-redis-disablenonsslport), Azure Cache for Redis only secure connections should be enabled (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-redis-http), Azure Database for MySQL server deploy a specific min TLS version and enforce SSL. (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-mysql-sslenforcement), Azure Database for PostgreSQL server deploy a specific min TLS version requirement and enforce SSL (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-postgresql-sslenforcement), Azure SQL Database should have the minimal TLS version set to the highest version (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-sql-mintls), Azure Storage deploy a specific min TLS version requirement and enforce SSL/HTTPS (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-storage-sslenforcement), Configure Logic apps to use the latest TLS version (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-logicapp-tls), Event Hub namespaces should use a valid TLS version (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-eh-mintls), Function App should only be accessible over HTTPS (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-appservicefunctionapp-http), Logic app should only be accessible over HTTPS (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-logicapps-without-https), MySQL database servers enforce SSL connections. (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-mysql-http), PostgreSQL database servers enforce SSL connection. (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-postgresql-http), SQL Managed Instance should have the minimal TLS version set to the highest version (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-sqlmi-mintls), SQL managed instances deploy a specific min TLS version requirement. (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-sqlmi-mintls), SQL servers deploys a specific min TLS version requirement. (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-sql-mintls), Web Application should only be accessible over HTTPS (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-appservicewebapp-http)) 06/12/2025 11:18:48 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated]: Deploy Diagnostic Settings to Azure Services Deploy-Diagnostics-LogAnalytics /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics Monitoring true 0 70 (Deploy Diagnostic Settings for Service Bus to Log Analytics workspace (/providers/microsoft.authorization/policydefinitions/04d53d87-841c-4f23-8a5b-21564380b55e), Deploy Diagnostic Settings for Search Services to Log Analytics workspace (/providers/microsoft.authorization/policydefinitions/08ba64b8-738f-4918-9686-730d2ed79c7d), Deploy Diagnostic Settings for Event Hub to Log Analytics workspace (/providers/microsoft.authorization/policydefinitions/1f6e93e8-6b31-41b1-83f6-36e449a42579), Deploy Diagnostic Settings for Stream Analytics to Log Analytics workspace (/providers/microsoft.authorization/policydefinitions/237e0f7e-b0e8-4ec4-ad46-8c12cb66d673), Configure diagnostic settings for File Services to Log Analytics workspace (/providers/microsoft.authorization/policydefinitions/25a70cc8-2bd4-47f1-90b6-1478e4662c96), Configure diagnostic settings for Table Services to Log Analytics workspace (/providers/microsoft.authorization/policydefinitions/2fb86bf3-d221-43d1-96d1-2434af34eaa0), Configure diagnostic settings for Storage Accounts to Log Analytics workspace (/providers/microsoft.authorization/policydefinitions/59759c62-9a22-4cdf-ae64-074495983fef), Deploy - Configure diagnostic settings for Azure Kubernetes Service to Log Analytics workspace (/providers/microsoft.authorization/policydefinitions/6c66c325-74c8-42fd-a286-a74b0e2939d8), Public IP addresses should have resource logs enabled for Azure DDoS Protection (/providers/microsoft.authorization/policydefinitions/752154a7-1e0f-45c6-a880-ac75a7e4f648), Configure diagnostic settings for Queue Services to Log Analytics workspace (/providers/microsoft.authorization/policydefinitions/7bd000e3-37c7-4928-9f31-86c4b77c5c45), Configure diagnostic settings for Blob Services to Log Analytics workspace (/providers/microsoft.authorization/policydefinitions/b4fe1a3b-0715-4c6c-a5ea-ffc33cf823cb), Deploy - Configure diagnostic settings for SQL Databases to Log Analytics workspace (/providers/microsoft.authorization/policydefinitions/b79fa14e-238a-4c2d-b376-442ce508fc84), Deploy Diagnostic Settings for Logic Apps to Log Analytics workspace (/providers/microsoft.authorization/policydefinitions/b889a06c-ec72-4b03-910a-cb169ee18721), Deploy Diagnostic Settings for Key Vault to Log Analytics workspace (/providers/microsoft.authorization/policydefinitions/bef3f64c-5290-43b7-85b0-9b254eef4c47), Deploy Diagnostic Settings for Recovery Services Vault to Log Analytics workspace for resource specific categories. (/providers/microsoft.authorization/policydefinitions/c717fb0c-d118-4c43-ab3d-ece30ac81fb3), Deploy Diagnostic Settings for Batch Account to Log Analytics workspace (/providers/microsoft.authorization/policydefinitions/c84e5349-db6d-4769-805e-e14037dab9b5), Deploy Diagnostic Settings for Data Lake Analytics to Log Analytics workspace (/providers/microsoft.authorization/policydefinitions/d56a5a7c-72d7-42bc-8ceb-3baf4c0eae03), [Deprecated] Diagnostic Settings for MariaDB to Log Analytics Workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-mariadb), [Deprecated]: Deploy Diagnostic Settings for Analysis Services to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-analysisservice), [Deprecated]: Deploy Diagnostic Settings for API Management to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-apimgmt), [Deprecated]: Deploy Diagnostic Settings for App Service Plan to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-webserverfarm), [Deprecated]: Deploy Diagnostic Settings for App Service to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-website), [Deprecated]: Deploy Diagnostic Settings for Application Gateway to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-applicationgateway), [Deprecated]: Deploy Diagnostic Settings for Automation to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-aa), [Deprecated]: Deploy Diagnostic Settings for AVD Application group to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-wvdappgroup), [Deprecated]: Deploy Diagnostic Settings for AVD Host Pools to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-wvdhostpools), [Deprecated]: Deploy Diagnostic Settings for AVD Scaling Plans to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-avdscalingplans), [Deprecated]: Deploy Diagnostic Settings for AVD Workspace to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-wvdworkspace), [Deprecated]: Deploy Diagnostic Settings for Azure API for FHIR to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-apiforfhir), [Deprecated]: Deploy Diagnostic Settings for Azure Bastion to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-bastion), [Deprecated]: Deploy Diagnostic Settings for Azure Data Explorer Cluster to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-dataexplorercluster), [Deprecated]: Deploy Diagnostic Settings for Azure Function App to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-function), [Deprecated]: Deploy Diagnostic Settings for Azure Media Service to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-mediaservice), [Deprecated]: Deploy Diagnostic Settings for CDN Endpoint to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-cdnendpoints), [Deprecated]: Deploy Diagnostic Settings for Cognitive Services to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-cognitiveservices), [Deprecated]: Deploy Diagnostic Settings for Container Instances to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-aci), [Deprecated]: Deploy Diagnostic Settings for Container Registry to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-acr), [Deprecated]: Deploy Diagnostic Settings for Cosmos DB to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-cosmosdb), [Deprecated]: Deploy Diagnostic Settings for Data Factory to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-datafactory), [Deprecated]: Deploy Diagnostic Settings for Data Lake Analytics to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-dlanalytics), [Deprecated]: Deploy Diagnostic Settings for Database for MySQL to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-mysql), [Deprecated]: Deploy Diagnostic Settings for Database for PostgreSQL to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-postgresql), [Deprecated]: Deploy Diagnostic Settings for Databricks to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-databricks), [Deprecated]: Deploy Diagnostic Settings for Event Grid subscriptions to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-eventgridsub), [Deprecated]: Deploy Diagnostic Settings for Event Grid System Topic to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-eventgridsystemtopic), [Deprecated]: Deploy Diagnostic Settings for Event Grid Topic to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-eventgridtopic), [Deprecated]: Deploy Diagnostic Settings for ExpressRoute to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-expressroute), [Deprecated]: Deploy Diagnostic Settings for Firewall to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-firewall), [Deprecated]: Deploy Diagnostic Settings for Front Door to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-frontdoor), [Deprecated]: Deploy Diagnostic Settings for HDInsight to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-hdinsight), [Deprecated]: Deploy Diagnostic Settings for IoT Hub to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-iothub), [Deprecated]: Deploy Diagnostic Settings for Load Balancer to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-loadbalancer), [Deprecated]: Deploy Diagnostic Settings for Log Analytics to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-loganalytics), [Deprecated]: Deploy Diagnostic Settings for Logic Apps integration service environment to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-logicappsise), [Deprecated]: Deploy Diagnostic Settings for Machine Learning workspace to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-mlworkspace), [Deprecated]: Deploy Diagnostic Settings for Network Interfaces to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-nic), [Deprecated]: Deploy Diagnostic Settings for Network Security Groups to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-networksecuritygroups), [Deprecated]: Deploy Diagnostic Settings for Power BI Embedded to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-powerbiembedded), [Deprecated]: Deploy Diagnostic Settings for Redis Cache to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-rediscache), [Deprecated]: Deploy Diagnostic Settings for Relay to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-relay), [Deprecated]: Deploy Diagnostic Settings for SignalR to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-signalr), [Deprecated]: Deploy Diagnostic Settings for SQL Elastic Pools to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-sqlelasticpools), [Deprecated]: Deploy Diagnostic Settings for SQL Managed Instances to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-sqlmi), [Deprecated]: Deploy Diagnostic Settings for Time Series Insights to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-timeseriesinsights), [Deprecated]: Deploy Diagnostic Settings for Traffic Manager to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-trafficmanager), [Deprecated]: Deploy Diagnostic Settings for Virtual Machine Scale Sets to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-vmss), [Deprecated]: Deploy Diagnostic Settings for Virtual Machines to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-vm), [Deprecated]: Deploy Diagnostic Settings for Virtual Network to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-virtualnetwork), [Deprecated]: Deploy Diagnostic Settings for VPN Gateway to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-vnetgw), [Deprecated]: Deploy Diagnostic Settings for VWAN S2S VPN Gateway to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-vwans2svpngw)) 06/12/2025 11:18:48 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated]: Deploy Microsoft Defender for Cloud configuration Deploy-MDFC-Config /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-mdfc-config Security Center true 0 19 (Configure machines to receive a vulnerability assessment provider (/providers/microsoft.authorization/policydefinitions/13ce0167-8ca6-4048-8e6b-f996402e3c1b), Configure Microsoft Defender for Key Vault plan (/providers/microsoft.authorization/policydefinitions/1f725891-01c0-420a-9059-4fa46cb770b7), [Deprecated]: Configure Azure Defender for DNS to be enabled (/providers/microsoft.authorization/policydefinitions/2370a3c1-4a25-4283-a91a-c9c1a145fb2f), Configure Azure Defender for open-source relational databases to be enabled (/providers/microsoft.authorization/policydefinitions/44433aa3-7ec2-4002-93ea-65c65ff0310a), Configure Azure Defender for SQL servers on machines to be enabled (/providers/microsoft.authorization/policydefinitions/50ea7265-7d8c-429e-9a7d-ca1f410191c3), Configure Azure Kubernetes Service clusters to enable Defender profile (/providers/microsoft.authorization/policydefinitions/64def556-fbad-4622-930e-72d1d5589bf5), Configure Microsoft Defender CSPM to be enabled (/providers/microsoft.authorization/policydefinitions/689f7782-ef2c-4270-a6d0-7664869076bd), Setup subscriptions to transition to an alternative vulnerability assessment solution (/providers/microsoft.authorization/policydefinitions/766e621d-ba95-4e43-a6f2-e945db3d7888), Configure Microsoft Defender for Azure Cosmos DB to be enabled (/providers/microsoft.authorization/policydefinitions/82bf5b87-728b-4a74-ba4d-6123845cf542), Configure Azure Defender for servers to be enabled (/providers/microsoft.authorization/policydefinitions/8e86a5b6-b9bd-49d1-8e21-4bb8a0862222), Deploy Azure Policy Add-on to Azure Kubernetes Service clusters (/providers/microsoft.authorization/policydefinitions/a8eff44f-8c92-45c3-a3fb-9880802d67a7), Configure Azure Defender for App Service to be enabled (/providers/microsoft.authorization/policydefinitions/b40e7bcd-a1e5-47fe-b9cf-2f534d0bfb7d), Configure Azure Defender for Resource Manager to be enabled (/providers/microsoft.authorization/policydefinitions/b7021b2b-08fd-4dc0-9de7-3c6ece09faf9), Configure Azure Defender for Azure SQL database to be enabled (/providers/microsoft.authorization/policydefinitions/b99b73e7-074b-4089-9395-b7236f094491), Configure Microsoft Defender for Containers to be enabled (/providers/microsoft.authorization/policydefinitions/c9ddb292-b203-4738-aead-18e2716e858f), Configure Microsoft Defender for Storage to be enabled (/providers/microsoft.authorization/policydefinitions/cfdc5972-75b3-4418-8ae1-7f5c36839390), [Deprecated]: Configure Microsoft Defender for APIs should be enabled (/providers/microsoft.authorization/policydefinitions/e54d2be9-5f2e-4d65-98e4-4f0e670b23d6), Deploy export to Log Analytics workspace for Microsoft Defender for Cloud data (/providers/microsoft.authorization/policydefinitions/ffb6f416-7bd2-4488-8828-56585fef2be9), Deploy Microsoft Defender for Cloud Security Contacts (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-asc-securitycontacts)) 06/12/2025 11:18:46 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg [Deprecated]: Deploy SQL Database built-in SQL security configuration Deploy-Sql-Security /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-sql-security SQL true 0 4 (Deploy SQL DB transparent data encryption (/providers/microsoft.authorization/policydefinitions/86a912f6-9a06-4e26-b447-11b16ba8659f), [Deprecated]: Deploy SQL Database vulnerability Assessments (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-sql-vulnerabilityassessments), Deploy SQL database auditing settings (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-sql-auditingsettings), Deploy SQL Database security Alert Policies configuration with email admin accounts (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-sql-securityalertpolicies)) 06/12/2025 11:18:45 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Audit virtual machines for Trusted Launch support Audit-TrustedLaunch /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/audit-trustedlaunch Trusted Launch true 1 (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-trustedlaunch) 2 (Disks and OS image should support TrustedLaunch (/providers/microsoft.authorization/policydefinitions/b03bb370-5249-4ea4-9fce-2552e87e45fa), Virtual Machine should have TrustedLaunch enabled (/providers/microsoft.authorization/policydefinitions/c95b54ad-0614-4633-ab29-104b01235cbf)) 06/12/2025 11:18:48 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Configure Azure PaaS services to use private DNS zones Deploy-Private-DNS-Zones /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-private-dns-zones Network true 0 59 (Configure a private DNS Zone ID for table groupID (/providers/microsoft.authorization/policydefinitions/028bbd88-e9b5-461f-9424-a1b63a7bee1a), Configure Azure File Sync to use private DNS zones (/providers/microsoft.authorization/policydefinitions/06695360-db88-47f6-b976-7500d4297475), Configure Azure Web PubSub Service to use private DNS zones (/providers/microsoft.authorization/policydefinitions/0b026355-49cb-467b-8ac4-f777874e175a), Configure Azure Databricks workspace to use private DNS zones (/providers/microsoft.authorization/policydefinitions/0eddd7f3-3d9b-4927-a07a-806e8ac9486c), Configure Azure Databricks workspace to use private DNS zones (/providers/microsoft.authorization/policydefinitions/0eddd7f3-3d9b-4927-a07a-806e8ac9486c), Configure Azure Synapse workspaces to use private DNS zones (/providers/microsoft.authorization/policydefinitions/1e5ed725-f16c-478b-bd4b-7bfa2f7940b9), Configure Azure Synapse workspaces to use private DNS zones (/providers/microsoft.authorization/policydefinitions/1e5ed725-f16c-478b-bd4b-7bfa2f7940b9), Configure Azure Synapse workspaces to use private DNS zones (/providers/microsoft.authorization/policydefinitions/1e5ed725-f16c-478b-bd4b-7bfa2f7940b9), Configure Azure Virtual Desktop workspace resources to use private DNS zones (/providers/microsoft.authorization/policydefinitions/34804460-d88b-4922-a7ca-537165e060ed), Configure Azure Monitor Private Link Scope to use private DNS zones (/providers/microsoft.authorization/policydefinitions/437914ee-c176-4fff-8986-7e05eb971365), Configure Azure HDInsight clusters to use private DNS zones (/providers/microsoft.authorization/policydefinitions/43d6e3bd-fc6a-4b44-8b4d-2151d8736a11), Configure Azure Managed Grafana workspaces to use private DNS zones (/providers/microsoft.authorization/policydefinitions/4c8537f8-cd1b-49ec-b704-18e82a42fd58), Deploy - Configure private DNS zones for private endpoints that connect to Batch accounts (/providers/microsoft.authorization/policydefinitions/4ec38ebc-381f-45ee-81a4-acbc4be878f8), Configure Azure Arc Private Link Scopes to use private DNS zones (/providers/microsoft.authorization/policydefinitions/55c4db33-97b0-437b-8469-c4f4498f5df9), Configure BotService resources to use private DNS zones (/providers/microsoft.authorization/policydefinitions/6a4e6f44-f2af-4082-9702-033c9e88b9f8), Configure Azure Automation accounts with private DNS zones (/providers/microsoft.authorization/policydefinitions/6dd01e4f-1be1-4e80-9d0b-d109e04cb064), Configure Azure Automation accounts with private DNS zones (/providers/microsoft.authorization/policydefinitions/6dd01e4f-1be1-4e80-9d0b-d109e04cb064), Configure a private DNS Zone ID for file groupID (/providers/microsoft.authorization/policydefinitions/6df98d03-368a-4438-8730-a93c4d7693d6), Configure Azure Migrate resources to use private DNS zones (/providers/microsoft.authorization/policydefinitions/7590a335-57cf-4c95-babd-ecbc8fafeb1f), Configure a private DNS Zone ID for blob groupID (/providers/microsoft.authorization/policydefinitions/75973700-529f-4de2-b794-fb9b6781b6b0), Configure private DNS zones for private endpoints connected to App Configuration (/providers/microsoft.authorization/policydefinitions/7a860e27-9ca2-4fc6-822d-c2d248c300df), Configure a private DNS Zone ID for dfs groupID (/providers/microsoft.authorization/policydefinitions/83c6fe0f-2316-444a-99a1-1ecd8a7872ca), Configure private DNS zones for private endpoints that connect to Azure Data Factory (/providers/microsoft.authorization/policydefinitions/86cd96e1-1745-420d-94d4-d3f2fe415aa4), Configure private DNS zones for private endpoints that connect to Azure Data Factory (/providers/microsoft.authorization/policydefinitions/86cd96e1-1745-420d-94d4-d3f2fe415aa4), Configure a private DNS Zone ID for dfs_secondary groupID (/providers/microsoft.authorization/policydefinitions/90bd4cb3-9f59-45f7-a6ca-f69db2726671), Configure Azure Virtual Desktop hostpool resources to use private DNS zones (/providers/microsoft.authorization/policydefinitions/9427df23-0f42-4e1e-bf99-a6133d841c4a), [Preview]: Configure Azure Recovery Services vaults to use private DNS zones (/providers/microsoft.authorization/policydefinitions/942bd215-1a66-44be-af65-6a1c0318dbe2), Configure a private DNS Zone ID for web groupID (/providers/microsoft.authorization/policydefinitions/9adab2a5-05ba-4fbd-831a-5bf958d04218), Configure Azure Device Update for IoT Hub accounts to use private DNS zones (/providers/microsoft.authorization/policydefinitions/a222b93a-e6c2-4c01-817f-21e092455b2a), Configure CosmosDB accounts to use private DNS zones (/providers/microsoft.authorization/policydefinitions/a63cc0bd-cda4-4178-b705-37dc439d3e0f), Configure CosmosDB accounts to use private DNS zones (/providers/microsoft.authorization/policydefinitions/a63cc0bd-cda4-4178-b705-37dc439d3e0f), Configure CosmosDB accounts to use private DNS zones (/providers/microsoft.authorization/policydefinitions/a63cc0bd-cda4-4178-b705-37dc439d3e0f), Configure CosmosDB accounts to use private DNS zones (/providers/microsoft.authorization/policydefinitions/a63cc0bd-cda4-4178-b705-37dc439d3e0f), Configure CosmosDB accounts to use private DNS zones (/providers/microsoft.authorization/policydefinitions/a63cc0bd-cda4-4178-b705-37dc439d3e0f), Configure IoT Hub device provisioning instances to use private DNS zones (/providers/microsoft.authorization/policydefinitions/aaa64d2d-2fa3-45e5-b332-0b031b9b30e8), Configure Azure Key Vaults to use private DNS zones (/providers/microsoft.authorization/policydefinitions/ac673a9a-f77d-4846-b2d8-a57f8e1c01d4), [Preview]: Configure Recovery Services vaults to use private DNS zones for backup (/providers/microsoft.authorization/policydefinitions/af783da1-4ad1-42be-800d-d19c70038820), Deploy - Configure private DNS zones for private endpoints connect to Azure SignalR Service (/providers/microsoft.authorization/policydefinitions/b0e86710-7fb7-4a6c-a064-32e9b829509e), Configure App Service apps to use private DNS zones (/providers/microsoft.authorization/policydefinitions/b318f84a-b872-429b-ac6d-a01b96814452), [Deprecated]: Configure Azure Media Services to use private DNS zones (/providers/microsoft.authorization/policydefinitions/b4a7f6c1-585e-4177-ad5b-c2c93f4bb991), [Deprecated]: Configure Azure Media Services to use private DNS zones (/providers/microsoft.authorization/policydefinitions/b4a7f6c1-585e-4177-ad5b-c2c93f4bb991), [Deprecated]: Configure Azure Media Services to use private DNS zones (/providers/microsoft.authorization/policydefinitions/b4a7f6c1-585e-4177-ad5b-c2c93f4bb991), Deploy - Configure Azure Event Grid topics to use private DNS zones (/providers/microsoft.authorization/policydefinitions/baf19753-7502-405f-8745-370519b20483), Configure disk access resources to use private DNS zones (/providers/microsoft.authorization/policydefinitions/bc05b96c-0b36-4ca9-82f0-5c53f96ce05a), Configure a private DNS Zone ID for queue groupID (/providers/microsoft.authorization/policydefinitions/bcff79fb-2b0d-47c9-97e5-3023479b00d1), Configure a private DNS Zone ID for table_secondary groupID (/providers/microsoft.authorization/policydefinitions/c1d634a5-f73d-4cdd-889f-2cc7006eb47f), Configure Cognitive Services accounts to use private DNS zones (/providers/microsoft.authorization/policydefinitions/c4bc6f10-cb41-49eb-b000-d5ab82e2a091), Deploy - Configure Azure IoT Hubs to use private DNS zones (/providers/microsoft.authorization/policydefinitions/c99ce9c1-ced7-4c3e-aca0-10e69ce0cb02), Configure a private DNS Zone ID for web_secondary groupID (/providers/microsoft.authorization/policydefinitions/d19ae5f1-b303-4b82-9ca8-7682749faf0c), Deploy - Configure Azure Event Grid domains to use private DNS zones (/providers/microsoft.authorization/policydefinitions/d389df0a-e0d7-4607-833c-75a6fdac2c2d), Deploy - Configure IoT Central to use private DNS zones (/providers/microsoft.authorization/policydefinitions/d627d7c6-ded5-481a-8f2e-7e16b1e6faf6), Configure a private DNS Zone ID for blob_secondary groupID (/providers/microsoft.authorization/policydefinitions/d847d34b-9337-4e2d-99a5-767e5ac9c582), Configure a private DNS Zone ID for queue_secondary groupID (/providers/microsoft.authorization/policydefinitions/da9b4ae8-5ddc-48c5-b9c0-25f8abf7a3d6), Configure Azure Cache for Redis to use private DNS zones (/providers/microsoft.authorization/policydefinitions/e016b22b-e0eb-436d-8fd7-160c4eaed6e2), Configure Container registries to use private DNS zones (/providers/microsoft.authorization/policydefinitions/e9585a95-5b8c-4d03-b193-dc7eb5ac4c32), Configure Event Hub namespaces to use private DNS zones (/providers/microsoft.authorization/policydefinitions/ed66d4f5-8220-45dc-ab4a-20d1749c74e6), Configure Azure Machine Learning workspace to use private DNS zones (/providers/microsoft.authorization/policydefinitions/ee40564d-486e-4f68-a5ca-7a621edae0fb), Configure Service Bus namespaces to use private DNS zones (/providers/microsoft.authorization/policydefinitions/f0fcf93c-c063-4071-9668-c47474bd3564), Configure Azure AI Search services to use private DNS zones (/providers/microsoft.authorization/policydefinitions/fbc14a67-53e4-4932-abcc-2049c6706009)) 06/12/2025 11:18:48 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines Deploy-AUM-CheckUpdates /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-aum-checkupdates Security Center true 2 (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates, /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates) 4 (Configure periodic checking for missing system updates on azure virtual machines (/providers/microsoft.authorization/policydefinitions/59efceea-0c96-497e-a4a1-4eb2290dac15), Configure periodic checking for missing system updates on azure virtual machines (/providers/microsoft.authorization/policydefinitions/59efceea-0c96-497e-a4a1-4eb2290dac15), Configure periodic checking for missing system updates on azure Arc-enabled servers (/providers/microsoft.authorization/policydefinitions/bfea026e-043f-4ff4-9d1b-bf301ca7ff46), Configure periodic checking for missing system updates on azure Arc-enabled servers (/providers/microsoft.authorization/policydefinitions/bfea026e-043f-4ff4-9d1b-bf301ca7ff46)) 06/12/2025 11:18:46 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Deny or Audit resources without Encryption with a customer-managed key (CMK) Enforce-Encryption-CMK_20250218 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encryption-cmk_20250218 Encryption true 0 30 (Azure API for FHIR should use a customer-managed key to encrypt data at rest (/providers/microsoft.authorization/policydefinitions/051cba44-2429-45b9-9649-46cec11c7119), [Deprecated]: Virtual machines should encrypt temp disks, caches, and data flows between Compute and Storage resources (/providers/microsoft.authorization/policydefinitions/0961003e-5a0a-4549-abde-af6a37f2724d), SQL servers should use customer-managed keys to encrypt data at rest (/providers/microsoft.authorization/policydefinitions/0a370ff3-6cab-4e85-8995-295fd854c5b8), Azure Container Instance container group should use customer-managed key for encryption (/providers/microsoft.authorization/policydefinitions/0aa61e00-0a01-4a3c-9945-e93cffedf0e6), PostgreSQL servers should use customer-managed keys to encrypt data at rest (/providers/microsoft.authorization/policydefinitions/18adea5e-f416-4d0f-8aa8-d24321e3e274), Azure Cosmos DB accounts should use customer-managed keys to encrypt data at rest (/providers/microsoft.authorization/policydefinitions/1f905d99-2ab7-462c-a6b0-f709acca6c8f), Service Bus Premium namespaces should use a customer-managed key for encryption (/providers/microsoft.authorization/policydefinitions/295fc8b1-dc9f-4f53-9c61-3f313ceab40a), [Preview]: Azure Recovery Services vaults should use customer-managed keys for encrypting backup data (/providers/microsoft.authorization/policydefinitions/2e94d99a-8a36-4563-bc77-810d8893b671), Azure data factories should be encrypted with a customer-managed key (/providers/microsoft.authorization/policydefinitions/4ec52d6d-beb7-40c4-9a9e-fe753254690e), Bot Service should be encrypted with a customer-managed key (/providers/microsoft.authorization/policydefinitions/51522a96-0869-4791-82f3-981000c2c67f), Azure Automation accounts should use customer-managed keys to encrypt data at rest (/providers/microsoft.authorization/policydefinitions/56a5ee18-2ae6-4810-86f7-18e39ce5629b), Container registries should be encrypted with a customer-managed key (/providers/microsoft.authorization/policydefinitions/5b9159ae-1701-4a6f-9a7a-aa9c8ddd0580), Azure AI Services resources should encrypt data at rest with a customer-managed key (CMK) (/providers/microsoft.authorization/policydefinitions/67121cc7-ff39-4ab8-b7e3-95b84dab487d), Storage accounts should use customer-managed key for encryption (/providers/microsoft.authorization/policydefinitions/6fac406b-40ca-413b-bf8e-0bf964659c25), OS and data disks should be encrypted with a customer-managed key (/providers/microsoft.authorization/policydefinitions/702dd420-7fcc-42c5-afe8-4026edd20fe0), Azure AI Search services should use customer-managed keys to encrypt data at rest (/providers/microsoft.authorization/policydefinitions/76a56461-9dc0-40f0-82f5-2453283afa2f), Table Storage should use customer-managed key for encryption (/providers/microsoft.authorization/policydefinitions/7c322315-e26d-4174-a99e-f49d351b4688), Both operating systems and data disks in Azure Kubernetes Service clusters should be encrypted by customer-managed keys (/providers/microsoft.authorization/policydefinitions/7d7be79c-23ba-4033-84dd-45e2a5ccdd67), Azure Data Explorer encryption at rest should use a customer-managed key (/providers/microsoft.authorization/policydefinitions/81e74cea-30fd-40d5-802f-d72103c2aaaa), MySQL servers should use customer-managed keys to encrypt data at rest (/providers/microsoft.authorization/policydefinitions/83cef61d-dbd1-4b20-a4fc-5fbc7da10833), Azure Data Box jobs should use a customer-managed key to encrypt the device unlock password (/providers/microsoft.authorization/policydefinitions/86efb160-8de7-451d-bc08-5d475b0aadae), Azure Stream Analytics jobs should use customer-managed keys to encrypt data (/providers/microsoft.authorization/policydefinitions/87ba29ef-1ab3-4d82-b763-87fcd4f531f7), Azure Batch account should use customer-managed keys to encrypt data (/providers/microsoft.authorization/policydefinitions/99e9ccd8-3db9-4592-b0d1-14b1715a4d8a), Event Hub namespaces should use a customer-managed key for encryption (/providers/microsoft.authorization/policydefinitions/a1ad735a-e96f-45d2-a7b2-9a4932cab7ec), SQL managed instances should use customer-managed keys to encrypt data at rest (/providers/microsoft.authorization/policydefinitions/ac01ad65-10e5-46df-bdd9-6b0cad13e1d2), Storage account encryption scopes should use customer-managed keys to encrypt data at rest (/providers/microsoft.authorization/policydefinitions/b5ec538c-daa0-4006-8596-35468b9148e8), Azure Machine Learning workspaces should be encrypted with a customer-managed key (/providers/microsoft.authorization/policydefinitions/ba769a63-b8cc-4b2d-abf6-ac33c7204be8), Queue Storage should use customer-managed key for encryption (/providers/microsoft.authorization/policydefinitions/f0e5abd0-2554-4736-b7c0-4ffef23475ef), Azure Synapse workspaces should use customer-managed keys to encrypt data at rest (/providers/microsoft.authorization/policydefinitions/f7d52b2d-e161-4dfa-a82b-55e564167385), Event Hub namespaces (Premium) should use a customer-managed key for encryption (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-eh-premium-cmk)) 06/12/2025 11:18:48 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit Enforce-EncryptTransit_20241211 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20241211 Encryption true 0 37 (Configure App Service app slots to use the latest TLS version (/providers/microsoft.authorization/policydefinitions/014664e7-e348-41a3-aeb9-566e4ff6a9df), Container Apps should only be accessible over HTTPS (/providers/microsoft.authorization/policydefinitions/0e80e269-43a4-4ae9-b5bc-178126b8a5cb), Kubernetes clusters should be accessible only over HTTPS (/providers/microsoft.authorization/policydefinitions/1a5b4dca-0b6f-4cf5-907c-56316bc1bf3d), Configure Function apps to use the latest TLS version (/providers/microsoft.authorization/policydefinitions/1f01f1c7-539c-49b5-9ef4-d4ffa37d22e0), Azure SQL Database should be running TLS version 1.2 or newer (/providers/microsoft.authorization/policydefinitions/32e6bbec-16b6-44c2-be37-c5b672d103cf), Function app slots should only be accessible over HTTPS (/providers/microsoft.authorization/policydefinitions/5e5dbe3f-2702-4ffc-8b1e-0cae008a5c71), Function apps should only be accessible over HTTPS (/providers/microsoft.authorization/policydefinitions/6d555dd1-86f2-4f1c-8ed7-5abae7c6cbab), App Service apps should only be accessible over HTTPS (/providers/microsoft.authorization/policydefinitions/a4af4a39-4135-47fb-b175-47fbdf85311d), SQL Managed Instance should have the minimal TLS version of 1.2 (/providers/microsoft.authorization/policydefinitions/a8793640-60f7-487c-b5c3-1d37215905c4), App Service app slots should only be accessible over HTTPS (/providers/microsoft.authorization/policydefinitions/ae1b9a8c-dfce-4605-bd91-69213b4a26fc), Configure App Service apps to use the latest TLS version (/providers/microsoft.authorization/policydefinitions/ae44c1d1-0df2-4ca9-98fa-a3d3ae5b409d), Azure Synapse Workspace SQL Server should be running TLS version 1.2 or newer (/providers/microsoft.authorization/policydefinitions/cb3738a6-82a2-4a18-b87b-15217b9deff4), App Service Environment should have TLS 1.0 and 1.1 disabled (/providers/microsoft.authorization/policydefinitions/d6545c6b-dd9d-4265-91e6-0b451e2f1c50), App Service apps should use the latest TLS version (/providers/microsoft.authorization/policydefinitions/f0e6e85b-9b9f-4a4b-b67b-f730d42f1b0b), Function apps should use the latest TLS version (/providers/microsoft.authorization/policydefinitions/f9d614c5-c173-4d56-95a7-b4437057d193), Configure Function app slots to use the latest TLS version (/providers/microsoft.authorization/policydefinitions/fa3a6357-c6d6-4120-8429-855577ec0063), Storage accounts should have the specified minimum TLS version (/providers/microsoft.authorization/policydefinitions/fe83a0eb-a853-422d-aac2-1bffd182c5d0), API App should only be accessible over HTTPS (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-appserviceapiapp-http), AppService append enable https only setting to enforce https setting. (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/append-appservice-httpsonly), AppService append sites with minimum TLS version to enforce. (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/append-appservice-latesttls), Azure Cache for Redis Append a specific min TLS version requirement and enforce TLS. (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/append-redis-sslenforcement), Azure Cache for Redis Append and the enforcement that enableNonSslPort is disabled. (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/append-redis-disablenonsslport), Azure Cache for Redis only secure connections should be enabled (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-redis-http), Azure Database for MySQL server deploy a specific min TLS version and enforce SSL. (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-mysql-sslenforcement), Azure Database for PostgreSQL server deploy a specific min TLS version requirement and enforce SSL (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-postgresql-sslenforcement), Azure SQL Database should have the minimal TLS version set to the highest version (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-sql-mintls), Azure Storage deploy a specific min TLS version requirement and enforce SSL/HTTPS (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-storage-sslenforcement), Configure Logic apps to use the latest TLS version (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-logicapp-tls), Event Hub namespaces should use a valid TLS version (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-eh-mintls), Function App should only be accessible over HTTPS (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-appservicefunctionapp-http), Logic app should only be accessible over HTTPS (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-logicapps-without-https), MySQL database servers enforce SSL connections. (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-mysql-http), PostgreSQL database servers enforce SSL connection. (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-postgresql-http), SQL Managed Instance should have the minimal TLS version set to the highest version (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-sqlmi-mintls), SQL managed instances deploy a specific min TLS version requirement. (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-sqlmi-mintls), SQL servers deploys a specific min TLS version requirement. (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-sql-mintls), Web Application should only be accessible over HTTPS (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-appservicewebapp-http)) 06/12/2025 11:18:46 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg DenyAction Delete - Activity Log Settings and Diagnostic Settings DenyAction-DeleteProtection /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/denyaction-deleteprotection Monitoring true 0 2 (DenyAction implementation on Activity Logs (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/denyaction-activitylogs), DenyAction implementation on Diagnostic Logs. (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/denyaction-diagnosticlogs)) 06/12/2025 11:18:46 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Deploy Microsoft Defender for Cloud configuration Deploy-MDFC-Config_20240319 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-mdfc-config_20240319 Security Center true 0 17 (Configure machines to receive a vulnerability assessment provider (/providers/microsoft.authorization/policydefinitions/13ce0167-8ca6-4048-8e6b-f996402e3c1b), Configure Microsoft Defender for Key Vault plan (/providers/microsoft.authorization/policydefinitions/1f725891-01c0-420a-9059-4fa46cb770b7), Configure Azure Defender for open-source relational databases to be enabled (/providers/microsoft.authorization/policydefinitions/44433aa3-7ec2-4002-93ea-65c65ff0310a), Configure Azure Defender for SQL servers on machines to be enabled (/providers/microsoft.authorization/policydefinitions/50ea7265-7d8c-429e-9a7d-ca1f410191c3), Configure Azure Kubernetes Service clusters to enable Defender profile (/providers/microsoft.authorization/policydefinitions/64def556-fbad-4622-930e-72d1d5589bf5), Configure Microsoft Defender CSPM plan (/providers/microsoft.authorization/policydefinitions/72f8cee7-2937-403d-84a1-a4e3e57f3c21), Setup subscriptions to transition to an alternative vulnerability assessment solution (/providers/microsoft.authorization/policydefinitions/766e621d-ba95-4e43-a6f2-e945db3d7888), Configure Microsoft Defender for Azure Cosmos DB to be enabled (/providers/microsoft.authorization/policydefinitions/82bf5b87-728b-4a74-ba4d-6123845cf542), Configure Azure Defender for servers to be enabled (/providers/microsoft.authorization/policydefinitions/8e86a5b6-b9bd-49d1-8e21-4bb8a0862222), Deploy Azure Policy Add-on to Azure Kubernetes Service clusters (/providers/microsoft.authorization/policydefinitions/a8eff44f-8c92-45c3-a3fb-9880802d67a7), Configure Azure Defender for App Service to be enabled (/providers/microsoft.authorization/policydefinitions/b40e7bcd-a1e5-47fe-b9cf-2f534d0bfb7d), Configure Azure Defender for Resource Manager to be enabled (/providers/microsoft.authorization/policydefinitions/b7021b2b-08fd-4dc0-9de7-3c6ece09faf9), Configure Azure Defender for Azure SQL database to be enabled (/providers/microsoft.authorization/policydefinitions/b99b73e7-074b-4089-9395-b7236f094491), Configure Microsoft Defender for Containers to be enabled (/providers/microsoft.authorization/policydefinitions/c9ddb292-b203-4738-aead-18e2716e858f), Configure Microsoft Defender for Storage to be enabled (/providers/microsoft.authorization/policydefinitions/cfdc5972-75b3-4418-8ae1-7f5c36839390), Deploy export to Log Analytics workspace for Microsoft Defender for Cloud data (/providers/microsoft.authorization/policydefinitions/ffb6f416-7bd2-4488-8828-56585fef2be9), Deploy Microsoft Defender for Cloud Security Contacts (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-asc-securitycontacts)) 06/12/2025 11:18:46 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Deploy SQL Database built-in SQL security configuration Deploy-Sql-Security_20240529 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-sql-security_20240529 SQL true 0 4 (Deploy SQL DB transparent data encryption (/providers/microsoft.authorization/policydefinitions/86a912f6-9a06-4e26-b447-11b16ba8659f), Deploy SQL database auditing settings (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-sql-auditingsettings), Deploy SQL Database security Alert Policies configuration with email admin accounts (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-sql-securityalertpolicies), Deploy SQL Database Vulnerability Assessments (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-sql-vulnerabilityassessments_20230706)) 06/12/2025 11:18:46 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Enforce additional recommended guardrails for Key Vault Enforce-Guardrails-KeyVault-Sup /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-keyvault-sup Key Vault true 0 2 ([Preview]: Configure Azure Key Vault Managed HSM to disable public network access (/providers/microsoft.authorization/policydefinitions/84d327c3-164a-4685-b453-900478614456), Configure key vaults to enable firewall (/providers/microsoft.authorization/policydefinitions/ac673a9a-f77d-4846-b2d8-a57f8e1c01dc)) 06/12/2025 11:18:47 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Enforce Azure Compute Security Benchmark compliance auditing Enforce-ACSB /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-acsb Guest Configuration true 1 (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/enforce-acsb) 5 (Deploy the Linux Guest Configuration extension to enable Guest Configuration assignments on Linux VMs (/providers/microsoft.authorization/policydefinitions/331e8ea8-378a-410f-a2e5-ae22f38bb0da), Deploy the Windows Guest Configuration extension to enable Guest Configuration assignments on Windows VMs (/providers/microsoft.authorization/policydefinitions/385f5831-96d4-41db-9a3c-cd3af78aaae6), Add system-assigned managed identity to enable Guest Configuration assignments on virtual machines with no identities (/providers/microsoft.authorization/policydefinitions/3cf2ab00-13f1-4d0c-8971-2ac904541a7e), Windows machines should meet requirements of the Azure compute security baseline (/providers/microsoft.authorization/policydefinitions/72650e9f-97bc-4b2a-ab5f-9781a9fcecbc), Linux machines should meet requirements for the Azure compute security baseline (/providers/microsoft.authorization/policydefinitions/fc9b3da7-8347-4380-8e70-0a0361d8dedd)) 06/12/2025 11:18:46 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Enforce enhanced recovery and backup policies Enforce-Backup /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-backup Backup true 0 6 ([Preview]: Immutability must be enabled for backup vaults (/providers/microsoft.authorization/policydefinitions/2514263b-bc0d-4b06-ac3e-f262c0979018), [Preview]: Soft delete must be enabled for Recovery Services Vaults. (/providers/microsoft.authorization/policydefinitions/31b8092a-36b8-434b-9af7-5ec844364148), [Preview]: Soft delete should be enabled for Backup Vaults (/providers/microsoft.authorization/policydefinitions/9798d31d-6028-4dee-8643-46102185c016), [Preview]: Multi-User Authorization (MUA) must be enabled for Backup Vaults. (/providers/microsoft.authorization/policydefinitions/c58e083e-7982-4e24-afdc-be14d312389e), [Preview]: Multi-User Authorization (MUA) must be enabled for Recovery Services Vaults. (/providers/microsoft.authorization/policydefinitions/c7031eab-0fc0-4cd9-acd0-4497bd66d91a), [Preview]: Immutability must be enabled for Recovery Services vaults (/providers/microsoft.authorization/policydefinitions/d6f6f560-14b7-49a4-9fc8-d2c3a9807868)) 06/12/2025 11:18:48 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Enforce policies in the Decommissioned Landing Zone Enforce-ALZ-Decomm /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-alz-decomm Decommissioned true 1 (/providers/microsoft.management/managementgroups/mibelle-decommissioned-mg/providers/microsoft.authorization/policyassignments/enforce-alz-decomm) 2 (Allowed resource types (/providers/microsoft.authorization/policydefinitions/a08ec900-254a-4555-9bf5-e42af04b5c5c), Deploy Virtual Machine Auto Shutdown Schedule (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-vm-autoshutdown)) 06/12/2025 11:18:48 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Enforce policies in the Sandbox Landing Zone Enforce-ALZ-Sandbox /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-alz-sandbox Sandbox true 1 (/providers/microsoft.management/managementgroups/mibelle-sandbox-mg/providers/microsoft.authorization/policyassignments/enforce-alz-sandbox) 2 (Not allowed resource types (/providers/microsoft.authorization/policydefinitions/6c112d4e-5bc7-47ae-a041-ea2d9dccd749), Deny vNet peering cross subscription. (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-vnet-peer-cross-sub)) 06/12/2025 11:18:48 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Enforce recommended guardrails for API Management Enforce-Guardrails-APIM /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-apim API Management true 0 11 (API Management subscriptions should not be scoped to all APIs (/providers/microsoft.authorization/policydefinitions/3aa03346-d8c5-4994-a5bc-7652c2a2aef1), [Deprecated]: API Management minimum API version should be set to 2019-12-01 or higher (/providers/microsoft.authorization/policydefinitions/549814b6-3212-4203-bdc8-1548d342fb67), API Management service should use a SKU that supports virtual networks (/providers/microsoft.authorization/policydefinitions/73ef9241-5d81-4cd4-b483-8443d1730fe5), Configure API Management services to disable access to API Management public service configuration endpoints (/providers/microsoft.authorization/policydefinitions/7ca8c8ac-3a6e-493d-99ba-c5fa35347ff2), API Management calls to API backends should not bypass certificate thumbprint or name validation (/providers/microsoft.authorization/policydefinitions/92bb331d-ac71-416a-8c91-02f2cb734ce4), API Management direct management endpoint should not be enabled (/providers/microsoft.authorization/policydefinitions/b741306c-968e-4b67-b916-5675e5c709f4), API Management calls to API backends should be authenticated (/providers/microsoft.authorization/policydefinitions/c15dcc82-b93c-4dcb-9332-fbf121685b54), API Management APIs should use only encrypted protocols (/providers/microsoft.authorization/policydefinitions/ee7495e7-3ba7-40b6-bfee-c29e22cc75d4), API Management services should use a virtual network (/providers/microsoft.authorization/policydefinitions/ef619a2c-cc4d-4d03-b2ba-8c94a834d85b), API Management secret named values should be stored in Azure Key Vault (/providers/microsoft.authorization/policydefinitions/f1cc7827-022c-473e-836e-5a51cae0b249), API Management services should use TLS version 1.2 (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-apim-tls)) 06/12/2025 11:18:47 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Enforce recommended guardrails for App Service Enforce-Guardrails-AppServices /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-appservices App Service true 0 19 (Configure Function app slots to only be accessible over HTTPS (/providers/microsoft.authorization/policydefinitions/08cf2974-d178-48a0-b26d-f6b8e555748b), Configure App Service apps to only be accessible over HTTPS (/providers/microsoft.authorization/policydefinitions/0f98368e-36bc-4716-8ac2-8f8067203b63), Configure App Service apps to disable public network access (/providers/microsoft.authorization/policydefinitions/2374605e-3e0b-492b-9046-229af202562c), Configure Function app slots to disable public network access (/providers/microsoft.authorization/policydefinitions/242222f3-4985-4e99-b5ef-086d6a6cb01c), Configure Function apps to turn off remote debugging (/providers/microsoft.authorization/policydefinitions/25a5046c-c423-4805-9235-e844ae9ef49b), Configure App Service app slots to disable local authentication for SCM sites (/providers/microsoft.authorization/policydefinitions/2c034a29-2a5f-4857-b120-f800fe5549ae), App Service apps should use a SKU that supports private link (/providers/microsoft.authorization/policydefinitions/546fe8d2-368d-4029-a418-6af48a7f61e5), Configure App Service apps to disable local authentication for FTP deployments (/providers/microsoft.authorization/policydefinitions/572e342c-c920-4ef5-be2e-1ed3c6a51dc5), App Service app slots should enable configuration routing to Azure Virtual Network (/providers/microsoft.authorization/policydefinitions/5747353b-1ca9-42c1-a4dd-b874b894f3d4), Configure App Service apps to disable local authentication for SCM sites (/providers/microsoft.authorization/policydefinitions/5e97b776-f380-4722-a9a3-e7f0be029e79), Configure Function app slots to turn off remote debugging (/providers/microsoft.authorization/policydefinitions/70adbb40-e092-42d5-a6f8-71c540a5efdb), App Service apps should enable configuration routing to Azure Virtual Network (/providers/microsoft.authorization/policydefinitions/801543d1-1953-4a90-b8b0-8cf6d41473a5), Configure App Service apps to turn off remote debugging (/providers/microsoft.authorization/policydefinitions/a5e3fe8f-f6cd-4f1d-bbf6-c749754a724b), App Service apps should enable outbound non-RFC 1918 traffic to Azure Virtual Network (/providers/microsoft.authorization/policydefinitions/a691eacb-474d-47e4-b287-b4813ca44222), Configure App Service app slots to disable public network access (/providers/microsoft.authorization/policydefinitions/c6c3e00e-d414-4ca4-914f-406699bb8eee), Configure App Service app slots to turn off remote debugging (/providers/microsoft.authorization/policydefinitions/cca5adfe-626b-4cc6-8522-f5b6ed2391bd), App Service Environment should be provisioned with latest versions (/providers/microsoft.authorization/policydefinitions/eb4d34ab-0929-491c-bbf3-61e13da19f9a), App Service app slots should enable outbound non-RFC 1918 traffic to Azure Virtual Network (/providers/microsoft.authorization/policydefinitions/f5c0bfb3-acea-47b1-b477-b0edcdf6edc1), App Service certificates must be stored in Key Vault (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-appservice-without-byoc)) 06/12/2025 11:18:45 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Enforce recommended guardrails for Automation Account Enforce-Guardrails-Automation /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-automation Automation true 0 6 (Configure Azure Automation accounts to disable public network access (/providers/microsoft.authorization/policydefinitions/23b36a7c-9d26-4288-a8fd-c1d2fa284d8c), Configure Azure Automation account to disable local authentication (/providers/microsoft.authorization/policydefinitions/30d1d58e-8f96-47a5-8564-499a3f3cca81), Automation account variables should be encrypted (/providers/microsoft.authorization/policydefinitions/3657f5a0-770e-44a3-b44e-9431ba1e9735), Azure Automation account should have local authentication method disabled (/providers/microsoft.authorization/policydefinitions/48c5f1cb-14ad-4797-8e3b-f78ab3f8d700), Hotpatch should be enabled for Windows Server Azure Edition VMs (/providers/microsoft.authorization/policydefinitions/6d02d2f7-e38b-4bdc-96f3-adc0a8726abc), Automation Account should have Managed Identity (/providers/microsoft.authorization/policydefinitions/dea83a72-443c-4292-83d5-54a2f98749c0)) 06/12/2025 11:18:48 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Enforce recommended guardrails for Azure Key Vault Enforce-Guardrails-KeyVault /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-keyvault Key Vault true 2 (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enforce-gr-keyvault, /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enforce-gr-keyvault) 29 (Certificates should have the specified maximum validity period (/providers/microsoft.authorization/policydefinitions/0a075868-4c26-42ef-914c-5bc007359560), Key vaults should have deletion protection enabled (/providers/microsoft.authorization/policydefinitions/0b60c0b2-2dc2-4e1c-b5c9-abbed971de53), Certificates should use allowed key types (/providers/microsoft.authorization/policydefinitions/1151cede-290b-4ba0-8b38-0ad145ac888f), Azure Key Vault should use RBAC permission model (/providers/microsoft.authorization/policydefinitions/12d4fa5e-1f9f-4c21-97a9-b99b3c6611b5), Certificates should have the specified lifetime action triggers (/providers/microsoft.authorization/policydefinitions/12ef42cb-9903-4e39-9c26-422d29570417), Key Vault keys should have an expiration date (/providers/microsoft.authorization/policydefinitions/152b15f7-8e1f-4c1f-ab71-8c010ba5dbc0), [Preview]: Azure Key Vault Managed HSM keys should have an expiration date (/providers/microsoft.authorization/policydefinitions/1d478a74-21ba-4b9f-9d8f-8e6fced0eec5), Key vaults should have soft delete enabled (/providers/microsoft.authorization/policydefinitions/1e66c121-a66a-4b1f-9b83-0fd99bf0fc2d), Secrets should have the specified maximum validity period (/providers/microsoft.authorization/policydefinitions/342e8053-e12e-4c44-be01-c3c2f318400f), Keys should have the specified maximum validity period (/providers/microsoft.authorization/policydefinitions/49a22571-d204-4c91-a7b6-09b1a586fbc9), Azure Key Vault should have firewall enabled or public network access disabled (/providers/microsoft.authorization/policydefinitions/55615ac9-af46-4a59-874e-391cc3dfb490), Keys should have more than the specified number of days before expiration (/providers/microsoft.authorization/policydefinitions/5ff38825-c5d8-47c5-b70e-069a21955146), Secrets should have content type set (/providers/microsoft.authorization/policydefinitions/75262d3e-ba4a-4f43-85f8-9f72c090e5e3), Keys should be the specified cryptographic type RSA or EC (/providers/microsoft.authorization/policydefinitions/75c4f823-d65c-4f29-a733-01d0077fdbcb), Keys using RSA cryptography should have a specified minimum key size (/providers/microsoft.authorization/policydefinitions/82067dbb-e53b-4e06-b631-546d197452d9), [Preview]: Azure Key Vault Managed HSM keys using RSA cryptography should have a specified minimum key size (/providers/microsoft.authorization/policydefinitions/86810a98-8e91-4a44-8386-ec66d0de5d57), Certificates should be issued by the specified integrated certificate authority (/providers/microsoft.authorization/policydefinitions/8e826246-c976-48f6-b03e-619bb92b3d82), Key Vault secrets should have an expiration date (/providers/microsoft.authorization/policydefinitions/98728c90-32c7-4049-8429-847dc0f4fe37), Certificates should be issued by the specified non-integrated certificate authority (/providers/microsoft.authorization/policydefinitions/a22f4a40-01d3-4c7d-8071-da157eeff341), [Preview]: Azure Key Vault Managed HSM Keys should have more than the specified number of days before expiration (/providers/microsoft.authorization/policydefinitions/ad27588c-0198-4c84-81ef-08efd0274653), Secrets should have more than the specified number of days before expiration (/providers/microsoft.authorization/policydefinitions/b0eb591a-5e70-4534-a8bf-04b9c489584a), Certificates using elliptic curve cryptography should have allowed curve names (/providers/microsoft.authorization/policydefinitions/bd78111f-4953-4367-9fd5-7e08808b54bf), Keys should not be active for longer than the specified number of days (/providers/microsoft.authorization/policydefinitions/c26e4b24-cf98-4c67-b48b-5a25c4c69eb9), Azure Key Vault Managed HSM should have purge protection enabled (/providers/microsoft.authorization/policydefinitions/c39ba22d-4428-4149-b981-70acb31fc383), Certificates using RSA cryptography should have the specified minimum key size (/providers/microsoft.authorization/policydefinitions/cee51871-e572-4576-855c-047c820360f0), [Preview]: Azure Key Vault Managed HSM keys using elliptic curve cryptography should have the specified curve names (/providers/microsoft.authorization/policydefinitions/e58fd0c1-feac-4d12-92db-0a7e9421f53e), Secrets should not be active for longer than the specified number of days (/providers/microsoft.authorization/policydefinitions/e8d99835-8a06-45ae-a8e0-87a91941ccfe), Certificates should not expire within the specified number of days (/providers/microsoft.authorization/policydefinitions/f772fb64-8e40-40ad-87bc-7706e1949427), Keys using elliptic curve cryptography should have the specified curve names (/providers/microsoft.authorization/policydefinitions/ff25f3c8-b739-4538-9d07-3d6d25cfb255)) 06/12/2025 11:18:49 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Enforce recommended guardrails for Bot Service Enforce-Guardrails-BotService /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-botservice Bot Service true 0 4 (Bot Service should have isolated mode enabled (/providers/microsoft.authorization/policydefinitions/52152f42-0dda-40d9-976e-abb1acdd611e), Bot Service endpoint should be a valid HTTPS URI (/providers/microsoft.authorization/policydefinitions/6164527b-e1ee-4882-8673-572f425f5e0a), BotService resources should use private link (/providers/microsoft.authorization/policydefinitions/ad5621d6-a877-4407-aa93-a950b428315e), Bot Service should have local authentication methods disabled (/providers/microsoft.authorization/policydefinitions/ffea632e-4e3a-4424-bf78-10e179bb2e1a)) 06/12/2025 11:18:46 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Enforce recommended guardrails for Cognitive Services Enforce-Guardrails-CognitiveServices /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-cognitiveservices Cognitive Services true 0 9 (Configure Cognitive Services accounts to disable local authentication methods (/providers/microsoft.authorization/policydefinitions/14de9e63-1b31-492e-a5a3-c3f7fd57f555), Cognitive Services accounts should use customer owned storage (/providers/microsoft.authorization/policydefinitions/46aa9b05-0e60-4eae-a88b-1e9d374fa515), Configure Cognitive Services accounts to disable public network access (/providers/microsoft.authorization/policydefinitions/47ba1dd7-28d9-4b07-a8d5-9813bed64e0c), Configure Azure AI Search services to disable local authentication (/providers/microsoft.authorization/policydefinitions/4eb216f2-9dba-4979-86e6-5d7e63ce3b75), Azure AI Search services should have local authentication methods disabled (/providers/microsoft.authorization/policydefinitions/6300012e-e9a4-4649-b41f-a85f5c43be91), Configure Azure AI Search services to disable public network access (/providers/microsoft.authorization/policydefinitions/9cee519f-d9c1-4fd9-9f79-24ec3449ed30), Azure AI Search service should use a SKU that supports private link (/providers/microsoft.authorization/policydefinitions/a049bf77-880b-470f-ba6d-9f21c530cf83), Resource logs in Search services should be enabled (/providers/microsoft.authorization/policydefinitions/b4330a05-a843-4bc8-bf9a-cacce50c67f4), Cognitive Services accounts should use a managed identity (/providers/microsoft.authorization/policydefinitions/fe3fd216-4f83-4fc1-8984-2bbec80a3418)) 06/12/2025 11:18:49 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Enforce recommended guardrails for Compute Enforce-Guardrails-Compute /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-compute Compute true 0 2 (Managed disks should be double encrypted with both platform-managed and customer-managed keys (/providers/microsoft.authorization/policydefinitions/ca91455f-eace-4f96-be59-e6e2c35b4816), Virtual machines and virtual machine scale sets should have encryption at host enabled (/providers/microsoft.authorization/policydefinitions/fc4d8e41-e223-45ea-9bf5-eada37891d87)) 06/12/2025 11:18:48 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Enforce recommended guardrails for Container Apps Enforce-Guardrails-ContainerApps /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-containerapps Container Apps true 0 2 (Container App environments should use network injection (/providers/microsoft.authorization/policydefinitions/8b346db6-85af-419b-8557-92cee2c0f9bb), Managed Identity should be enabled for Container Apps (/providers/microsoft.authorization/policydefinitions/b874ab2d-72dd-47f1-8cb5-4a306478a4e7)) 06/12/2025 11:18:48 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Enforce recommended guardrails for Container Instance Enforce-Guardrails-ContainerInstance /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-containerinstance Container Instances true 0 1 (Azure Container Instance container group should deploy into a virtual network (/providers/microsoft.authorization/policydefinitions/8af8f826-edcb-4178-b35f-851ea6fea615)) 06/12/2025 11:18:45 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Enforce recommended guardrails for Container Registry Enforce-Guardrails-ContainerRegistry /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-containerregistry Container Registry true 0 12 (Container registries should have ARM audience token authentication disabled. (/providers/microsoft.authorization/policydefinitions/42781ec6-6127-4c30-bdfa-fb423a0047d3), Container registries should have exports disabled (/providers/microsoft.authorization/policydefinitions/524b0254-c285-4903-bee6-bb8126cde579), Configure container registries to disable ARM audience token authentication. (/providers/microsoft.authorization/policydefinitions/785596ed-054f-41bc-aaec-7f3d0ba05725), Configure container registries to disable local admin account. (/providers/microsoft.authorization/policydefinitions/79fdfe03-ffcb-4e55-b4d0-b925b8241759), Container registries should have anonymous authentication disabled. (/providers/microsoft.authorization/policydefinitions/9f2dea28-e834-476c-99c5-3507b4728395), Configure Container registries to disable public network access (/providers/microsoft.authorization/policydefinitions/a3701552-92ea-433e-9d17-33b7f1208fc9), Configure container registries to disable repository scoped access token. (/providers/microsoft.authorization/policydefinitions/a9b426fe-8856-4945-8600-18c5dd1cca2a), Container registries should have SKUs that support Private Links (/providers/microsoft.authorization/policydefinitions/bd560fc0-3c69-498a-ae9f-aa8eb7de0e13), Configure container registries to disable anonymous authentication. (/providers/microsoft.authorization/policydefinitions/cced2946-b08a-44fe-9fd9-e4ed8a779897), Container registries should not allow unrestricted network access (/providers/microsoft.authorization/policydefinitions/d0793b48-0edc-4296-a390-4c75d1bdfd71), Container registries should have local admin account disabled. (/providers/microsoft.authorization/policydefinitions/dc921057-6b28-4fbe-9b83-f7bec05db6c2), Container registries should have repository scoped access token disabled. (/providers/microsoft.authorization/policydefinitions/ff05e24e-195c-447e-b322-5e90c9f9f366)) 06/12/2025 11:18:48 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Enforce recommended guardrails for Cosmos DB Enforce-Guardrails-CosmosDb /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-cosmosdb Cosmos DB true 0 6 (Azure Cosmos DB key based metadata write access should be disabled (/providers/microsoft.authorization/policydefinitions/4750c32b-89c0-46af-bfcb-2e4541a818d5), Cosmos DB database accounts should have local authentication methods disabled (/providers/microsoft.authorization/policydefinitions/5450f5bd-9c72-4390-a9c4-a7aba4edfdd2), Azure Cosmos DB accounts should have firewall rules (/providers/microsoft.authorization/policydefinitions/862e97cf-49fc-4a5c-9de4-40d4e2e7c8eb), Deploy Advanced Threat Protection for Cosmos DB Accounts (/providers/microsoft.authorization/policydefinitions/b5f04e03-92a3-4b09-9410-2cc5e5047656), Configure CosmosDB accounts to disable public network access (/providers/microsoft.authorization/policydefinitions/da69ba51-aaf1-41e5-8651-607cd0b37088), Configure Cosmos DB database accounts to disable local authentication (/providers/microsoft.authorization/policydefinitions/dc2d41d1-4ab1-4666-a3e1-3d51c43e0049)) 06/12/2025 11:18:46 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Enforce recommended guardrails for Data Explorer Enforce-Guardrails-DataExplorer /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-dataexplorer Azure Data Explorer true 0 4 (Azure Data Explorer should use a SKU that supports private link (/providers/microsoft.authorization/policydefinitions/1fec9658-933f-4b3e-bc95-913ed22d012b), Configure Azure Data Explorer to disable public network access (/providers/microsoft.authorization/policydefinitions/7b32f193-cb28-4e15-9a98-b9556db0bafa), Double encryption should be enabled on Azure Data Explorer (/providers/microsoft.authorization/policydefinitions/ec068d99-e9c7-401f-8cef-5bdde4e6ccf1), Disk encryption should be enabled on Azure Data Explorer (/providers/microsoft.authorization/policydefinitions/f4b53539-8df9-40e4-86c6-6b607703bd4e)) 06/12/2025 11:18:45 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Enforce recommended guardrails for Data Factory Enforce-Guardrails-DataFactory /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-datafactory Data Factory true 0 5 (SQL Server Integration Services integration runtimes on Azure Data Factory should be joined to a virtual network (/providers/microsoft.authorization/policydefinitions/0088bc63-6dee-4a9c-9d29-91cfdc848952), Configure Data Factories to disable public network access (/providers/microsoft.authorization/policydefinitions/08b1442b-7789-4130-8506-4f99a97226a7), Azure Data Factory linked services should use Key Vault for storing secrets (/providers/microsoft.authorization/policydefinitions/127ef6d7-242f-43b3-9eef-947faf1725d0), Azure Data Factory should use a Git repository for source control (/providers/microsoft.authorization/policydefinitions/77d40665-3120-4348-b539-3192ec808307), Azure Data Factory linked services should use system-assigned managed identity authentication when it is supported (/providers/microsoft.authorization/policydefinitions/f78ccdb4-7bf4-4106-8647-270491d2978a)) 06/12/2025 11:18:49 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Enforce recommended guardrails for Event Grid Enforce-Guardrails-EventGrid /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-eventgrid Event Grid true 0 8 (Configure Azure Event Grid topics to disable local authentication (/providers/microsoft.authorization/policydefinitions/1c8144d9-746a-4501-b08c-093c8d29ad04), Configure Azure Event Grid partner namespaces to disable local authentication (/providers/microsoft.authorization/policydefinitions/2dd0e8b9-4289-4bb0-b813-1883298e9924), Modify - Configure Azure Event Grid topics to disable public network access (/providers/microsoft.authorization/policydefinitions/36ea4b4b-0f7f-4a54-89fa-ab18f555a172), Azure Event Grid partner namespaces should have local authentication methods disabled (/providers/microsoft.authorization/policydefinitions/8632b003-3545-4b29-85e6-b2b96773df1e), Modify - Configure Azure Event Grid domains to disable public network access (/providers/microsoft.authorization/policydefinitions/898e9824-104c-4965-8e0e-5197588fa5d4), Configure Azure Event Grid domains to disable local authentication (/providers/microsoft.authorization/policydefinitions/8ac2748f-3bf1-4c02-a3b6-92ae68cf75b1), Azure Event Grid domains should have local authentication methods disabled (/providers/microsoft.authorization/policydefinitions/8bfadddb-ee1c-4639-8911-a38cb8e0b3bd), Azure Event Grid topics should have local authentication methods disabled (/providers/microsoft.authorization/policydefinitions/ae9fb87f-8a17-4428-94a4-8135d431055c)) 06/12/2025 11:18:48 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Enforce recommended guardrails for Event Hub Enforce-Guardrails-EventHub /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-eventhub Event Hub true 0 4 (Configure Azure Event Hub namespaces to disable local authentication (/providers/microsoft.authorization/policydefinitions/57f35901-8389-40bb-ac49-3ba4f86d889d), Azure Event Hub namespaces should have local authentication methods disabled (/providers/microsoft.authorization/policydefinitions/5d4e3c65-4873-47be-94f3-6f8b953a3598), Event Hub namespaces should have double encryption enabled (/providers/microsoft.authorization/policydefinitions/836cd60e-87f3-4e6a-a27c-29d687f01a4c), All authorization rules except RootManageSharedAccessKey should be removed from Event Hub namespace (/providers/microsoft.authorization/policydefinitions/b278e460-7cfc-4451-8294-cccc40a940d7)) 06/12/2025 11:18:46 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Enforce recommended guardrails for Kubernetes Enforce-Guardrails-Kubernetes /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-kubernetes Kubernetes true 0 16 (Azure Kubernetes Service Private Clusters should be enabled (/providers/microsoft.authorization/policydefinitions/040732e8-d947-40b8-95d6-854c95024bf8), Disable Command Invoke on Azure Kubernetes Service clusters (/providers/microsoft.authorization/policydefinitions/1b708b0a-3380-40e9-8b79-821f9fa224cc), Kubernetes clusters should not allow container privilege escalation (/providers/microsoft.authorization/policydefinitions/1c6e92c9-99f0-4e55-9cf2-0c234dc48f99), Kubernetes clusters should use internal load balancers (/providers/microsoft.authorization/policydefinitions/3fc4dc25-5baf-40d8-9b05-7fe74c1bc64e), Temp disks and cache for agent node pools in Azure Kubernetes Service clusters should be encrypted at host (/providers/microsoft.authorization/policydefinitions/41425d9f-d1a5-499a-9932-f8ed8453932c), Azure Kubernetes Clusters should use Azure CNI (/providers/microsoft.authorization/policydefinitions/46238e2f-3f6f-4589-9f3f-77bed4116e67), Kubernetes cluster containers should not share host namespaces (/providers/microsoft.authorization/policydefinitions/47a1ee2f-2a2a-4576-bf2a-e0e36709c2b8), Kubernetes cluster Windows containers should not run as ContainerAdministrator (/providers/microsoft.authorization/policydefinitions/5485eac0-7e8f-4964-998b-a44f4f0c1e75), Kubernetes cluster should not use naked pods (/providers/microsoft.authorization/policydefinitions/65280eef-c8b4-425e-9aec-af55e55bf581), Kubernetes cluster should not allow privileged containers (/providers/microsoft.authorization/policydefinitions/95edb821-ddaf-4404-9732-666045e056b4), Azure Kubernetes Service Clusters should have local authentication methods disabled (/providers/microsoft.authorization/policydefinitions/993c2fcd-2b29-49d2-9eb0-df2c3a730c32), Kubernetes clusters should not use the default namespace (/providers/microsoft.authorization/policydefinitions/9f061a12-e40d-4183-a00e-171812443373), Deploy Azure Policy Add-on to Azure Kubernetes Service clusters (/providers/microsoft.authorization/policydefinitions/a8eff44f-8c92-45c3-a3fb-9880802d67a7), Ensure cluster containers have readiness or liveness probes configured (/providers/microsoft.authorization/policydefinitions/b1a9997f-2883-4f12-bdff-2280f99b5915), Kubernetes cluster containers should only use allowed capabilities (/providers/microsoft.authorization/policydefinitions/c26596ff-4d70-4e6a-9a30-c2506bd2f80c), Azure Kubernetes Clusters should enable Key Management Service (KMS) (/providers/microsoft.authorization/policydefinitions/dbbdc317-9734-4dd8-9074-993b29c69008)) 06/12/2025 11:18:46 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Enforce recommended guardrails for Machine Learning Enforce-Guardrails-MachineLearning /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-machinelearning Machine Learning true 0 14 ([Preview]: Azure Machine Learning Model Registry Deployments are restricted except for the allowed Registry (/providers/microsoft.authorization/policydefinitions/19539b54-c61e-4196-9a38-67598701be90), Azure Machine Learning workspaces should use private link (/providers/microsoft.authorization/policydefinitions/45e05259-1eb5-4f70-9574-baf73e9d219b), [Preview]: Configure allowed module authors for specified Azure Machine Learning computes (/providers/microsoft.authorization/policydefinitions/53c70b02-63dd-11ea-bc55-0242ac130003), [Preview]: Configure allowed registries for specified Azure Machine Learning computes (/providers/microsoft.authorization/policydefinitions/5853517a-63de-11ea-bc55-0242ac130003), Azure Machine Learning workspaces should use user-assigned managed identity (/providers/microsoft.authorization/policydefinitions/5f0c7d88-c7de-45b8-ac49-db49e72eaa78), Azure Machine Learning Compute Instance should have idle shutdown. (/providers/microsoft.authorization/policydefinitions/679ddf89-ab8f-48a5-9029-e76054077449), [Preview]: Configure allowed Python packages for specified Azure Machine Learning computes (/providers/microsoft.authorization/policydefinitions/77eeea86-7e81-4a7d-9067-de844d096752), Azure Machine Learning Computes should be in a virtual network (/providers/microsoft.authorization/policydefinitions/7804b5c7-01dc-4723-969b-ae300cc07ff1), Configure Azure Machine Learning Workspaces to disable public network access (/providers/microsoft.authorization/policydefinitions/a10ee784-7409-4941-b091-663697637c0f), Configure Azure Machine Learning Computes to disable local authentication methods (/providers/microsoft.authorization/policydefinitions/a6f9a2d0-cff7-4855-83ad-4cd750666512), Resource logs in Azure Machine Learning Workspaces should be enabled (/providers/microsoft.authorization/policydefinitions/afe0c3be-ba3b-4544-ba52-0c99672a8ad6), Azure Machine Learning workspaces should enable V1LegacyMode to support network isolation backward compatibility (/providers/microsoft.authorization/policydefinitions/e413671a-dd10-4cc1-a943-45b598596cb7), Azure Machine Learning Computes should have local authentication methods disabled (/providers/microsoft.authorization/policydefinitions/e96a9a5f-07ca-471b-9bc5-6a0f33cbd68f), Azure Machine Learning compute instances should be recreated to get the latest software updates (/providers/microsoft.authorization/policydefinitions/f110a506-2dcb-422e-bcea-d533fc8c35e2)) 06/12/2025 11:18:48 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Enforce recommended guardrails for MySQL Enforce-Guardrails-MySQL /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-mysql MySQL true 0 2 (Infrastructure encryption should be enabled for Azure Database for MySQL servers (/providers/microsoft.authorization/policydefinitions/3a58212a-c829-4f13-9872-6371df2fd0b4), Configure Advanced Threat Protection to be enabled on Azure database for MySQL servers (/providers/microsoft.authorization/policydefinitions/80ed5239-4122-41ed-b54a-6f1fa7552816)) 06/12/2025 11:18:45 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Enforce recommended guardrails for Network and Networking services Enforce-Guardrails-Network /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-network Network true 0 22 (Azure Web Application Firewall should be enabled for Azure Front Door entry-points (/providers/microsoft.authorization/policydefinitions/055aa869-bc98-4af8-bafc-23f1ab6ffe2c), Web Application Firewall (WAF) should use the specified mode for Application Gateway (/providers/microsoft.authorization/policydefinitions/12430be1-6cc8-4527-a9a8-e3d38f250096), VPN gateways should use only Azure Active Directory (Azure AD) authentication for point-to-site users (/providers/microsoft.authorization/policydefinitions/21a6bc25-125e-4d13-b82d-2e19b7208ab7), Gateway subnets should not be configured with a network security group (/providers/microsoft.authorization/policydefinitions/35f9c03a-cc27-418e-9c0c-539ff999d010), Web Application Firewall (WAF) should use the specified mode for Azure Front Door Service (/providers/microsoft.authorization/policydefinitions/425bea59-a659-4cbb-8d31-34499bd030b8), Web Application Firewall (WAF) should be enabled for Application Gateway (/providers/microsoft.authorization/policydefinitions/564feb30-bf6a-4854-b4bb-0d2d2d1e6c66), [Deprecated]: Firewall Policy Premium should enable all IDPS signature rules to monitor all inbound and outbound traffic flows (/providers/microsoft.authorization/policydefinitions/610b6183-5f00-4d68-86d2-4ab4cb3a67a5), [Deprecated]: Web Application Firewall (WAF) should enable all firewall rules for Application Gateway (/providers/microsoft.authorization/policydefinitions/632d3993-e2c0-44ea-a7db-2eca131f356d), [Deprecated]: Firewall Policy Premium should enable the Intrusion Detection and Prevention System (IDPS) (/providers/microsoft.authorization/policydefinitions/6484db87-a62d-4327-9f07-80a2cbdf333a), [Deprecated]: Azure Firewall Premium should configure a valid intermediate certificate to enable TLS inspection (/providers/microsoft.authorization/policydefinitions/711c24bb-7f18-4578-b192-81a6161e1f17), Network interfaces should not have public IPs (/providers/microsoft.authorization/policydefinitions/83a86a26-fd1f-447c-b59d-e51f44264114), Network interfaces should disable IP forwarding (/providers/microsoft.authorization/policydefinitions/88c0b9da-ce96-4b03-9635-f29a937e2900), Virtual networks should be protected by Azure DDoS Protection (/providers/microsoft.authorization/policydefinitions/94de2ad3-e0c1-4caf-ad78-5d47bbc83d3d), [Deprecated]: Azure firewall policy should enable TLS inspection within application rules (/providers/microsoft.authorization/policydefinitions/a58ac66d-92cb-409c-94b8-8e48d7a96596), [Deprecated]: Bypass list of Intrusion Detection and Prevention System (IDPS) should be empty in Firewall Policy Premium (/providers/microsoft.authorization/policydefinitions/f516dc7a-4543-4d40-aad6-98f76a706b50), Application Gateway should be deployed with predefined Microsoft policy that is using TLS version 1.2 (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-appgw-without-tls), Deny or Audit service endpoints on subnets (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-service-endpoints), Enforce specific configuration of Network Security Groups (NSG) (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/modify-nsg), Enforce specific configuration of User-Defined Routes (UDR) (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/modify-udr), Management port access from the Internet should be blocked (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-mgmtports-from-internet), Subnets should have a Network Security Group (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-subnet-without-nsg), Subnets should have a User Defined Route (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-subnet-without-udr)) 06/12/2025 11:18:47 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Enforce recommended guardrails for Open AI (Cognitive Service) Enforce-Guardrails-OpenAI /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-openai Cognitive Services true 0 11 (Azure AI Services resources should restrict network access (/providers/microsoft.authorization/policydefinitions/037eea7a-bd0a-46c5-9a66-03aea78705d3), Configure Cognitive Services accounts to disable local authentication methods (/providers/microsoft.authorization/policydefinitions/14de9e63-1b31-492e-a5a3-c3f7fd57f555), Diagnostic logs in Azure AI services resources should be enabled (/providers/microsoft.authorization/policydefinitions/1b4d1c4e-934c-4703-944c-27c82c06bebb), Cognitive Services accounts should use customer owned storage (/providers/microsoft.authorization/policydefinitions/46aa9b05-0e60-4eae-a88b-1e9d374fa515), Configure Azure AI Services resources to disable local key access (disable local authentication) (/providers/microsoft.authorization/policydefinitions/55eff01b-f2bd-4c32-9203-db285f709d30), Azure AI Services resources should have key access disabled (disable local authentication) (/providers/microsoft.authorization/policydefinitions/71ef260a-8f18-47b7-abcb-62d0673d94dc), Configure Azure AI Services resources to disable local key access (disable local authentication) (/providers/microsoft.authorization/policydefinitions/d45520cb-31ca-44ba-8da2-fcf914608544), Azure AI Services resources should use Azure Private Link (/providers/microsoft.authorization/policydefinitions/d6759c02-b87f-42b7-892e-71b3f471d782), Cognitive Services accounts should use a managed identity (/providers/microsoft.authorization/policydefinitions/fe3fd216-4f83-4fc1-8984-2bbec80a3418), Network ACLs should be restricted for Cognitive Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-cognitiveservices-networkacls), Outbound network access should be restricted for Cognitive Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-cognitiveservices-restrictoutboundnetworkaccess)) 06/12/2025 11:18:46 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Enforce recommended guardrails for PostgreSQL Enforce-Guardrails-PostgreSQL /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-postgresql PostgreSQL true 0 1 (Configure Advanced Threat Protection to be enabled on Azure database for PostgreSQL servers (/providers/microsoft.authorization/policydefinitions/db048e65-913c-49f9-bb5f-1084184671d3)) 06/12/2025 11:18:45 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Enforce recommended guardrails for Service Bus Enforce-Guardrails-ServiceBus /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-servicebus Service Bus true 0 4 (Configure Azure Service Bus namespaces to disable local authentication (/providers/microsoft.authorization/policydefinitions/910711a6-8aa2-4f15-ae62-1e5b2ed3ef9e), All authorization rules except RootManageSharedAccessKey should be removed from Service Bus namespace (/providers/microsoft.authorization/policydefinitions/a1817ec0-a368-432a-8057-8371e17ac6ee), Azure Service Bus namespaces should have local authentication methods disabled (/providers/microsoft.authorization/policydefinitions/cfb11c26-f069-4c14-8e36-56c394dae5af), Service Bus namespaces should have double encryption enabled (/providers/microsoft.authorization/policydefinitions/ebaf4f25-a4e8-415f-86a8-42d9155bef0b)) 06/12/2025 11:18:47 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Enforce recommended guardrails for SQL and SQL Managed Instance Enforce-Guardrails-SQL /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-sql SQL true 0 5 (Configure Azure SQL Server to disable public network access (/providers/microsoft.authorization/policydefinitions/28b0b1e5-17ba-4963-a7a4-5a1ab4400a0b), Deploy Advanced Data Security on SQL servers (/providers/microsoft.authorization/policydefinitions/6134c3db-786f-471e-87bc-8f479dc890f6), Azure SQL Managed Instances should have Microsoft Entra-only authentication enabled during creation (/providers/microsoft.authorization/policydefinitions/78215662-041e-49ed-a9dd-5385911b3a1f), Azure SQL Database should have Microsoft Entra-only authentication enabled during creation (/providers/microsoft.authorization/policydefinitions/abda6d70-9778-44e7-84a8-06713e6db027), Configure Azure Defender to be enabled on SQL managed instances (/providers/microsoft.authorization/policydefinitions/c5a62eb0-c65a-4220-8a4d-f70dd4ca95dd)) 06/12/2025 11:18:48 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Enforce recommended guardrails for Storage Account Enforce-Guardrails-Storage /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-storage Storage true 0 22 (Storage account keys should not be expired (/providers/microsoft.authorization/policydefinitions/044985bb-afe1-42cd-8a36-9d5d42424537), Modify - Configure Azure File Sync to disable public network access (/providers/microsoft.authorization/policydefinitions/0e07b2e9-6cd9-4c40-9ccb-52817b95133b), Configure your Storage account public access to be disallowed (/providers/microsoft.authorization/policydefinitions/13502221-8df0-4414-9937-de9c5c4e396b), Storage accounts should restrict network access using virtual network rules (/providers/microsoft.authorization/policydefinitions/2a1a9cdf-e04d-429a-8416-3bfb72a1b26f), Storage accounts should restrict network access (/providers/microsoft.authorization/policydefinitions/34c877ad-507e-4c82-993e-3452a6e0ad3c), [Deprecated]: Deploy Defender for Storage (Classic) on storage accounts (/providers/microsoft.authorization/policydefinitions/361c2074-3595-4e5d-8cab-4f21dffc835c), Storage accounts should be migrated to new Azure Resource Manager resources (/providers/microsoft.authorization/policydefinitions/37e0d2fe-28a5-43d6-a273-67d37d1f5606), Storage accounts should have infrastructure encryption (/providers/microsoft.authorization/policydefinitions/4733ea7b-a883-42fe-8cac-97454c2a9e4a), Storage accounts should prevent shared key access (/providers/microsoft.authorization/policydefinitions/8c6a50c6-9ffd-4ae7-986f-5fa6111f9a54), Storage accounts should prevent cross tenant object replication (/providers/microsoft.authorization/policydefinitions/92a89a79-6c52-4a7e-a03f-61306fc49312), Configure storage accounts to disable public network access (/providers/microsoft.authorization/policydefinitions/a06d0189-92e8-4dba-b0c4-08d7669fce7d), Storage account encryption scopes should use double encryption for data at rest (/providers/microsoft.authorization/policydefinitions/bfecdea6-31c4-4045-ad42-71b9dc87247d), Allowed Copy scope should be restricted for Storage Accounts (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-storage-copyscope), Encryption for storage services should be enforced for Storage Accounts (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-storage-servicesencryption), Local users should be restricted for Storage Accounts (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-storage-localuser), Network ACL bypass option should be restricted for Storage Accounts (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-storage-networkaclsbypass), Resource Access Rules resource IDs should be restricted for Storage Accounts (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-storage-resourceaccessrulesresourceid), Resource Access Rules Tenants should be restricted for Storage Accounts (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-storage-resourceaccessrulestenantid), Storage Accounts should restrict CORS rules (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-storage-corsrules), Storage Accounts should use a container delete retention policy (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-storage-containerdeleteretentionpolicy), Storage Accounts with SFTP enabled should be denied (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-storage-sftp), Virtual network rules should be restricted for Storage Accounts (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-storage-networkaclsvirtualnetworkrules)) 06/12/2025 11:18:49 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Enforce recommended guardrails for Synapse workspaces Enforce-Guardrails-Synapse /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-synapse Synapse true 0 9 (Synapse Workspaces should use only Microsoft Entra identities for authentication during workspace creation (/providers/microsoft.authorization/policydefinitions/2158ddbe-fefa-408e-b43f-d4faef8ff3b8), Managed workspace virtual network on Azure Synapse workspaces should be enabled (/providers/microsoft.authorization/policydefinitions/2d9dbfa3-927b-4cf0-9d0f-08747f971650), Azure Synapse workspaces should allow outbound data traffic only to approved targets (/providers/microsoft.authorization/policydefinitions/3484ce98-c0c5-4c83-994b-c5ac24785218), Synapse managed private endpoints should only connect to resources in approved Azure Active Directory tenants (/providers/microsoft.authorization/policydefinitions/3a003702-13d2-4679-941b-937e58c443f0), IP firewall rules on Azure Synapse workspaces should be removed (/providers/microsoft.authorization/policydefinitions/56fd377d-098c-4f02-8406-81eb055902b8), Configure Azure Synapse workspaces to disable public network access (/providers/microsoft.authorization/policydefinitions/5c8cad01-ef30-4891-b230-652dadb4876a), Configure Azure Synapse Workspace Dedicated SQL minimum TLS version (/providers/microsoft.authorization/policydefinitions/8b5c654c-fb07-471b-aa8f-15fea733f140), Configure Microsoft Defender for SQL to be enabled on Synapse workspaces (/providers/microsoft.authorization/policydefinitions/951c1558-50a5-4ca3-abb6-a93e3e2367a6), Configure Synapse Workspaces to use only Microsoft Entra identities for authentication during workspace creation (/providers/microsoft.authorization/policydefinitions/c3624673-d2ff-48e0-b28c-5de1c6767c3c)) 06/12/2025 11:18:49 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Enforce recommended guardrails for Virtual Desktop Enforce-Guardrails-VirtualDesktop /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-virtualdesktop Desktop Virtualization true 0 2 (Configure Azure Virtual Desktop hostpools to disable public network access (/providers/microsoft.authorization/policydefinitions/2a0913ff-51e7-47b8-97bb-ea17127f7c8d), Configure Azure Virtual Desktop workspaces to disable public network access (/providers/microsoft.authorization/policydefinitions/ce6ebf1d-0b94-4df9-9257-d8cacc238b4f)) 06/12/2025 11:18:46 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Public network access should be disabled for PaaS services Deny-PublicPaaSEndpoints /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deny-publicpaasendpoints Network true 1 (/providers/microsoft.management/managementgroups/mibelle-landingzones-corp-mg/providers/microsoft.authorization/policyassignments/deny-public-endpoints) 45 (Azure AI Services resources should restrict network access (/providers/microsoft.authorization/policydefinitions/037eea7a-bd0a-46c5-9a66-03aea78705d3), Azure Kubernetes Service Private Clusters should be enabled (/providers/microsoft.authorization/policydefinitions/040732e8-d947-40b8-95d6-854c95024bf8), Event Hub Namespaces should disable public network access (/providers/microsoft.authorization/policydefinitions/0602787f-9896-402a-a6e1-39ee63ee435e), [Deprecated]: Cognitive Services accounts should disable public network access (/providers/microsoft.authorization/policydefinitions/0725b4dd-7e76-479c-a735-68e7ee23d5ca), Public network access should be disabled for Container registries (/providers/microsoft.authorization/policydefinitions/0fdf0491-d080-4575-b627-ad0e843cba0f), Function app slots should disable public network access (/providers/microsoft.authorization/policydefinitions/11c82d0c-db9f-4d7b-97c5-f3f9aa957da2), [Preview]: Azure Key Vault Managed HSM should disable public network access (/providers/microsoft.authorization/policydefinitions/19ea9d63-adee-4431-a95e-1913c6c1c75f), Azure Event Grid topics should disable public network access (/providers/microsoft.authorization/policydefinitions/1adadefe-5f21-44f7-b931-a59b54ccdb45), App Service apps should disable public network access (/providers/microsoft.authorization/policydefinitions/1b5ef780-c53c-4a64-87f3-bb9c8c8094ba), Public network access on Azure SQL Database should be disabled (/providers/microsoft.authorization/policydefinitions/1b8ca024-1d5c-4dec-8995-b1a932b41780), Public network access on Azure Data Factory should be disabled (/providers/microsoft.authorization/policydefinitions/1cf164be-6819-4a50-b8fa-4bcaa4f98fb6), Public network access should be disabled for Azure File Sync (/providers/microsoft.authorization/policydefinitions/21a8cd35-125e-4d13-b82d-2e19b7208bb7), App Service Environment apps should not be reachable over public internet (/providers/microsoft.authorization/policydefinitions/2d048aca-6479-4923-88f5-e2ac295d9af3), Azure Synapse workspaces should disable public network access (/providers/microsoft.authorization/policydefinitions/38d8df46-cf4e-4073-8e03-48c24b29de0d), App Configuration should disable public network access (/providers/microsoft.authorization/policydefinitions/3d9f5e4c-9947-4579-9539-2a7695fbc187), Azure Key Vault should disable public network access (/providers/microsoft.authorization/policydefinitions/405c5871-3e91-4644-8a63-58e19d68ff5b), Azure Machine Learning Workspaces should disable public network access (/providers/microsoft.authorization/policydefinitions/438c38d2-3772-465a-a9cc-7a6666a275ce), Public network access on Azure Data Explorer should be disabled (/providers/microsoft.authorization/policydefinitions/43bc7be6-5e69-4b0d-a2bb-e815557ca673), Azure Cache for Redis should disable public network access (/providers/microsoft.authorization/policydefinitions/470baccb-7e51-4549-8b1a-3e5be069f663), Storage account public access should be disallowed (/providers/microsoft.authorization/policydefinitions/4fa4b6c0-31ca-4c0d-b10d-24b96f62a751), Public network access should be disabled for PostgreSQL flexible servers (/providers/microsoft.authorization/policydefinitions/5e1de0e3-42cb-4ebc-a86d-61d0c619ca48), Bot Service should have public network access disabled (/providers/microsoft.authorization/policydefinitions/5e8168db-69e3-4beb-9822-57cb59202a9d), App Service app slots should disable public network access (/providers/microsoft.authorization/policydefinitions/701a595d-38fb-4a66-ae6d-fb3735217622), Public network access should be disabled for Batch accounts (/providers/microsoft.authorization/policydefinitions/74c5a0ae-5e48-4738-b093-65e23a060488), Container Apps should disable external network access (/providers/microsoft.authorization/policydefinitions/783ea2a8-b8fd-46be-896a-9ae79643a0b1), Azure Cosmos DB should disable public network access (/providers/microsoft.authorization/policydefinitions/797b37f7-06b8-444c-b1ad-fc62867f335a), Managed disks should disable public network access (/providers/microsoft.authorization/policydefinitions/8405fdab-1faf-48aa-b702-999c9c172094), Azure Virtual Desktop workspaces should disable public network access (/providers/microsoft.authorization/policydefinitions/87ac3038-c07a-4b92-860d-29e270a4f3cd), Automation accounts should disable public network access (/providers/microsoft.authorization/policydefinitions/955a914f-bf86-4f0e-acd5-e0766b0efcb6), Function apps should disable public network access (/providers/microsoft.authorization/policydefinitions/969ac98b-88a8-449f-883c-2e9adb123127), Azure SQL Managed Instances should disable public network access (/providers/microsoft.authorization/policydefinitions/9dfea752-dd46-4766-aed1-c355fa93fb91), [Preview]: Azure Recovery Services vaults should disable public network access (/providers/microsoft.authorization/policydefinitions/9ebbbba3-4d65-4da9-bb67-b22cfaaff090), Storage accounts should disable public network access (/providers/microsoft.authorization/policydefinitions/b2982f36-99f2-4db5-8eff-283140c09693), Public network access should be disabled for PostgreSQL servers (/providers/microsoft.authorization/policydefinitions/b52376f7-9612-48a1-81cd-1ffe4b61032c), Azure Virtual Desktop hostpools should disable public network access (/providers/microsoft.authorization/policydefinitions/c25dcf31-878f-4eba-98eb-0818fdc6a334), Public network access should be disabled for MySQL flexible servers (/providers/microsoft.authorization/policydefinitions/c9299215-ae47-4f50-9c54-8a392f68a052), Service Bus Namespaces should disable public network access (/providers/microsoft.authorization/policydefinitions/cbd11fd3-3002-4907-b6c8-579f0e700e13), Container Apps environment should disable public network access (/providers/microsoft.authorization/policydefinitions/d074ddf8-01a5-4b5e-a2b8-964aed452c0a), Public network access should be disabled for MySQL servers (/providers/microsoft.authorization/policydefinitions/d9844e8a-1437-4aeb-a32c-0c992f056095), API Management should disable public network access to the service configuration endpoints (/providers/microsoft.authorization/policydefinitions/df73bd95-24da-4a4f-96b9-4e8b94b402bd), Azure Managed Grafana workspaces should disable public network access (/providers/microsoft.authorization/policydefinitions/e8775d5a-73b7-4977-a39b-833ef0114628), Azure AI Search services should disable public network access (/providers/microsoft.authorization/policydefinitions/ee980b6d-0eca-4501-8d54-f6290fd512c3), Azure Event Grid domains should disable public network access (/providers/microsoft.authorization/policydefinitions/f8f774be-6aee-492a-9e29-486ef81f3a68), Public network access should be disabled for MariaDB servers (/providers/microsoft.authorization/policydefinitions/fdccbe47-f3e3-4213-ad5d-ea459b2fa077), Logic apps should disable public network access (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-logicapp-public-network)) 06/12/2025 11:18:48 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg Unused resources driving cost should be avoided Audit-UnusedResourcesCostOptimization /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/audit-unusedresourcescostoptimization Cost Optimization true 1 (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-unusedresources) 4 (Audit AHUB for eligible VMs (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/audit-azurehybridbenefit), Unused App Service plans driving cost should be avoided (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/audit-serverfarms-unusedresourcescostoptimization), Unused Disks driving cost should be avoided (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/audit-disks-unusedresourcescostoptimization), Unused Public IP addresses driving cost should be avoided (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/audit-publicipaddresses-unusedresourcescostoptimization)) 06/12/2025 11:18:48 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Download CSV semicolon | comma
PolicySet DisplayName PolicySetId
DenyAction Delete - Activity Log Settings and Diagnostic Settings /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/denyaction-deleteprotection
[Deprecated]: Deploy Diagnostic Settings to Azure Services /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics
[Deprecated]: Deploy Microsoft Defender for Cloud configuration /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-mdfc-config
Deploy Microsoft Defender for Cloud configuration /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-mdfc-config_20240319
[Deprecated]: Configure SQL VM and Arc-enabled SQL Servers to install Microsoft Defender for SQL and AMA with a user-defined LAW /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-mdfc-defendersql-ama
Configure Azure PaaS services to use private DNS zones /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-private-dns-zones
[Deprecated]: Deploy SQL Database built-in SQL security configuration /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-sql-security
Deploy SQL Database built-in SQL security configuration /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-sql-security_20240529
Enforce enhanced recovery and backup policies /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-backup
[Deprecated]: Deny or Audit resources without Encryption with a customer-managed key (CMK) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encryption-cmk
Deny or Audit resources without Encryption with a customer-managed key (CMK) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encryption-cmk_20250218
[Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit
[Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20240509
Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20241211
Enforce recommended guardrails for API Management /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-apim
Enforce recommended guardrails for App Service /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-appservices
Enforce recommended guardrails for Automation Account /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-automation
Enforce recommended guardrails for Bot Service /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-botservice
Enforce recommended guardrails for Cognitive Services /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-cognitiveservices
Enforce recommended guardrails for Compute /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-compute
Enforce recommended guardrails for Container Apps /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-containerapps
Enforce recommended guardrails for Container Instance /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-containerinstance
Enforce recommended guardrails for Container Registry /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-containerregistry
Enforce recommended guardrails for Cosmos DB /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-cosmosdb
Enforce recommended guardrails for Data Explorer /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-dataexplorer
Enforce recommended guardrails for Data Factory /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-datafactory
Enforce recommended guardrails for Event Grid /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-eventgrid
Enforce recommended guardrails for Event Hub /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-eventhub
Enforce additional recommended guardrails for Key Vault /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-keyvault-sup
Enforce recommended guardrails for Kubernetes /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-kubernetes
Enforce recommended guardrails for Machine Learning /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-machinelearning
Enforce recommended guardrails for MySQL /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-mysql
Enforce recommended guardrails for Network and Networking services /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-network
Enforce recommended guardrails for Open AI (Cognitive Service) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-openai
Enforce recommended guardrails for PostgreSQL /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-postgresql
Enforce recommended guardrails for Service Bus /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-servicebus
Enforce recommended guardrails for SQL and SQL Managed Instance /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-sql
Enforce recommended guardrails for Storage Account /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-storage
Enforce recommended guardrails for Synapse workspaces /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-synapse
Enforce recommended guardrails for Virtual Desktop /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-virtualdesktop
Download CSV semicolon | comma
Policy Name Policy DisplayName Policy Category Policy Id # match built-in Built-In Policy
Deny-AppServiceApiApp-http API App should only be accessible over HTTPS App Service /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-appserviceapiapp-http 1 [Deprecated]: API App should only be accessible over HTTPS (b7ddfbdc-1260-477d-91fd-98bd9be789a6)
Deny-AzFw-Without-Policy Azure Firewall should have a default Firewall Policy Network /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-azfw-without-policy 1 Azure Firewall Classic Rules should be migrated to Firewall Policy (794d77cc-fe65-4801-8514-230c0be387a8)
Deny-MachineLearning-Compute-SubnetId Enforce subnet connectivity for Azure Machine Learning compute clusters and compute instances Machine Learning /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-machinelearning-compute-subnetid 1 Azure Machine Learning Computes should be in a virtual network (7804b5c7-01dc-4723-969b-ae300cc07ff1)
Deny-RDP-From-Internet [Deprecated] RDP access from the Internet should be blocked Network /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-rdp-from-internet 1 [Deprecated]: RDP access from the Internet should be blocked (e372f825-a257-4fb8-9175-797a8a8627d6)
Azure Landing Zones (ALZ) GitHub
Download CSV semicolon | comma
ALZ Management Group Management Group exists / provided Missing ALZ Policy Assignments AzAdvertizer Link ALZ Library release ALZ release
corp : mibelle-landingzones-corp-mg Audit-PeDnsZones payload Link Audit-PeDnsZones AzA Link platform/alz/2025.09.3 N/A
corp : mibelle-landingzones-corp-mg Deploy-Private-DNS-Zones payload Link Deploy-Private-DNS-Zones AzA Link platform/alz/2025.09.3 N/A
landing_zones : mibelle-landingzones-mg Deny-Priv-Esc-AKS payload Link Deny-Priv-Esc-AKS AzA Link platform/alz/2025.09.3 N/A
landing_zones : mibelle-landingzones-mg Deny-Privileged-AKS payload Link Deny-Privileged-AKS AzA Link platform/alz/2025.09.3 N/A
landing_zones : mibelle-landingzones-mg Deny-Subnet-Without-Nsg payload Link Deny-Subnet-Without-Nsg AzA Link platform/alz/2025.09.3 N/A
landing_zones : mibelle-landingzones-mg Deploy-GuestAttest payload Link Deploy-GuestAttest AzA Link platform/alz/2025.09.3 N/A
landing_zones : mibelle-landingzones-mg Deploy-MDFC-DefSQL-AMA payload Link Deploy-MDFC-DefSQL-AMA AzA Link platform/alz/2025.09.3 N/A
landing_zones : mibelle-landingzones-mg Deploy-SQL-Threat payload Link Deploy-SQL-Threat AzA Link platform/alz/2025.09.3 N/A
landing_zones : mibelle-landingzones-mg Deploy-VM-Backup payload Link Deploy-VM-Backup AzA Link platform/alz/2025.09.3 N/A
landing_zones : mibelle-landingzones-mg Deploy-VM-ChangeTrack payload Link Deploy-VM-ChangeTrack AzA Link platform/alz/2025.09.3 N/A
landing_zones : mibelle-landingzones-mg Deploy-VM-Monitoring payload Link Deploy-VM-Monitoring AzA Link platform/alz/2025.09.3 N/A
landing_zones : mibelle-landingzones-mg Deploy-vmArc-ChangeTrack payload Link Deploy-vmArc-ChangeTrack AzA Link platform/alz/2025.09.3 N/A
landing_zones : mibelle-landingzones-mg Deploy-vmHybr-Monitoring payload Link Deploy-vmHybr-Monitoring AzA Link platform/alz/2025.09.3 N/A
landing_zones : mibelle-landingzones-mg Deploy-VMSS-ChangeTrack payload Link Deploy-VMSS-ChangeTrack AzA Link platform/alz/2025.09.3 N/A
landing_zones : mibelle-landingzones-mg Deploy-VMSS-Monitoring payload Link Deploy-VMSS-Monitoring AzA Link platform/alz/2025.09.3 N/A
landing_zones : mibelle-landingzones-mg Enable-DDoS-VNET payload Link Enable-DDoS-VNET AzA Link platform/alz/2025.09.3 N/A
landing_zones : mibelle-landingzones-mg Enforce-ASR payload Link Enforce-ASR AzA Link platform/alz/2025.09.3 N/A
landing_zones : mibelle-landingzones-mg Enforce-Encrypt-CMK0 payload Link Enforce-Encrypt-CMK0 AzA Link platform/alz/2025.09.3 N/A
landing_zones : mibelle-landingzones-mg Enforce-GR-APIM0 payload Link Enforce-GR-APIM0 AzA Link platform/alz/2025.09.3 N/A
landing_zones : mibelle-landingzones-mg Enforce-GR-AppServices0 payload Link Enforce-GR-AppServices0 AzA Link platform/alz/2025.09.3 N/A
landing_zones : mibelle-landingzones-mg Enforce-GR-Automation0 payload Link Enforce-GR-Automation0 AzA Link platform/alz/2025.09.3 N/A
landing_zones : mibelle-landingzones-mg Enforce-GR-BotService0 payload Link Enforce-GR-BotService0 AzA Link platform/alz/2025.09.3 N/A
landing_zones : mibelle-landingzones-mg Enforce-GR-CogServ0 payload Link Enforce-GR-CogServ0 AzA Link platform/alz/2025.09.3 N/A
landing_zones : mibelle-landingzones-mg Enforce-GR-Compute0 payload Link Enforce-GR-Compute0 AzA Link platform/alz/2025.09.3 N/A
landing_zones : mibelle-landingzones-mg Enforce-GR-ContApps0 payload Link Enforce-GR-ContApps0 AzA Link platform/alz/2025.09.3 N/A
landing_zones : mibelle-landingzones-mg Enforce-GR-ContInst0 payload Link Enforce-GR-ContInst0 AzA Link platform/alz/2025.09.3 N/A
landing_zones : mibelle-landingzones-mg Enforce-GR-ContReg0 payload Link Enforce-GR-ContReg0 AzA Link platform/alz/2025.09.3 N/A
landing_zones : mibelle-landingzones-mg Enforce-GR-CosmosDb0 payload Link Enforce-GR-CosmosDb0 AzA Link platform/alz/2025.09.3 N/A
landing_zones : mibelle-landingzones-mg Enforce-GR-DataExpl0 payload Link Enforce-GR-DataExpl0 AzA Link platform/alz/2025.09.3 N/A
landing_zones : mibelle-landingzones-mg Enforce-GR-DataFactory0 payload Link Enforce-GR-DataFactory0 AzA Link platform/alz/2025.09.3 N/A
landing_zones : mibelle-landingzones-mg Enforce-GR-EventGrid0 payload Link Enforce-GR-EventGrid0 AzA Link platform/alz/2025.09.3 N/A
landing_zones : mibelle-landingzones-mg Enforce-GR-EventHub0 payload Link Enforce-GR-EventHub0 AzA Link platform/alz/2025.09.3 N/A
landing_zones : mibelle-landingzones-mg Enforce-GR-KeyVaultSup0 payload Link Enforce-GR-KeyVaultSup0 AzA Link platform/alz/2025.09.3 N/A
landing_zones : mibelle-landingzones-mg Enforce-GR-Kubernetes0 payload Link Enforce-GR-Kubernetes0 AzA Link platform/alz/2025.09.3 N/A
landing_zones : mibelle-landingzones-mg Enforce-GR-MachLearn0 payload Link Enforce-GR-MachLearn0 AzA Link platform/alz/2025.09.3 N/A
landing_zones : mibelle-landingzones-mg Enforce-GR-MySQL0 payload Link Enforce-GR-MySQL0 AzA Link platform/alz/2025.09.3 N/A
landing_zones : mibelle-landingzones-mg Enforce-GR-Network0 payload Link Enforce-GR-Network0 AzA Link platform/alz/2025.09.3 N/A
landing_zones : mibelle-landingzones-mg Enforce-GR-OpenAI0 payload Link Enforce-GR-OpenAI0 AzA Link platform/alz/2025.09.3 N/A
landing_zones : mibelle-landingzones-mg Enforce-GR-PostgreSQL0 payload Link Enforce-GR-PostgreSQL0 AzA Link platform/alz/2025.09.3 N/A
landing_zones : mibelle-landingzones-mg Enforce-GR-ServiceBus0 payload Link Enforce-GR-ServiceBus0 AzA Link platform/alz/2025.09.3 N/A
landing_zones : mibelle-landingzones-mg Enforce-GR-SQL0 payload Link Enforce-GR-SQL0 AzA Link platform/alz/2025.09.3 N/A
landing_zones : mibelle-landingzones-mg Enforce-GR-Storage0 payload Link Enforce-GR-Storage0 AzA Link platform/alz/2025.09.3 N/A
landing_zones : mibelle-landingzones-mg Enforce-GR-Synapse0 payload Link Enforce-GR-Synapse0 AzA Link platform/alz/2025.09.3 N/A
landing_zones : mibelle-landingzones-mg Enforce-GR-VirtualDesk0 payload Link Enforce-GR-VirtualDesk0 AzA Link platform/alz/2025.09.3 N/A
landing_zones : mibelle-landingzones-mg Enforce-TLS-SSL-Q225 payload Link Enforce-TLS-SSL-Q225 AzA Link platform/alz/2025.09.3 N/A
identity : mibelle-platform-identity-mg Deny-Subnet-Without-Nsg payload Link Deny-Subnet-Without-Nsg AzA Link platform/alz/2025.09.3 N/A
identity : mibelle-platform-identity-mg Deploy-VM-Backup payload Link Deploy-VM-Backup AzA Link platform/alz/2025.09.3 N/A
sandbox Enforce-ALZ-Sandbox payload Link Enforce-ALZ-Sandbox AzA Link platform/alz/2025.09.3 N/A
root : Mibelle-mg Audit-ResourceRGLocation payload Link Audit-ResourceRGLocation AzA Link platform/alz/2025.09.3 N/A
root : Mibelle-mg Audit-ZoneResiliency payload Link Audit-ZoneResiliency AzA Link platform/alz/2025.09.3 N/A
root : Mibelle-mg Deploy-Diag-LogsCat payload Link Deploy-Diag-LogsCat AzA Link platform/alz/2025.09.3 N/A
root : Mibelle-mg Deploy-MDEndpoints payload Link Deploy-MDEndpoints AzA Link platform/alz/2025.09.3 N/A
root : Mibelle-mg Deploy-MDFC-Config-H224 payload Link Deploy-MDFC-Config-H224 AzA Link platform/alz/2025.09.3 N/A
root : Mibelle-mg Deploy-MDFC-OssDb payload Link Deploy-MDFC-OssDb AzA Link platform/alz/2025.09.3 N/A
root : Mibelle-mg Deploy-MDFC-SqlAtp payload Link Deploy-MDFC-SqlAtp AzA Link platform/alz/2025.09.3 N/A
root : Mibelle-mg Deploy-SvcHealth-BuiltIn payload Link Deploy-SvcHealth-BuiltIn AzA Link platform/alz/2025.09.3 N/A
connectivity : mibelle-platform-connectivity-mg Enable-DDoS-VNET payload Link Enable-DDoS-VNET AzA Link platform/alz/2025.09.3 N/A
platform : mibelle-platform-mg Deploy-GuestAttest payload Link Deploy-GuestAttest AzA Link platform/alz/2025.09.3 N/A
platform : mibelle-platform-mg Deploy-MDFC-DefSQL-AMA payload Link Deploy-MDFC-DefSQL-AMA AzA Link platform/alz/2025.09.3 N/A
platform : mibelle-platform-mg Deploy-VM-ChangeTrack payload Link Deploy-VM-ChangeTrack AzA Link platform/alz/2025.09.3 N/A
platform : mibelle-platform-mg Deploy-VM-Monitoring payload Link Deploy-VM-Monitoring AzA Link platform/alz/2025.09.3 N/A
platform : mibelle-platform-mg Deploy-vmArc-ChangeTrack payload Link Deploy-vmArc-ChangeTrack AzA Link platform/alz/2025.09.3 N/A
platform : mibelle-platform-mg Deploy-vmHybr-Monitoring payload Link Deploy-vmHybr-Monitoring AzA Link platform/alz/2025.09.3 N/A
platform : mibelle-platform-mg Deploy-VMSS-ChangeTrack payload Link Deploy-VMSS-ChangeTrack AzA Link platform/alz/2025.09.3 N/A
platform : mibelle-platform-mg Deploy-VMSS-Monitoring payload Link Deploy-VMSS-Monitoring AzA Link platform/alz/2025.09.3 N/A
platform : mibelle-platform-mg Enforce-ASR payload Link Enforce-ASR AzA Link platform/alz/2025.09.3 N/A
platform : mibelle-platform-mg Enforce-Encrypt-CMK0 payload Link Enforce-Encrypt-CMK0 AzA Link platform/alz/2025.09.3 N/A
platform : mibelle-platform-mg Enforce-GR-APIM0 payload Link Enforce-GR-APIM0 AzA Link platform/alz/2025.09.3 N/A
platform : mibelle-platform-mg Enforce-GR-AppServices0 payload Link Enforce-GR-AppServices0 AzA Link platform/alz/2025.09.3 N/A
platform : mibelle-platform-mg Enforce-GR-Automation0 payload Link Enforce-GR-Automation0 AzA Link platform/alz/2025.09.3 N/A
platform : mibelle-platform-mg Enforce-GR-BotService0 payload Link Enforce-GR-BotService0 AzA Link platform/alz/2025.09.3 N/A
platform : mibelle-platform-mg Enforce-GR-CogServ0 payload Link Enforce-GR-CogServ0 AzA Link platform/alz/2025.09.3 N/A
platform : mibelle-platform-mg Enforce-GR-Compute0 payload Link Enforce-GR-Compute0 AzA Link platform/alz/2025.09.3 N/A
platform : mibelle-platform-mg Enforce-GR-ContApps0 payload Link Enforce-GR-ContApps0 AzA Link platform/alz/2025.09.3 N/A
platform : mibelle-platform-mg Enforce-GR-ContInst0 payload Link Enforce-GR-ContInst0 AzA Link platform/alz/2025.09.3 N/A
platform : mibelle-platform-mg Enforce-GR-ContReg0 payload Link Enforce-GR-ContReg0 AzA Link platform/alz/2025.09.3 N/A
platform : mibelle-platform-mg Enforce-GR-CosmosDb0 payload Link Enforce-GR-CosmosDb0 AzA Link platform/alz/2025.09.3 N/A
platform : mibelle-platform-mg Enforce-GR-DataExpl0 payload Link Enforce-GR-DataExpl0 AzA Link platform/alz/2025.09.3 N/A
platform : mibelle-platform-mg Enforce-GR-DataFactory0 payload Link Enforce-GR-DataFactory0 AzA Link platform/alz/2025.09.3 N/A
platform : mibelle-platform-mg Enforce-GR-EventGrid0 payload Link Enforce-GR-EventGrid0 AzA Link platform/alz/2025.09.3 N/A
platform : mibelle-platform-mg Enforce-GR-EventHub0 payload Link Enforce-GR-EventHub0 AzA Link platform/alz/2025.09.3 N/A
platform : mibelle-platform-mg Enforce-GR-KeyVaultSup0 payload Link Enforce-GR-KeyVaultSup0 AzA Link platform/alz/2025.09.3 N/A
platform : mibelle-platform-mg Enforce-GR-Kubernetes0 payload Link Enforce-GR-Kubernetes0 AzA Link platform/alz/2025.09.3 N/A
platform : mibelle-platform-mg Enforce-GR-MachLearn0 payload Link Enforce-GR-MachLearn0 AzA Link platform/alz/2025.09.3 N/A
platform : mibelle-platform-mg Enforce-GR-MySQL0 payload Link Enforce-GR-MySQL0 AzA Link platform/alz/2025.09.3 N/A
platform : mibelle-platform-mg Enforce-GR-Network0 payload Link Enforce-GR-Network0 AzA Link platform/alz/2025.09.3 N/A
platform : mibelle-platform-mg Enforce-GR-OpenAI0 payload Link Enforce-GR-OpenAI0 AzA Link platform/alz/2025.09.3 N/A
platform : mibelle-platform-mg Enforce-GR-PostgreSQL0 payload Link Enforce-GR-PostgreSQL0 AzA Link platform/alz/2025.09.3 N/A
platform : mibelle-platform-mg Enforce-GR-ServiceBus0 payload Link Enforce-GR-ServiceBus0 AzA Link platform/alz/2025.09.3 N/A
platform : mibelle-platform-mg Enforce-GR-SQL0 payload Link Enforce-GR-SQL0 AzA Link platform/alz/2025.09.3 N/A
platform : mibelle-platform-mg Enforce-GR-Storage0 payload Link Enforce-GR-Storage0 AzA Link platform/alz/2025.09.3 N/A
platform : mibelle-platform-mg Enforce-GR-Synapse0 payload Link Enforce-GR-Synapse0 AzA Link platform/alz/2025.09.3 N/A
platform : mibelle-platform-mg Enforce-GR-VirtualDesk0 payload Link Enforce-GR-VirtualDesk0 AzA Link platform/alz/2025.09.3 N/A
Azure Landing Zones (ALZ) GitHub
Download CSV semicolon | comma
Type Policy Name (Id) Policy Version Policy Scope Policy Scope Id ALZ Policy Name (Id) ALZ Policy Version ALZ State Exists in tenant Detection method AzAdvertizer Link
Policy Append-AppService-httpsonly 1.0.0 Mg mibelle-mg Append-AppService-httpsonly 1.0.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Append-AppService-latestTLS 1.2.0 Mg mibelle-mg Append-AppService-latestTLS 1.2.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Append-KV-SoftDelete 1.0.0 Mg mibelle-mg Append-KV-SoftDelete 1.0.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Append-Redis-disableNonSslPort 1.0.1 Mg mibelle-mg Append-Redis-disableNonSslPort 1.0.1 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Append-Redis-sslEnforcement 1.1.0 Mg mibelle-mg Append-Redis-sslEnforcement 1.1.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Audit-AzureHybridBenefit 1.0.0 Mg mibelle-mg Audit-AzureHybridBenefit 1.0.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Audit-Disks-UnusedResourcesCostOptimization 1.0.0 Mg mibelle-mg Audit-Disks-UnusedResourcesCostOptimization 1.0.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Audit-MachineLearning-PrivateEndpointId 1.0.0 Mg mibelle-mg Audit-MachineLearning-PrivateEndpointId 1.0.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Audit-PrivateLinkDnsZones 1.0.2 Mg mibelle-mg Audit-PrivateLinkDnsZones 1.0.2 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Audit-PublicIpAddresses-UnusedResourcesCostOptimization 1.1.0 Mg mibelle-mg Audit-PublicIpAddresses-UnusedResourcesCostOptimization 1.1.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Audit-ServerFarms-UnusedResourcesCostOptimization 1.0.0 Mg mibelle-mg Audit-ServerFarms-UnusedResourcesCostOptimization 1.0.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Audit-Tags-Mandatory 1.0.0 Mg mibelle-mg Audit-Tags-Mandatory 1.0.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Audit-Tags-Mandatory-Rg 1.0.0 Mg mibelle-mg Audit-Tags-Mandatory-Rg 1.1.0 outDated True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
PolicySet Audit-TrustedLaunch 1.1.0 Mg mibelle-mg Audit-TrustedLaunch obsolete True PolicySet Hash
PolicySet Audit-UnusedResourcesCostOptimization 2.1.0 Mg mibelle-mg Audit-UnusedResourcesCostOptimization 2.1.0 upToDate True PolicySet Name, MetaData Tag AzA Link
Policy Deny-AA-child-resources 1.0.0 Mg mibelle-mg Deny-AA-child-resources 1.0.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deny-APIM-TLS 1.0.0 Mg mibelle-mg Deny-APIM-TLS 1.0.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deny-AppGw-Without-Tls 1.0.0 Mg mibelle-mg Deny-AppGw-Without-Tls 1.0.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deny-AppGW-Without-WAF 1.0.0 Mg mibelle-mg Deny-AppGW-Without-WAF 1.0.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deny-AppService-without-BYOC 1.0.0 Mg mibelle-mg Deny-AppService-without-BYOC 1.0.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deny-AppServiceApiApp-http 1.0.0 Mg mibelle-mg Deny-AppServiceApiApp-http 1.0.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deny-AppServiceFunctionApp-http 1.0.0 Mg mibelle-mg Deny-AppServiceFunctionApp-http 1.0.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deny-AppServiceWebApp-http 1.0.0 Mg mibelle-mg Deny-AppServiceWebApp-http 1.0.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deny-AzFw-Without-Policy 1.0.0 Mg mibelle-mg Deny-AzFw-Without-Policy 1.0.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deny-CognitiveServices-NetworkAcls 1.0.0 Mg mibelle-mg Deny-CognitiveServices-NetworkAcls 1.0.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deny-CognitiveServices-Resource-Kinds 1.0.0 Mg mibelle-mg Deny-CognitiveServices-Resource-Kinds 1.0.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deny-CognitiveServices-RestrictOutboundNetworkAccess 1.0.0 Mg mibelle-mg Deny-CognitiveServices-RestrictOutboundNetworkAccess 1.0.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deny-Databricks-NoPublicIp 1.0.0 Mg mibelle-mg Deny-Databricks-NoPublicIp 1.0.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deny-Databricks-Sku 1.0.0 Mg mibelle-mg Deny-Databricks-Sku 1.0.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deny-Databricks-VirtualNetwork 1.0.0 Mg mibelle-mg Deny-Databricks-VirtualNetwork 1.0.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deny-EH-minTLS 1.1.0 Mg mibelle-mg Deny-EH-minTLS 1.1.2 outDated True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deny-EH-Premium-CMK 1.0.0 Mg mibelle-mg Deny-EH-Premium-CMK 1.0.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deny-FileServices-InsecureAuth 1.0.0 Mg mibelle-mg Deny-FileServices-InsecureAuth 1.0.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deny-FileServices-InsecureKerberos 1.0.0 Mg mibelle-mg Deny-FileServices-InsecureKerberos 1.0.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deny-FileServices-InsecureSmbChannel 1.0.0 Mg mibelle-mg Deny-FileServices-InsecureSmbChannel 1.0.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deny-FileServices-InsecureSmbVersions 1.0.0 Mg mibelle-mg Deny-FileServices-InsecureSmbVersions 1.0.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deny-LogicApp-Public-Network 1.0.0 Mg mibelle-mg Deny-LogicApp-Public-Network 1.0.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deny-LogicApps-Without-Https 1.0.0 Mg mibelle-mg Deny-LogicApps-Without-Https 1.0.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deny-MachineLearning-Aks 1.0.0 Mg mibelle-mg Deny-MachineLearning-Aks 1.0.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deny-MachineLearning-Compute-SubnetId 1.0.0 Mg mibelle-mg Deny-MachineLearning-Compute-SubnetId 1.0.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deny-MachineLearning-Compute-VmSize 1.0.0 Mg mibelle-mg Deny-MachineLearning-Compute-VmSize 1.0.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deny-MachineLearning-ComputeCluster-RemoteLoginPortPublicAccess 1.1.0 Mg mibelle-mg Deny-MachineLearning-ComputeCluster-RemoteLoginPortPublicAccess 1.1.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deny-MachineLearning-ComputeCluster-Scale 1.0.0 Mg mibelle-mg Deny-MachineLearning-ComputeCluster-Scale 1.0.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deny-MachineLearning-HbiWorkspace 1.0.0 Mg mibelle-mg Deny-MachineLearning-HbiWorkspace 1.0.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deny-MachineLearning-PublicAccessWhenBehindVnet 1.0.1 Mg mibelle-mg Deny-MachineLearning-PublicAccessWhenBehindVnet 1.0.1 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deny-MachineLearning-PublicNetworkAccess 1.0.0-deprecated Mg mibelle-mg Deny-MachineLearning-PublicNetworkAccess 1.0.0-deprecated upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deny-MgmtPorts-From-Internet 2.1.1 Mg mibelle-mg Deny-MgmtPorts-From-Internet 2.2.0 outDated True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deny-MySql-http 1.1.0 Mg mibelle-mg Deny-MySql-http 1.1.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deny-PostgreSql-http 1.0.1 Mg mibelle-mg Deny-PostgreSql-http 1.0.1 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deny-Private-DNS-Zones 1.0.0 Mg mibelle-mg Deny-Private-DNS-Zones 1.0.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deny-PublicEndpoint-MariaDB 1.0.0-deprecated Mg mibelle-mg Deny-PublicEndpoint-MariaDB 1.0.0-deprecated upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deny-PublicIP 1.0.0-deprecated Mg mibelle-mg Deny-PublicIP 1.0.0-deprecated upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
PolicySet Deny-PublicPaaSEndpoints 5.2.0 Mg mibelle-mg Deny-PublicPaaSEndpoints 5.2.0 upToDate True PolicySet Name, MetaData Tag AzA Link
Policy Deny-RDP-From-Internet 1.0.1-deprecated Mg mibelle-mg Deny-RDP-From-Internet 1.0.1-deprecated upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deny-Redis-http 1.1.0 Mg mibelle-mg Deny-Redis-http 1.1.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deny-Service-Endpoints 1.0.0 Mg mibelle-mg Deny-Service-Endpoints 1.0.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deny-Sql-minTLS 1.1.0 Mg mibelle-mg Deny-Sql-minTLS 1.1.1 outDated True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deny-SqlMi-minTLS 1.1.0 Mg mibelle-mg Deny-SqlMi-minTLS 1.1.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deny-Storage-ContainerDeleteRetentionPolicy 1.0.0 Mg mibelle-mg Deny-Storage-ContainerDeleteRetentionPolicy 1.0.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deny-Storage-CopyScope 1.0.0 Mg mibelle-mg Deny-Storage-CopyScope 1.0.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deny-Storage-CorsRules 1.0.0 Mg mibelle-mg Deny-Storage-CorsRules 1.0.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deny-Storage-LocalUser 1.0.0 Mg mibelle-mg Deny-Storage-LocalUser 1.0.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deny-Storage-minTLS 1.0.0-deprecated Mg mibelle-mg Deny-Storage-minTLS 1.0.0-deprecated upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deny-Storage-NetworkAclsBypass 1.0.0 Mg mibelle-mg Deny-Storage-NetworkAclsBypass 1.0.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deny-Storage-NetworkAclsVirtualNetworkRules 1.0.0 Mg mibelle-mg Deny-Storage-NetworkAclsVirtualNetworkRules 1.0.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deny-Storage-ResourceAccessRulesResourceId 1.0.0 Mg mibelle-mg Deny-Storage-ResourceAccessRulesResourceId 1.0.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deny-Storage-ResourceAccessRulesTenantId 1.0.0 Mg mibelle-mg Deny-Storage-ResourceAccessRulesTenantId 1.0.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deny-Storage-ServicesEncryption 1.0.0 Mg mibelle-mg Deny-Storage-ServicesEncryption 1.0.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deny-Storage-SFTP 1.0.0 Mg mibelle-mg Deny-Storage-SFTP 1.0.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deny-StorageAccount-CustomDomain 1.0.0 Mg mibelle-mg Deny-StorageAccount-CustomDomain 1.0.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deny-Subnet-Without-Nsg 2.0.0 Mg mibelle-mg Deny-Subnet-Without-Nsg 2.0.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deny-Subnet-Without-Penp 1.0.0 Mg mibelle-mg Deny-Subnet-Without-Penp 1.0.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deny-Subnet-Without-Udr 2.0.0 Mg mibelle-mg Deny-Subnet-Without-Udr 2.0.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deny-UDR-With-Specific-NextHop 1.0.0 Mg mibelle-mg Deny-UDR-With-Specific-NextHop 1.0.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deny-VNET-Peer-Cross-Sub 1.1.0 Mg mibelle-mg Deny-VNET-Peer-Cross-Sub 1.1.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deny-VNet-Peering 1.0.1 Mg mibelle-mg Deny-VNet-Peering 1.0.1 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deny-VNET-Peering-To-Non-Approved-VNETs 1.0.0 Mg mibelle-mg Deny-VNET-Peering-To-Non-Approved-VNETs 1.0.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy DenyAction-ActivityLogs 1.0.0 Mg mibelle-mg DenyAction-ActivityLogs 1.0.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
PolicySet DenyAction-DeleteProtection 1.1.0 Mg mibelle-mg DenyAction-DeleteProtection 1.1.0 upToDate True PolicySet Name, MetaData Tag AzA Link
Policy DenyAction-DeleteResources 1.0.0 Mg mibelle-mg DenyAction-DeleteResources 1.0.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy DenyAction-DiagnosticLogs 1.0.0 Mg mibelle-mg DenyAction-DiagnosticLogs 1.0.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-ASC-SecurityContacts 2.0.0 Mg mibelle-mg Deploy-ASC-SecurityContacts 2.0.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
PolicySet Deploy-AUM-CheckUpdates 1.1.0 Mg mibelle-mg Deploy-AUM-CheckUpdates 1.1.0 upToDate True PolicySet Name, MetaData Tag AzA Link
Policy Deploy-Budget 1.1.0 Mg mibelle-mg Deploy-Budget 1.1.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-Custom-Route-Table 1.0.0 Mg mibelle-mg Deploy-Custom-Route-Table 1.0.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-DDoSProtection 1.0.1 Mg mibelle-mg Deploy-DDoSProtection 1.0.1 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-Diagnostics-AA 1.1.0-deprecated Mg mibelle-mg Deploy-Diagnostics-AA 1.1.0-deprecated upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-Diagnostics-ACI 1.1.0-deprecated Mg mibelle-mg Deploy-Diagnostics-ACI 1.1.0-deprecated upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-Diagnostics-ACR 1.1.0-deprecated Mg mibelle-mg Deploy-Diagnostics-ACR 1.1.0-deprecated upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-Diagnostics-AnalysisService 1.1.0-deprecated Mg mibelle-mg Deploy-Diagnostics-AnalysisService 1.1.0-deprecated upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-Diagnostics-ApiForFHIR 1.1.0-deprecated Mg mibelle-mg Deploy-Diagnostics-ApiForFHIR 1.1.0-deprecated upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-Diagnostics-APIMgmt 1.2.0-deprecated Mg mibelle-mg Deploy-Diagnostics-APIMgmt 1.2.0-deprecated upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-Diagnostics-ApplicationGateway 1.1.0-deprecated Mg mibelle-mg Deploy-Diagnostics-ApplicationGateway 1.1.0-deprecated upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-Diagnostics-AVDScalingPlans 1.1.0-deprecated Mg mibelle-mg Deploy-Diagnostics-AVDScalingPlans 1.1.0-deprecated upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-Diagnostics-Bastion 1.1.0-deprecated Mg mibelle-mg Deploy-Diagnostics-Bastion 1.1.0-deprecated upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-Diagnostics-CDNEndpoints 1.1.0-deprecated Mg mibelle-mg Deploy-Diagnostics-CDNEndpoints 1.1.0-deprecated upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-Diagnostics-CognitiveServices 1.1.0-deprecated Mg mibelle-mg Deploy-Diagnostics-CognitiveServices 1.1.0-deprecated upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-Diagnostics-CosmosDB 1.2.0-deprecated Mg mibelle-mg Deploy-Diagnostics-CosmosDB 1.2.0-deprecated upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-Diagnostics-Databricks 1.3.0-deprecated Mg mibelle-mg Deploy-Diagnostics-Databricks 1.3.0-deprecated upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-Diagnostics-DataExplorerCluster 1.1.0-deprecated Mg mibelle-mg Deploy-Diagnostics-DataExplorerCluster 1.1.0-deprecated upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-Diagnostics-DataFactory 1.2.0-deprecated Mg mibelle-mg Deploy-Diagnostics-DataFactory 1.2.0-deprecated upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-Diagnostics-DLAnalytics 1.1.0-deprecated Mg mibelle-mg Deploy-Diagnostics-DLAnalytics 1.1.0-deprecated upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-Diagnostics-EventGridSub 1.1.0-deprecated Mg mibelle-mg Deploy-Diagnostics-EventGridSub 1.1.0-deprecated upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-Diagnostics-EventGridSystemTopic 1.1.0-deprecated Mg mibelle-mg Deploy-Diagnostics-EventGridSystemTopic 1.1.0-deprecated upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-Diagnostics-EventGridTopic 1.2.0-deprecated Mg mibelle-mg Deploy-Diagnostics-EventGridTopic 1.2.0-deprecated upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-Diagnostics-ExpressRoute 1.1.0-deprecated Mg mibelle-mg Deploy-Diagnostics-ExpressRoute 1.1.0-deprecated upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-Diagnostics-Firewall 1.2.0-deprecated Mg mibelle-mg Deploy-Diagnostics-Firewall 1.2.0-deprecated upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-Diagnostics-FrontDoor 1.1.0-deprecated Mg mibelle-mg Deploy-Diagnostics-FrontDoor 1.1.0-deprecated upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-Diagnostics-Function 1.1.0-deprecated Mg mibelle-mg Deploy-Diagnostics-Function 1.1.0-deprecated upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-Diagnostics-HDInsight 1.1.0-deprecated Mg mibelle-mg Deploy-Diagnostics-HDInsight 1.1.0-deprecated upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-Diagnostics-iotHub 1.1.0-deprecated Mg mibelle-mg Deploy-Diagnostics-iotHub 1.1.0-deprecated upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-Diagnostics-LoadBalancer 1.1.0-deprecated Mg mibelle-mg Deploy-Diagnostics-LoadBalancer 1.1.0-deprecated upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-Diagnostics-LogAnalytics 1.1.0-deprecated Mg mibelle-mg Deploy-Diagnostics-LogAnalytics 1.1.0-deprecated upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
PolicySet Deploy-Diagnostics-LogAnalytics 2.2.0-deprecated Mg mibelle-mg Deploy-Diagnostics-LogAnalytics 2.2.0-deprecated upToDate True PolicySet Name, MetaData Tag AzA Link
Policy Deploy-Diagnostics-LogicAppsISE 1.1.0-deprecated Mg mibelle-mg Deploy-Diagnostics-LogicAppsISE 1.1.0-deprecated upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-Diagnostics-MariaDB 1.1.0-deprecated Mg mibelle-mg Deploy-Diagnostics-MariaDB 1.1.0-deprecated upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-Diagnostics-MediaService 1.1.0-deprecated Mg mibelle-mg Deploy-Diagnostics-MediaService 1.1.0-deprecated upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-Diagnostics-MlWorkspace 1.2.0-deprecated Mg mibelle-mg Deploy-Diagnostics-MlWorkspace 1.2.0-deprecated upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-Diagnostics-MySQL 1.1.0-deprecated Mg mibelle-mg Deploy-Diagnostics-MySQL 1.1.0-deprecated upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-Diagnostics-NetworkSecurityGroups 1.1.0-deprecated Mg mibelle-mg Deploy-Diagnostics-NetworkSecurityGroups 1.1.0-deprecated upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-Diagnostics-NIC 1.1.0-deprecated Mg mibelle-mg Deploy-Diagnostics-NIC 1.1.0-deprecated upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-Diagnostics-PostgreSQL 2.0.0-deprecated Mg mibelle-mg Deploy-Diagnostics-PostgreSQL 2.0.0-deprecated upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-Diagnostics-PowerBIEmbedded 1.1.0-deprecated Mg mibelle-mg Deploy-Diagnostics-PowerBIEmbedded 1.1.0-deprecated upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-Diagnostics-RedisCache 1.1.0-deprecated Mg mibelle-mg Deploy-Diagnostics-RedisCache 1.1.0-deprecated upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-Diagnostics-Relay 1.1.0-deprecated Mg mibelle-mg Deploy-Diagnostics-Relay 1.1.0-deprecated upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-Diagnostics-SignalR 1.1.0-deprecated Mg mibelle-mg Deploy-Diagnostics-SignalR 1.1.0-deprecated upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-Diagnostics-SQLElasticPools 1.1.0-deprecated Mg mibelle-mg Deploy-Diagnostics-SQLElasticPools 1.1.0-deprecated upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-Diagnostics-SQLMI 1.1.0-deprecated Mg mibelle-mg Deploy-Diagnostics-SQLMI 1.1.0-deprecated upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-Diagnostics-TimeSeriesInsights 1.1.0-deprecated Mg mibelle-mg Deploy-Diagnostics-TimeSeriesInsights 1.1.0-deprecated upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-Diagnostics-TrafficManager 1.1.0-deprecated Mg mibelle-mg Deploy-Diagnostics-TrafficManager 1.1.0-deprecated upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-Diagnostics-VirtualNetwork 1.1.0-deprecated Mg mibelle-mg Deploy-Diagnostics-VirtualNetwork 1.1.0-deprecated upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-Diagnostics-VM 1.1.0-deprecated Mg mibelle-mg Deploy-Diagnostics-VM 1.1.0-deprecated upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-Diagnostics-VMSS 1.1.0-deprecated Mg mibelle-mg Deploy-Diagnostics-VMSS 1.1.0-deprecated upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-Diagnostics-VNetGW 1.1.1-deprecated Mg mibelle-mg Deploy-Diagnostics-VNetGW 1.1.1-deprecated upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-Diagnostics-VWanS2SVPNGW 1.0.0-deprecated Mg mibelle-mg Deploy-Diagnostics-VWanS2SVPNGW 1.0.0-deprecated upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-Diagnostics-WebServerFarm 1.1.0-deprecated Mg mibelle-mg Deploy-Diagnostics-WebServerFarm 1.1.0-deprecated upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-Diagnostics-Website 1.2.0-deprecated Mg mibelle-mg Deploy-Diagnostics-Website 1.2.0-deprecated upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-Diagnostics-WVDAppGroup 1.1.1-deprecated Mg mibelle-mg Deploy-Diagnostics-WVDAppGroup 1.1.1-deprecated upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-Diagnostics-WVDHostPools 1.3.0-deprecated Mg mibelle-mg Deploy-Diagnostics-WVDHostPools 1.3.0-deprecated upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-Diagnostics-WVDWorkspace 1.1.1-deprecated Mg mibelle-mg Deploy-Diagnostics-WVDWorkspace 1.1.1-deprecated upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-FirewallPolicy 1.0.0 Mg mibelle-mg Deploy-FirewallPolicy 1.0.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-LogicApp-TLS 1.0.0 Mg mibelle-mg Deploy-LogicApp-TLS 1.0.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-MDFC-Arc-SQL-DCR-Association 1.0.0-deprecated Mg mibelle-mg Deploy-MDFC-Arc-SQL-DCR-Association 1.0.0-deprecated upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-MDFC-Arc-Sql-DefenderSQL-DCR 1.0.0-deprecated Mg mibelle-mg Deploy-MDFC-Arc-Sql-DefenderSQL-DCR 1.0.0-deprecated upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
PolicySet Deploy-MDFC-Config 7.0.0-deprecated Mg mibelle-mg Deploy-MDFC-Config 7.0.0-deprecated upToDate True PolicySet Name, MetaData Tag AzA Link
PolicySet Deploy-MDFC-Config_20240319 2.2.0 Mg mibelle-mg Deploy-MDFC-Config_20240319 2.3.0 outDated True PolicySet Name, MetaData Tag AzA Link
PolicySet Deploy-MDFC-DefenderSQL-AMA 1.0.1-deprecated Mg mibelle-mg Deploy-MDFC-DefenderSQL-AMA 1.0.1-deprecated upToDate True PolicySet Name, MetaData Tag AzA Link
Policy Deploy-MDFC-SQL-AMA 1.0.0-deprecated Mg mibelle-mg Deploy-MDFC-SQL-AMA 1.0.0-deprecated upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-MDFC-SQL-DefenderSQL 1.0.0-deprecated Mg mibelle-mg Deploy-MDFC-SQL-DefenderSQL 1.0.0-deprecated upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-MDFC-SQL-DefenderSQL-DCR 1.0.1-deprecated Mg mibelle-mg Deploy-MDFC-SQL-DefenderSQL-DCR 1.0.1-deprecated upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-MySQL-sslEnforcement 1.2.0 Mg mibelle-mg Deploy-MySQL-sslEnforcement 1.2.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-Nsg-FlowLogs 1.0.0-deprecated Mg mibelle-mg Deploy-Nsg-FlowLogs 1.0.0-deprecated upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-Nsg-FlowLogs-to-LA 1.1.0-deprecated Mg mibelle-mg Deploy-Nsg-FlowLogs-to-LA 1.1.0-deprecated upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-PostgreSQL-sslEnforcement 1.2.0 Mg mibelle-mg Deploy-PostgreSQL-sslEnforcement 1.2.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-Private-DNS-Generic 2.0.0 Mg mibelle-mg Deploy-Private-DNS-Generic 2.0.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
PolicySet Deploy-Private-DNS-Zones 2.4.0 Mg mibelle-mg Deploy-Private-DNS-Zones 2.4.0 upToDate True PolicySet Name, MetaData Tag AzA Link
Policy Deploy-Sql-AuditingSettings 1.0.0 Mg mibelle-mg Deploy-Sql-AuditingSettings 1.0.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-SQL-minTLS 1.2.0 Mg mibelle-mg Deploy-SQL-minTLS 1.2.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
PolicySet Deploy-Sql-Security 1.0.0-deprecated Mg mibelle-mg Deploy-Sql-Security 1.0.0-deprecated upToDate True PolicySet Name, MetaData Tag AzA Link
PolicySet Deploy-Sql-Security_20240529 1.1.0 Mg mibelle-mg Deploy-Sql-Security_20240529 1.1.0 upToDate True PolicySet Name, MetaData Tag AzA Link
Policy Deploy-Sql-SecurityAlertPolicies 1.1.1 Mg mibelle-mg Deploy-Sql-SecurityAlertPolicies 1.1.1 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-Sql-Tde 1.1.1-deprecated Mg mibelle-mg Deploy-Sql-Tde 1.1.1-deprecated upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-Sql-vulnerabilityAssessments 1.0.1-deprecated Mg mibelle-mg Deploy-Sql-vulnerabilityAssessments 1.0.1-deprecated upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-Sql-vulnerabilityAssessments_20230706 1.0.0 Mg mibelle-mg Deploy-Sql-vulnerabilityAssessments_20230706 1.0.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-SqlMi-minTLS 1.3.0 Mg mibelle-mg Deploy-SqlMi-minTLS 1.3.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-Storage-sslEnforcement 1.3.0 Mg mibelle-mg Deploy-Storage-sslEnforcement 1.3.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-UserAssignedManagedIdentity-VMInsights 1.0.0-deprecated Mg mibelle-mg Deploy-UserAssignedManagedIdentity-VMInsights 1.0.0-deprecated upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-Vm-autoShutdown 1.0.0 Mg mibelle-mg Deploy-Vm-autoShutdown 1.0.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-VNET-HubSpoke 1.1.0 Mg mibelle-mg Deploy-VNET-HubSpoke 1.1.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Deploy-Windows-DomainJoin 1.0.0 Mg mibelle-mg Deploy-Windows-DomainJoin 1.1.0 outDated True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
PolicySet Enforce-ACSB 1.1.0 Mg mibelle-mg Enforce-ACSB 1.1.0 upToDate True PolicySet Name, MetaData Tag AzA Link
PolicySet Enforce-ALZ-Decomm 1.1.0 Mg mibelle-mg Enforce-ALZ-Decomm 1.1.0 upToDate True PolicySet Name, MetaData Tag AzA Link
PolicySet Enforce-ALZ-Sandbox 1.1.0 Mg mibelle-mg Enforce-ALZ-Sandbox 1.1.0 upToDate True PolicySet Name, MetaData Tag AzA Link
PolicySet Enforce-Backup 1.1.0 Mg mibelle-mg Enforce-Backup 1.1.0 upToDate True PolicySet Name, MetaData Tag AzA Link
PolicySet Enforce-Encryption-CMK 3.2.0-deprecated Mg mibelle-mg Enforce-Encryption-CMK 3.2.0-deprecated upToDate True PolicySet Name, MetaData Tag AzA Link
PolicySet Enforce-Encryption-CMK_20250218 1.0.0 Mg mibelle-mg Enforce-Encryption-CMK_20250218 1.1.0 outDated True PolicySet Name, MetaData Tag AzA Link
PolicySet Enforce-EncryptTransit 2.1.0-deprecated Mg mibelle-mg Enforce-EncryptTransit 2.1.0-deprecated upToDate True PolicySet Name, MetaData Tag AzA Link
PolicySet Enforce-EncryptTransit_20240509 1.0.0-deprecated Mg mibelle-mg Enforce-EncryptTransit_20240509 1.0.0-deprecated upToDate True PolicySet Name, MetaData Tag AzA Link
PolicySet Enforce-EncryptTransit_20241211 1.2.0 Mg mibelle-mg Enforce-EncryptTransit_20241211 1.2.2 outDated True PolicySet Name, MetaData Tag AzA Link
PolicySet Enforce-Guardrails-APIM 1.1.0 Mg mibelle-mg Enforce-Guardrails-APIM 1.1.0 upToDate True PolicySet Name, MetaData Tag AzA Link
PolicySet Enforce-Guardrails-AppServices 1.1.0 Mg mibelle-mg Enforce-Guardrails-AppServices 1.1.0 upToDate True PolicySet Name, MetaData Tag AzA Link
PolicySet Enforce-Guardrails-Automation 1.1.0 Mg mibelle-mg Enforce-Guardrails-Automation 1.1.0 upToDate True PolicySet Name, MetaData Tag AzA Link
PolicySet Enforce-Guardrails-BotService 1.1.0 Mg mibelle-mg Enforce-Guardrails-BotService 1.1.0 upToDate True PolicySet Name, MetaData Tag AzA Link
PolicySet Enforce-Guardrails-CognitiveServices 1.2.0 Mg mibelle-mg Enforce-Guardrails-CognitiveServices 1.2.0 upToDate True PolicySet Name, MetaData Tag AzA Link
PolicySet Enforce-Guardrails-Compute 1.1.0 Mg mibelle-mg Enforce-Guardrails-Compute 1.1.0 upToDate True PolicySet Name, MetaData Tag AzA Link
PolicySet Enforce-Guardrails-ContainerApps 1.1.0 Mg mibelle-mg Enforce-Guardrails-ContainerApps 1.1.0 upToDate True PolicySet Name, MetaData Tag AzA Link
PolicySet Enforce-Guardrails-ContainerInstance 1.1.0 Mg mibelle-mg Enforce-Guardrails-ContainerInstance 1.1.0 upToDate True PolicySet Name, MetaData Tag AzA Link
PolicySet Enforce-Guardrails-ContainerRegistry 1.1.0 Mg mibelle-mg Enforce-Guardrails-ContainerRegistry 1.1.0 upToDate True PolicySet Name, MetaData Tag AzA Link
PolicySet Enforce-Guardrails-CosmosDb 1.1.0 Mg mibelle-mg Enforce-Guardrails-CosmosDb 1.1.0 upToDate True PolicySet Name, MetaData Tag AzA Link
PolicySet Enforce-Guardrails-DataExplorer 1.1.0 Mg mibelle-mg Enforce-Guardrails-DataExplorer 1.1.0 upToDate True PolicySet Name, MetaData Tag AzA Link
PolicySet Enforce-Guardrails-DataFactory 1.1.0 Mg mibelle-mg Enforce-Guardrails-DataFactory 1.1.0 upToDate True PolicySet Name, MetaData Tag AzA Link
PolicySet Enforce-Guardrails-EventGrid 1.1.0 Mg mibelle-mg Enforce-Guardrails-EventGrid 1.1.0 upToDate True PolicySet Name, MetaData Tag AzA Link
PolicySet Enforce-Guardrails-EventHub 1.1.0 Mg mibelle-mg Enforce-Guardrails-EventHub 1.1.0 upToDate True PolicySet Name, MetaData Tag AzA Link
PolicySet Enforce-Guardrails-KeyVault 2.2.0 Mg mibelle-mg Enforce-Guardrails-KeyVault 2.2.0 upToDate True PolicySet Name, MetaData Tag AzA Link
PolicySet Enforce-Guardrails-KeyVault-Sup 1.1.0 Mg mibelle-mg Enforce-Guardrails-KeyVault-Sup 1.1.0 upToDate True PolicySet Name, MetaData Tag AzA Link
PolicySet Enforce-Guardrails-Kubernetes 1.2.0 Mg mibelle-mg Enforce-Guardrails-Kubernetes 1.2.0 upToDate True PolicySet Name, MetaData Tag AzA Link
PolicySet Enforce-Guardrails-MachineLearning 1.2.0 Mg mibelle-mg Enforce-Guardrails-MachineLearning 1.2.0 upToDate True PolicySet Name, MetaData Tag AzA Link
PolicySet Enforce-Guardrails-MySQL 1.1.0 Mg mibelle-mg Enforce-Guardrails-MySQL 1.1.0 upToDate True PolicySet Name, MetaData Tag AzA Link
PolicySet Enforce-Guardrails-Network 1.2.0 Mg mibelle-mg Enforce-Guardrails-Network 1.2.0-deprecated deprecated True PolicySet Name, MetaData Tag AzA Link
PolicySet Enforce-Guardrails-OpenAI 1.2.0 Mg mibelle-mg Enforce-Guardrails-OpenAI 1.2.0 upToDate True PolicySet Name, MetaData Tag AzA Link
PolicySet Enforce-Guardrails-PostgreSQL 1.1.0 Mg mibelle-mg Enforce-Guardrails-PostgreSQL 1.1.0 upToDate True PolicySet Name, MetaData Tag AzA Link
PolicySet Enforce-Guardrails-ServiceBus 1.1.0 Mg mibelle-mg Enforce-Guardrails-ServiceBus 1.1.0 upToDate True PolicySet Name, MetaData Tag AzA Link
PolicySet Enforce-Guardrails-SQL 1.1.0 Mg mibelle-mg Enforce-Guardrails-SQL 1.1.0 upToDate True PolicySet Name, MetaData Tag AzA Link
PolicySet Enforce-Guardrails-Storage 1.1.0 Mg mibelle-mg Enforce-Guardrails-Storage 1.1.0 upToDate True PolicySet Name, MetaData Tag AzA Link
PolicySet Enforce-Guardrails-Synapse 1.2.0 Mg mibelle-mg Enforce-Guardrails-Synapse 1.2.0 upToDate True PolicySet Name, MetaData Tag AzA Link
PolicySet Enforce-Guardrails-VirtualDesktop 1.1.0 Mg mibelle-mg Enforce-Guardrails-VirtualDesktop 1.1.0 upToDate True PolicySet Name, MetaData Tag AzA Link
Policy Modify-NSG 1.0.0 Mg mibelle-mg Modify-NSG 1.0.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
Policy Modify-UDR 1.0.0 Mg mibelle-mg Modify-UDR 1.0.0 upToDate True PolicyRule Hash, Policy Name, MetaData Tag AzA Link
PolicySet n/a n/a n/a n/a Enforce-Guardrails-Network_20250326 2.0.0 False ALZ GitHub repository AzA Link
Download CSV semicolon | comma
PolicySet DisplayName PolicySetId Policy DisplayName PolicyId Deprecated Property
[Deprecated]: Deny or Audit resources without Encryption with a customer-managed key (CMK) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encryption-cmk [Deprecated]: Virtual machines should encrypt temp disks, caches, and data flows between Compute and Storage resources /providers/microsoft.authorization/policydefinitions/0961003e-5a0a-4549-abde-af6a37f2724d true
[Deprecated]: Deploy Microsoft Defender for Cloud configuration /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-mdfc-config [Deprecated]: Configure Microsoft Defender for APIs should be enabled /providers/microsoft.authorization/policydefinitions/e54d2be9-5f2e-4d65-98e4-4f0e670b23d6 true
[Deprecated]: Deploy Microsoft Defender for Cloud configuration /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-mdfc-config [Deprecated]: Configure Azure Defender for DNS to be enabled /providers/microsoft.authorization/policydefinitions/2370a3c1-4a25-4283-a91a-c9c1a145fb2f true
Configure Azure PaaS services to use private DNS zones /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-private-dns-zones [Deprecated]: Configure Azure Media Services to use private DNS zones /providers/microsoft.authorization/policydefinitions/b4a7f6c1-585e-4177-ad5b-c2c93f4bb991 true
Configure Azure PaaS services to use private DNS zones /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-private-dns-zones [Deprecated]: Configure Azure Media Services to use private DNS zones /providers/microsoft.authorization/policydefinitions/b4a7f6c1-585e-4177-ad5b-c2c93f4bb991 true
Configure Azure PaaS services to use private DNS zones /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-private-dns-zones [Deprecated]: Configure Azure Media Services to use private DNS zones /providers/microsoft.authorization/policydefinitions/b4a7f6c1-585e-4177-ad5b-c2c93f4bb991 true
Deny or Audit resources without Encryption with a customer-managed key (CMK) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encryption-cmk_20250218 [Deprecated]: Virtual machines should encrypt temp disks, caches, and data flows between Compute and Storage resources /providers/microsoft.authorization/policydefinitions/0961003e-5a0a-4549-abde-af6a37f2724d true
Enforce recommended guardrails for API Management /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-apim [Deprecated]: API Management minimum API version should be set to 2019-12-01 or higher /providers/microsoft.authorization/policydefinitions/549814b6-3212-4203-bdc8-1548d342fb67 true
Enforce recommended guardrails for Network and Networking services /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-network [Deprecated]: Firewall Policy Premium should enable all IDPS signature rules to monitor all inbound and outbound traffic flows /providers/microsoft.authorization/policydefinitions/610b6183-5f00-4d68-86d2-4ab4cb3a67a5 true
Enforce recommended guardrails for Network and Networking services /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-network [Deprecated]: Bypass list of Intrusion Detection and Prevention System (IDPS) should be empty in Firewall Policy Premium /providers/microsoft.authorization/policydefinitions/f516dc7a-4543-4d40-aad6-98f76a706b50 true
Enforce recommended guardrails for Network and Networking services /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-network [Deprecated]: Azure firewall policy should enable TLS inspection within application rules /providers/microsoft.authorization/policydefinitions/a58ac66d-92cb-409c-94b8-8e48d7a96596 true
Enforce recommended guardrails for Network and Networking services /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-network [Deprecated]: Azure Firewall Premium should configure a valid intermediate certificate to enable TLS inspection /providers/microsoft.authorization/policydefinitions/711c24bb-7f18-4578-b192-81a6161e1f17 true
Enforce recommended guardrails for Network and Networking services /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-network [Deprecated]: Web Application Firewall (WAF) should enable all firewall rules for Application Gateway /providers/microsoft.authorization/policydefinitions/632d3993-e2c0-44ea-a7db-2eca131f356d true
Enforce recommended guardrails for Network and Networking services /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-network [Deprecated]: Firewall Policy Premium should enable the Intrusion Detection and Prevention System (IDPS) /providers/microsoft.authorization/policydefinitions/6484db87-a62d-4327-9f07-80a2cbdf333a true
Enforce recommended guardrails for Storage Account /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-storage [Deprecated]: Deploy Defender for Storage (Classic) on storage accounts /providers/microsoft.authorization/policydefinitions/361c2074-3595-4e5d-8cab-4f21dffc835c true
Public network access should be disabled for PaaS services /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deny-publicpaasendpoints [Deprecated]: Cognitive Services accounts should disable public network access /providers/microsoft.authorization/policydefinitions/0725b4dd-7e76-479c-a735-68e7ee23d5ca true
Download CSV semicolon | comma
Policy Assignment DisplayName Policy AssignmentId Policy/PolicySet PolicySet DisplayName PolicySetId Policy DisplayName PolicyId Deprecated Property
Public network access should be disabled for PaaS services /providers/microsoft.management/managementgroups/mibelle-landingzones-corp-mg/providers/microsoft.authorization/policyassignments/deny-public-endpoints PolicySet Public network access should be disabled for PaaS services /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deny-publicpaasendpoints [Deprecated]: Cognitive Services accounts should disable public network access /providers/microsoft.authorization/policydefinitions/0725b4dd-7e76-479c-a735-68e7ee23d5ca True
Download CSV semicolon | comma
Scope Management Group Id Management Group Name SubscriptionId Subscription Name ResourceGroup ResourceName / ResourceType Exemption name Exemption description Category ExpiresOn (UTC) Exemption Id Policy AssignmentId Policy Type Policy Exempted Set Policies CreatedBy CreatedAt LastModifiedBy LastModifiedAt
RG mibelle-landingzones-corp-mg Corp d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation trendmicro-v1-d4493d1a-9fd5-4596-aff4-8c679eac0164 Corp - Public network access should be disabled for PaaS services TrendMicro Onboarding needs storage account with public endpoint enabled Waiver n/a /subscriptions/d4493d1a-9fd5-4596-aff4-8c679eac0164/resourcegroups/trendmicro-v1-d4493d1a-9fd5-4596-aff4-8c679eac0164/providers/Microsoft.Authorization/policyExemptions/61a92dce59f0457e9a4cfb13 /providers/Microsoft.Management/managementGroups/mibelle-landingzones-corp-mg/providers/Microsoft.Authorization/policyAssignments/Deny-Public-Endpoints PolicySet Public network access should be disabled for PaaS services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deny-publicpaasendpoints) all 45 csa-pirmin.felber@MIBCloud.onmicrosoft.com (User) 2025-10-16 08:15:24 csa-pirmin.felber@MIBCloud.onmicrosoft.com (User) 2025-10-16 08:15:24
Res mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity mibelle-hub-net-dns-prod-rg mibhubnetdnspeuwkv01 / microsoft.keyvault/vaults mibelle-platform-mg - Enforce recommended guardrails for Azure Key Vault Need Self-signed-Certificates for Apps Waiver n/a /subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourcegroups/mibelle-hub-net-dns-prod-rg/providers/microsoft.keyvault/vaults/mibhubnetdnspeuwkv01/providers/Microsoft.Authorization/policyExemptions/a633f23047f2472b85936e33 /providers/Microsoft.Management/managementGroups/mibelle-platform-mg/providers/Microsoft.Authorization/policyAssignments/Enforce-GR-KeyVault PolicySet Enforce recommended guardrails for Azure Key Vault (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-keyvault) all 29 csa-pirmin.felber@MIBCloud.onmicrosoft.com (User) 2025-11-24 08:49:55 csa-pirmin.felber@MIBCloud.onmicrosoft.com (User) 2025-11-24 08:49:55

0 Policy assignments orphaned

Download CSV semicolon | comma
*Depending on the number of rows and your computer´s performance the table may respond with delay, download the csv for better filtering experience
Scope Management Group Id Management Group Name SubscriptionId Subscription Name Inheritance ScopeExcluded Exemption applies Policy/Set DisplayName Policy/Set Description Policy/SetId Policy/Set Type Category ALZ Effect Parameters Enforcement NonCompliance Message Policies NonCmplnt Policies Compliant Resources NonCmplnt Resources Compliant Resources Conflicting Role/Assignment Managed Identity Assignment DisplayName Assignment Description AssignmentId AssignedBy CreatedOn CreatedBy UpdatedOn UpdatedBy
Mg mibelle-mg mibelle thisScope Mg false false Audit resource location matches resource group location Audit that the resource location matches its resource group location /providers/microsoft.authorization/policydefinitions/0a914e76-4921-4c19-b460-a2d36003525a Policy BuiltIn General False audit Default 1 0 8 590 0 none Audit that the resource location matches its resource group location Audit resource location matches resource group location /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-location-match n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg mibelle thisScope Mg false false Audit virtual machines for Trusted Launch support Trusted Launch improves security of a Virtual Machine which requires VM SKU, OS Disk & OS Image to support it (Gen 2). To learn more about Trusted Launch, visit https://aka.ms/trustedlaunch. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/audit-trustedlaunch PolicySet Custom Trusted Launch true n/a Default 2 0 10 7 0 none Audit virtual machines for Trusted Launch support Trusted Launch improves security of a Virtual Machine which requires VM SKU, OS Disk & OS Image to support it (Gen 2). To learn more about Trusted Launch, visit https://aka.ms/trustedlaunch. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-trustedlaunch n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg mibelle thisScope Mg false false Unused resources driving cost should be avoided Optimize cost by detecting unused but chargeable resources. Leverage this Azure Policy Initiative as a cost control tool to reveal orphaned resources that are contributing cost. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/audit-unusedresourcescostoptimization PolicySet Custom Cost Optimization true n/a EffectDisks=Audit, EffectPublicIpAddresses=Audit, EffectServerFarms=Audit Default 1 3 1 26 0 none Unused resources driving cost should be avoided This Policy initiative is a group of Policy definitions that help optimize cost by detecting unused but chargeable resources. Leverage this Policy initiative as a cost control to reveal orphaned resources that are driving cost. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-unusedresources n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg mibelle thisScope Mg false false Not allowed resource types Restrict which resource types can be deployed in your environment. Limiting resource types can reduce the complexity and attack surface of your environment while also helping to manage costs. Compliance results are only shown for non-compliant resources. /providers/microsoft.authorization/policydefinitions/6c112d4e-5bc7-47ae-a041-ea2d9dccd749 Policy BuiltIn General False Deny effect=Deny, listOfResourceTypesNotAllowed=Microsoft.ClassicCompute/capabilities; Microsoft.ClassicCompute/checkDomainNameAvailability; Microsoft.ClassicCompute/domainNames; Microsoft.ClassicCompute/domainNames/capabilities; Microsoft.ClassicCompute/domainNames/internalLoadBalancers; Microsoft.ClassicCompute/domainNames/serviceCertificates; Microsoft.ClassicCompute/domainNames/slots; Microsoft.ClassicCompute/domainNames/slots/roles; Microsoft.ClassicCompute/domainNames/slots/roles/metricDefinitions; Microsoft.ClassicCompute/domainNames/slots/roles/metrics; Microsoft.ClassicCompute/moveSubscriptionResources; Microsoft.ClassicCompute/operatingSystemFamilies; Microsoft.ClassicCompute/operatingSystems; Microsoft.ClassicCompute/operations; Microsoft.ClassicCompute/operationStatuses; Microsoft.ClassicCompute/quotas; Microsoft.ClassicCompute/resourceTypes; Microsoft.ClassicCompute/validateSubscriptionMoveAvailability; Microsoft.ClassicCompute/virtualMachines; Microsoft.ClassicCompute/virtualMachines/diagnosticSettings; Microsoft.ClassicCompute/virtualMachines/metricDefinitions; Microsoft.ClassicCompute/virtualMachines/metrics; Microsoft.ClassicInfrastructureMigrate/classicInfrastructureResources; Microsoft.ClassicNetwork/capabilities; Microsoft.ClassicNetwork/expressRouteCrossConnections; Microsoft.ClassicNetwork/expressRouteCrossConnections/peerings; Microsoft.ClassicNetwork/gatewaySupportedDevices; Microsoft.ClassicNetwork/networkSecurityGroups; Microsoft.ClassicNetwork/operations; Microsoft.ClassicNetwork/quotas; Microsoft.ClassicNetwork/reservedIps; Microsoft.ClassicNetwork/virtualNetworks; Microsoft.ClassicNetwork/virtualNetworks/remoteVirtualNetworkPeeringProxies; Microsoft.ClassicNetwork/virtualNetworks/virtualNetworkPeerings; Microsoft.ClassicStorage/capabilities; Microsoft.ClassicStorage/checkStorageAccountAvailability; Microsoft.ClassicStorage/disks; Microsoft.ClassicStorage/images; Microsoft.ClassicStorage/operations; Microsoft.ClassicStorage/osImages; Microsoft.ClassicStorage/osPlatformImages; Microsoft.ClassicStorage/publicImages; Microsoft.ClassicStorage/quotas; Microsoft.ClassicStorage/storageAccounts; Microsoft.ClassicStorage/storageAccounts/blobServices; Microsoft.ClassicStorage/storageAccounts/fileServices; Microsoft.ClassicStorage/storageAccounts/metricDefinitions; Microsoft.ClassicStorage/storageAccounts/metrics; Microsoft.ClassicStorage/storageAccounts/queueServices; Microsoft.ClassicStorage/storageAccounts/services; Microsoft.ClassicStorage/storageAccounts/services/diagnosticSettings; Microsoft.ClassicStorage/storageAccounts/services/metricDefinitions; Microsoft.ClassicStorage/storageAccounts/services/metrics; Microsoft.ClassicStorage/storageAccounts/tableServices; Microsoft.ClassicStorage/storageAccounts/vmImages; Microsoft.ClassicStorage/vmImages; Microsoft.ClassicSubscription/operations Default 0 0 0 0 0 none Deny the deployment of classic resources Denies deployment of classic resource types under the assigned scope. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deny-classic-resources n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg mibelle thisScope Mg false false Audit VMs that do not use managed disks This policy audits VMs that do not use managed disks /providers/microsoft.authorization/policydefinitions/06a78e20-9358-41c9-923c-fb736d382a4d Policy BuiltIn Compute False audit Default 0 1 0 7 0 none Deny virtual machines and virtual machine scale sets that do not use managed disk Deny virtual machines that do not use managed disk. It checks the managed disk property on virtual machine OS Disk fields. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deny-unmanageddisk n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg mibelle thisScope Mg false false Microsoft cloud security benchmark The Microsoft cloud security benchmark initiative represents the policies and controls implementing security recommendations defined in Microsoft cloud security benchmark, see https://aka.ms/azsecbm. This also serves as the Microsoft Defender for Cloud default policy initiative. You can directly assign this initiative, or manage its policies and compliance results within Microsoft Defender for Cloud. /providers/microsoft.authorization/policysetdefinitions/1f3afdf9-d0c9-4c3d-847f-89da613e70a8 PolicySet BuiltIn Security Center False n/a Default 55 25 186 46 0 none Enable Monitoring in Microsoft Defender for Cloud Enable Monitoring in Microsoft Defender for Cloud. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-asc-monitoring n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg mibelle thisScope Mg false false Configure Azure Activity logs to stream to specified Log Analytics workspace Deploys the diagnostic settings for Azure Activity to stream subscriptions audit logs to a Log Analytics workspace to monitor subscription-level events /providers/microsoft.authorization/policydefinitions/2465583e-4e78-4c15-b6be-a36cbc7c8b0f Policy BuiltIn Monitoring False DeployIfNotExists effect=DeployIfNotExists, logAnalytics=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 1 0 4 1 0 Monitoring Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/dcb59c88-f014-5e17-840c-6c9aecc66286), Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/82f0c3bf-808b-5863-bf9c-231cfbf9598a) Deploy-AzActivity-Log (SPObjId: 217aa040-8eb0-451b-b81c-0b8f3d200d5a) Deploy Diagnostic Settings for Activity Log to Log Analytics workspace Ensures that Activity Log Diagnostics settings are set to push logs into Log Analytics workspace. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg mibelle thisScope Mg false false Enable audit category group resource logging for supported resources to Log Analytics Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This initiative deploys diagnostic setting using the audit category group to route logs to Log Analytics for all supported resources. /providers/microsoft.authorization/policysetdefinitions/f5b29bc4-feca-4cc6-a58a-772dd5e290a5 PolicySet BuiltIn Monitoring False n/a logAnalytics=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 1 6 1 18 0 Monitoring Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b922046a-7a3e-59da-a982-8a5b855791ce), Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/9df772a7-1ce7-5439-ab6b-5d31d69925cc) Deploy-Diag-Logs (SPObjId: 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57) Enable allLogs category group resource logging for supported resources to Log Analytics Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This initiative deploys diagnostic setting using the allLogs category group to route logs to an Event Hub for all supported resources. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg mibelle thisScope Mg false false Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud Configure the multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud (WDATP, WDATP_EXCLUDE_LINUX_PUBLIC_PREVIEW, WDATP_UNIFIED_SOLUTION etc.). See: https://learn.microsoft.com/azure/defender-for-cloud/integration-defender-for-endpoint for more information. /providers/microsoft.authorization/policysetdefinitions/77b391e3-2d5d-40c3-83bf-65c846b3c6a3 PolicySet BuiltIn Security Center False n/a Default 0 3 0 5 0 Security Admin (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/d730d560-adce-52b7-b10c-36a8ad16a6d3) Deploy-MDEndpointsAMA (SPObjId: 7d365a6d-a7ae-4921-beca-5ce854a76960) Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud Configure the multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud (WDATP, WDATP_EXCLUDE_LINUX_PUBLIC_PREVIEW, WDATP_UNIFIED_SOLUTION etc.). See: https://learn.microsoft.com/azure/defender-for-cloud/integration-defender-for-endpoint for more information. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-mdendpointsama n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg mibelle thisScope Mg false false Enforce Azure Compute Security Benchmark compliance auditing Enforce Azure Compute Security Benchmark compliance auditing for Windows and Linux virtual machines. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-acsb PolicySet Custom Guest Configuration true n/a Default 3 2 121 0 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/6e26cd22-b41b-5611-aafc-e2c56b14c060) Enforce-ACSB (SPObjId: e1f2e80c-5329-4804-824d-f0b44713985e) Enforce Azure Compute Security Baseline compliance auditing This initiative assignment enables Azure Compute Security Baseline compliance auditing for Windows and Linux virtual machines. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/enforce-acsb n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-decommissioned-mg Decommissioned thisScope Mg false false Enforce policies in the Decommissioned Landing Zone Enforce policies in the Decommissioned Landing Zone. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-alz-decomm PolicySet Custom Decommissioned true n/a listOfResourceTypesAllowed=microsoft.consumption/tags; microsoft.authorization/roleassignments; microsoft.authorization/roledefinitions; microsoft.authorization/policyassignments; microsoft.authorization/locks; microsoft.authorization/policydefinitions; microsoft.authorization/policysetdefinitions; microsoft.resources/tags; microsoft.authorization/roleeligibilityschedules; microsoft.authorization/roleeligibilityscheduleinstances; microsoft.authorization/roleassignmentschedules; microsoft.authorization/roleassignmentscheduleinstances Default 0 0 0 0 0 Virtual Machine Contributor (/providers/microsoft.management/managementgroups/mibelle-decommissioned-mg/providers/microsoft.authorization/roleassignments/5e51d472-1e7a-5e45-8cf7-e3bb9d2323d4) Enforce-ALZ-Decomm (SPObjId: 449067cf-1d3a-494e-9c11-cb5b5e97fc69) Enforce ALZ Decommissioned Guardrails This initiative will help enforce and govern subscriptions that are placed within the decommissioned Management Group as part of your Subscription decommissioning process. See https://aka.ms/alz/policies for more information. /providers/microsoft.management/managementgroups/mibelle-decommissioned-mg/providers/microsoft.authorization/policyassignments/enforce-alz-decomm n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-decommissioned-mg Decommissioned inherited mibelle-mg false false Audit resource location matches resource group location Audit that the resource location matches its resource group location /providers/microsoft.authorization/policydefinitions/0a914e76-4921-4c19-b460-a2d36003525a Policy BuiltIn General False audit Default 0 0 0 0 0 none Audit that the resource location matches its resource group location Audit resource location matches resource group location /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-location-match n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-decommissioned-mg Decommissioned inherited mibelle-mg false false Audit virtual machines for Trusted Launch support Trusted Launch improves security of a Virtual Machine which requires VM SKU, OS Disk & OS Image to support it (Gen 2). To learn more about Trusted Launch, visit https://aka.ms/trustedlaunch. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/audit-trustedlaunch PolicySet Custom Trusted Launch true n/a Default 0 0 0 0 0 none Audit virtual machines for Trusted Launch support Trusted Launch improves security of a Virtual Machine which requires VM SKU, OS Disk & OS Image to support it (Gen 2). To learn more about Trusted Launch, visit https://aka.ms/trustedlaunch. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-trustedlaunch n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-decommissioned-mg Decommissioned inherited mibelle-mg false false Unused resources driving cost should be avoided Optimize cost by detecting unused but chargeable resources. Leverage this Azure Policy Initiative as a cost control tool to reveal orphaned resources that are contributing cost. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/audit-unusedresourcescostoptimization PolicySet Custom Cost Optimization true n/a EffectDisks=Audit, EffectPublicIpAddresses=Audit, EffectServerFarms=Audit Default 0 0 0 0 0 none Unused resources driving cost should be avoided This Policy initiative is a group of Policy definitions that help optimize cost by detecting unused but chargeable resources. Leverage this Policy initiative as a cost control to reveal orphaned resources that are driving cost. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-unusedresources n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-decommissioned-mg Decommissioned inherited mibelle-mg false false Not allowed resource types Restrict which resource types can be deployed in your environment. Limiting resource types can reduce the complexity and attack surface of your environment while also helping to manage costs. Compliance results are only shown for non-compliant resources. /providers/microsoft.authorization/policydefinitions/6c112d4e-5bc7-47ae-a041-ea2d9dccd749 Policy BuiltIn General False Deny effect=Deny, listOfResourceTypesNotAllowed=Microsoft.ClassicCompute/capabilities; Microsoft.ClassicCompute/checkDomainNameAvailability; Microsoft.ClassicCompute/domainNames; Microsoft.ClassicCompute/domainNames/capabilities; Microsoft.ClassicCompute/domainNames/internalLoadBalancers; Microsoft.ClassicCompute/domainNames/serviceCertificates; Microsoft.ClassicCompute/domainNames/slots; Microsoft.ClassicCompute/domainNames/slots/roles; Microsoft.ClassicCompute/domainNames/slots/roles/metricDefinitions; Microsoft.ClassicCompute/domainNames/slots/roles/metrics; Microsoft.ClassicCompute/moveSubscriptionResources; Microsoft.ClassicCompute/operatingSystemFamilies; Microsoft.ClassicCompute/operatingSystems; Microsoft.ClassicCompute/operations; Microsoft.ClassicCompute/operationStatuses; Microsoft.ClassicCompute/quotas; Microsoft.ClassicCompute/resourceTypes; Microsoft.ClassicCompute/validateSubscriptionMoveAvailability; Microsoft.ClassicCompute/virtualMachines; Microsoft.ClassicCompute/virtualMachines/diagnosticSettings; Microsoft.ClassicCompute/virtualMachines/metricDefinitions; Microsoft.ClassicCompute/virtualMachines/metrics; Microsoft.ClassicInfrastructureMigrate/classicInfrastructureResources; Microsoft.ClassicNetwork/capabilities; Microsoft.ClassicNetwork/expressRouteCrossConnections; Microsoft.ClassicNetwork/expressRouteCrossConnections/peerings; Microsoft.ClassicNetwork/gatewaySupportedDevices; Microsoft.ClassicNetwork/networkSecurityGroups; Microsoft.ClassicNetwork/operations; Microsoft.ClassicNetwork/quotas; Microsoft.ClassicNetwork/reservedIps; Microsoft.ClassicNetwork/virtualNetworks; Microsoft.ClassicNetwork/virtualNetworks/remoteVirtualNetworkPeeringProxies; Microsoft.ClassicNetwork/virtualNetworks/virtualNetworkPeerings; Microsoft.ClassicStorage/capabilities; Microsoft.ClassicStorage/checkStorageAccountAvailability; Microsoft.ClassicStorage/disks; Microsoft.ClassicStorage/images; Microsoft.ClassicStorage/operations; Microsoft.ClassicStorage/osImages; Microsoft.ClassicStorage/osPlatformImages; Microsoft.ClassicStorage/publicImages; Microsoft.ClassicStorage/quotas; Microsoft.ClassicStorage/storageAccounts; Microsoft.ClassicStorage/storageAccounts/blobServices; Microsoft.ClassicStorage/storageAccounts/fileServices; Microsoft.ClassicStorage/storageAccounts/metricDefinitions; Microsoft.ClassicStorage/storageAccounts/metrics; Microsoft.ClassicStorage/storageAccounts/queueServices; Microsoft.ClassicStorage/storageAccounts/services; Microsoft.ClassicStorage/storageAccounts/services/diagnosticSettings; Microsoft.ClassicStorage/storageAccounts/services/metricDefinitions; Microsoft.ClassicStorage/storageAccounts/services/metrics; Microsoft.ClassicStorage/storageAccounts/tableServices; Microsoft.ClassicStorage/storageAccounts/vmImages; Microsoft.ClassicStorage/vmImages; Microsoft.ClassicSubscription/operations Default 0 0 0 0 0 none Deny the deployment of classic resources Denies deployment of classic resource types under the assigned scope. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deny-classic-resources n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-decommissioned-mg Decommissioned inherited mibelle-mg false false Audit VMs that do not use managed disks This policy audits VMs that do not use managed disks /providers/microsoft.authorization/policydefinitions/06a78e20-9358-41c9-923c-fb736d382a4d Policy BuiltIn Compute False audit Default 0 0 0 0 0 none Deny virtual machines and virtual machine scale sets that do not use managed disk Deny virtual machines that do not use managed disk. It checks the managed disk property on virtual machine OS Disk fields. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deny-unmanageddisk n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-decommissioned-mg Decommissioned inherited mibelle-mg false false Microsoft cloud security benchmark The Microsoft cloud security benchmark initiative represents the policies and controls implementing security recommendations defined in Microsoft cloud security benchmark, see https://aka.ms/azsecbm. This also serves as the Microsoft Defender for Cloud default policy initiative. You can directly assign this initiative, or manage its policies and compliance results within Microsoft Defender for Cloud. /providers/microsoft.authorization/policysetdefinitions/1f3afdf9-d0c9-4c3d-847f-89da613e70a8 PolicySet BuiltIn Security Center False n/a Default 0 0 0 0 0 none Enable Monitoring in Microsoft Defender for Cloud Enable Monitoring in Microsoft Defender for Cloud. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-asc-monitoring n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-decommissioned-mg Decommissioned inherited mibelle-mg false false Configure Azure Activity logs to stream to specified Log Analytics workspace Deploys the diagnostic settings for Azure Activity to stream subscriptions audit logs to a Log Analytics workspace to monitor subscription-level events /providers/microsoft.authorization/policydefinitions/2465583e-4e78-4c15-b6be-a36cbc7c8b0f Policy BuiltIn Monitoring False DeployIfNotExists effect=DeployIfNotExists, logAnalytics=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 0 0 0 0 Monitoring Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/dcb59c88-f014-5e17-840c-6c9aecc66286), Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/82f0c3bf-808b-5863-bf9c-231cfbf9598a) Deploy-AzActivity-Log (SPObjId: 217aa040-8eb0-451b-b81c-0b8f3d200d5a) Deploy Diagnostic Settings for Activity Log to Log Analytics workspace Ensures that Activity Log Diagnostics settings are set to push logs into Log Analytics workspace. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-decommissioned-mg Decommissioned inherited mibelle-mg false false Enable audit category group resource logging for supported resources to Log Analytics Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This initiative deploys diagnostic setting using the audit category group to route logs to Log Analytics for all supported resources. /providers/microsoft.authorization/policysetdefinitions/f5b29bc4-feca-4cc6-a58a-772dd5e290a5 PolicySet BuiltIn Monitoring False n/a logAnalytics=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 0 0 0 0 Monitoring Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b922046a-7a3e-59da-a982-8a5b855791ce), Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/9df772a7-1ce7-5439-ab6b-5d31d69925cc) Deploy-Diag-Logs (SPObjId: 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57) Enable allLogs category group resource logging for supported resources to Log Analytics Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This initiative deploys diagnostic setting using the allLogs category group to route logs to an Event Hub for all supported resources. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-decommissioned-mg Decommissioned inherited mibelle-mg false false Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud Configure the multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud (WDATP, WDATP_EXCLUDE_LINUX_PUBLIC_PREVIEW, WDATP_UNIFIED_SOLUTION etc.). See: https://learn.microsoft.com/azure/defender-for-cloud/integration-defender-for-endpoint for more information. /providers/microsoft.authorization/policysetdefinitions/77b391e3-2d5d-40c3-83bf-65c846b3c6a3 PolicySet BuiltIn Security Center False n/a Default 0 0 0 0 0 Security Admin (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/d730d560-adce-52b7-b10c-36a8ad16a6d3) Deploy-MDEndpointsAMA (SPObjId: 7d365a6d-a7ae-4921-beca-5ce854a76960) Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud Configure the multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud (WDATP, WDATP_EXCLUDE_LINUX_PUBLIC_PREVIEW, WDATP_UNIFIED_SOLUTION etc.). See: https://learn.microsoft.com/azure/defender-for-cloud/integration-defender-for-endpoint for more information. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-mdendpointsama n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-decommissioned-mg Decommissioned inherited mibelle-mg false false Enforce Azure Compute Security Benchmark compliance auditing Enforce Azure Compute Security Benchmark compliance auditing for Windows and Linux virtual machines. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-acsb PolicySet Custom Guest Configuration true n/a Default 0 0 0 0 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/6e26cd22-b41b-5611-aafc-e2c56b14c060) Enforce-ACSB (SPObjId: e1f2e80c-5329-4804-824d-f0b44713985e) Enforce Azure Compute Security Baseline compliance auditing This initiative assignment enables Azure Compute Security Baseline compliance auditing for Windows and Linux virtual machines. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/enforce-acsb n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-mg Landing Zones thisScope Mg false false Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics If a virtual network already has traffic analytics enabled, then, this policy will overwrite its existing settings with the ones provided during policy creation. Traffic analytics is a cloud-based solution that provides visibility into user and application activity in cloud networks. /providers/microsoft.authorization/policydefinitions/052c180e-287d-44c3-86ef-01aeae2d9774 Policy BuiltIn Network False DeployIfNotExists networkWatcherName=/subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourcegroups/networkwatcherrg/providers/microsoft.network/networkwatchers/networkwatcher_westeurope, networkWatcherRG=networkwatcherrg, retentionDays=1, storageId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.storage/storageaccounts/mibmgmtnetprodeuwst01, vnetRegion=westeurope, workspaceRegion=westeurope, workspaceResourceId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 0 0 0 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/94dfdb33-b864-47c9-831d-366721beb989) 52a8c671384a4b609f1d7651 (SPObjId: 6e0d029a-fce4-400f-bff3-45b8d9a8342e) Deploy-TrafficAnalytics-WestEurope Deploy VNet Flow Logs in on All VNet in West Europe & enable Traffic Analytics /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/52a8c671384a4b609f1d7651 n/a 09/04/2025 06:12:52 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 09/04/2025 07:23:12 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-mg Landing Zones thisScope Mg false false Web Application Firewall (WAF) should be enabled for Application Gateway Deploy Azure Web Application Firewall (WAF) in front of public facing web applications for additional inspection of incoming traffic. Web Application Firewall (WAF) provides centralized protection of your web applications from common exploits and vulnerabilities such as SQL injections, Cross-Site Scripting, local and remote file executions. You can also restrict access to your web applications by countries, IP address ranges, and other http(s) parameters via custom rules. /providers/microsoft.authorization/policydefinitions/564feb30-bf6a-4854-b4bb-0d2d2d1e6c66 Policy BuiltIn Network False Audit effect=Audit Default 0 0 0 0 0 none Web Application Firewall (WAF) should be enabled for Application Gateway Assign the WAF should be enabled for Application Gateway audit policy. /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/audit-appgw-waf n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-mg Landing Zones thisScope Mg false false Network interfaces should disable IP forwarding This policy denies the network interfaces which enabled IP forwarding. The setting of IP forwarding disables Azure's check of the source and destination for a network interface. This should be reviewed by the network security team. /providers/microsoft.authorization/policydefinitions/88c0b9da-ce96-4b03-9635-f29a937e2900 Policy BuiltIn Network False deny Default 0 0 0 0 0 none Network interfaces should disable IP forwarding This policy denies the network interfaces which enabled IP forwarding. The setting of IP forwarding disables Azure's check of the source and destination for a network interface. This should be reviewed by the network security team. /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deny-ip-forwarding n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-mg Landing Zones thisScope Mg false false Management port access from the Internet should be blocked This policy denies any network security rule that allows management port access from the Internet, by default blocking SSH/RDP ports. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-mgmtports-from-internet Policy Custom Network true Deny effect=Deny Default 0 0 0 0 0 none Management port access from the Internet should be blocked This policy denies any network security rule that allows management port access from the Internet /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deny-mgmtports-internet n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-mg Landing Zones thisScope Mg false false Kubernetes cluster should not allow privileged containers Do not allow privileged containers creation in a Kubernetes cluster. This recommendation is part of CIS 5.2.1 which is intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. /providers/microsoft.authorization/policydefinitions/95edb821-ddaf-4404-9732-666045e056b4 Policy BuiltIn Kubernetes False deny effect=deny Default 0 0 0 0 0 none Kubernetes cluster should not allow privileged containers Do not allow privileged containers creation in a Kubernetes cluster. This recommendation is part of CIS 5.2.1 which is intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deny-priv-containers-aks n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-mg Landing Zones thisScope Mg false false Kubernetes clusters should not allow container privilege escalation Do not allow containers to run with privilege escalation to root in a Kubernetes cluster. This recommendation is part of CIS 5.2.5 which is intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. /providers/microsoft.authorization/policydefinitions/1c6e92c9-99f0-4e55-9cf2-0c234dc48f99 Policy BuiltIn Kubernetes False deny effect=deny Default 0 0 0 0 0 none Kubernetes clusters should not allow container privilege escalation Do not allow containers to run with privilege escalation to root in a Kubernetes cluster. This recommendation is part of CIS 5.2.5 which is intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deny-priv-escalation-aks n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-mg Landing Zones thisScope Mg false false Secure transfer to storage accounts should be enabled Audit requirement of Secure transfer in your storage account. Secure transfer is an option that forces your storage account to accept requests only from secure connections (HTTPS). Use of HTTPS ensures authentication between the server and the service and protects data in transit from network layer attacks such as man-in-the-middle, eavesdropping, and session-hijacking /providers/microsoft.authorization/policydefinitions/404c3081-a854-4457-ae30-26a93ef643f9 Policy BuiltIn Storage False Deny effect=Deny Default 0 1 0 8 0 none Secure transfer to storage accounts should be enabled Audit requirement of Secure transfer in your storage account. Secure transfer is an option that forces your storage account to accept requests only from secure connections (HTTPS). Use of HTTPS ensures authentication between the server and the service and protects data in transit from network layer attacks such as man-in-the-middle, eavesdropping, and session-hijacking. /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deny-storage-http n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-mg Landing Zones thisScope Mg false false Configure SQL servers to have auditing enabled to Log Analytics workspace To ensure the operations performed against your SQL assets are captured, SQL servers should have auditing enabled. If auditing is not enabled, this policy will configure auditing events to flow to the specified Log Analytics workspace. /providers/microsoft.authorization/policydefinitions/25da7dfb-0666-4a15-a8f5-402127efd8bb Policy BuiltIn SQL False DeployIfNotExists effect=DeployIfNotExists, logAnalyticsWorkspaceId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 0 0 0 0 SQL Security Manager (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/2f1eab15-c92e-52cd-8b0c-a60e52f1b331), SQL Security Manager (/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/providers/microsoft.authorization/roleassignments/ce81334b-c425-5087-9b8d-2119e050082b), Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/488f45ec-c535-5f65-85bf-acacd1bb93e8), Log Analytics Contributor (/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/providers/microsoft.authorization/roleassignments/fbb2af70-7587-52bd-b3e1-54fcdbdb7ea4) Deploy-AzSqlDb-Auditing (SPObjId: afb169da-f80a-4dd6-abf3-b7fc08efb8ae) Configure SQL servers to have auditing enabled to Log Analytics workspace To ensure the operations performed against your SQL assets are captured, SQL servers should have auditing enabled. If auditing is not enabled, this policy will configure auditing events to flow to the specified Log Analytics workspace. /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deploy-azsqldb-auditing n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-mg Landing Zones thisScope Mg false false Deploy SQL DB transparent data encryption Enables transparent data encryption on SQL databases /providers/microsoft.authorization/policydefinitions/86a912f6-9a06-4e26-b447-11b16ba8659f Policy BuiltIn SQL False DeployIfNotExists Default 0 0 0 0 0 SQL DB Contributor (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/af2f6b24-ac34-5f3b-9249-5a109d9d1528) Deploy-SQL-TDE (SPObjId: de5ed213-fd75-471c-8d32-920072d6c378) Deploy TDE on SQL servers This policy ensures that Transparent Data Encryption is enabled on SQL Servers. /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deploy-sql-tde n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-mg Landing Zones thisScope Mg false false Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics If a virtual network already has traffic analytics enabled, then, this policy will overwrite its existing settings with the ones provided during policy creation. Traffic analytics is a cloud-based solution that provides visibility into user and application activity in cloud networks. /providers/microsoft.authorization/policydefinitions/052c180e-287d-44c3-86ef-01aeae2d9774 Policy BuiltIn Network False DeployIfNotExists networkWatcherName=/subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourcegroups/networkwatcherrg/providers/microsoft.network/networkwatchers/networkwatcher_northeurope, networkWatcherRG=networkwatcherrg, retentionDays=1, storageId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.storage/storageaccounts/mibmgmtnetprodeunst01, vnetRegion=northeurope, workspaceRegion=westeurope, workspaceResourceId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 0 0 0 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/3fb7bac5-2328-4e74-a5b0-0d6d2a631693) e9143c36572348c3ba0c67b1 (SPObjId: 9c3b725e-ce85-47ac-bf6f-c2fa0571c259) Deploy-TrafficAnalytics-NorthEurope Deploy VNet Flow Logs in on All VNet in North Europe & enable Traffic Analytics /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/e9143c36572348c3ba0c67b1 n/a 09/04/2025 07:17:59 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 09/04/2025 07:33:42 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-mg Landing Zones thisScope Mg false false Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines Configure auto-assessment (every 24 hours) for OS updates. You can control the scope of assignment according to machine subscription, resource group, location or tag. Learn more about this for Windows: https://aka.ms/computevm-windowspatchassessmentmode, for Linux: https://aka.ms/computevm-linuxpatchassessmentmode. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-aum-checkupdates PolicySet Custom Security Center true n/a assessmentMode=AutomaticByPlatform Default 0 0 0 0 0 Virtual Machine Contributor (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/571da045-f503-5cb2-b123-ede8cfe0f15a), Azure Connected Machine Resource Administrator (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/7d65b18e-df43-5353-85a4-716e68ff7c7a), Managed Identity Operator (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/b2c88903-f3a4-54ec-813c-46d650309b86) Enable-AUM-CheckUpdates (SPObjId: 4f27b633-c16b-47a6-ab24-737bb6cdad56) Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines. Configure auto-assessment (every 24 hours) for OS updates. You can control the scope of assignment according to machine subscription, resource group, location or tag. Learn more about this for Windows: https://aka.ms/computevm-windowspatchassessmentmode, for Linux: https://aka.ms/computevm-linuxpatchassessmentmode. /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-mg Landing Zones thisScope Mg false false Kubernetes clusters should be accessible only over HTTPS Use of HTTPS ensures authentication and protects data in transit from network layer eavesdropping attacks. This capability is currently generally available for Kubernetes Service (AKS), and in preview for Azure Arc enabled Kubernetes. For more info, visit https://aka.ms/kubepolicydoc /providers/microsoft.authorization/policydefinitions/1a5b4dca-0b6f-4cf5-907c-56316bc1bf3d Policy BuiltIn Kubernetes False deny effect=deny Default 0 0 0 0 0 none Kubernetes clusters should be accessible only over HTTPS Use of HTTPS ensures authentication and protects data in transit from network layer eavesdropping attacks. This capability is currently generally available for Kubernetes Service (AKS), and in preview for AKS Engine and Azure Arc enabled Kubernetes. For more info, visit https://aka.ms/kubepolicydoc. /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enforce-aks-https n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-mg Landing Zones thisScope Mg false false Enforce recommended guardrails for Azure Key Vault Enforce recommended guardrails for Azure Key Vault. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-keyvault PolicySet Custom Key Vault true n/a Default 2 8 2 1 0 none Enforce recommended guardrails for Azure Key Vault This initiative assignment enables recommended ALZ guardrails for Azure Key Vault. /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enforce-gr-keyvault n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-mg Landing Zones thisScope Mg false false Subnets should be private Ensure your subnets are secure by default by preventing default outbound access. For more information go to https://aka.ms/defaultoutboundaccessretirement /providers/microsoft.authorization/policydefinitions/7bca8353-aa3b-429b-904a-9229c4385837 Policy BuiltIn Network False Audit Default 0 0 0 0 0 none Subnets should be private Ensure your subnets are secure by default by preventing default outbound access. For more information go to https://aka.ms/defaultoutboundaccessretirement /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enforce-subnet-private n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-mg Landing Zones inherited mibelle-mg false false Audit resource location matches resource group location Audit that the resource location matches its resource group location /providers/microsoft.authorization/policydefinitions/0a914e76-4921-4c19-b460-a2d36003525a Policy BuiltIn General False audit Default 1 0 5 56 0 none Audit that the resource location matches its resource group location Audit resource location matches resource group location /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-location-match n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-mg Landing Zones inherited mibelle-mg false false Audit virtual machines for Trusted Launch support Trusted Launch improves security of a Virtual Machine which requires VM SKU, OS Disk & OS Image to support it (Gen 2). To learn more about Trusted Launch, visit https://aka.ms/trustedlaunch. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/audit-trustedlaunch PolicySet Custom Trusted Launch true n/a Default 0 0 0 0 0 none Audit virtual machines for Trusted Launch support Trusted Launch improves security of a Virtual Machine which requires VM SKU, OS Disk & OS Image to support it (Gen 2). To learn more about Trusted Launch, visit https://aka.ms/trustedlaunch. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-trustedlaunch n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-mg Landing Zones inherited mibelle-mg false false Unused resources driving cost should be avoided Optimize cost by detecting unused but chargeable resources. Leverage this Azure Policy Initiative as a cost control tool to reveal orphaned resources that are contributing cost. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/audit-unusedresourcescostoptimization PolicySet Custom Cost Optimization true n/a EffectDisks=Audit, EffectPublicIpAddresses=Audit, EffectServerFarms=Audit Default 0 1 0 5 0 none Unused resources driving cost should be avoided This Policy initiative is a group of Policy definitions that help optimize cost by detecting unused but chargeable resources. Leverage this Policy initiative as a cost control to reveal orphaned resources that are driving cost. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-unusedresources n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-mg Landing Zones inherited mibelle-mg false false Not allowed resource types Restrict which resource types can be deployed in your environment. Limiting resource types can reduce the complexity and attack surface of your environment while also helping to manage costs. Compliance results are only shown for non-compliant resources. /providers/microsoft.authorization/policydefinitions/6c112d4e-5bc7-47ae-a041-ea2d9dccd749 Policy BuiltIn General False Deny effect=Deny, listOfResourceTypesNotAllowed=Microsoft.ClassicCompute/capabilities; Microsoft.ClassicCompute/checkDomainNameAvailability; Microsoft.ClassicCompute/domainNames; Microsoft.ClassicCompute/domainNames/capabilities; Microsoft.ClassicCompute/domainNames/internalLoadBalancers; Microsoft.ClassicCompute/domainNames/serviceCertificates; Microsoft.ClassicCompute/domainNames/slots; Microsoft.ClassicCompute/domainNames/slots/roles; Microsoft.ClassicCompute/domainNames/slots/roles/metricDefinitions; Microsoft.ClassicCompute/domainNames/slots/roles/metrics; Microsoft.ClassicCompute/moveSubscriptionResources; Microsoft.ClassicCompute/operatingSystemFamilies; Microsoft.ClassicCompute/operatingSystems; Microsoft.ClassicCompute/operations; Microsoft.ClassicCompute/operationStatuses; Microsoft.ClassicCompute/quotas; Microsoft.ClassicCompute/resourceTypes; Microsoft.ClassicCompute/validateSubscriptionMoveAvailability; Microsoft.ClassicCompute/virtualMachines; Microsoft.ClassicCompute/virtualMachines/diagnosticSettings; Microsoft.ClassicCompute/virtualMachines/metricDefinitions; Microsoft.ClassicCompute/virtualMachines/metrics; Microsoft.ClassicInfrastructureMigrate/classicInfrastructureResources; Microsoft.ClassicNetwork/capabilities; Microsoft.ClassicNetwork/expressRouteCrossConnections; Microsoft.ClassicNetwork/expressRouteCrossConnections/peerings; Microsoft.ClassicNetwork/gatewaySupportedDevices; Microsoft.ClassicNetwork/networkSecurityGroups; Microsoft.ClassicNetwork/operations; Microsoft.ClassicNetwork/quotas; Microsoft.ClassicNetwork/reservedIps; Microsoft.ClassicNetwork/virtualNetworks; Microsoft.ClassicNetwork/virtualNetworks/remoteVirtualNetworkPeeringProxies; Microsoft.ClassicNetwork/virtualNetworks/virtualNetworkPeerings; Microsoft.ClassicStorage/capabilities; Microsoft.ClassicStorage/checkStorageAccountAvailability; Microsoft.ClassicStorage/disks; Microsoft.ClassicStorage/images; Microsoft.ClassicStorage/operations; Microsoft.ClassicStorage/osImages; Microsoft.ClassicStorage/osPlatformImages; Microsoft.ClassicStorage/publicImages; Microsoft.ClassicStorage/quotas; Microsoft.ClassicStorage/storageAccounts; Microsoft.ClassicStorage/storageAccounts/blobServices; Microsoft.ClassicStorage/storageAccounts/fileServices; Microsoft.ClassicStorage/storageAccounts/metricDefinitions; Microsoft.ClassicStorage/storageAccounts/metrics; Microsoft.ClassicStorage/storageAccounts/queueServices; Microsoft.ClassicStorage/storageAccounts/services; Microsoft.ClassicStorage/storageAccounts/services/diagnosticSettings; Microsoft.ClassicStorage/storageAccounts/services/metricDefinitions; Microsoft.ClassicStorage/storageAccounts/services/metrics; Microsoft.ClassicStorage/storageAccounts/tableServices; Microsoft.ClassicStorage/storageAccounts/vmImages; Microsoft.ClassicStorage/vmImages; Microsoft.ClassicSubscription/operations Default 0 0 0 0 0 none Deny the deployment of classic resources Denies deployment of classic resource types under the assigned scope. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deny-classic-resources n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-mg Landing Zones inherited mibelle-mg false false Audit VMs that do not use managed disks This policy audits VMs that do not use managed disks /providers/microsoft.authorization/policydefinitions/06a78e20-9358-41c9-923c-fb736d382a4d Policy BuiltIn Compute False audit Default 0 0 0 0 0 none Deny virtual machines and virtual machine scale sets that do not use managed disk Deny virtual machines that do not use managed disk. It checks the managed disk property on virtual machine OS Disk fields. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deny-unmanageddisk n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-mg Landing Zones inherited mibelle-mg false false Microsoft cloud security benchmark The Microsoft cloud security benchmark initiative represents the policies and controls implementing security recommendations defined in Microsoft cloud security benchmark, see https://aka.ms/azsecbm. This also serves as the Microsoft Defender for Cloud default policy initiative. You can directly assign this initiative, or manage its policies and compliance results within Microsoft Defender for Cloud. /providers/microsoft.authorization/policysetdefinitions/1f3afdf9-d0c9-4c3d-847f-89da613e70a8 PolicySet BuiltIn Security Center False n/a Default 35 14 32 0 0 none Enable Monitoring in Microsoft Defender for Cloud Enable Monitoring in Microsoft Defender for Cloud. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-asc-monitoring n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-mg Landing Zones inherited mibelle-mg false false Configure Azure Activity logs to stream to specified Log Analytics workspace Deploys the diagnostic settings for Azure Activity to stream subscriptions audit logs to a Log Analytics workspace to monitor subscription-level events /providers/microsoft.authorization/policydefinitions/2465583e-4e78-4c15-b6be-a36cbc7c8b0f Policy BuiltIn Monitoring False DeployIfNotExists effect=DeployIfNotExists, logAnalytics=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 1 0 2 0 0 Monitoring Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/dcb59c88-f014-5e17-840c-6c9aecc66286), Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/82f0c3bf-808b-5863-bf9c-231cfbf9598a) Deploy-AzActivity-Log (SPObjId: 217aa040-8eb0-451b-b81c-0b8f3d200d5a) Deploy Diagnostic Settings for Activity Log to Log Analytics workspace Ensures that Activity Log Diagnostics settings are set to push logs into Log Analytics workspace. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-mg Landing Zones inherited mibelle-mg false false Enable audit category group resource logging for supported resources to Log Analytics Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This initiative deploys diagnostic setting using the audit category group to route logs to Log Analytics for all supported resources. /providers/microsoft.authorization/policysetdefinitions/f5b29bc4-feca-4cc6-a58a-772dd5e290a5 PolicySet BuiltIn Monitoring False n/a logAnalytics=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 4 0 10 0 Monitoring Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b922046a-7a3e-59da-a982-8a5b855791ce), Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/9df772a7-1ce7-5439-ab6b-5d31d69925cc) Deploy-Diag-Logs (SPObjId: 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57) Enable allLogs category group resource logging for supported resources to Log Analytics Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This initiative deploys diagnostic setting using the allLogs category group to route logs to an Event Hub for all supported resources. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-mg Landing Zones inherited mibelle-mg false false Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud Configure the multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud (WDATP, WDATP_EXCLUDE_LINUX_PUBLIC_PREVIEW, WDATP_UNIFIED_SOLUTION etc.). See: https://learn.microsoft.com/azure/defender-for-cloud/integration-defender-for-endpoint for more information. /providers/microsoft.authorization/policysetdefinitions/77b391e3-2d5d-40c3-83bf-65c846b3c6a3 PolicySet BuiltIn Security Center False n/a Default 0 3 0 2 0 Security Admin (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/d730d560-adce-52b7-b10c-36a8ad16a6d3) Deploy-MDEndpointsAMA (SPObjId: 7d365a6d-a7ae-4921-beca-5ce854a76960) Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud Configure the multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud (WDATP, WDATP_EXCLUDE_LINUX_PUBLIC_PREVIEW, WDATP_UNIFIED_SOLUTION etc.). See: https://learn.microsoft.com/azure/defender-for-cloud/integration-defender-for-endpoint for more information. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-mdendpointsama n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-mg Landing Zones inherited mibelle-mg false false Enforce Azure Compute Security Benchmark compliance auditing Enforce Azure Compute Security Benchmark compliance auditing for Windows and Linux virtual machines. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-acsb PolicySet Custom Guest Configuration true n/a Default 0 0 0 0 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/6e26cd22-b41b-5611-aafc-e2c56b14c060) Enforce-ACSB (SPObjId: e1f2e80c-5329-4804-824d-f0b44713985e) Enforce Azure Compute Security Baseline compliance auditing This initiative assignment enables Azure Compute Security Baseline compliance auditing for Windows and Linux virtual machines. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/enforce-acsb n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-mg Platform inherited mibelle-mg false false Audit resource location matches resource group location Audit that the resource location matches its resource group location /providers/microsoft.authorization/policydefinitions/0a914e76-4921-4c19-b460-a2d36003525a Policy BuiltIn General False audit Default 1 0 3 534 0 none Audit that the resource location matches its resource group location Audit resource location matches resource group location /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-location-match n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-mg Platform inherited mibelle-mg false false Audit virtual machines for Trusted Launch support Trusted Launch improves security of a Virtual Machine which requires VM SKU, OS Disk & OS Image to support it (Gen 2). To learn more about Trusted Launch, visit https://aka.ms/trustedlaunch. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/audit-trustedlaunch PolicySet Custom Trusted Launch true n/a Default 2 0 10 7 0 none Audit virtual machines for Trusted Launch support Trusted Launch improves security of a Virtual Machine which requires VM SKU, OS Disk & OS Image to support it (Gen 2). To learn more about Trusted Launch, visit https://aka.ms/trustedlaunch. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-trustedlaunch n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-mg Platform inherited mibelle-mg false false Unused resources driving cost should be avoided Optimize cost by detecting unused but chargeable resources. Leverage this Azure Policy Initiative as a cost control tool to reveal orphaned resources that are contributing cost. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/audit-unusedresourcescostoptimization PolicySet Custom Cost Optimization true n/a EffectDisks=Audit, EffectPublicIpAddresses=Audit, EffectServerFarms=Audit Default 1 3 1 21 0 none Unused resources driving cost should be avoided This Policy initiative is a group of Policy definitions that help optimize cost by detecting unused but chargeable resources. Leverage this Policy initiative as a cost control to reveal orphaned resources that are driving cost. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-unusedresources n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-mg Platform inherited mibelle-mg false false Not allowed resource types Restrict which resource types can be deployed in your environment. Limiting resource types can reduce the complexity and attack surface of your environment while also helping to manage costs. Compliance results are only shown for non-compliant resources. /providers/microsoft.authorization/policydefinitions/6c112d4e-5bc7-47ae-a041-ea2d9dccd749 Policy BuiltIn General False Deny effect=Deny, listOfResourceTypesNotAllowed=Microsoft.ClassicCompute/capabilities; Microsoft.ClassicCompute/checkDomainNameAvailability; Microsoft.ClassicCompute/domainNames; Microsoft.ClassicCompute/domainNames/capabilities; Microsoft.ClassicCompute/domainNames/internalLoadBalancers; Microsoft.ClassicCompute/domainNames/serviceCertificates; Microsoft.ClassicCompute/domainNames/slots; Microsoft.ClassicCompute/domainNames/slots/roles; Microsoft.ClassicCompute/domainNames/slots/roles/metricDefinitions; Microsoft.ClassicCompute/domainNames/slots/roles/metrics; Microsoft.ClassicCompute/moveSubscriptionResources; Microsoft.ClassicCompute/operatingSystemFamilies; Microsoft.ClassicCompute/operatingSystems; Microsoft.ClassicCompute/operations; Microsoft.ClassicCompute/operationStatuses; Microsoft.ClassicCompute/quotas; Microsoft.ClassicCompute/resourceTypes; Microsoft.ClassicCompute/validateSubscriptionMoveAvailability; Microsoft.ClassicCompute/virtualMachines; Microsoft.ClassicCompute/virtualMachines/diagnosticSettings; Microsoft.ClassicCompute/virtualMachines/metricDefinitions; Microsoft.ClassicCompute/virtualMachines/metrics; Microsoft.ClassicInfrastructureMigrate/classicInfrastructureResources; Microsoft.ClassicNetwork/capabilities; Microsoft.ClassicNetwork/expressRouteCrossConnections; Microsoft.ClassicNetwork/expressRouteCrossConnections/peerings; Microsoft.ClassicNetwork/gatewaySupportedDevices; Microsoft.ClassicNetwork/networkSecurityGroups; Microsoft.ClassicNetwork/operations; Microsoft.ClassicNetwork/quotas; Microsoft.ClassicNetwork/reservedIps; Microsoft.ClassicNetwork/virtualNetworks; Microsoft.ClassicNetwork/virtualNetworks/remoteVirtualNetworkPeeringProxies; Microsoft.ClassicNetwork/virtualNetworks/virtualNetworkPeerings; Microsoft.ClassicStorage/capabilities; Microsoft.ClassicStorage/checkStorageAccountAvailability; Microsoft.ClassicStorage/disks; Microsoft.ClassicStorage/images; Microsoft.ClassicStorage/operations; Microsoft.ClassicStorage/osImages; Microsoft.ClassicStorage/osPlatformImages; Microsoft.ClassicStorage/publicImages; Microsoft.ClassicStorage/quotas; Microsoft.ClassicStorage/storageAccounts; Microsoft.ClassicStorage/storageAccounts/blobServices; Microsoft.ClassicStorage/storageAccounts/fileServices; Microsoft.ClassicStorage/storageAccounts/metricDefinitions; Microsoft.ClassicStorage/storageAccounts/metrics; Microsoft.ClassicStorage/storageAccounts/queueServices; Microsoft.ClassicStorage/storageAccounts/services; Microsoft.ClassicStorage/storageAccounts/services/diagnosticSettings; Microsoft.ClassicStorage/storageAccounts/services/metricDefinitions; Microsoft.ClassicStorage/storageAccounts/services/metrics; Microsoft.ClassicStorage/storageAccounts/tableServices; Microsoft.ClassicStorage/storageAccounts/vmImages; Microsoft.ClassicStorage/vmImages; Microsoft.ClassicSubscription/operations Default 0 0 0 0 0 none Deny the deployment of classic resources Denies deployment of classic resource types under the assigned scope. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deny-classic-resources n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-mg Platform inherited mibelle-mg false false Audit VMs that do not use managed disks This policy audits VMs that do not use managed disks /providers/microsoft.authorization/policydefinitions/06a78e20-9358-41c9-923c-fb736d382a4d Policy BuiltIn Compute False audit Default 0 1 0 7 0 none Deny virtual machines and virtual machine scale sets that do not use managed disk Deny virtual machines that do not use managed disk. It checks the managed disk property on virtual machine OS Disk fields. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deny-unmanageddisk n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-mg Platform inherited mibelle-mg false false Microsoft cloud security benchmark The Microsoft cloud security benchmark initiative represents the policies and controls implementing security recommendations defined in Microsoft cloud security benchmark, see https://aka.ms/azsecbm. This also serves as the Microsoft Defender for Cloud default policy initiative. You can directly assign this initiative, or manage its policies and compliance results within Microsoft Defender for Cloud. /providers/microsoft.authorization/policysetdefinitions/1f3afdf9-d0c9-4c3d-847f-89da613e70a8 PolicySet BuiltIn Security Center False n/a Default 49 27 154 46 0 none Enable Monitoring in Microsoft Defender for Cloud Enable Monitoring in Microsoft Defender for Cloud. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-asc-monitoring n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-mg Platform inherited mibelle-mg false false Configure Azure Activity logs to stream to specified Log Analytics workspace Deploys the diagnostic settings for Azure Activity to stream subscriptions audit logs to a Log Analytics workspace to monitor subscription-level events /providers/microsoft.authorization/policydefinitions/2465583e-4e78-4c15-b6be-a36cbc7c8b0f Policy BuiltIn Monitoring False DeployIfNotExists effect=DeployIfNotExists, logAnalytics=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 1 0 2 1 0 Monitoring Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/dcb59c88-f014-5e17-840c-6c9aecc66286), Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/82f0c3bf-808b-5863-bf9c-231cfbf9598a) Deploy-AzActivity-Log (SPObjId: 217aa040-8eb0-451b-b81c-0b8f3d200d5a) Deploy Diagnostic Settings for Activity Log to Log Analytics workspace Ensures that Activity Log Diagnostics settings are set to push logs into Log Analytics workspace. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-mg Platform inherited mibelle-mg false false Enable audit category group resource logging for supported resources to Log Analytics Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This initiative deploys diagnostic setting using the audit category group to route logs to Log Analytics for all supported resources. /providers/microsoft.authorization/policysetdefinitions/f5b29bc4-feca-4cc6-a58a-772dd5e290a5 PolicySet BuiltIn Monitoring False n/a logAnalytics=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 1 4 1 8 0 Monitoring Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b922046a-7a3e-59da-a982-8a5b855791ce), Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/9df772a7-1ce7-5439-ab6b-5d31d69925cc) Deploy-Diag-Logs (SPObjId: 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57) Enable allLogs category group resource logging for supported resources to Log Analytics Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This initiative deploys diagnostic setting using the allLogs category group to route logs to an Event Hub for all supported resources. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-mg Platform inherited mibelle-mg false false Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud Configure the multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud (WDATP, WDATP_EXCLUDE_LINUX_PUBLIC_PREVIEW, WDATP_UNIFIED_SOLUTION etc.). See: https://learn.microsoft.com/azure/defender-for-cloud/integration-defender-for-endpoint for more information. /providers/microsoft.authorization/policysetdefinitions/77b391e3-2d5d-40c3-83bf-65c846b3c6a3 PolicySet BuiltIn Security Center False n/a Default 0 3 0 3 0 Security Admin (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/d730d560-adce-52b7-b10c-36a8ad16a6d3) Deploy-MDEndpointsAMA (SPObjId: 7d365a6d-a7ae-4921-beca-5ce854a76960) Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud Configure the multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud (WDATP, WDATP_EXCLUDE_LINUX_PUBLIC_PREVIEW, WDATP_UNIFIED_SOLUTION etc.). See: https://learn.microsoft.com/azure/defender-for-cloud/integration-defender-for-endpoint for more information. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-mdendpointsama n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-mg Platform inherited mibelle-mg false false Enforce Azure Compute Security Benchmark compliance auditing Enforce Azure Compute Security Benchmark compliance auditing for Windows and Linux virtual machines. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-acsb PolicySet Custom Guest Configuration true n/a Default 3 2 121 0 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/6e26cd22-b41b-5611-aafc-e2c56b14c060) Enforce-ACSB (SPObjId: e1f2e80c-5329-4804-824d-f0b44713985e) Enforce Azure Compute Security Baseline compliance auditing This initiative assignment enables Azure Compute Security Baseline compliance auditing for Windows and Linux virtual machines. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/enforce-acsb n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-mg Platform thisScope Mg false false Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics If a virtual network already has traffic analytics enabled, then, this policy will overwrite its existing settings with the ones provided during policy creation. Traffic analytics is a cloud-based solution that provides visibility into user and application activity in cloud networks. /providers/microsoft.authorization/policydefinitions/052c180e-287d-44c3-86ef-01aeae2d9774 Policy BuiltIn Network False DeployIfNotExists networkWatcherName=/subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourcegroups/networkwatcherrg/providers/microsoft.network/networkwatchers/networkwatcher_northeurope, networkWatcherRG=networkwatcherrg, retentionDays=1, storageId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.storage/storageaccounts/mibmgmtnetprodeunst01, vnetRegion=northeurope, workspaceRegion=westeurope, workspaceResourceId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 0 0 0 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/71689b0c-ca78-4285-9603-49a5497225d8) 97339ff59e1744678fd92dea (SPObjId: c2b8a553-ec19-42b8-8855-6edc985eaffb) Deploy-TrafficAnalytics-NorthEurope Deploy VNet Flow Logs in on All VNet in North Europe & enable Traffic Analytics /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/97339ff59e1744678fd92dea n/a 09/04/2025 07:21:45 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 09/04/2025 07:34:08 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-mg Platform thisScope Mg false false Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics If a virtual network already has traffic analytics enabled, then, this policy will overwrite its existing settings with the ones provided during policy creation. Traffic analytics is a cloud-based solution that provides visibility into user and application activity in cloud networks. /providers/microsoft.authorization/policydefinitions/052c180e-287d-44c3-86ef-01aeae2d9774 Policy BuiltIn Network False DeployIfNotExists networkWatcherName=/subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourcegroups/networkwatcherrg/providers/microsoft.network/networkwatchers/networkwatcher_westeurope, networkWatcherRG=networkwatcherrg, retentionDays=1, storageId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.storage/storageaccounts/mibmgmtnetprodeuwst01, vnetRegion=westeurope, workspaceRegion=westeurope, workspaceResourceId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 1 0 1 2 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/21c0b216-76ff-44ef-9430-19f801e102d5) d33eb38085bf40bd860fe43b (SPObjId: 78dd5b73-2109-4a10-b2e4-6463304b4b4d) Deploy-TrafficAnalytics-WestEurope Deploy VNet Flow Logs in on All VNet in North Europe & enable Traffic Analytics /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/d33eb38085bf40bd860fe43b n/a 06/12/2025 18:15:24 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 09/04/2025 07:24:28 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-mg Platform thisScope Mg false false Do not allow deletion of specified resource and resource type This policy enables you to specify the resource and resource type that your organization can protect from accidentals deletion by blocking delete calls using the deny action effect. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/denyaction-deleteresources Policy Custom General true DenyAction effect=DenyAction, resourceName=mibelle-mgmt-log-prod-euw-id-01, resourceType=Microsoft.ManagedIdentity/userAssignedIdentities Default 0 0 0 0 0 none Do not allow deletion of the User Assigned Managed Identity used by AMA This policy provides a safeguard against accidental removal of the User Assigned Managed Identity used by AMA by blocking delete calls using deny action effect. /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/denyaction-deleteuamiama n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-mg Platform thisScope Mg false false Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines Configure auto-assessment (every 24 hours) for OS updates. You can control the scope of assignment according to machine subscription, resource group, location or tag. Learn more about this for Windows: https://aka.ms/computevm-windowspatchassessmentmode, for Linux: https://aka.ms/computevm-linuxpatchassessmentmode. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-aum-checkupdates PolicySet Custom Security Center true n/a assessmentMode=AutomaticByPlatform Default 0 4 0 123 0 Virtual Machine Contributor (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/51e23aa4-bdf1-5059-8efc-453852a14d5e), Azure Connected Machine Resource Administrator (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/d72b7c0f-a23a-58ed-8e0a-40f49a5b6ab3), Managed Identity Operator (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/1f97b9d8-3c21-5b8b-9b36-72e77d4a90e0) Enable-AUM-CheckUpdates (SPObjId: ce67e461-e4a3-4514-89cb-7eb8802f8f65) Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines. Configure auto-assessment (every 24 hours) for OS updates. You can control the scope of assignment according to machine subscription, resource group, location or tag. Learn more about this for Windows: https://aka.ms/computevm-windowspatchassessmentmode, for Linux: https://aka.ms/computevm-linuxpatchassessmentmode. /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates n/a 06/12/2025 17:56:38 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-mg Platform thisScope Mg false false Enforce recommended guardrails for Azure Key Vault Enforce recommended guardrails for Azure Key Vault. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-keyvault PolicySet Custom Key Vault true n/a Default 3 5 1 0 0 none Enforce recommended guardrails for Azure Key Vault This initiative assignment enables recommended ALZ guardrails for Azure Key Vault. /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enforce-gr-keyvault n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-mg Platform thisScope Mg false false Subnets should be private Ensure your subnets are secure by default by preventing default outbound access. For more information go to https://aka.ms/defaultoutboundaccessretirement /providers/microsoft.authorization/policydefinitions/7bca8353-aa3b-429b-904a-9229c4385837 Policy BuiltIn Network False Audit Default 1 0 15 0 0 none Subnets should be private Ensure your subnets are secure by default by preventing default outbound access. For more information go to https://aka.ms/defaultoutboundaccessretirement /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enforce-subnet-private n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-sandbox-mg Sandbox inherited mibelle-mg false false Audit resource location matches resource group location Audit that the resource location matches its resource group location /providers/microsoft.authorization/policydefinitions/0a914e76-4921-4c19-b460-a2d36003525a Policy BuiltIn General False audit Default 0 0 0 0 0 none Audit that the resource location matches its resource group location Audit resource location matches resource group location /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-location-match n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-sandbox-mg Sandbox inherited mibelle-mg false false Audit virtual machines for Trusted Launch support Trusted Launch improves security of a Virtual Machine which requires VM SKU, OS Disk & OS Image to support it (Gen 2). To learn more about Trusted Launch, visit https://aka.ms/trustedlaunch. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/audit-trustedlaunch PolicySet Custom Trusted Launch true n/a Default 0 0 0 0 0 none Audit virtual machines for Trusted Launch support Trusted Launch improves security of a Virtual Machine which requires VM SKU, OS Disk & OS Image to support it (Gen 2). To learn more about Trusted Launch, visit https://aka.ms/trustedlaunch. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-trustedlaunch n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-sandbox-mg Sandbox inherited mibelle-mg false false Unused resources driving cost should be avoided Optimize cost by detecting unused but chargeable resources. Leverage this Azure Policy Initiative as a cost control tool to reveal orphaned resources that are contributing cost. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/audit-unusedresourcescostoptimization PolicySet Custom Cost Optimization true n/a EffectDisks=Audit, EffectPublicIpAddresses=Audit, EffectServerFarms=Audit Default 0 0 0 0 0 none Unused resources driving cost should be avoided This Policy initiative is a group of Policy definitions that help optimize cost by detecting unused but chargeable resources. Leverage this Policy initiative as a cost control to reveal orphaned resources that are driving cost. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-unusedresources n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-sandbox-mg Sandbox inherited mibelle-mg false false Not allowed resource types Restrict which resource types can be deployed in your environment. Limiting resource types can reduce the complexity and attack surface of your environment while also helping to manage costs. Compliance results are only shown for non-compliant resources. /providers/microsoft.authorization/policydefinitions/6c112d4e-5bc7-47ae-a041-ea2d9dccd749 Policy BuiltIn General False Deny effect=Deny, listOfResourceTypesNotAllowed=Microsoft.ClassicCompute/capabilities; Microsoft.ClassicCompute/checkDomainNameAvailability; Microsoft.ClassicCompute/domainNames; Microsoft.ClassicCompute/domainNames/capabilities; Microsoft.ClassicCompute/domainNames/internalLoadBalancers; Microsoft.ClassicCompute/domainNames/serviceCertificates; Microsoft.ClassicCompute/domainNames/slots; Microsoft.ClassicCompute/domainNames/slots/roles; Microsoft.ClassicCompute/domainNames/slots/roles/metricDefinitions; Microsoft.ClassicCompute/domainNames/slots/roles/metrics; Microsoft.ClassicCompute/moveSubscriptionResources; Microsoft.ClassicCompute/operatingSystemFamilies; Microsoft.ClassicCompute/operatingSystems; Microsoft.ClassicCompute/operations; Microsoft.ClassicCompute/operationStatuses; Microsoft.ClassicCompute/quotas; Microsoft.ClassicCompute/resourceTypes; Microsoft.ClassicCompute/validateSubscriptionMoveAvailability; Microsoft.ClassicCompute/virtualMachines; Microsoft.ClassicCompute/virtualMachines/diagnosticSettings; Microsoft.ClassicCompute/virtualMachines/metricDefinitions; Microsoft.ClassicCompute/virtualMachines/metrics; Microsoft.ClassicInfrastructureMigrate/classicInfrastructureResources; Microsoft.ClassicNetwork/capabilities; Microsoft.ClassicNetwork/expressRouteCrossConnections; Microsoft.ClassicNetwork/expressRouteCrossConnections/peerings; Microsoft.ClassicNetwork/gatewaySupportedDevices; Microsoft.ClassicNetwork/networkSecurityGroups; Microsoft.ClassicNetwork/operations; Microsoft.ClassicNetwork/quotas; Microsoft.ClassicNetwork/reservedIps; Microsoft.ClassicNetwork/virtualNetworks; Microsoft.ClassicNetwork/virtualNetworks/remoteVirtualNetworkPeeringProxies; Microsoft.ClassicNetwork/virtualNetworks/virtualNetworkPeerings; Microsoft.ClassicStorage/capabilities; Microsoft.ClassicStorage/checkStorageAccountAvailability; Microsoft.ClassicStorage/disks; Microsoft.ClassicStorage/images; Microsoft.ClassicStorage/operations; Microsoft.ClassicStorage/osImages; Microsoft.ClassicStorage/osPlatformImages; Microsoft.ClassicStorage/publicImages; Microsoft.ClassicStorage/quotas; Microsoft.ClassicStorage/storageAccounts; Microsoft.ClassicStorage/storageAccounts/blobServices; Microsoft.ClassicStorage/storageAccounts/fileServices; Microsoft.ClassicStorage/storageAccounts/metricDefinitions; Microsoft.ClassicStorage/storageAccounts/metrics; Microsoft.ClassicStorage/storageAccounts/queueServices; Microsoft.ClassicStorage/storageAccounts/services; Microsoft.ClassicStorage/storageAccounts/services/diagnosticSettings; Microsoft.ClassicStorage/storageAccounts/services/metricDefinitions; Microsoft.ClassicStorage/storageAccounts/services/metrics; Microsoft.ClassicStorage/storageAccounts/tableServices; Microsoft.ClassicStorage/storageAccounts/vmImages; Microsoft.ClassicStorage/vmImages; Microsoft.ClassicSubscription/operations Default 0 0 0 0 0 none Deny the deployment of classic resources Denies deployment of classic resource types under the assigned scope. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deny-classic-resources n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-sandbox-mg Sandbox inherited mibelle-mg false false Audit VMs that do not use managed disks This policy audits VMs that do not use managed disks /providers/microsoft.authorization/policydefinitions/06a78e20-9358-41c9-923c-fb736d382a4d Policy BuiltIn Compute False audit Default 0 0 0 0 0 none Deny virtual machines and virtual machine scale sets that do not use managed disk Deny virtual machines that do not use managed disk. It checks the managed disk property on virtual machine OS Disk fields. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deny-unmanageddisk n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-sandbox-mg Sandbox inherited mibelle-mg false false Microsoft cloud security benchmark The Microsoft cloud security benchmark initiative represents the policies and controls implementing security recommendations defined in Microsoft cloud security benchmark, see https://aka.ms/azsecbm. This also serves as the Microsoft Defender for Cloud default policy initiative. You can directly assign this initiative, or manage its policies and compliance results within Microsoft Defender for Cloud. /providers/microsoft.authorization/policysetdefinitions/1f3afdf9-d0c9-4c3d-847f-89da613e70a8 PolicySet BuiltIn Security Center False n/a Default 0 0 0 0 0 none Enable Monitoring in Microsoft Defender for Cloud Enable Monitoring in Microsoft Defender for Cloud. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-asc-monitoring n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-sandbox-mg Sandbox inherited mibelle-mg false false Configure Azure Activity logs to stream to specified Log Analytics workspace Deploys the diagnostic settings for Azure Activity to stream subscriptions audit logs to a Log Analytics workspace to monitor subscription-level events /providers/microsoft.authorization/policydefinitions/2465583e-4e78-4c15-b6be-a36cbc7c8b0f Policy BuiltIn Monitoring False DeployIfNotExists effect=DeployIfNotExists, logAnalytics=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 0 0 0 0 Monitoring Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/dcb59c88-f014-5e17-840c-6c9aecc66286), Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/82f0c3bf-808b-5863-bf9c-231cfbf9598a) Deploy-AzActivity-Log (SPObjId: 217aa040-8eb0-451b-b81c-0b8f3d200d5a) Deploy Diagnostic Settings for Activity Log to Log Analytics workspace Ensures that Activity Log Diagnostics settings are set to push logs into Log Analytics workspace. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-sandbox-mg Sandbox inherited mibelle-mg false false Enable audit category group resource logging for supported resources to Log Analytics Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This initiative deploys diagnostic setting using the audit category group to route logs to Log Analytics for all supported resources. /providers/microsoft.authorization/policysetdefinitions/f5b29bc4-feca-4cc6-a58a-772dd5e290a5 PolicySet BuiltIn Monitoring False n/a logAnalytics=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 0 0 0 0 Monitoring Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b922046a-7a3e-59da-a982-8a5b855791ce), Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/9df772a7-1ce7-5439-ab6b-5d31d69925cc) Deploy-Diag-Logs (SPObjId: 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57) Enable allLogs category group resource logging for supported resources to Log Analytics Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This initiative deploys diagnostic setting using the allLogs category group to route logs to an Event Hub for all supported resources. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-sandbox-mg Sandbox inherited mibelle-mg false false Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud Configure the multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud (WDATP, WDATP_EXCLUDE_LINUX_PUBLIC_PREVIEW, WDATP_UNIFIED_SOLUTION etc.). See: https://learn.microsoft.com/azure/defender-for-cloud/integration-defender-for-endpoint for more information. /providers/microsoft.authorization/policysetdefinitions/77b391e3-2d5d-40c3-83bf-65c846b3c6a3 PolicySet BuiltIn Security Center False n/a Default 0 0 0 0 0 Security Admin (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/d730d560-adce-52b7-b10c-36a8ad16a6d3) Deploy-MDEndpointsAMA (SPObjId: 7d365a6d-a7ae-4921-beca-5ce854a76960) Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud Configure the multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud (WDATP, WDATP_EXCLUDE_LINUX_PUBLIC_PREVIEW, WDATP_UNIFIED_SOLUTION etc.). See: https://learn.microsoft.com/azure/defender-for-cloud/integration-defender-for-endpoint for more information. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-mdendpointsama n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-sandbox-mg Sandbox inherited mibelle-mg false false Enforce Azure Compute Security Benchmark compliance auditing Enforce Azure Compute Security Benchmark compliance auditing for Windows and Linux virtual machines. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-acsb PolicySet Custom Guest Configuration true n/a Default 0 0 0 0 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/6e26cd22-b41b-5611-aafc-e2c56b14c060) Enforce-ACSB (SPObjId: e1f2e80c-5329-4804-824d-f0b44713985e) Enforce Azure Compute Security Baseline compliance auditing This initiative assignment enables Azure Compute Security Baseline compliance auditing for Windows and Linux virtual machines. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/enforce-acsb n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-sandbox-mg Sandbox thisScope Mg false false Enforce policies in the Sandbox Landing Zone Enforce policies in the Sandbox Landing Zone. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-alz-sandbox PolicySet Custom Sandbox true n/a listOfResourceTypesNotAllowed=microsoft.network/expressroutecircuits; microsoft.network/expressroutegateways; microsoft.network/expressrouteports; microsoft.network/virtualwans; microsoft.network/virtualhubs; microsoft.network/vpngateways; microsoft.network/p2svpngateways; microsoft.network/vpnsites; microsoft.network/virtualnetworkgateways Default 0 0 0 0 0 none Enforce ALZ Sandbox Guardrails This initiative will help enforce and govern subscriptions that are placed within the Sandobx Management Group. See https://aka.ms/alz/policies for more information. /providers/microsoft.management/managementgroups/mibelle-sandbox-mg/providers/microsoft.authorization/policyassignments/enforce-alz-sandbox n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-connectivity-mg Connectivity inherited mibelle-mg false false Audit resource location matches resource group location Audit that the resource location matches its resource group location /providers/microsoft.authorization/policydefinitions/0a914e76-4921-4c19-b460-a2d36003525a Policy BuiltIn General False audit Default 1 0 1 77 0 none Audit that the resource location matches its resource group location Audit resource location matches resource group location /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-location-match n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-connectivity-mg Connectivity inherited mibelle-mg false false Audit virtual machines for Trusted Launch support Trusted Launch improves security of a Virtual Machine which requires VM SKU, OS Disk & OS Image to support it (Gen 2). To learn more about Trusted Launch, visit https://aka.ms/trustedlaunch. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/audit-trustedlaunch PolicySet Custom Trusted Launch true n/a Default 2 0 10 4 0 none Audit virtual machines for Trusted Launch support Trusted Launch improves security of a Virtual Machine which requires VM SKU, OS Disk & OS Image to support it (Gen 2). To learn more about Trusted Launch, visit https://aka.ms/trustedlaunch. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-trustedlaunch n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-connectivity-mg Connectivity inherited mibelle-mg false false Unused resources driving cost should be avoided Optimize cost by detecting unused but chargeable resources. Leverage this Azure Policy Initiative as a cost control tool to reveal orphaned resources that are contributing cost. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/audit-unusedresourcescostoptimization PolicySet Custom Cost Optimization true n/a EffectDisks=Audit, EffectPublicIpAddresses=Audit, EffectServerFarms=Audit Default 1 2 1 17 0 none Unused resources driving cost should be avoided This Policy initiative is a group of Policy definitions that help optimize cost by detecting unused but chargeable resources. Leverage this Policy initiative as a cost control to reveal orphaned resources that are driving cost. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-unusedresources n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-connectivity-mg Connectivity inherited mibelle-mg false false Not allowed resource types Restrict which resource types can be deployed in your environment. Limiting resource types can reduce the complexity and attack surface of your environment while also helping to manage costs. Compliance results are only shown for non-compliant resources. /providers/microsoft.authorization/policydefinitions/6c112d4e-5bc7-47ae-a041-ea2d9dccd749 Policy BuiltIn General False Deny effect=Deny, listOfResourceTypesNotAllowed=Microsoft.ClassicCompute/capabilities; Microsoft.ClassicCompute/checkDomainNameAvailability; Microsoft.ClassicCompute/domainNames; Microsoft.ClassicCompute/domainNames/capabilities; Microsoft.ClassicCompute/domainNames/internalLoadBalancers; Microsoft.ClassicCompute/domainNames/serviceCertificates; Microsoft.ClassicCompute/domainNames/slots; Microsoft.ClassicCompute/domainNames/slots/roles; Microsoft.ClassicCompute/domainNames/slots/roles/metricDefinitions; Microsoft.ClassicCompute/domainNames/slots/roles/metrics; Microsoft.ClassicCompute/moveSubscriptionResources; Microsoft.ClassicCompute/operatingSystemFamilies; Microsoft.ClassicCompute/operatingSystems; Microsoft.ClassicCompute/operations; Microsoft.ClassicCompute/operationStatuses; Microsoft.ClassicCompute/quotas; Microsoft.ClassicCompute/resourceTypes; Microsoft.ClassicCompute/validateSubscriptionMoveAvailability; Microsoft.ClassicCompute/virtualMachines; Microsoft.ClassicCompute/virtualMachines/diagnosticSettings; Microsoft.ClassicCompute/virtualMachines/metricDefinitions; Microsoft.ClassicCompute/virtualMachines/metrics; Microsoft.ClassicInfrastructureMigrate/classicInfrastructureResources; Microsoft.ClassicNetwork/capabilities; Microsoft.ClassicNetwork/expressRouteCrossConnections; Microsoft.ClassicNetwork/expressRouteCrossConnections/peerings; Microsoft.ClassicNetwork/gatewaySupportedDevices; Microsoft.ClassicNetwork/networkSecurityGroups; Microsoft.ClassicNetwork/operations; Microsoft.ClassicNetwork/quotas; Microsoft.ClassicNetwork/reservedIps; Microsoft.ClassicNetwork/virtualNetworks; Microsoft.ClassicNetwork/virtualNetworks/remoteVirtualNetworkPeeringProxies; Microsoft.ClassicNetwork/virtualNetworks/virtualNetworkPeerings; Microsoft.ClassicStorage/capabilities; Microsoft.ClassicStorage/checkStorageAccountAvailability; Microsoft.ClassicStorage/disks; Microsoft.ClassicStorage/images; Microsoft.ClassicStorage/operations; Microsoft.ClassicStorage/osImages; Microsoft.ClassicStorage/osPlatformImages; Microsoft.ClassicStorage/publicImages; Microsoft.ClassicStorage/quotas; Microsoft.ClassicStorage/storageAccounts; Microsoft.ClassicStorage/storageAccounts/blobServices; Microsoft.ClassicStorage/storageAccounts/fileServices; Microsoft.ClassicStorage/storageAccounts/metricDefinitions; Microsoft.ClassicStorage/storageAccounts/metrics; Microsoft.ClassicStorage/storageAccounts/queueServices; Microsoft.ClassicStorage/storageAccounts/services; Microsoft.ClassicStorage/storageAccounts/services/diagnosticSettings; Microsoft.ClassicStorage/storageAccounts/services/metricDefinitions; Microsoft.ClassicStorage/storageAccounts/services/metrics; Microsoft.ClassicStorage/storageAccounts/tableServices; Microsoft.ClassicStorage/storageAccounts/vmImages; Microsoft.ClassicStorage/vmImages; Microsoft.ClassicSubscription/operations Default 0 0 0 0 0 none Deny the deployment of classic resources Denies deployment of classic resource types under the assigned scope. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deny-classic-resources n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-connectivity-mg Connectivity inherited mibelle-mg false false Audit VMs that do not use managed disks This policy audits VMs that do not use managed disks /providers/microsoft.authorization/policydefinitions/06a78e20-9358-41c9-923c-fb736d382a4d Policy BuiltIn Compute False audit Default 0 1 0 6 0 none Deny virtual machines and virtual machine scale sets that do not use managed disk Deny virtual machines that do not use managed disk. It checks the managed disk property on virtual machine OS Disk fields. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deny-unmanageddisk n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-connectivity-mg Connectivity inherited mibelle-mg false false Microsoft cloud security benchmark The Microsoft cloud security benchmark initiative represents the policies and controls implementing security recommendations defined in Microsoft cloud security benchmark, see https://aka.ms/azsecbm. This also serves as the Microsoft Defender for Cloud default policy initiative. You can directly assign this initiative, or manage its policies and compliance results within Microsoft Defender for Cloud. /providers/microsoft.authorization/policysetdefinitions/1f3afdf9-d0c9-4c3d-847f-89da613e70a8 PolicySet BuiltIn Security Center False n/a Default 43 24 17 4 0 none Enable Monitoring in Microsoft Defender for Cloud Enable Monitoring in Microsoft Defender for Cloud. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-asc-monitoring n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-connectivity-mg Connectivity inherited mibelle-mg false false Configure Azure Activity logs to stream to specified Log Analytics workspace Deploys the diagnostic settings for Azure Activity to stream subscriptions audit logs to a Log Analytics workspace to monitor subscription-level events /providers/microsoft.authorization/policydefinitions/2465583e-4e78-4c15-b6be-a36cbc7c8b0f Policy BuiltIn Monitoring False DeployIfNotExists effect=DeployIfNotExists, logAnalytics=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 1 0 1 0 0 Monitoring Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/dcb59c88-f014-5e17-840c-6c9aecc66286), Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/82f0c3bf-808b-5863-bf9c-231cfbf9598a) Deploy-AzActivity-Log (SPObjId: 217aa040-8eb0-451b-b81c-0b8f3d200d5a) Deploy Diagnostic Settings for Activity Log to Log Analytics workspace Ensures that Activity Log Diagnostics settings are set to push logs into Log Analytics workspace. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-connectivity-mg Connectivity inherited mibelle-mg false false Enable audit category group resource logging for supported resources to Log Analytics Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This initiative deploys diagnostic setting using the audit category group to route logs to Log Analytics for all supported resources. /providers/microsoft.authorization/policysetdefinitions/f5b29bc4-feca-4cc6-a58a-772dd5e290a5 PolicySet BuiltIn Monitoring False n/a logAnalytics=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 3 0 6 0 Monitoring Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b922046a-7a3e-59da-a982-8a5b855791ce), Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/9df772a7-1ce7-5439-ab6b-5d31d69925cc) Deploy-Diag-Logs (SPObjId: 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57) Enable allLogs category group resource logging for supported resources to Log Analytics Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This initiative deploys diagnostic setting using the allLogs category group to route logs to an Event Hub for all supported resources. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-connectivity-mg Connectivity inherited mibelle-mg false false Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud Configure the multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud (WDATP, WDATP_EXCLUDE_LINUX_PUBLIC_PREVIEW, WDATP_UNIFIED_SOLUTION etc.). See: https://learn.microsoft.com/azure/defender-for-cloud/integration-defender-for-endpoint for more information. /providers/microsoft.authorization/policysetdefinitions/77b391e3-2d5d-40c3-83bf-65c846b3c6a3 PolicySet BuiltIn Security Center False n/a Default 0 3 0 1 0 Security Admin (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/d730d560-adce-52b7-b10c-36a8ad16a6d3) Deploy-MDEndpointsAMA (SPObjId: 7d365a6d-a7ae-4921-beca-5ce854a76960) Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud Configure the multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud (WDATP, WDATP_EXCLUDE_LINUX_PUBLIC_PREVIEW, WDATP_UNIFIED_SOLUTION etc.). See: https://learn.microsoft.com/azure/defender-for-cloud/integration-defender-for-endpoint for more information. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-mdendpointsama n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-connectivity-mg Connectivity inherited mibelle-mg false false Enforce Azure Compute Security Benchmark compliance auditing Enforce Azure Compute Security Benchmark compliance auditing for Windows and Linux virtual machines. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-acsb PolicySet Custom Guest Configuration true n/a Default 3 2 6 0 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/6e26cd22-b41b-5611-aafc-e2c56b14c060) Enforce-ACSB (SPObjId: e1f2e80c-5329-4804-824d-f0b44713985e) Enforce Azure Compute Security Baseline compliance auditing This initiative assignment enables Azure Compute Security Baseline compliance auditing for Windows and Linux virtual machines. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/enforce-acsb n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-connectivity-mg Connectivity inherited mibelle-platform-mg false false Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics If a virtual network already has traffic analytics enabled, then, this policy will overwrite its existing settings with the ones provided during policy creation. Traffic analytics is a cloud-based solution that provides visibility into user and application activity in cloud networks. /providers/microsoft.authorization/policydefinitions/052c180e-287d-44c3-86ef-01aeae2d9774 Policy BuiltIn Network False DeployIfNotExists networkWatcherName=/subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourcegroups/networkwatcherrg/providers/microsoft.network/networkwatchers/networkwatcher_northeurope, networkWatcherRG=networkwatcherrg, retentionDays=1, storageId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.storage/storageaccounts/mibmgmtnetprodeunst01, vnetRegion=northeurope, workspaceRegion=westeurope, workspaceResourceId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 0 0 0 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/71689b0c-ca78-4285-9603-49a5497225d8) 97339ff59e1744678fd92dea (SPObjId: c2b8a553-ec19-42b8-8855-6edc985eaffb) Deploy-TrafficAnalytics-NorthEurope Deploy VNet Flow Logs in on All VNet in North Europe & enable Traffic Analytics /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/97339ff59e1744678fd92dea n/a 09/04/2025 07:21:45 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 09/04/2025 07:34:08 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-connectivity-mg Connectivity inherited mibelle-platform-mg false false Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics If a virtual network already has traffic analytics enabled, then, this policy will overwrite its existing settings with the ones provided during policy creation. Traffic analytics is a cloud-based solution that provides visibility into user and application activity in cloud networks. /providers/microsoft.authorization/policydefinitions/052c180e-287d-44c3-86ef-01aeae2d9774 Policy BuiltIn Network False DeployIfNotExists networkWatcherName=/subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourcegroups/networkwatcherrg/providers/microsoft.network/networkwatchers/networkwatcher_westeurope, networkWatcherRG=networkwatcherrg, retentionDays=1, storageId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.storage/storageaccounts/mibmgmtnetprodeuwst01, vnetRegion=westeurope, workspaceRegion=westeurope, workspaceResourceId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 1 0 1 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/21c0b216-76ff-44ef-9430-19f801e102d5) d33eb38085bf40bd860fe43b (SPObjId: 78dd5b73-2109-4a10-b2e4-6463304b4b4d) Deploy-TrafficAnalytics-WestEurope Deploy VNet Flow Logs in on All VNet in North Europe & enable Traffic Analytics /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/d33eb38085bf40bd860fe43b n/a 06/12/2025 18:15:24 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 09/04/2025 07:24:28 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-connectivity-mg Connectivity inherited mibelle-platform-mg false false Do not allow deletion of specified resource and resource type This policy enables you to specify the resource and resource type that your organization can protect from accidentals deletion by blocking delete calls using the deny action effect. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/denyaction-deleteresources Policy Custom General true DenyAction effect=DenyAction, resourceName=mibelle-mgmt-log-prod-euw-id-01, resourceType=Microsoft.ManagedIdentity/userAssignedIdentities Default 0 0 0 0 0 none Do not allow deletion of the User Assigned Managed Identity used by AMA This policy provides a safeguard against accidental removal of the User Assigned Managed Identity used by AMA by blocking delete calls using deny action effect. /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/denyaction-deleteuamiama n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-connectivity-mg Connectivity inherited mibelle-platform-mg false false Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines Configure auto-assessment (every 24 hours) for OS updates. You can control the scope of assignment according to machine subscription, resource group, location or tag. Learn more about this for Windows: https://aka.ms/computevm-windowspatchassessmentmode, for Linux: https://aka.ms/computevm-linuxpatchassessmentmode. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-aum-checkupdates PolicySet Custom Security Center true n/a assessmentMode=AutomaticByPlatform Default 0 2 0 6 0 Virtual Machine Contributor (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/51e23aa4-bdf1-5059-8efc-453852a14d5e), Azure Connected Machine Resource Administrator (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/d72b7c0f-a23a-58ed-8e0a-40f49a5b6ab3), Managed Identity Operator (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/1f97b9d8-3c21-5b8b-9b36-72e77d4a90e0) Enable-AUM-CheckUpdates (SPObjId: ce67e461-e4a3-4514-89cb-7eb8802f8f65) Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines. Configure auto-assessment (every 24 hours) for OS updates. You can control the scope of assignment according to machine subscription, resource group, location or tag. Learn more about this for Windows: https://aka.ms/computevm-windowspatchassessmentmode, for Linux: https://aka.ms/computevm-linuxpatchassessmentmode. /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates n/a 06/12/2025 17:56:38 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-connectivity-mg Connectivity inherited mibelle-platform-mg false false Enforce recommended guardrails for Azure Key Vault Enforce recommended guardrails for Azure Key Vault. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-keyvault PolicySet Custom Key Vault true n/a Default 0 0 0 0 0 none Enforce recommended guardrails for Azure Key Vault This initiative assignment enables recommended ALZ guardrails for Azure Key Vault. /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enforce-gr-keyvault n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-connectivity-mg Connectivity inherited mibelle-platform-mg false false Subnets should be private Ensure your subnets are secure by default by preventing default outbound access. For more information go to https://aka.ms/defaultoutboundaccessretirement /providers/microsoft.authorization/policydefinitions/7bca8353-aa3b-429b-904a-9229c4385837 Policy BuiltIn Network False Audit Default 1 0 11 0 0 none Subnets should be private Ensure your subnets are secure by default by preventing default outbound access. For more information go to https://aka.ms/defaultoutboundaccessretirement /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enforce-subnet-private n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-mg false false Audit resource location matches resource group location Audit that the resource location matches its resource group location /providers/microsoft.authorization/policydefinitions/0a914e76-4921-4c19-b460-a2d36003525a Policy BuiltIn General False audit Default 1 0 1 77 0 none Audit that the resource location matches its resource group location Audit resource location matches resource group location /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-location-match n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-mg false false Audit virtual machines for Trusted Launch support Trusted Launch improves security of a Virtual Machine which requires VM SKU, OS Disk & OS Image to support it (Gen 2). To learn more about Trusted Launch, visit https://aka.ms/trustedlaunch. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/audit-trustedlaunch PolicySet Custom Trusted Launch true n/a Default 2 0 10 4 0 none Audit virtual machines for Trusted Launch support Trusted Launch improves security of a Virtual Machine which requires VM SKU, OS Disk & OS Image to support it (Gen 2). To learn more about Trusted Launch, visit https://aka.ms/trustedlaunch. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-trustedlaunch n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-mg false false Unused resources driving cost should be avoided Optimize cost by detecting unused but chargeable resources. Leverage this Azure Policy Initiative as a cost control tool to reveal orphaned resources that are contributing cost. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/audit-unusedresourcescostoptimization PolicySet Custom Cost Optimization true n/a EffectDisks=Audit, EffectPublicIpAddresses=Audit, EffectServerFarms=Audit Default 1 2 1 17 0 none Unused resources driving cost should be avoided This Policy initiative is a group of Policy definitions that help optimize cost by detecting unused but chargeable resources. Leverage this Policy initiative as a cost control to reveal orphaned resources that are driving cost. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-unusedresources n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-mg false false Not allowed resource types Restrict which resource types can be deployed in your environment. Limiting resource types can reduce the complexity and attack surface of your environment while also helping to manage costs. Compliance results are only shown for non-compliant resources. /providers/microsoft.authorization/policydefinitions/6c112d4e-5bc7-47ae-a041-ea2d9dccd749 Policy BuiltIn General False Deny effect=Deny, listOfResourceTypesNotAllowed=Microsoft.ClassicCompute/capabilities; Microsoft.ClassicCompute/checkDomainNameAvailability; Microsoft.ClassicCompute/domainNames; Microsoft.ClassicCompute/domainNames/capabilities; Microsoft.ClassicCompute/domainNames/internalLoadBalancers; Microsoft.ClassicCompute/domainNames/serviceCertificates; Microsoft.ClassicCompute/domainNames/slots; Microsoft.ClassicCompute/domainNames/slots/roles; Microsoft.ClassicCompute/domainNames/slots/roles/metricDefinitions; Microsoft.ClassicCompute/domainNames/slots/roles/metrics; Microsoft.ClassicCompute/moveSubscriptionResources; Microsoft.ClassicCompute/operatingSystemFamilies; Microsoft.ClassicCompute/operatingSystems; Microsoft.ClassicCompute/operations; Microsoft.ClassicCompute/operationStatuses; Microsoft.ClassicCompute/quotas; Microsoft.ClassicCompute/resourceTypes; Microsoft.ClassicCompute/validateSubscriptionMoveAvailability; Microsoft.ClassicCompute/virtualMachines; Microsoft.ClassicCompute/virtualMachines/diagnosticSettings; Microsoft.ClassicCompute/virtualMachines/metricDefinitions; Microsoft.ClassicCompute/virtualMachines/metrics; Microsoft.ClassicInfrastructureMigrate/classicInfrastructureResources; Microsoft.ClassicNetwork/capabilities; Microsoft.ClassicNetwork/expressRouteCrossConnections; Microsoft.ClassicNetwork/expressRouteCrossConnections/peerings; Microsoft.ClassicNetwork/gatewaySupportedDevices; Microsoft.ClassicNetwork/networkSecurityGroups; Microsoft.ClassicNetwork/operations; Microsoft.ClassicNetwork/quotas; Microsoft.ClassicNetwork/reservedIps; Microsoft.ClassicNetwork/virtualNetworks; Microsoft.ClassicNetwork/virtualNetworks/remoteVirtualNetworkPeeringProxies; Microsoft.ClassicNetwork/virtualNetworks/virtualNetworkPeerings; Microsoft.ClassicStorage/capabilities; Microsoft.ClassicStorage/checkStorageAccountAvailability; Microsoft.ClassicStorage/disks; Microsoft.ClassicStorage/images; Microsoft.ClassicStorage/operations; Microsoft.ClassicStorage/osImages; Microsoft.ClassicStorage/osPlatformImages; Microsoft.ClassicStorage/publicImages; Microsoft.ClassicStorage/quotas; Microsoft.ClassicStorage/storageAccounts; Microsoft.ClassicStorage/storageAccounts/blobServices; Microsoft.ClassicStorage/storageAccounts/fileServices; Microsoft.ClassicStorage/storageAccounts/metricDefinitions; Microsoft.ClassicStorage/storageAccounts/metrics; Microsoft.ClassicStorage/storageAccounts/queueServices; Microsoft.ClassicStorage/storageAccounts/services; Microsoft.ClassicStorage/storageAccounts/services/diagnosticSettings; Microsoft.ClassicStorage/storageAccounts/services/metricDefinitions; Microsoft.ClassicStorage/storageAccounts/services/metrics; Microsoft.ClassicStorage/storageAccounts/tableServices; Microsoft.ClassicStorage/storageAccounts/vmImages; Microsoft.ClassicStorage/vmImages; Microsoft.ClassicSubscription/operations Default 0 0 0 0 0 none Deny the deployment of classic resources Denies deployment of classic resource types under the assigned scope. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deny-classic-resources n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-mg false false Audit VMs that do not use managed disks This policy audits VMs that do not use managed disks /providers/microsoft.authorization/policydefinitions/06a78e20-9358-41c9-923c-fb736d382a4d Policy BuiltIn Compute False audit Default 0 1 0 6 0 none Deny virtual machines and virtual machine scale sets that do not use managed disk Deny virtual machines that do not use managed disk. It checks the managed disk property on virtual machine OS Disk fields. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deny-unmanageddisk n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-mg false false Microsoft cloud security benchmark The Microsoft cloud security benchmark initiative represents the policies and controls implementing security recommendations defined in Microsoft cloud security benchmark, see https://aka.ms/azsecbm. This also serves as the Microsoft Defender for Cloud default policy initiative. You can directly assign this initiative, or manage its policies and compliance results within Microsoft Defender for Cloud. /providers/microsoft.authorization/policysetdefinitions/1f3afdf9-d0c9-4c3d-847f-89da613e70a8 PolicySet BuiltIn Security Center False n/a Default 43 24 17 4 0 none Enable Monitoring in Microsoft Defender for Cloud Enable Monitoring in Microsoft Defender for Cloud. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-asc-monitoring n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-mg false false Configure Azure Activity logs to stream to specified Log Analytics workspace Deploys the diagnostic settings for Azure Activity to stream subscriptions audit logs to a Log Analytics workspace to monitor subscription-level events /providers/microsoft.authorization/policydefinitions/2465583e-4e78-4c15-b6be-a36cbc7c8b0f Policy BuiltIn Monitoring False DeployIfNotExists effect=DeployIfNotExists, logAnalytics=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 1 0 1 0 0 Monitoring Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/dcb59c88-f014-5e17-840c-6c9aecc66286), Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/82f0c3bf-808b-5863-bf9c-231cfbf9598a) Deploy-AzActivity-Log (SPObjId: 217aa040-8eb0-451b-b81c-0b8f3d200d5a) Deploy Diagnostic Settings for Activity Log to Log Analytics workspace Ensures that Activity Log Diagnostics settings are set to push logs into Log Analytics workspace. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-mg false false Enable audit category group resource logging for supported resources to Log Analytics Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This initiative deploys diagnostic setting using the audit category group to route logs to Log Analytics for all supported resources. /providers/microsoft.authorization/policysetdefinitions/f5b29bc4-feca-4cc6-a58a-772dd5e290a5 PolicySet BuiltIn Monitoring False n/a logAnalytics=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 3 0 6 0 Monitoring Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b922046a-7a3e-59da-a982-8a5b855791ce), Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/9df772a7-1ce7-5439-ab6b-5d31d69925cc) Deploy-Diag-Logs (SPObjId: 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57) Enable allLogs category group resource logging for supported resources to Log Analytics Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This initiative deploys diagnostic setting using the allLogs category group to route logs to an Event Hub for all supported resources. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-mg false false Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud Configure the multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud (WDATP, WDATP_EXCLUDE_LINUX_PUBLIC_PREVIEW, WDATP_UNIFIED_SOLUTION etc.). See: https://learn.microsoft.com/azure/defender-for-cloud/integration-defender-for-endpoint for more information. /providers/microsoft.authorization/policysetdefinitions/77b391e3-2d5d-40c3-83bf-65c846b3c6a3 PolicySet BuiltIn Security Center False n/a Default 0 3 0 1 0 Security Admin (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/d730d560-adce-52b7-b10c-36a8ad16a6d3) Deploy-MDEndpointsAMA (SPObjId: 7d365a6d-a7ae-4921-beca-5ce854a76960) Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud Configure the multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud (WDATP, WDATP_EXCLUDE_LINUX_PUBLIC_PREVIEW, WDATP_UNIFIED_SOLUTION etc.). See: https://learn.microsoft.com/azure/defender-for-cloud/integration-defender-for-endpoint for more information. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-mdendpointsama n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-mg false false Enforce Azure Compute Security Benchmark compliance auditing Enforce Azure Compute Security Benchmark compliance auditing for Windows and Linux virtual machines. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-acsb PolicySet Custom Guest Configuration true n/a Default 3 2 6 0 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/6e26cd22-b41b-5611-aafc-e2c56b14c060) Enforce-ACSB (SPObjId: e1f2e80c-5329-4804-824d-f0b44713985e) Enforce Azure Compute Security Baseline compliance auditing This initiative assignment enables Azure Compute Security Baseline compliance auditing for Windows and Linux virtual machines. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/enforce-acsb n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-platform-mg false false Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics If a virtual network already has traffic analytics enabled, then, this policy will overwrite its existing settings with the ones provided during policy creation. Traffic analytics is a cloud-based solution that provides visibility into user and application activity in cloud networks. /providers/microsoft.authorization/policydefinitions/052c180e-287d-44c3-86ef-01aeae2d9774 Policy BuiltIn Network False DeployIfNotExists networkWatcherName=/subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourcegroups/networkwatcherrg/providers/microsoft.network/networkwatchers/networkwatcher_northeurope, networkWatcherRG=networkwatcherrg, retentionDays=1, storageId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.storage/storageaccounts/mibmgmtnetprodeunst01, vnetRegion=northeurope, workspaceRegion=westeurope, workspaceResourceId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 0 0 0 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/71689b0c-ca78-4285-9603-49a5497225d8) 97339ff59e1744678fd92dea (SPObjId: c2b8a553-ec19-42b8-8855-6edc985eaffb) Deploy-TrafficAnalytics-NorthEurope Deploy VNet Flow Logs in on All VNet in North Europe & enable Traffic Analytics /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/97339ff59e1744678fd92dea n/a 09/04/2025 07:21:45 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 09/04/2025 07:34:08 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-platform-mg false false Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics If a virtual network already has traffic analytics enabled, then, this policy will overwrite its existing settings with the ones provided during policy creation. Traffic analytics is a cloud-based solution that provides visibility into user and application activity in cloud networks. /providers/microsoft.authorization/policydefinitions/052c180e-287d-44c3-86ef-01aeae2d9774 Policy BuiltIn Network False DeployIfNotExists networkWatcherName=/subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourcegroups/networkwatcherrg/providers/microsoft.network/networkwatchers/networkwatcher_westeurope, networkWatcherRG=networkwatcherrg, retentionDays=1, storageId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.storage/storageaccounts/mibmgmtnetprodeuwst01, vnetRegion=westeurope, workspaceRegion=westeurope, workspaceResourceId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 1 0 1 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/21c0b216-76ff-44ef-9430-19f801e102d5) d33eb38085bf40bd860fe43b (SPObjId: 78dd5b73-2109-4a10-b2e4-6463304b4b4d) Deploy-TrafficAnalytics-WestEurope Deploy VNet Flow Logs in on All VNet in North Europe & enable Traffic Analytics /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/d33eb38085bf40bd860fe43b n/a 06/12/2025 18:15:24 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 09/04/2025 07:24:28 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-platform-mg false false Do not allow deletion of specified resource and resource type This policy enables you to specify the resource and resource type that your organization can protect from accidentals deletion by blocking delete calls using the deny action effect. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/denyaction-deleteresources Policy Custom General true DenyAction effect=DenyAction, resourceName=mibelle-mgmt-log-prod-euw-id-01, resourceType=Microsoft.ManagedIdentity/userAssignedIdentities Default 0 0 0 0 0 none Do not allow deletion of the User Assigned Managed Identity used by AMA This policy provides a safeguard against accidental removal of the User Assigned Managed Identity used by AMA by blocking delete calls using deny action effect. /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/denyaction-deleteuamiama n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-platform-mg false false Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines Configure auto-assessment (every 24 hours) for OS updates. You can control the scope of assignment according to machine subscription, resource group, location or tag. Learn more about this for Windows: https://aka.ms/computevm-windowspatchassessmentmode, for Linux: https://aka.ms/computevm-linuxpatchassessmentmode. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-aum-checkupdates PolicySet Custom Security Center true n/a assessmentMode=AutomaticByPlatform Default 0 2 0 6 0 Virtual Machine Contributor (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/51e23aa4-bdf1-5059-8efc-453852a14d5e), Azure Connected Machine Resource Administrator (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/d72b7c0f-a23a-58ed-8e0a-40f49a5b6ab3), Managed Identity Operator (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/1f97b9d8-3c21-5b8b-9b36-72e77d4a90e0) Enable-AUM-CheckUpdates (SPObjId: ce67e461-e4a3-4514-89cb-7eb8802f8f65) Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines. Configure auto-assessment (every 24 hours) for OS updates. You can control the scope of assignment according to machine subscription, resource group, location or tag. Learn more about this for Windows: https://aka.ms/computevm-windowspatchassessmentmode, for Linux: https://aka.ms/computevm-linuxpatchassessmentmode. /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates n/a 06/12/2025 17:56:38 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-platform-mg false false Enforce recommended guardrails for Azure Key Vault Enforce recommended guardrails for Azure Key Vault. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-keyvault PolicySet Custom Key Vault true n/a Default 0 0 0 0 0 none Enforce recommended guardrails for Azure Key Vault This initiative assignment enables recommended ALZ guardrails for Azure Key Vault. /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enforce-gr-keyvault n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-platform-mg false false Subnets should be private Ensure your subnets are secure by default by preventing default outbound access. For more information go to https://aka.ms/defaultoutboundaccessretirement /providers/microsoft.authorization/policydefinitions/7bca8353-aa3b-429b-904a-9229c4385837 Policy BuiltIn Network False Audit Default 1 0 11 0 0 none Subnets should be private Ensure your subnets are secure by default by preventing default outbound access. For more information go to https://aka.ms/defaultoutboundaccessretirement /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enforce-subnet-private n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-corp-mg Corp thisScope Mg false false Not allowed resource types Restrict which resource types can be deployed in your environment. Limiting resource types can reduce the complexity and attack surface of your environment while also helping to manage costs. Compliance results are only shown for non-compliant resources. /providers/microsoft.authorization/policydefinitions/6c112d4e-5bc7-47ae-a041-ea2d9dccd749 Policy BuiltIn General False Deny effect=Deny, listOfResourceTypesNotAllowed=microsoft.network/expressroutecircuits; microsoft.network/expressroutegateways; microsoft.network/expressrouteports; microsoft.network/virtualwans; microsoft.network/vpngateways; microsoft.network/p2svpngateways; microsoft.network/vpnsites; microsoft.network/virtualnetworkgateways Default 0 0 0 0 0 none Deny the deployment of vWAN/ER/VPN gateway resources Denies deployment of vWAN/ER/VPN gateway resources in the Corp landing zone. /providers/microsoft.management/managementgroups/mibelle-landingzones-corp-mg/providers/microsoft.authorization/policyassignments/deny-hybridnetworking n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-corp-mg Corp thisScope Mg false false Public network access should be disabled for PaaS services This policy initiative is a group of policies that prevents creation of Azure PaaS services with exposed public endpoints /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deny-publicpaasendpoints PolicySet Custom Network true n/a Default 0 2 0 2 0 none Public network access should be disabled for PaaS services This policy initiative is a group of policies that prevents creation of Azure PaaS services with exposed public endpoints. /providers/microsoft.management/managementgroups/mibelle-landingzones-corp-mg/providers/microsoft.authorization/policyassignments/deny-public-endpoints n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-corp-mg Corp thisScope Mg false false Network interfaces should not have public IPs This policy denies the network interfaces which are configured with any public IP. Public IP addresses allow internet resources to communicate inbound to Azure resources, and Azure resources to communicate outbound to the internet. This should be reviewed by the network security team. /providers/microsoft.authorization/policydefinitions/83a86a26-fd1f-447c-b59d-e51f44264114 Policy BuiltIn Network False deny Default 0 0 0 0 0 none Deny network interfaces having a public IP associated This policy denies network interfaces from having a public IP associated to it under the assigned scope. /providers/microsoft.management/managementgroups/mibelle-landingzones-corp-mg/providers/microsoft.authorization/policyassignments/deny-public-ip-on-nic n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-corp-mg Corp inherited mibelle-landingzones-mg false false Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics If a virtual network already has traffic analytics enabled, then, this policy will overwrite its existing settings with the ones provided during policy creation. Traffic analytics is a cloud-based solution that provides visibility into user and application activity in cloud networks. /providers/microsoft.authorization/policydefinitions/052c180e-287d-44c3-86ef-01aeae2d9774 Policy BuiltIn Network False DeployIfNotExists networkWatcherName=/subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourcegroups/networkwatcherrg/providers/microsoft.network/networkwatchers/networkwatcher_westeurope, networkWatcherRG=networkwatcherrg, retentionDays=1, storageId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.storage/storageaccounts/mibmgmtnetprodeuwst01, vnetRegion=westeurope, workspaceRegion=westeurope, workspaceResourceId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 0 0 0 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/94dfdb33-b864-47c9-831d-366721beb989) 52a8c671384a4b609f1d7651 (SPObjId: 6e0d029a-fce4-400f-bff3-45b8d9a8342e) Deploy-TrafficAnalytics-WestEurope Deploy VNet Flow Logs in on All VNet in West Europe & enable Traffic Analytics /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/52a8c671384a4b609f1d7651 n/a 09/04/2025 06:12:52 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 09/04/2025 07:23:12 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-corp-mg Corp inherited mibelle-landingzones-mg false false Web Application Firewall (WAF) should be enabled for Application Gateway Deploy Azure Web Application Firewall (WAF) in front of public facing web applications for additional inspection of incoming traffic. Web Application Firewall (WAF) provides centralized protection of your web applications from common exploits and vulnerabilities such as SQL injections, Cross-Site Scripting, local and remote file executions. You can also restrict access to your web applications by countries, IP address ranges, and other http(s) parameters via custom rules. /providers/microsoft.authorization/policydefinitions/564feb30-bf6a-4854-b4bb-0d2d2d1e6c66 Policy BuiltIn Network False Audit effect=Audit Default 0 0 0 0 0 none Web Application Firewall (WAF) should be enabled for Application Gateway Assign the WAF should be enabled for Application Gateway audit policy. /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/audit-appgw-waf n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-corp-mg Corp inherited mibelle-landingzones-mg false false Network interfaces should disable IP forwarding This policy denies the network interfaces which enabled IP forwarding. The setting of IP forwarding disables Azure's check of the source and destination for a network interface. This should be reviewed by the network security team. /providers/microsoft.authorization/policydefinitions/88c0b9da-ce96-4b03-9635-f29a937e2900 Policy BuiltIn Network False deny Default 0 0 0 0 0 none Network interfaces should disable IP forwarding This policy denies the network interfaces which enabled IP forwarding. The setting of IP forwarding disables Azure's check of the source and destination for a network interface. This should be reviewed by the network security team. /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deny-ip-forwarding n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-corp-mg Corp inherited mibelle-landingzones-mg false false Management port access from the Internet should be blocked This policy denies any network security rule that allows management port access from the Internet, by default blocking SSH/RDP ports. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-mgmtports-from-internet Policy Custom Network true Deny effect=Deny Default 0 0 0 0 0 none Management port access from the Internet should be blocked This policy denies any network security rule that allows management port access from the Internet /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deny-mgmtports-internet n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-corp-mg Corp inherited mibelle-landingzones-mg false false Kubernetes cluster should not allow privileged containers Do not allow privileged containers creation in a Kubernetes cluster. This recommendation is part of CIS 5.2.1 which is intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. /providers/microsoft.authorization/policydefinitions/95edb821-ddaf-4404-9732-666045e056b4 Policy BuiltIn Kubernetes False deny effect=deny Default 0 0 0 0 0 none Kubernetes cluster should not allow privileged containers Do not allow privileged containers creation in a Kubernetes cluster. This recommendation is part of CIS 5.2.1 which is intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deny-priv-containers-aks n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-corp-mg Corp inherited mibelle-landingzones-mg false false Kubernetes clusters should not allow container privilege escalation Do not allow containers to run with privilege escalation to root in a Kubernetes cluster. This recommendation is part of CIS 5.2.5 which is intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. /providers/microsoft.authorization/policydefinitions/1c6e92c9-99f0-4e55-9cf2-0c234dc48f99 Policy BuiltIn Kubernetes False deny effect=deny Default 0 0 0 0 0 none Kubernetes clusters should not allow container privilege escalation Do not allow containers to run with privilege escalation to root in a Kubernetes cluster. This recommendation is part of CIS 5.2.5 which is intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deny-priv-escalation-aks n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-corp-mg Corp inherited mibelle-landingzones-mg false false Secure transfer to storage accounts should be enabled Audit requirement of Secure transfer in your storage account. Secure transfer is an option that forces your storage account to accept requests only from secure connections (HTTPS). Use of HTTPS ensures authentication between the server and the service and protects data in transit from network layer attacks such as man-in-the-middle, eavesdropping, and session-hijacking /providers/microsoft.authorization/policydefinitions/404c3081-a854-4457-ae30-26a93ef643f9 Policy BuiltIn Storage False Deny effect=Deny Default 0 1 0 1 0 none Secure transfer to storage accounts should be enabled Audit requirement of Secure transfer in your storage account. Secure transfer is an option that forces your storage account to accept requests only from secure connections (HTTPS). Use of HTTPS ensures authentication between the server and the service and protects data in transit from network layer attacks such as man-in-the-middle, eavesdropping, and session-hijacking. /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deny-storage-http n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-corp-mg Corp inherited mibelle-landingzones-mg false false Configure SQL servers to have auditing enabled to Log Analytics workspace To ensure the operations performed against your SQL assets are captured, SQL servers should have auditing enabled. If auditing is not enabled, this policy will configure auditing events to flow to the specified Log Analytics workspace. /providers/microsoft.authorization/policydefinitions/25da7dfb-0666-4a15-a8f5-402127efd8bb Policy BuiltIn SQL False DeployIfNotExists effect=DeployIfNotExists, logAnalyticsWorkspaceId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 0 0 0 0 SQL Security Manager (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/2f1eab15-c92e-52cd-8b0c-a60e52f1b331), SQL Security Manager (/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/providers/microsoft.authorization/roleassignments/ce81334b-c425-5087-9b8d-2119e050082b), Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/488f45ec-c535-5f65-85bf-acacd1bb93e8), Log Analytics Contributor (/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/providers/microsoft.authorization/roleassignments/fbb2af70-7587-52bd-b3e1-54fcdbdb7ea4) Deploy-AzSqlDb-Auditing (SPObjId: afb169da-f80a-4dd6-abf3-b7fc08efb8ae) Configure SQL servers to have auditing enabled to Log Analytics workspace To ensure the operations performed against your SQL assets are captured, SQL servers should have auditing enabled. If auditing is not enabled, this policy will configure auditing events to flow to the specified Log Analytics workspace. /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deploy-azsqldb-auditing n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-corp-mg Corp inherited mibelle-landingzones-mg false false Deploy SQL DB transparent data encryption Enables transparent data encryption on SQL databases /providers/microsoft.authorization/policydefinitions/86a912f6-9a06-4e26-b447-11b16ba8659f Policy BuiltIn SQL False DeployIfNotExists Default 0 0 0 0 0 SQL DB Contributor (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/af2f6b24-ac34-5f3b-9249-5a109d9d1528) Deploy-SQL-TDE (SPObjId: de5ed213-fd75-471c-8d32-920072d6c378) Deploy TDE on SQL servers This policy ensures that Transparent Data Encryption is enabled on SQL Servers. /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deploy-sql-tde n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-corp-mg Corp inherited mibelle-landingzones-mg false false Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics If a virtual network already has traffic analytics enabled, then, this policy will overwrite its existing settings with the ones provided during policy creation. Traffic analytics is a cloud-based solution that provides visibility into user and application activity in cloud networks. /providers/microsoft.authorization/policydefinitions/052c180e-287d-44c3-86ef-01aeae2d9774 Policy BuiltIn Network False DeployIfNotExists networkWatcherName=/subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourcegroups/networkwatcherrg/providers/microsoft.network/networkwatchers/networkwatcher_northeurope, networkWatcherRG=networkwatcherrg, retentionDays=1, storageId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.storage/storageaccounts/mibmgmtnetprodeunst01, vnetRegion=northeurope, workspaceRegion=westeurope, workspaceResourceId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 0 0 0 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/3fb7bac5-2328-4e74-a5b0-0d6d2a631693) e9143c36572348c3ba0c67b1 (SPObjId: 9c3b725e-ce85-47ac-bf6f-c2fa0571c259) Deploy-TrafficAnalytics-NorthEurope Deploy VNet Flow Logs in on All VNet in North Europe & enable Traffic Analytics /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/e9143c36572348c3ba0c67b1 n/a 09/04/2025 07:17:59 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 09/04/2025 07:33:42 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-corp-mg Corp inherited mibelle-landingzones-mg false false Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines Configure auto-assessment (every 24 hours) for OS updates. You can control the scope of assignment according to machine subscription, resource group, location or tag. Learn more about this for Windows: https://aka.ms/computevm-windowspatchassessmentmode, for Linux: https://aka.ms/computevm-linuxpatchassessmentmode. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-aum-checkupdates PolicySet Custom Security Center true n/a assessmentMode=AutomaticByPlatform Default 0 0 0 0 0 Virtual Machine Contributor (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/571da045-f503-5cb2-b123-ede8cfe0f15a), Azure Connected Machine Resource Administrator (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/7d65b18e-df43-5353-85a4-716e68ff7c7a), Managed Identity Operator (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/b2c88903-f3a4-54ec-813c-46d650309b86) Enable-AUM-CheckUpdates (SPObjId: 4f27b633-c16b-47a6-ab24-737bb6cdad56) Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines. Configure auto-assessment (every 24 hours) for OS updates. You can control the scope of assignment according to machine subscription, resource group, location or tag. Learn more about this for Windows: https://aka.ms/computevm-windowspatchassessmentmode, for Linux: https://aka.ms/computevm-linuxpatchassessmentmode. /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-corp-mg Corp inherited mibelle-landingzones-mg false false Kubernetes clusters should be accessible only over HTTPS Use of HTTPS ensures authentication and protects data in transit from network layer eavesdropping attacks. This capability is currently generally available for Kubernetes Service (AKS), and in preview for Azure Arc enabled Kubernetes. For more info, visit https://aka.ms/kubepolicydoc /providers/microsoft.authorization/policydefinitions/1a5b4dca-0b6f-4cf5-907c-56316bc1bf3d Policy BuiltIn Kubernetes False deny effect=deny Default 0 0 0 0 0 none Kubernetes clusters should be accessible only over HTTPS Use of HTTPS ensures authentication and protects data in transit from network layer eavesdropping attacks. This capability is currently generally available for Kubernetes Service (AKS), and in preview for AKS Engine and Azure Arc enabled Kubernetes. For more info, visit https://aka.ms/kubepolicydoc. /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enforce-aks-https n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-corp-mg Corp inherited mibelle-landingzones-mg false false Enforce recommended guardrails for Azure Key Vault Enforce recommended guardrails for Azure Key Vault. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-keyvault PolicySet Custom Key Vault true n/a Default 0 4 0 1 0 none Enforce recommended guardrails for Azure Key Vault This initiative assignment enables recommended ALZ guardrails for Azure Key Vault. /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enforce-gr-keyvault n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-corp-mg Corp inherited mibelle-landingzones-mg false false Subnets should be private Ensure your subnets are secure by default by preventing default outbound access. For more information go to https://aka.ms/defaultoutboundaccessretirement /providers/microsoft.authorization/policydefinitions/7bca8353-aa3b-429b-904a-9229c4385837 Policy BuiltIn Network False Audit Default 0 0 0 0 0 none Subnets should be private Ensure your subnets are secure by default by preventing default outbound access. For more information go to https://aka.ms/defaultoutboundaccessretirement /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enforce-subnet-private n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-corp-mg Corp inherited mibelle-mg false false Audit resource location matches resource group location Audit that the resource location matches its resource group location /providers/microsoft.authorization/policydefinitions/0a914e76-4921-4c19-b460-a2d36003525a Policy BuiltIn General False audit Default 0 1 0 7 0 none Audit that the resource location matches its resource group location Audit resource location matches resource group location /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-location-match n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-corp-mg Corp inherited mibelle-mg false false Audit virtual machines for Trusted Launch support Trusted Launch improves security of a Virtual Machine which requires VM SKU, OS Disk & OS Image to support it (Gen 2). To learn more about Trusted Launch, visit https://aka.ms/trustedlaunch. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/audit-trustedlaunch PolicySet Custom Trusted Launch true n/a Default 0 0 0 0 0 none Audit virtual machines for Trusted Launch support Trusted Launch improves security of a Virtual Machine which requires VM SKU, OS Disk & OS Image to support it (Gen 2). To learn more about Trusted Launch, visit https://aka.ms/trustedlaunch. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-trustedlaunch n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-corp-mg Corp inherited mibelle-mg false false Unused resources driving cost should be avoided Optimize cost by detecting unused but chargeable resources. Leverage this Azure Policy Initiative as a cost control tool to reveal orphaned resources that are contributing cost. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/audit-unusedresourcescostoptimization PolicySet Custom Cost Optimization true n/a EffectDisks=Audit, EffectPublicIpAddresses=Audit, EffectServerFarms=Audit Default 0 1 0 1 0 none Unused resources driving cost should be avoided This Policy initiative is a group of Policy definitions that help optimize cost by detecting unused but chargeable resources. Leverage this Policy initiative as a cost control to reveal orphaned resources that are driving cost. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-unusedresources n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-corp-mg Corp inherited mibelle-mg false false Not allowed resource types Restrict which resource types can be deployed in your environment. Limiting resource types can reduce the complexity and attack surface of your environment while also helping to manage costs. Compliance results are only shown for non-compliant resources. /providers/microsoft.authorization/policydefinitions/6c112d4e-5bc7-47ae-a041-ea2d9dccd749 Policy BuiltIn General False Deny effect=Deny, listOfResourceTypesNotAllowed=Microsoft.ClassicCompute/capabilities; Microsoft.ClassicCompute/checkDomainNameAvailability; Microsoft.ClassicCompute/domainNames; Microsoft.ClassicCompute/domainNames/capabilities; Microsoft.ClassicCompute/domainNames/internalLoadBalancers; Microsoft.ClassicCompute/domainNames/serviceCertificates; Microsoft.ClassicCompute/domainNames/slots; Microsoft.ClassicCompute/domainNames/slots/roles; Microsoft.ClassicCompute/domainNames/slots/roles/metricDefinitions; Microsoft.ClassicCompute/domainNames/slots/roles/metrics; Microsoft.ClassicCompute/moveSubscriptionResources; Microsoft.ClassicCompute/operatingSystemFamilies; Microsoft.ClassicCompute/operatingSystems; Microsoft.ClassicCompute/operations; Microsoft.ClassicCompute/operationStatuses; Microsoft.ClassicCompute/quotas; Microsoft.ClassicCompute/resourceTypes; Microsoft.ClassicCompute/validateSubscriptionMoveAvailability; Microsoft.ClassicCompute/virtualMachines; Microsoft.ClassicCompute/virtualMachines/diagnosticSettings; Microsoft.ClassicCompute/virtualMachines/metricDefinitions; Microsoft.ClassicCompute/virtualMachines/metrics; Microsoft.ClassicInfrastructureMigrate/classicInfrastructureResources; Microsoft.ClassicNetwork/capabilities; Microsoft.ClassicNetwork/expressRouteCrossConnections; Microsoft.ClassicNetwork/expressRouteCrossConnections/peerings; Microsoft.ClassicNetwork/gatewaySupportedDevices; Microsoft.ClassicNetwork/networkSecurityGroups; Microsoft.ClassicNetwork/operations; Microsoft.ClassicNetwork/quotas; Microsoft.ClassicNetwork/reservedIps; Microsoft.ClassicNetwork/virtualNetworks; Microsoft.ClassicNetwork/virtualNetworks/remoteVirtualNetworkPeeringProxies; Microsoft.ClassicNetwork/virtualNetworks/virtualNetworkPeerings; Microsoft.ClassicStorage/capabilities; Microsoft.ClassicStorage/checkStorageAccountAvailability; Microsoft.ClassicStorage/disks; Microsoft.ClassicStorage/images; Microsoft.ClassicStorage/operations; Microsoft.ClassicStorage/osImages; Microsoft.ClassicStorage/osPlatformImages; Microsoft.ClassicStorage/publicImages; Microsoft.ClassicStorage/quotas; Microsoft.ClassicStorage/storageAccounts; Microsoft.ClassicStorage/storageAccounts/blobServices; Microsoft.ClassicStorage/storageAccounts/fileServices; Microsoft.ClassicStorage/storageAccounts/metricDefinitions; Microsoft.ClassicStorage/storageAccounts/metrics; Microsoft.ClassicStorage/storageAccounts/queueServices; Microsoft.ClassicStorage/storageAccounts/services; Microsoft.ClassicStorage/storageAccounts/services/diagnosticSettings; Microsoft.ClassicStorage/storageAccounts/services/metricDefinitions; Microsoft.ClassicStorage/storageAccounts/services/metrics; Microsoft.ClassicStorage/storageAccounts/tableServices; Microsoft.ClassicStorage/storageAccounts/vmImages; Microsoft.ClassicStorage/vmImages; Microsoft.ClassicSubscription/operations Default 0 0 0 0 0 none Deny the deployment of classic resources Denies deployment of classic resource types under the assigned scope. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deny-classic-resources n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-corp-mg Corp inherited mibelle-mg false false Audit VMs that do not use managed disks This policy audits VMs that do not use managed disks /providers/microsoft.authorization/policydefinitions/06a78e20-9358-41c9-923c-fb736d382a4d Policy BuiltIn Compute False audit Default 0 0 0 0 0 none Deny virtual machines and virtual machine scale sets that do not use managed disk Deny virtual machines that do not use managed disk. It checks the managed disk property on virtual machine OS Disk fields. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deny-unmanageddisk n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-corp-mg Corp inherited mibelle-mg false false Microsoft cloud security benchmark The Microsoft cloud security benchmark initiative represents the policies and controls implementing security recommendations defined in Microsoft cloud security benchmark, see https://aka.ms/azsecbm. This also serves as the Microsoft Defender for Cloud default policy initiative. You can directly assign this initiative, or manage its policies and compliance results within Microsoft Defender for Cloud. /providers/microsoft.authorization/policysetdefinitions/1f3afdf9-d0c9-4c3d-847f-89da613e70a8 PolicySet BuiltIn Security Center False n/a Default 27 18 9 0 0 none Enable Monitoring in Microsoft Defender for Cloud Enable Monitoring in Microsoft Defender for Cloud. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-asc-monitoring n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-corp-mg Corp inherited mibelle-mg false false Configure Azure Activity logs to stream to specified Log Analytics workspace Deploys the diagnostic settings for Azure Activity to stream subscriptions audit logs to a Log Analytics workspace to monitor subscription-level events /providers/microsoft.authorization/policydefinitions/2465583e-4e78-4c15-b6be-a36cbc7c8b0f Policy BuiltIn Monitoring False DeployIfNotExists effect=DeployIfNotExists, logAnalytics=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 1 0 1 0 0 Monitoring Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/dcb59c88-f014-5e17-840c-6c9aecc66286), Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/82f0c3bf-808b-5863-bf9c-231cfbf9598a) Deploy-AzActivity-Log (SPObjId: 217aa040-8eb0-451b-b81c-0b8f3d200d5a) Deploy Diagnostic Settings for Activity Log to Log Analytics workspace Ensures that Activity Log Diagnostics settings are set to push logs into Log Analytics workspace. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-corp-mg Corp inherited mibelle-mg false false Enable audit category group resource logging for supported resources to Log Analytics Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This initiative deploys diagnostic setting using the audit category group to route logs to Log Analytics for all supported resources. /providers/microsoft.authorization/policysetdefinitions/f5b29bc4-feca-4cc6-a58a-772dd5e290a5 PolicySet BuiltIn Monitoring False n/a logAnalytics=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 2 0 2 0 Monitoring Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b922046a-7a3e-59da-a982-8a5b855791ce), Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/9df772a7-1ce7-5439-ab6b-5d31d69925cc) Deploy-Diag-Logs (SPObjId: 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57) Enable allLogs category group resource logging for supported resources to Log Analytics Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This initiative deploys diagnostic setting using the allLogs category group to route logs to an Event Hub for all supported resources. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-corp-mg Corp inherited mibelle-mg false false Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud Configure the multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud (WDATP, WDATP_EXCLUDE_LINUX_PUBLIC_PREVIEW, WDATP_UNIFIED_SOLUTION etc.). See: https://learn.microsoft.com/azure/defender-for-cloud/integration-defender-for-endpoint for more information. /providers/microsoft.authorization/policysetdefinitions/77b391e3-2d5d-40c3-83bf-65c846b3c6a3 PolicySet BuiltIn Security Center False n/a Default 0 3 0 1 0 Security Admin (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/d730d560-adce-52b7-b10c-36a8ad16a6d3) Deploy-MDEndpointsAMA (SPObjId: 7d365a6d-a7ae-4921-beca-5ce854a76960) Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud Configure the multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud (WDATP, WDATP_EXCLUDE_LINUX_PUBLIC_PREVIEW, WDATP_UNIFIED_SOLUTION etc.). See: https://learn.microsoft.com/azure/defender-for-cloud/integration-defender-for-endpoint for more information. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-mdendpointsama n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-corp-mg Corp inherited mibelle-mg false false Enforce Azure Compute Security Benchmark compliance auditing Enforce Azure Compute Security Benchmark compliance auditing for Windows and Linux virtual machines. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-acsb PolicySet Custom Guest Configuration true n/a Default 0 0 0 0 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/6e26cd22-b41b-5611-aafc-e2c56b14c060) Enforce-ACSB (SPObjId: e1f2e80c-5329-4804-824d-f0b44713985e) Enforce Azure Compute Security Baseline compliance auditing This initiative assignment enables Azure Compute Security Baseline compliance auditing for Windows and Linux virtual machines. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/enforce-acsb n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-landingzones-corp-mg Corp d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation inherited mibelle-landingzones-corp-mg false false Not allowed resource types Restrict which resource types can be deployed in your environment. Limiting resource types can reduce the complexity and attack surface of your environment while also helping to manage costs. Compliance results are only shown for non-compliant resources. /providers/microsoft.authorization/policydefinitions/6c112d4e-5bc7-47ae-a041-ea2d9dccd749 Policy BuiltIn General False Deny effect=Deny, listOfResourceTypesNotAllowed=microsoft.network/expressroutecircuits; microsoft.network/expressroutegateways; microsoft.network/expressrouteports; microsoft.network/virtualwans; microsoft.network/vpngateways; microsoft.network/p2svpngateways; microsoft.network/vpnsites; microsoft.network/virtualnetworkgateways Default 0 0 0 0 0 none Deny the deployment of vWAN/ER/VPN gateway resources Denies deployment of vWAN/ER/VPN gateway resources in the Corp landing zone. /providers/microsoft.management/managementgroups/mibelle-landingzones-corp-mg/providers/microsoft.authorization/policyassignments/deny-hybridnetworking n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-landingzones-corp-mg Corp d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation inherited mibelle-landingzones-corp-mg false false Public network access should be disabled for PaaS services This policy initiative is a group of policies that prevents creation of Azure PaaS services with exposed public endpoints /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deny-publicpaasendpoints PolicySet Custom Network true n/a Default 0 2 0 2 0 none Public network access should be disabled for PaaS services This policy initiative is a group of policies that prevents creation of Azure PaaS services with exposed public endpoints. /providers/microsoft.management/managementgroups/mibelle-landingzones-corp-mg/providers/microsoft.authorization/policyassignments/deny-public-endpoints n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-landingzones-corp-mg Corp d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation inherited mibelle-landingzones-corp-mg false false Network interfaces should not have public IPs This policy denies the network interfaces which are configured with any public IP. Public IP addresses allow internet resources to communicate inbound to Azure resources, and Azure resources to communicate outbound to the internet. This should be reviewed by the network security team. /providers/microsoft.authorization/policydefinitions/83a86a26-fd1f-447c-b59d-e51f44264114 Policy BuiltIn Network False deny Default 0 0 0 0 0 none Deny network interfaces having a public IP associated This policy denies network interfaces from having a public IP associated to it under the assigned scope. /providers/microsoft.management/managementgroups/mibelle-landingzones-corp-mg/providers/microsoft.authorization/policyassignments/deny-public-ip-on-nic n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-landingzones-corp-mg Corp d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation inherited mibelle-landingzones-mg false false Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics If a virtual network already has traffic analytics enabled, then, this policy will overwrite its existing settings with the ones provided during policy creation. Traffic analytics is a cloud-based solution that provides visibility into user and application activity in cloud networks. /providers/microsoft.authorization/policydefinitions/052c180e-287d-44c3-86ef-01aeae2d9774 Policy BuiltIn Network False DeployIfNotExists networkWatcherName=/subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourcegroups/networkwatcherrg/providers/microsoft.network/networkwatchers/networkwatcher_westeurope, networkWatcherRG=networkwatcherrg, retentionDays=1, storageId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.storage/storageaccounts/mibmgmtnetprodeuwst01, vnetRegion=westeurope, workspaceRegion=westeurope, workspaceResourceId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 0 0 0 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/94dfdb33-b864-47c9-831d-366721beb989) 52a8c671384a4b609f1d7651 (SPObjId: 6e0d029a-fce4-400f-bff3-45b8d9a8342e) Deploy-TrafficAnalytics-WestEurope Deploy VNet Flow Logs in on All VNet in West Europe & enable Traffic Analytics /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/52a8c671384a4b609f1d7651 n/a 09/04/2025 06:12:52 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 09/04/2025 07:23:12 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-landingzones-corp-mg Corp d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation inherited mibelle-landingzones-mg false false Web Application Firewall (WAF) should be enabled for Application Gateway Deploy Azure Web Application Firewall (WAF) in front of public facing web applications for additional inspection of incoming traffic. Web Application Firewall (WAF) provides centralized protection of your web applications from common exploits and vulnerabilities such as SQL injections, Cross-Site Scripting, local and remote file executions. You can also restrict access to your web applications by countries, IP address ranges, and other http(s) parameters via custom rules. /providers/microsoft.authorization/policydefinitions/564feb30-bf6a-4854-b4bb-0d2d2d1e6c66 Policy BuiltIn Network False Audit effect=Audit Default 0 0 0 0 0 none Web Application Firewall (WAF) should be enabled for Application Gateway Assign the WAF should be enabled for Application Gateway audit policy. /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/audit-appgw-waf n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-landingzones-corp-mg Corp d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation inherited mibelle-landingzones-mg false false Network interfaces should disable IP forwarding This policy denies the network interfaces which enabled IP forwarding. The setting of IP forwarding disables Azure's check of the source and destination for a network interface. This should be reviewed by the network security team. /providers/microsoft.authorization/policydefinitions/88c0b9da-ce96-4b03-9635-f29a937e2900 Policy BuiltIn Network False deny Default 0 0 0 0 0 none Network interfaces should disable IP forwarding This policy denies the network interfaces which enabled IP forwarding. The setting of IP forwarding disables Azure's check of the source and destination for a network interface. This should be reviewed by the network security team. /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deny-ip-forwarding n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-landingzones-corp-mg Corp d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation inherited mibelle-landingzones-mg false false Management port access from the Internet should be blocked This policy denies any network security rule that allows management port access from the Internet, by default blocking SSH/RDP ports. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-mgmtports-from-internet Policy Custom Network true Deny effect=Deny Default 0 0 0 0 0 none Management port access from the Internet should be blocked This policy denies any network security rule that allows management port access from the Internet /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deny-mgmtports-internet n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-landingzones-corp-mg Corp d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation inherited mibelle-landingzones-mg false false Kubernetes cluster should not allow privileged containers Do not allow privileged containers creation in a Kubernetes cluster. This recommendation is part of CIS 5.2.1 which is intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. /providers/microsoft.authorization/policydefinitions/95edb821-ddaf-4404-9732-666045e056b4 Policy BuiltIn Kubernetes False deny effect=deny Default 0 0 0 0 0 none Kubernetes cluster should not allow privileged containers Do not allow privileged containers creation in a Kubernetes cluster. This recommendation is part of CIS 5.2.1 which is intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deny-priv-containers-aks n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-landingzones-corp-mg Corp d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation inherited mibelle-landingzones-mg false false Kubernetes clusters should not allow container privilege escalation Do not allow containers to run with privilege escalation to root in a Kubernetes cluster. This recommendation is part of CIS 5.2.5 which is intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. /providers/microsoft.authorization/policydefinitions/1c6e92c9-99f0-4e55-9cf2-0c234dc48f99 Policy BuiltIn Kubernetes False deny effect=deny Default 0 0 0 0 0 none Kubernetes clusters should not allow container privilege escalation Do not allow containers to run with privilege escalation to root in a Kubernetes cluster. This recommendation is part of CIS 5.2.5 which is intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deny-priv-escalation-aks n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-landingzones-corp-mg Corp d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation inherited mibelle-landingzones-mg false false Secure transfer to storage accounts should be enabled Audit requirement of Secure transfer in your storage account. Secure transfer is an option that forces your storage account to accept requests only from secure connections (HTTPS). Use of HTTPS ensures authentication between the server and the service and protects data in transit from network layer attacks such as man-in-the-middle, eavesdropping, and session-hijacking /providers/microsoft.authorization/policydefinitions/404c3081-a854-4457-ae30-26a93ef643f9 Policy BuiltIn Storage False Deny effect=Deny Default 0 1 0 1 0 none Secure transfer to storage accounts should be enabled Audit requirement of Secure transfer in your storage account. Secure transfer is an option that forces your storage account to accept requests only from secure connections (HTTPS). Use of HTTPS ensures authentication between the server and the service and protects data in transit from network layer attacks such as man-in-the-middle, eavesdropping, and session-hijacking. /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deny-storage-http n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-landingzones-corp-mg Corp d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation inherited mibelle-landingzones-mg false false Configure SQL servers to have auditing enabled to Log Analytics workspace To ensure the operations performed against your SQL assets are captured, SQL servers should have auditing enabled. If auditing is not enabled, this policy will configure auditing events to flow to the specified Log Analytics workspace. /providers/microsoft.authorization/policydefinitions/25da7dfb-0666-4a15-a8f5-402127efd8bb Policy BuiltIn SQL False DeployIfNotExists effect=DeployIfNotExists, logAnalyticsWorkspaceId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 0 0 0 0 SQL Security Manager (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/2f1eab15-c92e-52cd-8b0c-a60e52f1b331), SQL Security Manager (/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/providers/microsoft.authorization/roleassignments/ce81334b-c425-5087-9b8d-2119e050082b), Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/488f45ec-c535-5f65-85bf-acacd1bb93e8), Log Analytics Contributor (/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/providers/microsoft.authorization/roleassignments/fbb2af70-7587-52bd-b3e1-54fcdbdb7ea4) Deploy-AzSqlDb-Auditing (SPObjId: afb169da-f80a-4dd6-abf3-b7fc08efb8ae) Configure SQL servers to have auditing enabled to Log Analytics workspace To ensure the operations performed against your SQL assets are captured, SQL servers should have auditing enabled. If auditing is not enabled, this policy will configure auditing events to flow to the specified Log Analytics workspace. /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deploy-azsqldb-auditing n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-landingzones-corp-mg Corp d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation inherited mibelle-landingzones-mg false false Deploy SQL DB transparent data encryption Enables transparent data encryption on SQL databases /providers/microsoft.authorization/policydefinitions/86a912f6-9a06-4e26-b447-11b16ba8659f Policy BuiltIn SQL False DeployIfNotExists Default 0 0 0 0 0 SQL DB Contributor (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/af2f6b24-ac34-5f3b-9249-5a109d9d1528) Deploy-SQL-TDE (SPObjId: de5ed213-fd75-471c-8d32-920072d6c378) Deploy TDE on SQL servers This policy ensures that Transparent Data Encryption is enabled on SQL Servers. /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deploy-sql-tde n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-landingzones-corp-mg Corp d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation inherited mibelle-landingzones-mg false false Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics If a virtual network already has traffic analytics enabled, then, this policy will overwrite its existing settings with the ones provided during policy creation. Traffic analytics is a cloud-based solution that provides visibility into user and application activity in cloud networks. /providers/microsoft.authorization/policydefinitions/052c180e-287d-44c3-86ef-01aeae2d9774 Policy BuiltIn Network False DeployIfNotExists networkWatcherName=/subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourcegroups/networkwatcherrg/providers/microsoft.network/networkwatchers/networkwatcher_northeurope, networkWatcherRG=networkwatcherrg, retentionDays=1, storageId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.storage/storageaccounts/mibmgmtnetprodeunst01, vnetRegion=northeurope, workspaceRegion=westeurope, workspaceResourceId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 0 0 0 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/3fb7bac5-2328-4e74-a5b0-0d6d2a631693) e9143c36572348c3ba0c67b1 (SPObjId: 9c3b725e-ce85-47ac-bf6f-c2fa0571c259) Deploy-TrafficAnalytics-NorthEurope Deploy VNet Flow Logs in on All VNet in North Europe & enable Traffic Analytics /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/e9143c36572348c3ba0c67b1 n/a 09/04/2025 07:17:59 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 09/04/2025 07:33:42 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-landingzones-corp-mg Corp d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation inherited mibelle-landingzones-mg false false Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines Configure auto-assessment (every 24 hours) for OS updates. You can control the scope of assignment according to machine subscription, resource group, location or tag. Learn more about this for Windows: https://aka.ms/computevm-windowspatchassessmentmode, for Linux: https://aka.ms/computevm-linuxpatchassessmentmode. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-aum-checkupdates PolicySet Custom Security Center true n/a assessmentMode=AutomaticByPlatform Default 0 0 0 0 0 Virtual Machine Contributor (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/571da045-f503-5cb2-b123-ede8cfe0f15a), Azure Connected Machine Resource Administrator (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/7d65b18e-df43-5353-85a4-716e68ff7c7a), Managed Identity Operator (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/b2c88903-f3a4-54ec-813c-46d650309b86) Enable-AUM-CheckUpdates (SPObjId: 4f27b633-c16b-47a6-ab24-737bb6cdad56) Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines. Configure auto-assessment (every 24 hours) for OS updates. You can control the scope of assignment according to machine subscription, resource group, location or tag. Learn more about this for Windows: https://aka.ms/computevm-windowspatchassessmentmode, for Linux: https://aka.ms/computevm-linuxpatchassessmentmode. /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-landingzones-corp-mg Corp d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation inherited mibelle-landingzones-mg false false Kubernetes clusters should be accessible only over HTTPS Use of HTTPS ensures authentication and protects data in transit from network layer eavesdropping attacks. This capability is currently generally available for Kubernetes Service (AKS), and in preview for Azure Arc enabled Kubernetes. For more info, visit https://aka.ms/kubepolicydoc /providers/microsoft.authorization/policydefinitions/1a5b4dca-0b6f-4cf5-907c-56316bc1bf3d Policy BuiltIn Kubernetes False deny effect=deny Default 0 0 0 0 0 none Kubernetes clusters should be accessible only over HTTPS Use of HTTPS ensures authentication and protects data in transit from network layer eavesdropping attacks. This capability is currently generally available for Kubernetes Service (AKS), and in preview for AKS Engine and Azure Arc enabled Kubernetes. For more info, visit https://aka.ms/kubepolicydoc. /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enforce-aks-https n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-landingzones-corp-mg Corp d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation inherited mibelle-landingzones-mg false false Enforce recommended guardrails for Azure Key Vault Enforce recommended guardrails for Azure Key Vault. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-keyvault PolicySet Custom Key Vault true n/a Default 0 4 0 1 0 none Enforce recommended guardrails for Azure Key Vault This initiative assignment enables recommended ALZ guardrails for Azure Key Vault. /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enforce-gr-keyvault n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-landingzones-corp-mg Corp d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation inherited mibelle-landingzones-mg false false Subnets should be private Ensure your subnets are secure by default by preventing default outbound access. For more information go to https://aka.ms/defaultoutboundaccessretirement /providers/microsoft.authorization/policydefinitions/7bca8353-aa3b-429b-904a-9229c4385837 Policy BuiltIn Network False Audit Default 0 0 0 0 0 none Subnets should be private Ensure your subnets are secure by default by preventing default outbound access. For more information go to https://aka.ms/defaultoutboundaccessretirement /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enforce-subnet-private n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-landingzones-corp-mg Corp d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation inherited mibelle-mg false false Audit resource location matches resource group location Audit that the resource location matches its resource group location /providers/microsoft.authorization/policydefinitions/0a914e76-4921-4c19-b460-a2d36003525a Policy BuiltIn General False audit Default 0 1 0 7 0 none Audit that the resource location matches its resource group location Audit resource location matches resource group location /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-location-match n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-landingzones-corp-mg Corp d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation inherited mibelle-mg false false Audit virtual machines for Trusted Launch support Trusted Launch improves security of a Virtual Machine which requires VM SKU, OS Disk & OS Image to support it (Gen 2). To learn more about Trusted Launch, visit https://aka.ms/trustedlaunch. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/audit-trustedlaunch PolicySet Custom Trusted Launch true n/a Default 0 0 0 0 0 none Audit virtual machines for Trusted Launch support Trusted Launch improves security of a Virtual Machine which requires VM SKU, OS Disk & OS Image to support it (Gen 2). To learn more about Trusted Launch, visit https://aka.ms/trustedlaunch. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-trustedlaunch n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-landingzones-corp-mg Corp d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation inherited mibelle-mg false false Unused resources driving cost should be avoided Optimize cost by detecting unused but chargeable resources. Leverage this Azure Policy Initiative as a cost control tool to reveal orphaned resources that are contributing cost. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/audit-unusedresourcescostoptimization PolicySet Custom Cost Optimization true n/a EffectDisks=Audit, EffectPublicIpAddresses=Audit, EffectServerFarms=Audit Default 0 1 0 1 0 none Unused resources driving cost should be avoided This Policy initiative is a group of Policy definitions that help optimize cost by detecting unused but chargeable resources. Leverage this Policy initiative as a cost control to reveal orphaned resources that are driving cost. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-unusedresources n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-landingzones-corp-mg Corp d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation inherited mibelle-mg false false Not allowed resource types Restrict which resource types can be deployed in your environment. Limiting resource types can reduce the complexity and attack surface of your environment while also helping to manage costs. Compliance results are only shown for non-compliant resources. /providers/microsoft.authorization/policydefinitions/6c112d4e-5bc7-47ae-a041-ea2d9dccd749 Policy BuiltIn General False Deny effect=Deny, listOfResourceTypesNotAllowed=Microsoft.ClassicCompute/capabilities; Microsoft.ClassicCompute/checkDomainNameAvailability; Microsoft.ClassicCompute/domainNames; Microsoft.ClassicCompute/domainNames/capabilities; Microsoft.ClassicCompute/domainNames/internalLoadBalancers; Microsoft.ClassicCompute/domainNames/serviceCertificates; Microsoft.ClassicCompute/domainNames/slots; Microsoft.ClassicCompute/domainNames/slots/roles; Microsoft.ClassicCompute/domainNames/slots/roles/metricDefinitions; Microsoft.ClassicCompute/domainNames/slots/roles/metrics; Microsoft.ClassicCompute/moveSubscriptionResources; Microsoft.ClassicCompute/operatingSystemFamilies; Microsoft.ClassicCompute/operatingSystems; Microsoft.ClassicCompute/operations; Microsoft.ClassicCompute/operationStatuses; Microsoft.ClassicCompute/quotas; Microsoft.ClassicCompute/resourceTypes; Microsoft.ClassicCompute/validateSubscriptionMoveAvailability; Microsoft.ClassicCompute/virtualMachines; Microsoft.ClassicCompute/virtualMachines/diagnosticSettings; Microsoft.ClassicCompute/virtualMachines/metricDefinitions; Microsoft.ClassicCompute/virtualMachines/metrics; Microsoft.ClassicInfrastructureMigrate/classicInfrastructureResources; Microsoft.ClassicNetwork/capabilities; Microsoft.ClassicNetwork/expressRouteCrossConnections; Microsoft.ClassicNetwork/expressRouteCrossConnections/peerings; Microsoft.ClassicNetwork/gatewaySupportedDevices; Microsoft.ClassicNetwork/networkSecurityGroups; Microsoft.ClassicNetwork/operations; Microsoft.ClassicNetwork/quotas; Microsoft.ClassicNetwork/reservedIps; Microsoft.ClassicNetwork/virtualNetworks; Microsoft.ClassicNetwork/virtualNetworks/remoteVirtualNetworkPeeringProxies; Microsoft.ClassicNetwork/virtualNetworks/virtualNetworkPeerings; Microsoft.ClassicStorage/capabilities; Microsoft.ClassicStorage/checkStorageAccountAvailability; Microsoft.ClassicStorage/disks; Microsoft.ClassicStorage/images; Microsoft.ClassicStorage/operations; Microsoft.ClassicStorage/osImages; Microsoft.ClassicStorage/osPlatformImages; Microsoft.ClassicStorage/publicImages; Microsoft.ClassicStorage/quotas; Microsoft.ClassicStorage/storageAccounts; Microsoft.ClassicStorage/storageAccounts/blobServices; Microsoft.ClassicStorage/storageAccounts/fileServices; Microsoft.ClassicStorage/storageAccounts/metricDefinitions; Microsoft.ClassicStorage/storageAccounts/metrics; Microsoft.ClassicStorage/storageAccounts/queueServices; Microsoft.ClassicStorage/storageAccounts/services; Microsoft.ClassicStorage/storageAccounts/services/diagnosticSettings; Microsoft.ClassicStorage/storageAccounts/services/metricDefinitions; Microsoft.ClassicStorage/storageAccounts/services/metrics; Microsoft.ClassicStorage/storageAccounts/tableServices; Microsoft.ClassicStorage/storageAccounts/vmImages; Microsoft.ClassicStorage/vmImages; Microsoft.ClassicSubscription/operations Default 0 0 0 0 0 none Deny the deployment of classic resources Denies deployment of classic resource types under the assigned scope. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deny-classic-resources n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-landingzones-corp-mg Corp d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation inherited mibelle-mg false false Audit VMs that do not use managed disks This policy audits VMs that do not use managed disks /providers/microsoft.authorization/policydefinitions/06a78e20-9358-41c9-923c-fb736d382a4d Policy BuiltIn Compute False audit Default 0 0 0 0 0 none Deny virtual machines and virtual machine scale sets that do not use managed disk Deny virtual machines that do not use managed disk. It checks the managed disk property on virtual machine OS Disk fields. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deny-unmanageddisk n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-landingzones-corp-mg Corp d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation inherited mibelle-mg false false Microsoft cloud security benchmark The Microsoft cloud security benchmark initiative represents the policies and controls implementing security recommendations defined in Microsoft cloud security benchmark, see https://aka.ms/azsecbm. This also serves as the Microsoft Defender for Cloud default policy initiative. You can directly assign this initiative, or manage its policies and compliance results within Microsoft Defender for Cloud. /providers/microsoft.authorization/policysetdefinitions/1f3afdf9-d0c9-4c3d-847f-89da613e70a8 PolicySet BuiltIn Security Center False n/a Default 27 18 9 0 0 none Enable Monitoring in Microsoft Defender for Cloud Enable Monitoring in Microsoft Defender for Cloud. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-asc-monitoring n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-landingzones-corp-mg Corp d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation inherited mibelle-mg false false Configure Azure Activity logs to stream to specified Log Analytics workspace Deploys the diagnostic settings for Azure Activity to stream subscriptions audit logs to a Log Analytics workspace to monitor subscription-level events /providers/microsoft.authorization/policydefinitions/2465583e-4e78-4c15-b6be-a36cbc7c8b0f Policy BuiltIn Monitoring False DeployIfNotExists effect=DeployIfNotExists, logAnalytics=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 1 0 1 0 0 Monitoring Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/dcb59c88-f014-5e17-840c-6c9aecc66286), Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/82f0c3bf-808b-5863-bf9c-231cfbf9598a) Deploy-AzActivity-Log (SPObjId: 217aa040-8eb0-451b-b81c-0b8f3d200d5a) Deploy Diagnostic Settings for Activity Log to Log Analytics workspace Ensures that Activity Log Diagnostics settings are set to push logs into Log Analytics workspace. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-landingzones-corp-mg Corp d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation inherited mibelle-mg false false Enable audit category group resource logging for supported resources to Log Analytics Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This initiative deploys diagnostic setting using the audit category group to route logs to Log Analytics for all supported resources. /providers/microsoft.authorization/policysetdefinitions/f5b29bc4-feca-4cc6-a58a-772dd5e290a5 PolicySet BuiltIn Monitoring False n/a logAnalytics=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 2 0 2 0 Monitoring Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b922046a-7a3e-59da-a982-8a5b855791ce), Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/9df772a7-1ce7-5439-ab6b-5d31d69925cc) Deploy-Diag-Logs (SPObjId: 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57) Enable allLogs category group resource logging for supported resources to Log Analytics Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This initiative deploys diagnostic setting using the allLogs category group to route logs to an Event Hub for all supported resources. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-landingzones-corp-mg Corp d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation inherited mibelle-mg false false Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud Configure the multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud (WDATP, WDATP_EXCLUDE_LINUX_PUBLIC_PREVIEW, WDATP_UNIFIED_SOLUTION etc.). See: https://learn.microsoft.com/azure/defender-for-cloud/integration-defender-for-endpoint for more information. /providers/microsoft.authorization/policysetdefinitions/77b391e3-2d5d-40c3-83bf-65c846b3c6a3 PolicySet BuiltIn Security Center False n/a Default 0 3 0 1 0 Security Admin (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/d730d560-adce-52b7-b10c-36a8ad16a6d3) Deploy-MDEndpointsAMA (SPObjId: 7d365a6d-a7ae-4921-beca-5ce854a76960) Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud Configure the multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud (WDATP, WDATP_EXCLUDE_LINUX_PUBLIC_PREVIEW, WDATP_UNIFIED_SOLUTION etc.). See: https://learn.microsoft.com/azure/defender-for-cloud/integration-defender-for-endpoint for more information. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-mdendpointsama n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-landingzones-corp-mg Corp d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation inherited mibelle-mg false false Enforce Azure Compute Security Benchmark compliance auditing Enforce Azure Compute Security Benchmark compliance auditing for Windows and Linux virtual machines. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-acsb PolicySet Custom Guest Configuration true n/a Default 0 0 0 0 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/6e26cd22-b41b-5611-aafc-e2c56b14c060) Enforce-ACSB (SPObjId: e1f2e80c-5329-4804-824d-f0b44713985e) Enforce Azure Compute Security Baseline compliance auditing This initiative assignment enables Azure Compute Security Baseline compliance auditing for Windows and Linux virtual machines. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/enforce-acsb n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-identity-mg Identity inherited mibelle-mg false false Audit resource location matches resource group location Audit that the resource location matches its resource group location /providers/microsoft.authorization/policydefinitions/0a914e76-4921-4c19-b460-a2d36003525a Policy BuiltIn General False audit Default 0 1 0 9 0 none Audit that the resource location matches its resource group location Audit resource location matches resource group location /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-location-match n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-identity-mg Identity inherited mibelle-mg false false Audit virtual machines for Trusted Launch support Trusted Launch improves security of a Virtual Machine which requires VM SKU, OS Disk & OS Image to support it (Gen 2). To learn more about Trusted Launch, visit https://aka.ms/trustedlaunch. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/audit-trustedlaunch PolicySet Custom Trusted Launch true n/a Default 0 2 0 3 0 none Audit virtual machines for Trusted Launch support Trusted Launch improves security of a Virtual Machine which requires VM SKU, OS Disk & OS Image to support it (Gen 2). To learn more about Trusted Launch, visit https://aka.ms/trustedlaunch. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-trustedlaunch n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-identity-mg Identity inherited mibelle-mg false false Unused resources driving cost should be avoided Optimize cost by detecting unused but chargeable resources. Leverage this Azure Policy Initiative as a cost control tool to reveal orphaned resources that are contributing cost. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/audit-unusedresourcescostoptimization PolicySet Custom Cost Optimization true n/a EffectDisks=Audit, EffectPublicIpAddresses=Audit, EffectServerFarms=Audit Default 0 2 0 3 0 none Unused resources driving cost should be avoided This Policy initiative is a group of Policy definitions that help optimize cost by detecting unused but chargeable resources. Leverage this Policy initiative as a cost control to reveal orphaned resources that are driving cost. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-unusedresources n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-identity-mg Identity inherited mibelle-mg false false Not allowed resource types Restrict which resource types can be deployed in your environment. Limiting resource types can reduce the complexity and attack surface of your environment while also helping to manage costs. Compliance results are only shown for non-compliant resources. /providers/microsoft.authorization/policydefinitions/6c112d4e-5bc7-47ae-a041-ea2d9dccd749 Policy BuiltIn General False Deny effect=Deny, listOfResourceTypesNotAllowed=Microsoft.ClassicCompute/capabilities; Microsoft.ClassicCompute/checkDomainNameAvailability; Microsoft.ClassicCompute/domainNames; Microsoft.ClassicCompute/domainNames/capabilities; Microsoft.ClassicCompute/domainNames/internalLoadBalancers; Microsoft.ClassicCompute/domainNames/serviceCertificates; Microsoft.ClassicCompute/domainNames/slots; Microsoft.ClassicCompute/domainNames/slots/roles; Microsoft.ClassicCompute/domainNames/slots/roles/metricDefinitions; Microsoft.ClassicCompute/domainNames/slots/roles/metrics; Microsoft.ClassicCompute/moveSubscriptionResources; Microsoft.ClassicCompute/operatingSystemFamilies; Microsoft.ClassicCompute/operatingSystems; Microsoft.ClassicCompute/operations; Microsoft.ClassicCompute/operationStatuses; Microsoft.ClassicCompute/quotas; Microsoft.ClassicCompute/resourceTypes; Microsoft.ClassicCompute/validateSubscriptionMoveAvailability; Microsoft.ClassicCompute/virtualMachines; Microsoft.ClassicCompute/virtualMachines/diagnosticSettings; Microsoft.ClassicCompute/virtualMachines/metricDefinitions; Microsoft.ClassicCompute/virtualMachines/metrics; Microsoft.ClassicInfrastructureMigrate/classicInfrastructureResources; Microsoft.ClassicNetwork/capabilities; Microsoft.ClassicNetwork/expressRouteCrossConnections; Microsoft.ClassicNetwork/expressRouteCrossConnections/peerings; Microsoft.ClassicNetwork/gatewaySupportedDevices; Microsoft.ClassicNetwork/networkSecurityGroups; Microsoft.ClassicNetwork/operations; Microsoft.ClassicNetwork/quotas; Microsoft.ClassicNetwork/reservedIps; Microsoft.ClassicNetwork/virtualNetworks; Microsoft.ClassicNetwork/virtualNetworks/remoteVirtualNetworkPeeringProxies; Microsoft.ClassicNetwork/virtualNetworks/virtualNetworkPeerings; Microsoft.ClassicStorage/capabilities; Microsoft.ClassicStorage/checkStorageAccountAvailability; Microsoft.ClassicStorage/disks; Microsoft.ClassicStorage/images; Microsoft.ClassicStorage/operations; Microsoft.ClassicStorage/osImages; Microsoft.ClassicStorage/osPlatformImages; Microsoft.ClassicStorage/publicImages; Microsoft.ClassicStorage/quotas; Microsoft.ClassicStorage/storageAccounts; Microsoft.ClassicStorage/storageAccounts/blobServices; Microsoft.ClassicStorage/storageAccounts/fileServices; Microsoft.ClassicStorage/storageAccounts/metricDefinitions; Microsoft.ClassicStorage/storageAccounts/metrics; Microsoft.ClassicStorage/storageAccounts/queueServices; Microsoft.ClassicStorage/storageAccounts/services; Microsoft.ClassicStorage/storageAccounts/services/diagnosticSettings; Microsoft.ClassicStorage/storageAccounts/services/metricDefinitions; Microsoft.ClassicStorage/storageAccounts/services/metrics; Microsoft.ClassicStorage/storageAccounts/tableServices; Microsoft.ClassicStorage/storageAccounts/vmImages; Microsoft.ClassicStorage/vmImages; Microsoft.ClassicSubscription/operations Default 0 0 0 0 0 none Deny the deployment of classic resources Denies deployment of classic resource types under the assigned scope. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deny-classic-resources n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-identity-mg Identity inherited mibelle-mg false false Audit VMs that do not use managed disks This policy audits VMs that do not use managed disks /providers/microsoft.authorization/policydefinitions/06a78e20-9358-41c9-923c-fb736d382a4d Policy BuiltIn Compute False audit Default 0 1 0 1 0 none Deny virtual machines and virtual machine scale sets that do not use managed disk Deny virtual machines that do not use managed disk. It checks the managed disk property on virtual machine OS Disk fields. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deny-unmanageddisk n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-identity-mg Identity inherited mibelle-mg false false Microsoft cloud security benchmark The Microsoft cloud security benchmark initiative represents the policies and controls implementing security recommendations defined in Microsoft cloud security benchmark, see https://aka.ms/azsecbm. This also serves as the Microsoft Defender for Cloud default policy initiative. You can directly assign this initiative, or manage its policies and compliance results within Microsoft Defender for Cloud. /providers/microsoft.authorization/policysetdefinitions/1f3afdf9-d0c9-4c3d-847f-89da613e70a8 PolicySet BuiltIn Security Center False n/a Default 33 23 8 2 0 none Enable Monitoring in Microsoft Defender for Cloud Enable Monitoring in Microsoft Defender for Cloud. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-asc-monitoring n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-identity-mg Identity inherited mibelle-mg false false Configure Azure Activity logs to stream to specified Log Analytics workspace Deploys the diagnostic settings for Azure Activity to stream subscriptions audit logs to a Log Analytics workspace to monitor subscription-level events /providers/microsoft.authorization/policydefinitions/2465583e-4e78-4c15-b6be-a36cbc7c8b0f Policy BuiltIn Monitoring False DeployIfNotExists effect=DeployIfNotExists, logAnalytics=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 1 0 1 0 Monitoring Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/dcb59c88-f014-5e17-840c-6c9aecc66286), Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/82f0c3bf-808b-5863-bf9c-231cfbf9598a) Deploy-AzActivity-Log (SPObjId: 217aa040-8eb0-451b-b81c-0b8f3d200d5a) Deploy Diagnostic Settings for Activity Log to Log Analytics workspace Ensures that Activity Log Diagnostics settings are set to push logs into Log Analytics workspace. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-identity-mg Identity inherited mibelle-mg false false Enable audit category group resource logging for supported resources to Log Analytics Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This initiative deploys diagnostic setting using the audit category group to route logs to Log Analytics for all supported resources. /providers/microsoft.authorization/policysetdefinitions/f5b29bc4-feca-4cc6-a58a-772dd5e290a5 PolicySet BuiltIn Monitoring False n/a logAnalytics=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 0 0 0 0 Monitoring Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b922046a-7a3e-59da-a982-8a5b855791ce), Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/9df772a7-1ce7-5439-ab6b-5d31d69925cc) Deploy-Diag-Logs (SPObjId: 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57) Enable allLogs category group resource logging for supported resources to Log Analytics Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This initiative deploys diagnostic setting using the allLogs category group to route logs to an Event Hub for all supported resources. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-identity-mg Identity inherited mibelle-mg false false Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud Configure the multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud (WDATP, WDATP_EXCLUDE_LINUX_PUBLIC_PREVIEW, WDATP_UNIFIED_SOLUTION etc.). See: https://learn.microsoft.com/azure/defender-for-cloud/integration-defender-for-endpoint for more information. /providers/microsoft.authorization/policysetdefinitions/77b391e3-2d5d-40c3-83bf-65c846b3c6a3 PolicySet BuiltIn Security Center False n/a Default 0 3 0 1 0 Security Admin (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/d730d560-adce-52b7-b10c-36a8ad16a6d3) Deploy-MDEndpointsAMA (SPObjId: 7d365a6d-a7ae-4921-beca-5ce854a76960) Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud Configure the multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud (WDATP, WDATP_EXCLUDE_LINUX_PUBLIC_PREVIEW, WDATP_UNIFIED_SOLUTION etc.). See: https://learn.microsoft.com/azure/defender-for-cloud/integration-defender-for-endpoint for more information. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-mdendpointsama n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-identity-mg Identity inherited mibelle-mg false false Enforce Azure Compute Security Benchmark compliance auditing Enforce Azure Compute Security Benchmark compliance auditing for Windows and Linux virtual machines. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-acsb PolicySet Custom Guest Configuration true n/a Default 1 2 1 0 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/6e26cd22-b41b-5611-aafc-e2c56b14c060) Enforce-ACSB (SPObjId: e1f2e80c-5329-4804-824d-f0b44713985e) Enforce Azure Compute Security Baseline compliance auditing This initiative assignment enables Azure Compute Security Baseline compliance auditing for Windows and Linux virtual machines. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/enforce-acsb n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-identity-mg Identity thisScope Mg false false Management port access from the Internet should be blocked This policy denies any network security rule that allows management port access from the Internet, by default blocking SSH/RDP ports. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-mgmtports-from-internet Policy Custom Network true Deny effect=Deny Default 0 0 0 0 0 none Management port access from the Internet should be blocked This policy denies any network security rule that allows management port access from the Internet /providers/microsoft.management/managementgroups/mibelle-platform-identity-mg/providers/microsoft.authorization/policyassignments/deny-mgmtports-internet n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-identity-mg Identity thisScope Mg false false Not allowed resource types Restrict which resource types can be deployed in your environment. Limiting resource types can reduce the complexity and attack surface of your environment while also helping to manage costs. Compliance results are only shown for non-compliant resources. /providers/microsoft.authorization/policydefinitions/6c112d4e-5bc7-47ae-a041-ea2d9dccd749 Policy BuiltIn General False Deny effect=Deny, listOfResourceTypesNotAllowed=Microsoft.Network/publicIPAddresses Default 0 0 0 0 0 none Deny the creation of public IP This policy denies creation of Public IPs under the assigned scope. /providers/microsoft.management/managementgroups/mibelle-platform-identity-mg/providers/microsoft.authorization/policyassignments/deny-public-ip n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-identity-mg Identity inherited mibelle-platform-mg false false Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics If a virtual network already has traffic analytics enabled, then, this policy will overwrite its existing settings with the ones provided during policy creation. Traffic analytics is a cloud-based solution that provides visibility into user and application activity in cloud networks. /providers/microsoft.authorization/policydefinitions/052c180e-287d-44c3-86ef-01aeae2d9774 Policy BuiltIn Network False DeployIfNotExists networkWatcherName=/subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourcegroups/networkwatcherrg/providers/microsoft.network/networkwatchers/networkwatcher_northeurope, networkWatcherRG=networkwatcherrg, retentionDays=1, storageId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.storage/storageaccounts/mibmgmtnetprodeunst01, vnetRegion=northeurope, workspaceRegion=westeurope, workspaceResourceId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 0 0 0 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/71689b0c-ca78-4285-9603-49a5497225d8) 97339ff59e1744678fd92dea (SPObjId: c2b8a553-ec19-42b8-8855-6edc985eaffb) Deploy-TrafficAnalytics-NorthEurope Deploy VNet Flow Logs in on All VNet in North Europe & enable Traffic Analytics /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/97339ff59e1744678fd92dea n/a 09/04/2025 07:21:45 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 09/04/2025 07:34:08 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-identity-mg Identity inherited mibelle-platform-mg false false Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics If a virtual network already has traffic analytics enabled, then, this policy will overwrite its existing settings with the ones provided during policy creation. Traffic analytics is a cloud-based solution that provides visibility into user and application activity in cloud networks. /providers/microsoft.authorization/policydefinitions/052c180e-287d-44c3-86ef-01aeae2d9774 Policy BuiltIn Network False DeployIfNotExists networkWatcherName=/subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourcegroups/networkwatcherrg/providers/microsoft.network/networkwatchers/networkwatcher_westeurope, networkWatcherRG=networkwatcherrg, retentionDays=1, storageId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.storage/storageaccounts/mibmgmtnetprodeuwst01, vnetRegion=westeurope, workspaceRegion=westeurope, workspaceResourceId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 1 0 1 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/21c0b216-76ff-44ef-9430-19f801e102d5) d33eb38085bf40bd860fe43b (SPObjId: 78dd5b73-2109-4a10-b2e4-6463304b4b4d) Deploy-TrafficAnalytics-WestEurope Deploy VNet Flow Logs in on All VNet in North Europe & enable Traffic Analytics /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/d33eb38085bf40bd860fe43b n/a 06/12/2025 18:15:24 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 09/04/2025 07:24:28 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-identity-mg Identity inherited mibelle-platform-mg false false Do not allow deletion of specified resource and resource type This policy enables you to specify the resource and resource type that your organization can protect from accidentals deletion by blocking delete calls using the deny action effect. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/denyaction-deleteresources Policy Custom General true DenyAction effect=DenyAction, resourceName=mibelle-mgmt-log-prod-euw-id-01, resourceType=Microsoft.ManagedIdentity/userAssignedIdentities Default 0 0 0 0 0 none Do not allow deletion of the User Assigned Managed Identity used by AMA This policy provides a safeguard against accidental removal of the User Assigned Managed Identity used by AMA by blocking delete calls using deny action effect. /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/denyaction-deleteuamiama n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-identity-mg Identity inherited mibelle-platform-mg false false Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines Configure auto-assessment (every 24 hours) for OS updates. You can control the scope of assignment according to machine subscription, resource group, location or tag. Learn more about this for Windows: https://aka.ms/computevm-windowspatchassessmentmode, for Linux: https://aka.ms/computevm-linuxpatchassessmentmode. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-aum-checkupdates PolicySet Custom Security Center true n/a assessmentMode=AutomaticByPlatform Default 0 2 0 1 0 Virtual Machine Contributor (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/51e23aa4-bdf1-5059-8efc-453852a14d5e), Azure Connected Machine Resource Administrator (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/d72b7c0f-a23a-58ed-8e0a-40f49a5b6ab3), Managed Identity Operator (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/1f97b9d8-3c21-5b8b-9b36-72e77d4a90e0) Enable-AUM-CheckUpdates (SPObjId: ce67e461-e4a3-4514-89cb-7eb8802f8f65) Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines. Configure auto-assessment (every 24 hours) for OS updates. You can control the scope of assignment according to machine subscription, resource group, location or tag. Learn more about this for Windows: https://aka.ms/computevm-windowspatchassessmentmode, for Linux: https://aka.ms/computevm-linuxpatchassessmentmode. /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates n/a 06/12/2025 17:56:38 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-identity-mg Identity inherited mibelle-platform-mg false false Enforce recommended guardrails for Azure Key Vault Enforce recommended guardrails for Azure Key Vault. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-keyvault PolicySet Custom Key Vault true n/a Default 0 0 0 0 0 none Enforce recommended guardrails for Azure Key Vault This initiative assignment enables recommended ALZ guardrails for Azure Key Vault. /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enforce-gr-keyvault n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-identity-mg Identity inherited mibelle-platform-mg false false Subnets should be private Ensure your subnets are secure by default by preventing default outbound access. For more information go to https://aka.ms/defaultoutboundaccessretirement /providers/microsoft.authorization/policydefinitions/7bca8353-aa3b-429b-904a-9229c4385837 Policy BuiltIn Network False Audit Default 1 0 2 0 0 none Subnets should be private Ensure your subnets are secure by default by preventing default outbound access. For more information go to https://aka.ms/defaultoutboundaccessretirement /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enforce-subnet-private n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-mg false false Audit resource location matches resource group location Audit that the resource location matches its resource group location /providers/microsoft.authorization/policydefinitions/0a914e76-4921-4c19-b460-a2d36003525a Policy BuiltIn General False audit Default 0 1 0 9 0 none Audit that the resource location matches its resource group location Audit resource location matches resource group location /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-location-match n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-mg false false Audit virtual machines for Trusted Launch support Trusted Launch improves security of a Virtual Machine which requires VM SKU, OS Disk & OS Image to support it (Gen 2). To learn more about Trusted Launch, visit https://aka.ms/trustedlaunch. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/audit-trustedlaunch PolicySet Custom Trusted Launch true n/a Default 0 2 0 3 0 none Audit virtual machines for Trusted Launch support Trusted Launch improves security of a Virtual Machine which requires VM SKU, OS Disk & OS Image to support it (Gen 2). To learn more about Trusted Launch, visit https://aka.ms/trustedlaunch. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-trustedlaunch n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-mg false false Unused resources driving cost should be avoided Optimize cost by detecting unused but chargeable resources. Leverage this Azure Policy Initiative as a cost control tool to reveal orphaned resources that are contributing cost. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/audit-unusedresourcescostoptimization PolicySet Custom Cost Optimization true n/a EffectDisks=Audit, EffectPublicIpAddresses=Audit, EffectServerFarms=Audit Default 0 2 0 3 0 none Unused resources driving cost should be avoided This Policy initiative is a group of Policy definitions that help optimize cost by detecting unused but chargeable resources. Leverage this Policy initiative as a cost control to reveal orphaned resources that are driving cost. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-unusedresources n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-mg false false Not allowed resource types Restrict which resource types can be deployed in your environment. Limiting resource types can reduce the complexity and attack surface of your environment while also helping to manage costs. Compliance results are only shown for non-compliant resources. /providers/microsoft.authorization/policydefinitions/6c112d4e-5bc7-47ae-a041-ea2d9dccd749 Policy BuiltIn General False Deny effect=Deny, listOfResourceTypesNotAllowed=Microsoft.ClassicCompute/capabilities; Microsoft.ClassicCompute/checkDomainNameAvailability; Microsoft.ClassicCompute/domainNames; Microsoft.ClassicCompute/domainNames/capabilities; Microsoft.ClassicCompute/domainNames/internalLoadBalancers; Microsoft.ClassicCompute/domainNames/serviceCertificates; Microsoft.ClassicCompute/domainNames/slots; Microsoft.ClassicCompute/domainNames/slots/roles; Microsoft.ClassicCompute/domainNames/slots/roles/metricDefinitions; Microsoft.ClassicCompute/domainNames/slots/roles/metrics; Microsoft.ClassicCompute/moveSubscriptionResources; Microsoft.ClassicCompute/operatingSystemFamilies; Microsoft.ClassicCompute/operatingSystems; Microsoft.ClassicCompute/operations; Microsoft.ClassicCompute/operationStatuses; Microsoft.ClassicCompute/quotas; Microsoft.ClassicCompute/resourceTypes; Microsoft.ClassicCompute/validateSubscriptionMoveAvailability; Microsoft.ClassicCompute/virtualMachines; Microsoft.ClassicCompute/virtualMachines/diagnosticSettings; Microsoft.ClassicCompute/virtualMachines/metricDefinitions; Microsoft.ClassicCompute/virtualMachines/metrics; Microsoft.ClassicInfrastructureMigrate/classicInfrastructureResources; Microsoft.ClassicNetwork/capabilities; Microsoft.ClassicNetwork/expressRouteCrossConnections; Microsoft.ClassicNetwork/expressRouteCrossConnections/peerings; Microsoft.ClassicNetwork/gatewaySupportedDevices; Microsoft.ClassicNetwork/networkSecurityGroups; Microsoft.ClassicNetwork/operations; Microsoft.ClassicNetwork/quotas; Microsoft.ClassicNetwork/reservedIps; Microsoft.ClassicNetwork/virtualNetworks; Microsoft.ClassicNetwork/virtualNetworks/remoteVirtualNetworkPeeringProxies; Microsoft.ClassicNetwork/virtualNetworks/virtualNetworkPeerings; Microsoft.ClassicStorage/capabilities; Microsoft.ClassicStorage/checkStorageAccountAvailability; Microsoft.ClassicStorage/disks; Microsoft.ClassicStorage/images; Microsoft.ClassicStorage/operations; Microsoft.ClassicStorage/osImages; Microsoft.ClassicStorage/osPlatformImages; Microsoft.ClassicStorage/publicImages; Microsoft.ClassicStorage/quotas; Microsoft.ClassicStorage/storageAccounts; Microsoft.ClassicStorage/storageAccounts/blobServices; Microsoft.ClassicStorage/storageAccounts/fileServices; Microsoft.ClassicStorage/storageAccounts/metricDefinitions; Microsoft.ClassicStorage/storageAccounts/metrics; Microsoft.ClassicStorage/storageAccounts/queueServices; Microsoft.ClassicStorage/storageAccounts/services; Microsoft.ClassicStorage/storageAccounts/services/diagnosticSettings; Microsoft.ClassicStorage/storageAccounts/services/metricDefinitions; Microsoft.ClassicStorage/storageAccounts/services/metrics; Microsoft.ClassicStorage/storageAccounts/tableServices; Microsoft.ClassicStorage/storageAccounts/vmImages; Microsoft.ClassicStorage/vmImages; Microsoft.ClassicSubscription/operations Default 0 0 0 0 0 none Deny the deployment of classic resources Denies deployment of classic resource types under the assigned scope. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deny-classic-resources n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-mg false false Audit VMs that do not use managed disks This policy audits VMs that do not use managed disks /providers/microsoft.authorization/policydefinitions/06a78e20-9358-41c9-923c-fb736d382a4d Policy BuiltIn Compute False audit Default 0 1 0 1 0 none Deny virtual machines and virtual machine scale sets that do not use managed disk Deny virtual machines that do not use managed disk. It checks the managed disk property on virtual machine OS Disk fields. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deny-unmanageddisk n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-mg false false Microsoft cloud security benchmark The Microsoft cloud security benchmark initiative represents the policies and controls implementing security recommendations defined in Microsoft cloud security benchmark, see https://aka.ms/azsecbm. This also serves as the Microsoft Defender for Cloud default policy initiative. You can directly assign this initiative, or manage its policies and compliance results within Microsoft Defender for Cloud. /providers/microsoft.authorization/policysetdefinitions/1f3afdf9-d0c9-4c3d-847f-89da613e70a8 PolicySet BuiltIn Security Center False n/a Default 33 23 8 2 0 none Enable Monitoring in Microsoft Defender for Cloud Enable Monitoring in Microsoft Defender for Cloud. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-asc-monitoring n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-mg false false Configure Azure Activity logs to stream to specified Log Analytics workspace Deploys the diagnostic settings for Azure Activity to stream subscriptions audit logs to a Log Analytics workspace to monitor subscription-level events /providers/microsoft.authorization/policydefinitions/2465583e-4e78-4c15-b6be-a36cbc7c8b0f Policy BuiltIn Monitoring False DeployIfNotExists effect=DeployIfNotExists, logAnalytics=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 1 0 1 0 Monitoring Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/dcb59c88-f014-5e17-840c-6c9aecc66286), Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/82f0c3bf-808b-5863-bf9c-231cfbf9598a) Deploy-AzActivity-Log (SPObjId: 217aa040-8eb0-451b-b81c-0b8f3d200d5a) Deploy Diagnostic Settings for Activity Log to Log Analytics workspace Ensures that Activity Log Diagnostics settings are set to push logs into Log Analytics workspace. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-mg false false Enable audit category group resource logging for supported resources to Log Analytics Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This initiative deploys diagnostic setting using the audit category group to route logs to Log Analytics for all supported resources. /providers/microsoft.authorization/policysetdefinitions/f5b29bc4-feca-4cc6-a58a-772dd5e290a5 PolicySet BuiltIn Monitoring False n/a logAnalytics=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 0 0 0 0 Monitoring Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b922046a-7a3e-59da-a982-8a5b855791ce), Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/9df772a7-1ce7-5439-ab6b-5d31d69925cc) Deploy-Diag-Logs (SPObjId: 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57) Enable allLogs category group resource logging for supported resources to Log Analytics Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This initiative deploys diagnostic setting using the allLogs category group to route logs to an Event Hub for all supported resources. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-mg false false Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud Configure the multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud (WDATP, WDATP_EXCLUDE_LINUX_PUBLIC_PREVIEW, WDATP_UNIFIED_SOLUTION etc.). See: https://learn.microsoft.com/azure/defender-for-cloud/integration-defender-for-endpoint for more information. /providers/microsoft.authorization/policysetdefinitions/77b391e3-2d5d-40c3-83bf-65c846b3c6a3 PolicySet BuiltIn Security Center False n/a Default 0 3 0 1 0 Security Admin (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/d730d560-adce-52b7-b10c-36a8ad16a6d3) Deploy-MDEndpointsAMA (SPObjId: 7d365a6d-a7ae-4921-beca-5ce854a76960) Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud Configure the multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud (WDATP, WDATP_EXCLUDE_LINUX_PUBLIC_PREVIEW, WDATP_UNIFIED_SOLUTION etc.). See: https://learn.microsoft.com/azure/defender-for-cloud/integration-defender-for-endpoint for more information. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-mdendpointsama n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-mg false false Enforce Azure Compute Security Benchmark compliance auditing Enforce Azure Compute Security Benchmark compliance auditing for Windows and Linux virtual machines. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-acsb PolicySet Custom Guest Configuration true n/a Default 1 2 1 0 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/6e26cd22-b41b-5611-aafc-e2c56b14c060) Enforce-ACSB (SPObjId: e1f2e80c-5329-4804-824d-f0b44713985e) Enforce Azure Compute Security Baseline compliance auditing This initiative assignment enables Azure Compute Security Baseline compliance auditing for Windows and Linux virtual machines. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/enforce-acsb n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-platform-identity-mg false false Management port access from the Internet should be blocked This policy denies any network security rule that allows management port access from the Internet, by default blocking SSH/RDP ports. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-mgmtports-from-internet Policy Custom Network true Deny effect=Deny Default 0 0 0 0 0 none Management port access from the Internet should be blocked This policy denies any network security rule that allows management port access from the Internet /providers/microsoft.management/managementgroups/mibelle-platform-identity-mg/providers/microsoft.authorization/policyassignments/deny-mgmtports-internet n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-platform-identity-mg false false Not allowed resource types Restrict which resource types can be deployed in your environment. Limiting resource types can reduce the complexity and attack surface of your environment while also helping to manage costs. Compliance results are only shown for non-compliant resources. /providers/microsoft.authorization/policydefinitions/6c112d4e-5bc7-47ae-a041-ea2d9dccd749 Policy BuiltIn General False Deny effect=Deny, listOfResourceTypesNotAllowed=Microsoft.Network/publicIPAddresses Default 0 0 0 0 0 none Deny the creation of public IP This policy denies creation of Public IPs under the assigned scope. /providers/microsoft.management/managementgroups/mibelle-platform-identity-mg/providers/microsoft.authorization/policyassignments/deny-public-ip n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-platform-mg false false Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics If a virtual network already has traffic analytics enabled, then, this policy will overwrite its existing settings with the ones provided during policy creation. Traffic analytics is a cloud-based solution that provides visibility into user and application activity in cloud networks. /providers/microsoft.authorization/policydefinitions/052c180e-287d-44c3-86ef-01aeae2d9774 Policy BuiltIn Network False DeployIfNotExists networkWatcherName=/subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourcegroups/networkwatcherrg/providers/microsoft.network/networkwatchers/networkwatcher_northeurope, networkWatcherRG=networkwatcherrg, retentionDays=1, storageId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.storage/storageaccounts/mibmgmtnetprodeunst01, vnetRegion=northeurope, workspaceRegion=westeurope, workspaceResourceId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 0 0 0 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/71689b0c-ca78-4285-9603-49a5497225d8) 97339ff59e1744678fd92dea (SPObjId: c2b8a553-ec19-42b8-8855-6edc985eaffb) Deploy-TrafficAnalytics-NorthEurope Deploy VNet Flow Logs in on All VNet in North Europe & enable Traffic Analytics /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/97339ff59e1744678fd92dea n/a 09/04/2025 07:21:45 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 09/04/2025 07:34:08 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-platform-mg false false Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics If a virtual network already has traffic analytics enabled, then, this policy will overwrite its existing settings with the ones provided during policy creation. Traffic analytics is a cloud-based solution that provides visibility into user and application activity in cloud networks. /providers/microsoft.authorization/policydefinitions/052c180e-287d-44c3-86ef-01aeae2d9774 Policy BuiltIn Network False DeployIfNotExists networkWatcherName=/subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourcegroups/networkwatcherrg/providers/microsoft.network/networkwatchers/networkwatcher_westeurope, networkWatcherRG=networkwatcherrg, retentionDays=1, storageId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.storage/storageaccounts/mibmgmtnetprodeuwst01, vnetRegion=westeurope, workspaceRegion=westeurope, workspaceResourceId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 1 0 1 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/21c0b216-76ff-44ef-9430-19f801e102d5) d33eb38085bf40bd860fe43b (SPObjId: 78dd5b73-2109-4a10-b2e4-6463304b4b4d) Deploy-TrafficAnalytics-WestEurope Deploy VNet Flow Logs in on All VNet in North Europe & enable Traffic Analytics /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/d33eb38085bf40bd860fe43b n/a 06/12/2025 18:15:24 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 09/04/2025 07:24:28 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-platform-mg false false Do not allow deletion of specified resource and resource type This policy enables you to specify the resource and resource type that your organization can protect from accidentals deletion by blocking delete calls using the deny action effect. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/denyaction-deleteresources Policy Custom General true DenyAction effect=DenyAction, resourceName=mibelle-mgmt-log-prod-euw-id-01, resourceType=Microsoft.ManagedIdentity/userAssignedIdentities Default 0 0 0 0 0 none Do not allow deletion of the User Assigned Managed Identity used by AMA This policy provides a safeguard against accidental removal of the User Assigned Managed Identity used by AMA by blocking delete calls using deny action effect. /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/denyaction-deleteuamiama n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-platform-mg false false Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines Configure auto-assessment (every 24 hours) for OS updates. You can control the scope of assignment according to machine subscription, resource group, location or tag. Learn more about this for Windows: https://aka.ms/computevm-windowspatchassessmentmode, for Linux: https://aka.ms/computevm-linuxpatchassessmentmode. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-aum-checkupdates PolicySet Custom Security Center true n/a assessmentMode=AutomaticByPlatform Default 0 2 0 1 0 Virtual Machine Contributor (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/51e23aa4-bdf1-5059-8efc-453852a14d5e), Azure Connected Machine Resource Administrator (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/d72b7c0f-a23a-58ed-8e0a-40f49a5b6ab3), Managed Identity Operator (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/1f97b9d8-3c21-5b8b-9b36-72e77d4a90e0) Enable-AUM-CheckUpdates (SPObjId: ce67e461-e4a3-4514-89cb-7eb8802f8f65) Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines. Configure auto-assessment (every 24 hours) for OS updates. You can control the scope of assignment according to machine subscription, resource group, location or tag. Learn more about this for Windows: https://aka.ms/computevm-windowspatchassessmentmode, for Linux: https://aka.ms/computevm-linuxpatchassessmentmode. /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates n/a 06/12/2025 17:56:38 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-platform-mg false false Enforce recommended guardrails for Azure Key Vault Enforce recommended guardrails for Azure Key Vault. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-keyvault PolicySet Custom Key Vault true n/a Default 0 0 0 0 0 none Enforce recommended guardrails for Azure Key Vault This initiative assignment enables recommended ALZ guardrails for Azure Key Vault. /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enforce-gr-keyvault n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-platform-mg false false Subnets should be private Ensure your subnets are secure by default by preventing default outbound access. For more information go to https://aka.ms/defaultoutboundaccessretirement /providers/microsoft.authorization/policydefinitions/7bca8353-aa3b-429b-904a-9229c4385837 Policy BuiltIn Network False Audit Default 1 0 2 0 0 none Subnets should be private Ensure your subnets are secure by default by preventing default outbound access. For more information go to https://aka.ms/defaultoutboundaccessretirement /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enforce-subnet-private n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-management-mg Management inherited mibelle-mg false false Audit resource location matches resource group location Audit that the resource location matches its resource group location /providers/microsoft.authorization/policydefinitions/0a914e76-4921-4c19-b460-a2d36003525a Policy BuiltIn General False audit Default 1 0 2 448 0 none Audit that the resource location matches its resource group location Audit resource location matches resource group location /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-location-match n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-management-mg Management inherited mibelle-mg false false Audit virtual machines for Trusted Launch support Trusted Launch improves security of a Virtual Machine which requires VM SKU, OS Disk & OS Image to support it (Gen 2). To learn more about Trusted Launch, visit https://aka.ms/trustedlaunch. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/audit-trustedlaunch PolicySet Custom Trusted Launch true n/a Default 0 0 0 0 0 none Audit virtual machines for Trusted Launch support Trusted Launch improves security of a Virtual Machine which requires VM SKU, OS Disk & OS Image to support it (Gen 2). To learn more about Trusted Launch, visit https://aka.ms/trustedlaunch. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-trustedlaunch n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-management-mg Management inherited mibelle-mg false false Unused resources driving cost should be avoided Optimize cost by detecting unused but chargeable resources. Leverage this Azure Policy Initiative as a cost control tool to reveal orphaned resources that are contributing cost. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/audit-unusedresourcescostoptimization PolicySet Custom Cost Optimization true n/a EffectDisks=Audit, EffectPublicIpAddresses=Audit, EffectServerFarms=Audit Default 0 1 0 1 0 none Unused resources driving cost should be avoided This Policy initiative is a group of Policy definitions that help optimize cost by detecting unused but chargeable resources. Leverage this Policy initiative as a cost control to reveal orphaned resources that are driving cost. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-unusedresources n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-management-mg Management inherited mibelle-mg false false Not allowed resource types Restrict which resource types can be deployed in your environment. Limiting resource types can reduce the complexity and attack surface of your environment while also helping to manage costs. Compliance results are only shown for non-compliant resources. /providers/microsoft.authorization/policydefinitions/6c112d4e-5bc7-47ae-a041-ea2d9dccd749 Policy BuiltIn General False Deny effect=Deny, listOfResourceTypesNotAllowed=Microsoft.ClassicCompute/capabilities; Microsoft.ClassicCompute/checkDomainNameAvailability; Microsoft.ClassicCompute/domainNames; Microsoft.ClassicCompute/domainNames/capabilities; Microsoft.ClassicCompute/domainNames/internalLoadBalancers; Microsoft.ClassicCompute/domainNames/serviceCertificates; Microsoft.ClassicCompute/domainNames/slots; Microsoft.ClassicCompute/domainNames/slots/roles; Microsoft.ClassicCompute/domainNames/slots/roles/metricDefinitions; Microsoft.ClassicCompute/domainNames/slots/roles/metrics; Microsoft.ClassicCompute/moveSubscriptionResources; Microsoft.ClassicCompute/operatingSystemFamilies; Microsoft.ClassicCompute/operatingSystems; Microsoft.ClassicCompute/operations; Microsoft.ClassicCompute/operationStatuses; Microsoft.ClassicCompute/quotas; Microsoft.ClassicCompute/resourceTypes; Microsoft.ClassicCompute/validateSubscriptionMoveAvailability; Microsoft.ClassicCompute/virtualMachines; Microsoft.ClassicCompute/virtualMachines/diagnosticSettings; Microsoft.ClassicCompute/virtualMachines/metricDefinitions; Microsoft.ClassicCompute/virtualMachines/metrics; Microsoft.ClassicInfrastructureMigrate/classicInfrastructureResources; Microsoft.ClassicNetwork/capabilities; Microsoft.ClassicNetwork/expressRouteCrossConnections; Microsoft.ClassicNetwork/expressRouteCrossConnections/peerings; Microsoft.ClassicNetwork/gatewaySupportedDevices; Microsoft.ClassicNetwork/networkSecurityGroups; Microsoft.ClassicNetwork/operations; Microsoft.ClassicNetwork/quotas; Microsoft.ClassicNetwork/reservedIps; Microsoft.ClassicNetwork/virtualNetworks; Microsoft.ClassicNetwork/virtualNetworks/remoteVirtualNetworkPeeringProxies; Microsoft.ClassicNetwork/virtualNetworks/virtualNetworkPeerings; Microsoft.ClassicStorage/capabilities; Microsoft.ClassicStorage/checkStorageAccountAvailability; Microsoft.ClassicStorage/disks; Microsoft.ClassicStorage/images; Microsoft.ClassicStorage/operations; Microsoft.ClassicStorage/osImages; Microsoft.ClassicStorage/osPlatformImages; Microsoft.ClassicStorage/publicImages; Microsoft.ClassicStorage/quotas; Microsoft.ClassicStorage/storageAccounts; Microsoft.ClassicStorage/storageAccounts/blobServices; Microsoft.ClassicStorage/storageAccounts/fileServices; Microsoft.ClassicStorage/storageAccounts/metricDefinitions; Microsoft.ClassicStorage/storageAccounts/metrics; Microsoft.ClassicStorage/storageAccounts/queueServices; Microsoft.ClassicStorage/storageAccounts/services; Microsoft.ClassicStorage/storageAccounts/services/diagnosticSettings; Microsoft.ClassicStorage/storageAccounts/services/metricDefinitions; Microsoft.ClassicStorage/storageAccounts/services/metrics; Microsoft.ClassicStorage/storageAccounts/tableServices; Microsoft.ClassicStorage/storageAccounts/vmImages; Microsoft.ClassicStorage/vmImages; Microsoft.ClassicSubscription/operations Default 0 0 0 0 0 none Deny the deployment of classic resources Denies deployment of classic resource types under the assigned scope. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deny-classic-resources n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-management-mg Management inherited mibelle-mg false false Audit VMs that do not use managed disks This policy audits VMs that do not use managed disks /providers/microsoft.authorization/policydefinitions/06a78e20-9358-41c9-923c-fb736d382a4d Policy BuiltIn Compute False audit Default 0 0 0 0 0 none Deny virtual machines and virtual machine scale sets that do not use managed disk Deny virtual machines that do not use managed disk. It checks the managed disk property on virtual machine OS Disk fields. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deny-unmanageddisk n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-management-mg Management inherited mibelle-mg false false Microsoft cloud security benchmark The Microsoft cloud security benchmark initiative represents the policies and controls implementing security recommendations defined in Microsoft cloud security benchmark, see https://aka.ms/azsecbm. This also serves as the Microsoft Defender for Cloud default policy initiative. You can directly assign this initiative, or manage its policies and compliance results within Microsoft Defender for Cloud. /providers/microsoft.authorization/policysetdefinitions/1f3afdf9-d0c9-4c3d-847f-89da613e70a8 PolicySet BuiltIn Security Center False n/a Default 36 19 129 40 0 none Enable Monitoring in Microsoft Defender for Cloud Enable Monitoring in Microsoft Defender for Cloud. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-asc-monitoring n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-management-mg Management inherited mibelle-mg false false Configure Azure Activity logs to stream to specified Log Analytics workspace Deploys the diagnostic settings for Azure Activity to stream subscriptions audit logs to a Log Analytics workspace to monitor subscription-level events /providers/microsoft.authorization/policydefinitions/2465583e-4e78-4c15-b6be-a36cbc7c8b0f Policy BuiltIn Monitoring False DeployIfNotExists effect=DeployIfNotExists, logAnalytics=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 1 0 1 0 0 Monitoring Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/dcb59c88-f014-5e17-840c-6c9aecc66286), Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/82f0c3bf-808b-5863-bf9c-231cfbf9598a) Deploy-AzActivity-Log (SPObjId: 217aa040-8eb0-451b-b81c-0b8f3d200d5a) Deploy Diagnostic Settings for Activity Log to Log Analytics workspace Ensures that Activity Log Diagnostics settings are set to push logs into Log Analytics workspace. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-management-mg Management inherited mibelle-mg false false Enable audit category group resource logging for supported resources to Log Analytics Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This initiative deploys diagnostic setting using the audit category group to route logs to Log Analytics for all supported resources. /providers/microsoft.authorization/policysetdefinitions/f5b29bc4-feca-4cc6-a58a-772dd5e290a5 PolicySet BuiltIn Monitoring False n/a logAnalytics=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 1 2 1 2 0 Monitoring Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b922046a-7a3e-59da-a982-8a5b855791ce), Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/9df772a7-1ce7-5439-ab6b-5d31d69925cc) Deploy-Diag-Logs (SPObjId: 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57) Enable allLogs category group resource logging for supported resources to Log Analytics Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This initiative deploys diagnostic setting using the allLogs category group to route logs to an Event Hub for all supported resources. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-management-mg Management inherited mibelle-mg false false Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud Configure the multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud (WDATP, WDATP_EXCLUDE_LINUX_PUBLIC_PREVIEW, WDATP_UNIFIED_SOLUTION etc.). See: https://learn.microsoft.com/azure/defender-for-cloud/integration-defender-for-endpoint for more information. /providers/microsoft.authorization/policysetdefinitions/77b391e3-2d5d-40c3-83bf-65c846b3c6a3 PolicySet BuiltIn Security Center False n/a Default 0 3 0 1 0 Security Admin (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/d730d560-adce-52b7-b10c-36a8ad16a6d3) Deploy-MDEndpointsAMA (SPObjId: 7d365a6d-a7ae-4921-beca-5ce854a76960) Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud Configure the multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud (WDATP, WDATP_EXCLUDE_LINUX_PUBLIC_PREVIEW, WDATP_UNIFIED_SOLUTION etc.). See: https://learn.microsoft.com/azure/defender-for-cloud/integration-defender-for-endpoint for more information. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-mdendpointsama n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-management-mg Management inherited mibelle-mg false false Enforce Azure Compute Security Benchmark compliance auditing Enforce Azure Compute Security Benchmark compliance auditing for Windows and Linux virtual machines. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-acsb PolicySet Custom Guest Configuration true n/a Default 1 0 114 0 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/6e26cd22-b41b-5611-aafc-e2c56b14c060) Enforce-ACSB (SPObjId: e1f2e80c-5329-4804-824d-f0b44713985e) Enforce Azure Compute Security Baseline compliance auditing This initiative assignment enables Azure Compute Security Baseline compliance auditing for Windows and Linux virtual machines. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/enforce-acsb n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-management-mg Management inherited mibelle-platform-mg false false Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics If a virtual network already has traffic analytics enabled, then, this policy will overwrite its existing settings with the ones provided during policy creation. Traffic analytics is a cloud-based solution that provides visibility into user and application activity in cloud networks. /providers/microsoft.authorization/policydefinitions/052c180e-287d-44c3-86ef-01aeae2d9774 Policy BuiltIn Network False DeployIfNotExists networkWatcherName=/subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourcegroups/networkwatcherrg/providers/microsoft.network/networkwatchers/networkwatcher_northeurope, networkWatcherRG=networkwatcherrg, retentionDays=1, storageId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.storage/storageaccounts/mibmgmtnetprodeunst01, vnetRegion=northeurope, workspaceRegion=westeurope, workspaceResourceId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 0 0 0 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/71689b0c-ca78-4285-9603-49a5497225d8) 97339ff59e1744678fd92dea (SPObjId: c2b8a553-ec19-42b8-8855-6edc985eaffb) Deploy-TrafficAnalytics-NorthEurope Deploy VNet Flow Logs in on All VNet in North Europe & enable Traffic Analytics /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/97339ff59e1744678fd92dea n/a 09/04/2025 07:21:45 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 09/04/2025 07:34:08 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-management-mg Management inherited mibelle-platform-mg false false Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics If a virtual network already has traffic analytics enabled, then, this policy will overwrite its existing settings with the ones provided during policy creation. Traffic analytics is a cloud-based solution that provides visibility into user and application activity in cloud networks. /providers/microsoft.authorization/policydefinitions/052c180e-287d-44c3-86ef-01aeae2d9774 Policy BuiltIn Network False DeployIfNotExists networkWatcherName=/subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourcegroups/networkwatcherrg/providers/microsoft.network/networkwatchers/networkwatcher_westeurope, networkWatcherRG=networkwatcherrg, retentionDays=1, storageId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.storage/storageaccounts/mibmgmtnetprodeuwst01, vnetRegion=westeurope, workspaceRegion=westeurope, workspaceResourceId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 1 0 1 0 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/21c0b216-76ff-44ef-9430-19f801e102d5) d33eb38085bf40bd860fe43b (SPObjId: 78dd5b73-2109-4a10-b2e4-6463304b4b4d) Deploy-TrafficAnalytics-WestEurope Deploy VNet Flow Logs in on All VNet in North Europe & enable Traffic Analytics /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/d33eb38085bf40bd860fe43b n/a 06/12/2025 18:15:24 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 09/04/2025 07:24:28 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-management-mg Management inherited mibelle-platform-mg false false Do not allow deletion of specified resource and resource type This policy enables you to specify the resource and resource type that your organization can protect from accidentals deletion by blocking delete calls using the deny action effect. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/denyaction-deleteresources Policy Custom General true DenyAction effect=DenyAction, resourceName=mibelle-mgmt-log-prod-euw-id-01, resourceType=Microsoft.ManagedIdentity/userAssignedIdentities Default 0 0 0 0 0 none Do not allow deletion of the User Assigned Managed Identity used by AMA This policy provides a safeguard against accidental removal of the User Assigned Managed Identity used by AMA by blocking delete calls using deny action effect. /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/denyaction-deleteuamiama n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-management-mg Management inherited mibelle-platform-mg false false Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines Configure auto-assessment (every 24 hours) for OS updates. You can control the scope of assignment according to machine subscription, resource group, location or tag. Learn more about this for Windows: https://aka.ms/computevm-windowspatchassessmentmode, for Linux: https://aka.ms/computevm-linuxpatchassessmentmode. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-aum-checkupdates PolicySet Custom Security Center true n/a assessmentMode=AutomaticByPlatform Default 0 2 0 116 0 Virtual Machine Contributor (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/51e23aa4-bdf1-5059-8efc-453852a14d5e), Azure Connected Machine Resource Administrator (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/d72b7c0f-a23a-58ed-8e0a-40f49a5b6ab3), Managed Identity Operator (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/1f97b9d8-3c21-5b8b-9b36-72e77d4a90e0) Enable-AUM-CheckUpdates (SPObjId: ce67e461-e4a3-4514-89cb-7eb8802f8f65) Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines. Configure auto-assessment (every 24 hours) for OS updates. You can control the scope of assignment according to machine subscription, resource group, location or tag. Learn more about this for Windows: https://aka.ms/computevm-windowspatchassessmentmode, for Linux: https://aka.ms/computevm-linuxpatchassessmentmode. /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates n/a 06/12/2025 17:56:38 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-management-mg Management inherited mibelle-platform-mg false false Enforce recommended guardrails for Azure Key Vault Enforce recommended guardrails for Azure Key Vault. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-keyvault PolicySet Custom Key Vault true n/a Default 3 5 1 0 0 none Enforce recommended guardrails for Azure Key Vault This initiative assignment enables recommended ALZ guardrails for Azure Key Vault. /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enforce-gr-keyvault n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-management-mg Management inherited mibelle-platform-mg false false Subnets should be private Ensure your subnets are secure by default by preventing default outbound access. For more information go to https://aka.ms/defaultoutboundaccessretirement /providers/microsoft.authorization/policydefinitions/7bca8353-aa3b-429b-904a-9229c4385837 Policy BuiltIn Network False Audit Default 1 0 2 0 0 none Subnets should be private Ensure your subnets are secure by default by preventing default outbound access. For more information go to https://aka.ms/defaultoutboundaccessretirement /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enforce-subnet-private n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-mg false false Audit resource location matches resource group location Audit that the resource location matches its resource group location /providers/microsoft.authorization/policydefinitions/0a914e76-4921-4c19-b460-a2d36003525a Policy BuiltIn General False audit Default 1 0 2 448 0 none Audit that the resource location matches its resource group location Audit resource location matches resource group location /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-location-match n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-mg false false Audit virtual machines for Trusted Launch support Trusted Launch improves security of a Virtual Machine which requires VM SKU, OS Disk & OS Image to support it (Gen 2). To learn more about Trusted Launch, visit https://aka.ms/trustedlaunch. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/audit-trustedlaunch PolicySet Custom Trusted Launch true n/a Default 0 0 0 0 0 none Audit virtual machines for Trusted Launch support Trusted Launch improves security of a Virtual Machine which requires VM SKU, OS Disk & OS Image to support it (Gen 2). To learn more about Trusted Launch, visit https://aka.ms/trustedlaunch. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-trustedlaunch n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-mg false false Unused resources driving cost should be avoided Optimize cost by detecting unused but chargeable resources. Leverage this Azure Policy Initiative as a cost control tool to reveal orphaned resources that are contributing cost. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/audit-unusedresourcescostoptimization PolicySet Custom Cost Optimization true n/a EffectDisks=Audit, EffectPublicIpAddresses=Audit, EffectServerFarms=Audit Default 0 1 0 1 0 none Unused resources driving cost should be avoided This Policy initiative is a group of Policy definitions that help optimize cost by detecting unused but chargeable resources. Leverage this Policy initiative as a cost control to reveal orphaned resources that are driving cost. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-unusedresources n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-mg false false Not allowed resource types Restrict which resource types can be deployed in your environment. Limiting resource types can reduce the complexity and attack surface of your environment while also helping to manage costs. Compliance results are only shown for non-compliant resources. /providers/microsoft.authorization/policydefinitions/6c112d4e-5bc7-47ae-a041-ea2d9dccd749 Policy BuiltIn General False Deny effect=Deny, listOfResourceTypesNotAllowed=Microsoft.ClassicCompute/capabilities; Microsoft.ClassicCompute/checkDomainNameAvailability; Microsoft.ClassicCompute/domainNames; Microsoft.ClassicCompute/domainNames/capabilities; Microsoft.ClassicCompute/domainNames/internalLoadBalancers; Microsoft.ClassicCompute/domainNames/serviceCertificates; Microsoft.ClassicCompute/domainNames/slots; Microsoft.ClassicCompute/domainNames/slots/roles; Microsoft.ClassicCompute/domainNames/slots/roles/metricDefinitions; Microsoft.ClassicCompute/domainNames/slots/roles/metrics; Microsoft.ClassicCompute/moveSubscriptionResources; Microsoft.ClassicCompute/operatingSystemFamilies; Microsoft.ClassicCompute/operatingSystems; Microsoft.ClassicCompute/operations; Microsoft.ClassicCompute/operationStatuses; Microsoft.ClassicCompute/quotas; Microsoft.ClassicCompute/resourceTypes; Microsoft.ClassicCompute/validateSubscriptionMoveAvailability; Microsoft.ClassicCompute/virtualMachines; Microsoft.ClassicCompute/virtualMachines/diagnosticSettings; Microsoft.ClassicCompute/virtualMachines/metricDefinitions; Microsoft.ClassicCompute/virtualMachines/metrics; Microsoft.ClassicInfrastructureMigrate/classicInfrastructureResources; Microsoft.ClassicNetwork/capabilities; Microsoft.ClassicNetwork/expressRouteCrossConnections; Microsoft.ClassicNetwork/expressRouteCrossConnections/peerings; Microsoft.ClassicNetwork/gatewaySupportedDevices; Microsoft.ClassicNetwork/networkSecurityGroups; Microsoft.ClassicNetwork/operations; Microsoft.ClassicNetwork/quotas; Microsoft.ClassicNetwork/reservedIps; Microsoft.ClassicNetwork/virtualNetworks; Microsoft.ClassicNetwork/virtualNetworks/remoteVirtualNetworkPeeringProxies; Microsoft.ClassicNetwork/virtualNetworks/virtualNetworkPeerings; Microsoft.ClassicStorage/capabilities; Microsoft.ClassicStorage/checkStorageAccountAvailability; Microsoft.ClassicStorage/disks; Microsoft.ClassicStorage/images; Microsoft.ClassicStorage/operations; Microsoft.ClassicStorage/osImages; Microsoft.ClassicStorage/osPlatformImages; Microsoft.ClassicStorage/publicImages; Microsoft.ClassicStorage/quotas; Microsoft.ClassicStorage/storageAccounts; Microsoft.ClassicStorage/storageAccounts/blobServices; Microsoft.ClassicStorage/storageAccounts/fileServices; Microsoft.ClassicStorage/storageAccounts/metricDefinitions; Microsoft.ClassicStorage/storageAccounts/metrics; Microsoft.ClassicStorage/storageAccounts/queueServices; Microsoft.ClassicStorage/storageAccounts/services; Microsoft.ClassicStorage/storageAccounts/services/diagnosticSettings; Microsoft.ClassicStorage/storageAccounts/services/metricDefinitions; Microsoft.ClassicStorage/storageAccounts/services/metrics; Microsoft.ClassicStorage/storageAccounts/tableServices; Microsoft.ClassicStorage/storageAccounts/vmImages; Microsoft.ClassicStorage/vmImages; Microsoft.ClassicSubscription/operations Default 0 0 0 0 0 none Deny the deployment of classic resources Denies deployment of classic resource types under the assigned scope. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deny-classic-resources n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-mg false false Audit VMs that do not use managed disks This policy audits VMs that do not use managed disks /providers/microsoft.authorization/policydefinitions/06a78e20-9358-41c9-923c-fb736d382a4d Policy BuiltIn Compute False audit Default 0 0 0 0 0 none Deny virtual machines and virtual machine scale sets that do not use managed disk Deny virtual machines that do not use managed disk. It checks the managed disk property on virtual machine OS Disk fields. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deny-unmanageddisk n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-mg false false Microsoft cloud security benchmark The Microsoft cloud security benchmark initiative represents the policies and controls implementing security recommendations defined in Microsoft cloud security benchmark, see https://aka.ms/azsecbm. This also serves as the Microsoft Defender for Cloud default policy initiative. You can directly assign this initiative, or manage its policies and compliance results within Microsoft Defender for Cloud. /providers/microsoft.authorization/policysetdefinitions/1f3afdf9-d0c9-4c3d-847f-89da613e70a8 PolicySet BuiltIn Security Center False n/a Default 36 19 129 40 0 none Enable Monitoring in Microsoft Defender for Cloud Enable Monitoring in Microsoft Defender for Cloud. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-asc-monitoring n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-mg false false Configure Azure Activity logs to stream to specified Log Analytics workspace Deploys the diagnostic settings for Azure Activity to stream subscriptions audit logs to a Log Analytics workspace to monitor subscription-level events /providers/microsoft.authorization/policydefinitions/2465583e-4e78-4c15-b6be-a36cbc7c8b0f Policy BuiltIn Monitoring False DeployIfNotExists effect=DeployIfNotExists, logAnalytics=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 1 0 1 0 0 Monitoring Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/dcb59c88-f014-5e17-840c-6c9aecc66286), Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/82f0c3bf-808b-5863-bf9c-231cfbf9598a) Deploy-AzActivity-Log (SPObjId: 217aa040-8eb0-451b-b81c-0b8f3d200d5a) Deploy Diagnostic Settings for Activity Log to Log Analytics workspace Ensures that Activity Log Diagnostics settings are set to push logs into Log Analytics workspace. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-mg false false Enable audit category group resource logging for supported resources to Log Analytics Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This initiative deploys diagnostic setting using the audit category group to route logs to Log Analytics for all supported resources. /providers/microsoft.authorization/policysetdefinitions/f5b29bc4-feca-4cc6-a58a-772dd5e290a5 PolicySet BuiltIn Monitoring False n/a logAnalytics=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 1 2 1 2 0 Monitoring Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b922046a-7a3e-59da-a982-8a5b855791ce), Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/9df772a7-1ce7-5439-ab6b-5d31d69925cc) Deploy-Diag-Logs (SPObjId: 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57) Enable allLogs category group resource logging for supported resources to Log Analytics Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This initiative deploys diagnostic setting using the allLogs category group to route logs to an Event Hub for all supported resources. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-mg false false Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud Configure the multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud (WDATP, WDATP_EXCLUDE_LINUX_PUBLIC_PREVIEW, WDATP_UNIFIED_SOLUTION etc.). See: https://learn.microsoft.com/azure/defender-for-cloud/integration-defender-for-endpoint for more information. /providers/microsoft.authorization/policysetdefinitions/77b391e3-2d5d-40c3-83bf-65c846b3c6a3 PolicySet BuiltIn Security Center False n/a Default 0 3 0 1 0 Security Admin (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/d730d560-adce-52b7-b10c-36a8ad16a6d3) Deploy-MDEndpointsAMA (SPObjId: 7d365a6d-a7ae-4921-beca-5ce854a76960) Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud Configure the multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud (WDATP, WDATP_EXCLUDE_LINUX_PUBLIC_PREVIEW, WDATP_UNIFIED_SOLUTION etc.). See: https://learn.microsoft.com/azure/defender-for-cloud/integration-defender-for-endpoint for more information. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-mdendpointsama n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-mg false false Enforce Azure Compute Security Benchmark compliance auditing Enforce Azure Compute Security Benchmark compliance auditing for Windows and Linux virtual machines. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-acsb PolicySet Custom Guest Configuration true n/a Default 1 0 114 0 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/6e26cd22-b41b-5611-aafc-e2c56b14c060) Enforce-ACSB (SPObjId: e1f2e80c-5329-4804-824d-f0b44713985e) Enforce Azure Compute Security Baseline compliance auditing This initiative assignment enables Azure Compute Security Baseline compliance auditing for Windows and Linux virtual machines. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/enforce-acsb n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-platform-mg false false Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics If a virtual network already has traffic analytics enabled, then, this policy will overwrite its existing settings with the ones provided during policy creation. Traffic analytics is a cloud-based solution that provides visibility into user and application activity in cloud networks. /providers/microsoft.authorization/policydefinitions/052c180e-287d-44c3-86ef-01aeae2d9774 Policy BuiltIn Network False DeployIfNotExists networkWatcherName=/subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourcegroups/networkwatcherrg/providers/microsoft.network/networkwatchers/networkwatcher_northeurope, networkWatcherRG=networkwatcherrg, retentionDays=1, storageId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.storage/storageaccounts/mibmgmtnetprodeunst01, vnetRegion=northeurope, workspaceRegion=westeurope, workspaceResourceId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 0 0 0 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/71689b0c-ca78-4285-9603-49a5497225d8) 97339ff59e1744678fd92dea (SPObjId: c2b8a553-ec19-42b8-8855-6edc985eaffb) Deploy-TrafficAnalytics-NorthEurope Deploy VNet Flow Logs in on All VNet in North Europe & enable Traffic Analytics /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/97339ff59e1744678fd92dea n/a 09/04/2025 07:21:45 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 09/04/2025 07:34:08 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-platform-mg false false Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics If a virtual network already has traffic analytics enabled, then, this policy will overwrite its existing settings with the ones provided during policy creation. Traffic analytics is a cloud-based solution that provides visibility into user and application activity in cloud networks. /providers/microsoft.authorization/policydefinitions/052c180e-287d-44c3-86ef-01aeae2d9774 Policy BuiltIn Network False DeployIfNotExists networkWatcherName=/subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourcegroups/networkwatcherrg/providers/microsoft.network/networkwatchers/networkwatcher_westeurope, networkWatcherRG=networkwatcherrg, retentionDays=1, storageId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.storage/storageaccounts/mibmgmtnetprodeuwst01, vnetRegion=westeurope, workspaceRegion=westeurope, workspaceResourceId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 1 0 1 0 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/21c0b216-76ff-44ef-9430-19f801e102d5) d33eb38085bf40bd860fe43b (SPObjId: 78dd5b73-2109-4a10-b2e4-6463304b4b4d) Deploy-TrafficAnalytics-WestEurope Deploy VNet Flow Logs in on All VNet in North Europe & enable Traffic Analytics /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/d33eb38085bf40bd860fe43b n/a 06/12/2025 18:15:24 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 09/04/2025 07:24:28 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-platform-mg false false Do not allow deletion of specified resource and resource type This policy enables you to specify the resource and resource type that your organization can protect from accidentals deletion by blocking delete calls using the deny action effect. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/denyaction-deleteresources Policy Custom General true DenyAction effect=DenyAction, resourceName=mibelle-mgmt-log-prod-euw-id-01, resourceType=Microsoft.ManagedIdentity/userAssignedIdentities Default 0 0 0 0 0 none Do not allow deletion of the User Assigned Managed Identity used by AMA This policy provides a safeguard against accidental removal of the User Assigned Managed Identity used by AMA by blocking delete calls using deny action effect. /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/denyaction-deleteuamiama n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-platform-mg false false Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines Configure auto-assessment (every 24 hours) for OS updates. You can control the scope of assignment according to machine subscription, resource group, location or tag. Learn more about this for Windows: https://aka.ms/computevm-windowspatchassessmentmode, for Linux: https://aka.ms/computevm-linuxpatchassessmentmode. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-aum-checkupdates PolicySet Custom Security Center true n/a assessmentMode=AutomaticByPlatform Default 0 2 0 116 0 Virtual Machine Contributor (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/51e23aa4-bdf1-5059-8efc-453852a14d5e), Azure Connected Machine Resource Administrator (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/d72b7c0f-a23a-58ed-8e0a-40f49a5b6ab3), Managed Identity Operator (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/1f97b9d8-3c21-5b8b-9b36-72e77d4a90e0) Enable-AUM-CheckUpdates (SPObjId: ce67e461-e4a3-4514-89cb-7eb8802f8f65) Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines. Configure auto-assessment (every 24 hours) for OS updates. You can control the scope of assignment according to machine subscription, resource group, location or tag. Learn more about this for Windows: https://aka.ms/computevm-windowspatchassessmentmode, for Linux: https://aka.ms/computevm-linuxpatchassessmentmode. /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates n/a 06/12/2025 17:56:38 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-platform-mg false false Enforce recommended guardrails for Azure Key Vault Enforce recommended guardrails for Azure Key Vault. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-keyvault PolicySet Custom Key Vault true n/a Default 3 5 1 0 0 none Enforce recommended guardrails for Azure Key Vault This initiative assignment enables recommended ALZ guardrails for Azure Key Vault. /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enforce-gr-keyvault n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-platform-mg false false Subnets should be private Ensure your subnets are secure by default by preventing default outbound access. For more information go to https://aka.ms/defaultoutboundaccessretirement /providers/microsoft.authorization/policydefinitions/7bca8353-aa3b-429b-904a-9229c4385837 Policy BuiltIn Network False Audit Default 1 0 2 0 0 none Subnets should be private Ensure your subnets are secure by default by preventing default outbound access. For more information go to https://aka.ms/defaultoutboundaccessretirement /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enforce-subnet-private n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-online-mg Online inherited mibelle-landingzones-mg false false Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics If a virtual network already has traffic analytics enabled, then, this policy will overwrite its existing settings with the ones provided during policy creation. Traffic analytics is a cloud-based solution that provides visibility into user and application activity in cloud networks. /providers/microsoft.authorization/policydefinitions/052c180e-287d-44c3-86ef-01aeae2d9774 Policy BuiltIn Network False DeployIfNotExists networkWatcherName=/subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourcegroups/networkwatcherrg/providers/microsoft.network/networkwatchers/networkwatcher_westeurope, networkWatcherRG=networkwatcherrg, retentionDays=1, storageId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.storage/storageaccounts/mibmgmtnetprodeuwst01, vnetRegion=westeurope, workspaceRegion=westeurope, workspaceResourceId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 0 0 0 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/94dfdb33-b864-47c9-831d-366721beb989) 52a8c671384a4b609f1d7651 (SPObjId: 6e0d029a-fce4-400f-bff3-45b8d9a8342e) Deploy-TrafficAnalytics-WestEurope Deploy VNet Flow Logs in on All VNet in West Europe & enable Traffic Analytics /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/52a8c671384a4b609f1d7651 n/a 09/04/2025 06:12:52 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 09/04/2025 07:23:12 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-online-mg Online inherited mibelle-landingzones-mg false false Web Application Firewall (WAF) should be enabled for Application Gateway Deploy Azure Web Application Firewall (WAF) in front of public facing web applications for additional inspection of incoming traffic. Web Application Firewall (WAF) provides centralized protection of your web applications from common exploits and vulnerabilities such as SQL injections, Cross-Site Scripting, local and remote file executions. You can also restrict access to your web applications by countries, IP address ranges, and other http(s) parameters via custom rules. /providers/microsoft.authorization/policydefinitions/564feb30-bf6a-4854-b4bb-0d2d2d1e6c66 Policy BuiltIn Network False Audit effect=Audit Default 0 0 0 0 0 none Web Application Firewall (WAF) should be enabled for Application Gateway Assign the WAF should be enabled for Application Gateway audit policy. /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/audit-appgw-waf n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-online-mg Online inherited mibelle-landingzones-mg false false Network interfaces should disable IP forwarding This policy denies the network interfaces which enabled IP forwarding. The setting of IP forwarding disables Azure's check of the source and destination for a network interface. This should be reviewed by the network security team. /providers/microsoft.authorization/policydefinitions/88c0b9da-ce96-4b03-9635-f29a937e2900 Policy BuiltIn Network False deny Default 0 0 0 0 0 none Network interfaces should disable IP forwarding This policy denies the network interfaces which enabled IP forwarding. The setting of IP forwarding disables Azure's check of the source and destination for a network interface. This should be reviewed by the network security team. /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deny-ip-forwarding n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-online-mg Online inherited mibelle-landingzones-mg false false Management port access from the Internet should be blocked This policy denies any network security rule that allows management port access from the Internet, by default blocking SSH/RDP ports. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-mgmtports-from-internet Policy Custom Network true Deny effect=Deny Default 0 0 0 0 0 none Management port access from the Internet should be blocked This policy denies any network security rule that allows management port access from the Internet /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deny-mgmtports-internet n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-online-mg Online inherited mibelle-landingzones-mg false false Kubernetes cluster should not allow privileged containers Do not allow privileged containers creation in a Kubernetes cluster. This recommendation is part of CIS 5.2.1 which is intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. /providers/microsoft.authorization/policydefinitions/95edb821-ddaf-4404-9732-666045e056b4 Policy BuiltIn Kubernetes False deny effect=deny Default 0 0 0 0 0 none Kubernetes cluster should not allow privileged containers Do not allow privileged containers creation in a Kubernetes cluster. This recommendation is part of CIS 5.2.1 which is intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deny-priv-containers-aks n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-online-mg Online inherited mibelle-landingzones-mg false false Kubernetes clusters should not allow container privilege escalation Do not allow containers to run with privilege escalation to root in a Kubernetes cluster. This recommendation is part of CIS 5.2.5 which is intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. /providers/microsoft.authorization/policydefinitions/1c6e92c9-99f0-4e55-9cf2-0c234dc48f99 Policy BuiltIn Kubernetes False deny effect=deny Default 0 0 0 0 0 none Kubernetes clusters should not allow container privilege escalation Do not allow containers to run with privilege escalation to root in a Kubernetes cluster. This recommendation is part of CIS 5.2.5 which is intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deny-priv-escalation-aks n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-online-mg Online inherited mibelle-landingzones-mg false false Secure transfer to storage accounts should be enabled Audit requirement of Secure transfer in your storage account. Secure transfer is an option that forces your storage account to accept requests only from secure connections (HTTPS). Use of HTTPS ensures authentication between the server and the service and protects data in transit from network layer attacks such as man-in-the-middle, eavesdropping, and session-hijacking /providers/microsoft.authorization/policydefinitions/404c3081-a854-4457-ae30-26a93ef643f9 Policy BuiltIn Storage False Deny effect=Deny Default 0 1 0 7 0 none Secure transfer to storage accounts should be enabled Audit requirement of Secure transfer in your storage account. Secure transfer is an option that forces your storage account to accept requests only from secure connections (HTTPS). Use of HTTPS ensures authentication between the server and the service and protects data in transit from network layer attacks such as man-in-the-middle, eavesdropping, and session-hijacking. /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deny-storage-http n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-online-mg Online inherited mibelle-landingzones-mg false false Configure SQL servers to have auditing enabled to Log Analytics workspace To ensure the operations performed against your SQL assets are captured, SQL servers should have auditing enabled. If auditing is not enabled, this policy will configure auditing events to flow to the specified Log Analytics workspace. /providers/microsoft.authorization/policydefinitions/25da7dfb-0666-4a15-a8f5-402127efd8bb Policy BuiltIn SQL False DeployIfNotExists effect=DeployIfNotExists, logAnalyticsWorkspaceId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 0 0 0 0 SQL Security Manager (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/2f1eab15-c92e-52cd-8b0c-a60e52f1b331), SQL Security Manager (/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/providers/microsoft.authorization/roleassignments/ce81334b-c425-5087-9b8d-2119e050082b), Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/488f45ec-c535-5f65-85bf-acacd1bb93e8), Log Analytics Contributor (/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/providers/microsoft.authorization/roleassignments/fbb2af70-7587-52bd-b3e1-54fcdbdb7ea4) Deploy-AzSqlDb-Auditing (SPObjId: afb169da-f80a-4dd6-abf3-b7fc08efb8ae) Configure SQL servers to have auditing enabled to Log Analytics workspace To ensure the operations performed against your SQL assets are captured, SQL servers should have auditing enabled. If auditing is not enabled, this policy will configure auditing events to flow to the specified Log Analytics workspace. /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deploy-azsqldb-auditing n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-online-mg Online inherited mibelle-landingzones-mg false false Deploy SQL DB transparent data encryption Enables transparent data encryption on SQL databases /providers/microsoft.authorization/policydefinitions/86a912f6-9a06-4e26-b447-11b16ba8659f Policy BuiltIn SQL False DeployIfNotExists Default 0 0 0 0 0 SQL DB Contributor (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/af2f6b24-ac34-5f3b-9249-5a109d9d1528) Deploy-SQL-TDE (SPObjId: de5ed213-fd75-471c-8d32-920072d6c378) Deploy TDE on SQL servers This policy ensures that Transparent Data Encryption is enabled on SQL Servers. /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deploy-sql-tde n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-online-mg Online inherited mibelle-landingzones-mg false false Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics If a virtual network already has traffic analytics enabled, then, this policy will overwrite its existing settings with the ones provided during policy creation. Traffic analytics is a cloud-based solution that provides visibility into user and application activity in cloud networks. /providers/microsoft.authorization/policydefinitions/052c180e-287d-44c3-86ef-01aeae2d9774 Policy BuiltIn Network False DeployIfNotExists networkWatcherName=/subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourcegroups/networkwatcherrg/providers/microsoft.network/networkwatchers/networkwatcher_northeurope, networkWatcherRG=networkwatcherrg, retentionDays=1, storageId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.storage/storageaccounts/mibmgmtnetprodeunst01, vnetRegion=northeurope, workspaceRegion=westeurope, workspaceResourceId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 0 0 0 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/3fb7bac5-2328-4e74-a5b0-0d6d2a631693) e9143c36572348c3ba0c67b1 (SPObjId: 9c3b725e-ce85-47ac-bf6f-c2fa0571c259) Deploy-TrafficAnalytics-NorthEurope Deploy VNet Flow Logs in on All VNet in North Europe & enable Traffic Analytics /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/e9143c36572348c3ba0c67b1 n/a 09/04/2025 07:17:59 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 09/04/2025 07:33:42 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-online-mg Online inherited mibelle-landingzones-mg false false Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines Configure auto-assessment (every 24 hours) for OS updates. You can control the scope of assignment according to machine subscription, resource group, location or tag. Learn more about this for Windows: https://aka.ms/computevm-windowspatchassessmentmode, for Linux: https://aka.ms/computevm-linuxpatchassessmentmode. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-aum-checkupdates PolicySet Custom Security Center true n/a assessmentMode=AutomaticByPlatform Default 0 0 0 0 0 Virtual Machine Contributor (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/571da045-f503-5cb2-b123-ede8cfe0f15a), Azure Connected Machine Resource Administrator (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/7d65b18e-df43-5353-85a4-716e68ff7c7a), Managed Identity Operator (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/b2c88903-f3a4-54ec-813c-46d650309b86) Enable-AUM-CheckUpdates (SPObjId: 4f27b633-c16b-47a6-ab24-737bb6cdad56) Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines. Configure auto-assessment (every 24 hours) for OS updates. You can control the scope of assignment according to machine subscription, resource group, location or tag. Learn more about this for Windows: https://aka.ms/computevm-windowspatchassessmentmode, for Linux: https://aka.ms/computevm-linuxpatchassessmentmode. /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-online-mg Online inherited mibelle-landingzones-mg false false Kubernetes clusters should be accessible only over HTTPS Use of HTTPS ensures authentication and protects data in transit from network layer eavesdropping attacks. This capability is currently generally available for Kubernetes Service (AKS), and in preview for Azure Arc enabled Kubernetes. For more info, visit https://aka.ms/kubepolicydoc /providers/microsoft.authorization/policydefinitions/1a5b4dca-0b6f-4cf5-907c-56316bc1bf3d Policy BuiltIn Kubernetes False deny effect=deny Default 0 0 0 0 0 none Kubernetes clusters should be accessible only over HTTPS Use of HTTPS ensures authentication and protects data in transit from network layer eavesdropping attacks. This capability is currently generally available for Kubernetes Service (AKS), and in preview for AKS Engine and Azure Arc enabled Kubernetes. For more info, visit https://aka.ms/kubepolicydoc. /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enforce-aks-https n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-online-mg Online inherited mibelle-landingzones-mg false false Enforce recommended guardrails for Azure Key Vault Enforce recommended guardrails for Azure Key Vault. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-keyvault PolicySet Custom Key Vault true n/a Default 2 8 2 0 0 none Enforce recommended guardrails for Azure Key Vault This initiative assignment enables recommended ALZ guardrails for Azure Key Vault. /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enforce-gr-keyvault n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-online-mg Online inherited mibelle-landingzones-mg false false Subnets should be private Ensure your subnets are secure by default by preventing default outbound access. For more information go to https://aka.ms/defaultoutboundaccessretirement /providers/microsoft.authorization/policydefinitions/7bca8353-aa3b-429b-904a-9229c4385837 Policy BuiltIn Network False Audit Default 0 0 0 0 0 none Subnets should be private Ensure your subnets are secure by default by preventing default outbound access. For more information go to https://aka.ms/defaultoutboundaccessretirement /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enforce-subnet-private n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-online-mg Online inherited mibelle-mg false false Audit resource location matches resource group location Audit that the resource location matches its resource group location /providers/microsoft.authorization/policydefinitions/0a914e76-4921-4c19-b460-a2d36003525a Policy BuiltIn General False audit Default 1 0 5 49 0 none Audit that the resource location matches its resource group location Audit resource location matches resource group location /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-location-match n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-online-mg Online inherited mibelle-mg false false Audit virtual machines for Trusted Launch support Trusted Launch improves security of a Virtual Machine which requires VM SKU, OS Disk & OS Image to support it (Gen 2). To learn more about Trusted Launch, visit https://aka.ms/trustedlaunch. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/audit-trustedlaunch PolicySet Custom Trusted Launch true n/a Default 0 0 0 0 0 none Audit virtual machines for Trusted Launch support Trusted Launch improves security of a Virtual Machine which requires VM SKU, OS Disk & OS Image to support it (Gen 2). To learn more about Trusted Launch, visit https://aka.ms/trustedlaunch. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-trustedlaunch n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-online-mg Online inherited mibelle-mg false false Unused resources driving cost should be avoided Optimize cost by detecting unused but chargeable resources. Leverage this Azure Policy Initiative as a cost control tool to reveal orphaned resources that are contributing cost. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/audit-unusedresourcescostoptimization PolicySet Custom Cost Optimization true n/a EffectDisks=Audit, EffectPublicIpAddresses=Audit, EffectServerFarms=Audit Default 0 1 0 4 0 none Unused resources driving cost should be avoided This Policy initiative is a group of Policy definitions that help optimize cost by detecting unused but chargeable resources. Leverage this Policy initiative as a cost control to reveal orphaned resources that are driving cost. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-unusedresources n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-online-mg Online inherited mibelle-mg false false Not allowed resource types Restrict which resource types can be deployed in your environment. Limiting resource types can reduce the complexity and attack surface of your environment while also helping to manage costs. Compliance results are only shown for non-compliant resources. /providers/microsoft.authorization/policydefinitions/6c112d4e-5bc7-47ae-a041-ea2d9dccd749 Policy BuiltIn General False Deny effect=Deny, listOfResourceTypesNotAllowed=Microsoft.ClassicCompute/capabilities; Microsoft.ClassicCompute/checkDomainNameAvailability; Microsoft.ClassicCompute/domainNames; Microsoft.ClassicCompute/domainNames/capabilities; Microsoft.ClassicCompute/domainNames/internalLoadBalancers; Microsoft.ClassicCompute/domainNames/serviceCertificates; Microsoft.ClassicCompute/domainNames/slots; Microsoft.ClassicCompute/domainNames/slots/roles; Microsoft.ClassicCompute/domainNames/slots/roles/metricDefinitions; Microsoft.ClassicCompute/domainNames/slots/roles/metrics; Microsoft.ClassicCompute/moveSubscriptionResources; Microsoft.ClassicCompute/operatingSystemFamilies; Microsoft.ClassicCompute/operatingSystems; Microsoft.ClassicCompute/operations; Microsoft.ClassicCompute/operationStatuses; Microsoft.ClassicCompute/quotas; Microsoft.ClassicCompute/resourceTypes; Microsoft.ClassicCompute/validateSubscriptionMoveAvailability; Microsoft.ClassicCompute/virtualMachines; Microsoft.ClassicCompute/virtualMachines/diagnosticSettings; Microsoft.ClassicCompute/virtualMachines/metricDefinitions; Microsoft.ClassicCompute/virtualMachines/metrics; Microsoft.ClassicInfrastructureMigrate/classicInfrastructureResources; Microsoft.ClassicNetwork/capabilities; Microsoft.ClassicNetwork/expressRouteCrossConnections; Microsoft.ClassicNetwork/expressRouteCrossConnections/peerings; Microsoft.ClassicNetwork/gatewaySupportedDevices; Microsoft.ClassicNetwork/networkSecurityGroups; Microsoft.ClassicNetwork/operations; Microsoft.ClassicNetwork/quotas; Microsoft.ClassicNetwork/reservedIps; Microsoft.ClassicNetwork/virtualNetworks; Microsoft.ClassicNetwork/virtualNetworks/remoteVirtualNetworkPeeringProxies; Microsoft.ClassicNetwork/virtualNetworks/virtualNetworkPeerings; Microsoft.ClassicStorage/capabilities; Microsoft.ClassicStorage/checkStorageAccountAvailability; Microsoft.ClassicStorage/disks; Microsoft.ClassicStorage/images; Microsoft.ClassicStorage/operations; Microsoft.ClassicStorage/osImages; Microsoft.ClassicStorage/osPlatformImages; Microsoft.ClassicStorage/publicImages; Microsoft.ClassicStorage/quotas; Microsoft.ClassicStorage/storageAccounts; Microsoft.ClassicStorage/storageAccounts/blobServices; Microsoft.ClassicStorage/storageAccounts/fileServices; Microsoft.ClassicStorage/storageAccounts/metricDefinitions; Microsoft.ClassicStorage/storageAccounts/metrics; Microsoft.ClassicStorage/storageAccounts/queueServices; Microsoft.ClassicStorage/storageAccounts/services; Microsoft.ClassicStorage/storageAccounts/services/diagnosticSettings; Microsoft.ClassicStorage/storageAccounts/services/metricDefinitions; Microsoft.ClassicStorage/storageAccounts/services/metrics; Microsoft.ClassicStorage/storageAccounts/tableServices; Microsoft.ClassicStorage/storageAccounts/vmImages; Microsoft.ClassicStorage/vmImages; Microsoft.ClassicSubscription/operations Default 0 0 0 0 0 none Deny the deployment of classic resources Denies deployment of classic resource types under the assigned scope. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deny-classic-resources n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-online-mg Online inherited mibelle-mg false false Audit VMs that do not use managed disks This policy audits VMs that do not use managed disks /providers/microsoft.authorization/policydefinitions/06a78e20-9358-41c9-923c-fb736d382a4d Policy BuiltIn Compute False audit Default 0 0 0 0 0 none Deny virtual machines and virtual machine scale sets that do not use managed disk Deny virtual machines that do not use managed disk. It checks the managed disk property on virtual machine OS Disk fields. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deny-unmanageddisk n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-online-mg Online inherited mibelle-mg false false Microsoft cloud security benchmark The Microsoft cloud security benchmark initiative represents the policies and controls implementing security recommendations defined in Microsoft cloud security benchmark, see https://aka.ms/azsecbm. This also serves as the Microsoft Defender for Cloud default policy initiative. You can directly assign this initiative, or manage its policies and compliance results within Microsoft Defender for Cloud. /providers/microsoft.authorization/policysetdefinitions/1f3afdf9-d0c9-4c3d-847f-89da613e70a8 PolicySet BuiltIn Security Center False n/a Default 34 15 23 0 0 none Enable Monitoring in Microsoft Defender for Cloud Enable Monitoring in Microsoft Defender for Cloud. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-asc-monitoring n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-online-mg Online inherited mibelle-mg false false Configure Azure Activity logs to stream to specified Log Analytics workspace Deploys the diagnostic settings for Azure Activity to stream subscriptions audit logs to a Log Analytics workspace to monitor subscription-level events /providers/microsoft.authorization/policydefinitions/2465583e-4e78-4c15-b6be-a36cbc7c8b0f Policy BuiltIn Monitoring False DeployIfNotExists effect=DeployIfNotExists, logAnalytics=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 1 0 1 0 0 Monitoring Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/dcb59c88-f014-5e17-840c-6c9aecc66286), Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/82f0c3bf-808b-5863-bf9c-231cfbf9598a) Deploy-AzActivity-Log (SPObjId: 217aa040-8eb0-451b-b81c-0b8f3d200d5a) Deploy Diagnostic Settings for Activity Log to Log Analytics workspace Ensures that Activity Log Diagnostics settings are set to push logs into Log Analytics workspace. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-online-mg Online inherited mibelle-mg false false Enable audit category group resource logging for supported resources to Log Analytics Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This initiative deploys diagnostic setting using the audit category group to route logs to Log Analytics for all supported resources. /providers/microsoft.authorization/policysetdefinitions/f5b29bc4-feca-4cc6-a58a-772dd5e290a5 PolicySet BuiltIn Monitoring False n/a logAnalytics=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 4 0 8 0 Monitoring Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b922046a-7a3e-59da-a982-8a5b855791ce), Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/9df772a7-1ce7-5439-ab6b-5d31d69925cc) Deploy-Diag-Logs (SPObjId: 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57) Enable allLogs category group resource logging for supported resources to Log Analytics Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This initiative deploys diagnostic setting using the allLogs category group to route logs to an Event Hub for all supported resources. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-online-mg Online inherited mibelle-mg false false Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud Configure the multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud (WDATP, WDATP_EXCLUDE_LINUX_PUBLIC_PREVIEW, WDATP_UNIFIED_SOLUTION etc.). See: https://learn.microsoft.com/azure/defender-for-cloud/integration-defender-for-endpoint for more information. /providers/microsoft.authorization/policysetdefinitions/77b391e3-2d5d-40c3-83bf-65c846b3c6a3 PolicySet BuiltIn Security Center False n/a Default 0 3 0 1 0 Security Admin (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/d730d560-adce-52b7-b10c-36a8ad16a6d3) Deploy-MDEndpointsAMA (SPObjId: 7d365a6d-a7ae-4921-beca-5ce854a76960) Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud Configure the multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud (WDATP, WDATP_EXCLUDE_LINUX_PUBLIC_PREVIEW, WDATP_UNIFIED_SOLUTION etc.). See: https://learn.microsoft.com/azure/defender-for-cloud/integration-defender-for-endpoint for more information. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-mdendpointsama n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-online-mg Online inherited mibelle-mg false false Enforce Azure Compute Security Benchmark compliance auditing Enforce Azure Compute Security Benchmark compliance auditing for Windows and Linux virtual machines. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-acsb PolicySet Custom Guest Configuration true n/a Default 0 0 0 0 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/6e26cd22-b41b-5611-aafc-e2c56b14c060) Enforce-ACSB (SPObjId: e1f2e80c-5329-4804-824d-f0b44713985e) Enforce Azure Compute Security Baseline compliance auditing This initiative assignment enables Azure Compute Security Baseline compliance auditing for Windows and Linux virtual machines. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/enforce-acsb n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-landingzones-mg false false Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics If a virtual network already has traffic analytics enabled, then, this policy will overwrite its existing settings with the ones provided during policy creation. Traffic analytics is a cloud-based solution that provides visibility into user and application activity in cloud networks. /providers/microsoft.authorization/policydefinitions/052c180e-287d-44c3-86ef-01aeae2d9774 Policy BuiltIn Network False DeployIfNotExists networkWatcherName=/subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourcegroups/networkwatcherrg/providers/microsoft.network/networkwatchers/networkwatcher_westeurope, networkWatcherRG=networkwatcherrg, retentionDays=1, storageId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.storage/storageaccounts/mibmgmtnetprodeuwst01, vnetRegion=westeurope, workspaceRegion=westeurope, workspaceResourceId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 0 0 0 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/94dfdb33-b864-47c9-831d-366721beb989) 52a8c671384a4b609f1d7651 (SPObjId: 6e0d029a-fce4-400f-bff3-45b8d9a8342e) Deploy-TrafficAnalytics-WestEurope Deploy VNet Flow Logs in on All VNet in West Europe & enable Traffic Analytics /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/52a8c671384a4b609f1d7651 n/a 09/04/2025 06:12:52 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 09/04/2025 07:23:12 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-landingzones-mg false false Web Application Firewall (WAF) should be enabled for Application Gateway Deploy Azure Web Application Firewall (WAF) in front of public facing web applications for additional inspection of incoming traffic. Web Application Firewall (WAF) provides centralized protection of your web applications from common exploits and vulnerabilities such as SQL injections, Cross-Site Scripting, local and remote file executions. You can also restrict access to your web applications by countries, IP address ranges, and other http(s) parameters via custom rules. /providers/microsoft.authorization/policydefinitions/564feb30-bf6a-4854-b4bb-0d2d2d1e6c66 Policy BuiltIn Network False Audit effect=Audit Default 0 0 0 0 0 none Web Application Firewall (WAF) should be enabled for Application Gateway Assign the WAF should be enabled for Application Gateway audit policy. /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/audit-appgw-waf n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-landingzones-mg false false Network interfaces should disable IP forwarding This policy denies the network interfaces which enabled IP forwarding. The setting of IP forwarding disables Azure's check of the source and destination for a network interface. This should be reviewed by the network security team. /providers/microsoft.authorization/policydefinitions/88c0b9da-ce96-4b03-9635-f29a937e2900 Policy BuiltIn Network False deny Default 0 0 0 0 0 none Network interfaces should disable IP forwarding This policy denies the network interfaces which enabled IP forwarding. The setting of IP forwarding disables Azure's check of the source and destination for a network interface. This should be reviewed by the network security team. /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deny-ip-forwarding n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-landingzones-mg false false Management port access from the Internet should be blocked This policy denies any network security rule that allows management port access from the Internet, by default blocking SSH/RDP ports. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-mgmtports-from-internet Policy Custom Network true Deny effect=Deny Default 0 0 0 0 0 none Management port access from the Internet should be blocked This policy denies any network security rule that allows management port access from the Internet /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deny-mgmtports-internet n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-landingzones-mg false false Kubernetes cluster should not allow privileged containers Do not allow privileged containers creation in a Kubernetes cluster. This recommendation is part of CIS 5.2.1 which is intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. /providers/microsoft.authorization/policydefinitions/95edb821-ddaf-4404-9732-666045e056b4 Policy BuiltIn Kubernetes False deny effect=deny Default 0 0 0 0 0 none Kubernetes cluster should not allow privileged containers Do not allow privileged containers creation in a Kubernetes cluster. This recommendation is part of CIS 5.2.1 which is intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deny-priv-containers-aks n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-landingzones-mg false false Kubernetes clusters should not allow container privilege escalation Do not allow containers to run with privilege escalation to root in a Kubernetes cluster. This recommendation is part of CIS 5.2.5 which is intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. /providers/microsoft.authorization/policydefinitions/1c6e92c9-99f0-4e55-9cf2-0c234dc48f99 Policy BuiltIn Kubernetes False deny effect=deny Default 0 0 0 0 0 none Kubernetes clusters should not allow container privilege escalation Do not allow containers to run with privilege escalation to root in a Kubernetes cluster. This recommendation is part of CIS 5.2.5 which is intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for AKS Engine and Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc. /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deny-priv-escalation-aks n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-landingzones-mg false false Secure transfer to storage accounts should be enabled Audit requirement of Secure transfer in your storage account. Secure transfer is an option that forces your storage account to accept requests only from secure connections (HTTPS). Use of HTTPS ensures authentication between the server and the service and protects data in transit from network layer attacks such as man-in-the-middle, eavesdropping, and session-hijacking /providers/microsoft.authorization/policydefinitions/404c3081-a854-4457-ae30-26a93ef643f9 Policy BuiltIn Storage False Deny effect=Deny Default 0 1 0 7 0 none Secure transfer to storage accounts should be enabled Audit requirement of Secure transfer in your storage account. Secure transfer is an option that forces your storage account to accept requests only from secure connections (HTTPS). Use of HTTPS ensures authentication between the server and the service and protects data in transit from network layer attacks such as man-in-the-middle, eavesdropping, and session-hijacking. /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deny-storage-http n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-landingzones-mg false false Configure SQL servers to have auditing enabled to Log Analytics workspace To ensure the operations performed against your SQL assets are captured, SQL servers should have auditing enabled. If auditing is not enabled, this policy will configure auditing events to flow to the specified Log Analytics workspace. /providers/microsoft.authorization/policydefinitions/25da7dfb-0666-4a15-a8f5-402127efd8bb Policy BuiltIn SQL False DeployIfNotExists effect=DeployIfNotExists, logAnalyticsWorkspaceId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 0 0 0 0 SQL Security Manager (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/2f1eab15-c92e-52cd-8b0c-a60e52f1b331), SQL Security Manager (/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/providers/microsoft.authorization/roleassignments/ce81334b-c425-5087-9b8d-2119e050082b), Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/488f45ec-c535-5f65-85bf-acacd1bb93e8), Log Analytics Contributor (/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/providers/microsoft.authorization/roleassignments/fbb2af70-7587-52bd-b3e1-54fcdbdb7ea4) Deploy-AzSqlDb-Auditing (SPObjId: afb169da-f80a-4dd6-abf3-b7fc08efb8ae) Configure SQL servers to have auditing enabled to Log Analytics workspace To ensure the operations performed against your SQL assets are captured, SQL servers should have auditing enabled. If auditing is not enabled, this policy will configure auditing events to flow to the specified Log Analytics workspace. /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deploy-azsqldb-auditing n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-landingzones-mg false false Deploy SQL DB transparent data encryption Enables transparent data encryption on SQL databases /providers/microsoft.authorization/policydefinitions/86a912f6-9a06-4e26-b447-11b16ba8659f Policy BuiltIn SQL False DeployIfNotExists Default 0 0 0 0 0 SQL DB Contributor (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/af2f6b24-ac34-5f3b-9249-5a109d9d1528) Deploy-SQL-TDE (SPObjId: de5ed213-fd75-471c-8d32-920072d6c378) Deploy TDE on SQL servers This policy ensures that Transparent Data Encryption is enabled on SQL Servers. /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deploy-sql-tde n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-landingzones-mg false false Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics If a virtual network already has traffic analytics enabled, then, this policy will overwrite its existing settings with the ones provided during policy creation. Traffic analytics is a cloud-based solution that provides visibility into user and application activity in cloud networks. /providers/microsoft.authorization/policydefinitions/052c180e-287d-44c3-86ef-01aeae2d9774 Policy BuiltIn Network False DeployIfNotExists networkWatcherName=/subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourcegroups/networkwatcherrg/providers/microsoft.network/networkwatchers/networkwatcher_northeurope, networkWatcherRG=networkwatcherrg, retentionDays=1, storageId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.storage/storageaccounts/mibmgmtnetprodeunst01, vnetRegion=northeurope, workspaceRegion=westeurope, workspaceResourceId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 0 0 0 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/3fb7bac5-2328-4e74-a5b0-0d6d2a631693) e9143c36572348c3ba0c67b1 (SPObjId: 9c3b725e-ce85-47ac-bf6f-c2fa0571c259) Deploy-TrafficAnalytics-NorthEurope Deploy VNet Flow Logs in on All VNet in North Europe & enable Traffic Analytics /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/e9143c36572348c3ba0c67b1 n/a 09/04/2025 07:17:59 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 09/04/2025 07:33:42 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-landingzones-mg false false Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines Configure auto-assessment (every 24 hours) for OS updates. You can control the scope of assignment according to machine subscription, resource group, location or tag. Learn more about this for Windows: https://aka.ms/computevm-windowspatchassessmentmode, for Linux: https://aka.ms/computevm-linuxpatchassessmentmode. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-aum-checkupdates PolicySet Custom Security Center true n/a assessmentMode=AutomaticByPlatform Default 0 0 0 0 0 Virtual Machine Contributor (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/571da045-f503-5cb2-b123-ede8cfe0f15a), Azure Connected Machine Resource Administrator (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/7d65b18e-df43-5353-85a4-716e68ff7c7a), Managed Identity Operator (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/b2c88903-f3a4-54ec-813c-46d650309b86) Enable-AUM-CheckUpdates (SPObjId: 4f27b633-c16b-47a6-ab24-737bb6cdad56) Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines. Configure auto-assessment (every 24 hours) for OS updates. You can control the scope of assignment according to machine subscription, resource group, location or tag. Learn more about this for Windows: https://aka.ms/computevm-windowspatchassessmentmode, for Linux: https://aka.ms/computevm-linuxpatchassessmentmode. /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-landingzones-mg false false Kubernetes clusters should be accessible only over HTTPS Use of HTTPS ensures authentication and protects data in transit from network layer eavesdropping attacks. This capability is currently generally available for Kubernetes Service (AKS), and in preview for Azure Arc enabled Kubernetes. For more info, visit https://aka.ms/kubepolicydoc /providers/microsoft.authorization/policydefinitions/1a5b4dca-0b6f-4cf5-907c-56316bc1bf3d Policy BuiltIn Kubernetes False deny effect=deny Default 0 0 0 0 0 none Kubernetes clusters should be accessible only over HTTPS Use of HTTPS ensures authentication and protects data in transit from network layer eavesdropping attacks. This capability is currently generally available for Kubernetes Service (AKS), and in preview for AKS Engine and Azure Arc enabled Kubernetes. For more info, visit https://aka.ms/kubepolicydoc. /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enforce-aks-https n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-landingzones-mg false false Enforce recommended guardrails for Azure Key Vault Enforce recommended guardrails for Azure Key Vault. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-keyvault PolicySet Custom Key Vault true n/a Default 2 8 2 0 0 none Enforce recommended guardrails for Azure Key Vault This initiative assignment enables recommended ALZ guardrails for Azure Key Vault. /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enforce-gr-keyvault n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-landingzones-mg false false Subnets should be private Ensure your subnets are secure by default by preventing default outbound access. For more information go to https://aka.ms/defaultoutboundaccessretirement /providers/microsoft.authorization/policydefinitions/7bca8353-aa3b-429b-904a-9229c4385837 Policy BuiltIn Network False Audit Default 0 0 0 0 0 none Subnets should be private Ensure your subnets are secure by default by preventing default outbound access. For more information go to https://aka.ms/defaultoutboundaccessretirement /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enforce-subnet-private n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-mg false false Audit resource location matches resource group location Audit that the resource location matches its resource group location /providers/microsoft.authorization/policydefinitions/0a914e76-4921-4c19-b460-a2d36003525a Policy BuiltIn General False audit Default 1 0 5 49 0 none Audit that the resource location matches its resource group location Audit resource location matches resource group location /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-location-match n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-mg false false Audit virtual machines for Trusted Launch support Trusted Launch improves security of a Virtual Machine which requires VM SKU, OS Disk & OS Image to support it (Gen 2). To learn more about Trusted Launch, visit https://aka.ms/trustedlaunch. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/audit-trustedlaunch PolicySet Custom Trusted Launch true n/a Default 0 0 0 0 0 none Audit virtual machines for Trusted Launch support Trusted Launch improves security of a Virtual Machine which requires VM SKU, OS Disk & OS Image to support it (Gen 2). To learn more about Trusted Launch, visit https://aka.ms/trustedlaunch. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-trustedlaunch n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-mg false false Unused resources driving cost should be avoided Optimize cost by detecting unused but chargeable resources. Leverage this Azure Policy Initiative as a cost control tool to reveal orphaned resources that are contributing cost. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/audit-unusedresourcescostoptimization PolicySet Custom Cost Optimization true n/a EffectDisks=Audit, EffectPublicIpAddresses=Audit, EffectServerFarms=Audit Default 0 1 0 4 0 none Unused resources driving cost should be avoided This Policy initiative is a group of Policy definitions that help optimize cost by detecting unused but chargeable resources. Leverage this Policy initiative as a cost control to reveal orphaned resources that are driving cost. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-unusedresources n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-mg false false Not allowed resource types Restrict which resource types can be deployed in your environment. Limiting resource types can reduce the complexity and attack surface of your environment while also helping to manage costs. Compliance results are only shown for non-compliant resources. /providers/microsoft.authorization/policydefinitions/6c112d4e-5bc7-47ae-a041-ea2d9dccd749 Policy BuiltIn General False Deny effect=Deny, listOfResourceTypesNotAllowed=Microsoft.ClassicCompute/capabilities; Microsoft.ClassicCompute/checkDomainNameAvailability; Microsoft.ClassicCompute/domainNames; Microsoft.ClassicCompute/domainNames/capabilities; Microsoft.ClassicCompute/domainNames/internalLoadBalancers; Microsoft.ClassicCompute/domainNames/serviceCertificates; Microsoft.ClassicCompute/domainNames/slots; Microsoft.ClassicCompute/domainNames/slots/roles; Microsoft.ClassicCompute/domainNames/slots/roles/metricDefinitions; Microsoft.ClassicCompute/domainNames/slots/roles/metrics; Microsoft.ClassicCompute/moveSubscriptionResources; Microsoft.ClassicCompute/operatingSystemFamilies; Microsoft.ClassicCompute/operatingSystems; Microsoft.ClassicCompute/operations; Microsoft.ClassicCompute/operationStatuses; Microsoft.ClassicCompute/quotas; Microsoft.ClassicCompute/resourceTypes; Microsoft.ClassicCompute/validateSubscriptionMoveAvailability; Microsoft.ClassicCompute/virtualMachines; Microsoft.ClassicCompute/virtualMachines/diagnosticSettings; Microsoft.ClassicCompute/virtualMachines/metricDefinitions; Microsoft.ClassicCompute/virtualMachines/metrics; Microsoft.ClassicInfrastructureMigrate/classicInfrastructureResources; Microsoft.ClassicNetwork/capabilities; Microsoft.ClassicNetwork/expressRouteCrossConnections; Microsoft.ClassicNetwork/expressRouteCrossConnections/peerings; Microsoft.ClassicNetwork/gatewaySupportedDevices; Microsoft.ClassicNetwork/networkSecurityGroups; Microsoft.ClassicNetwork/operations; Microsoft.ClassicNetwork/quotas; Microsoft.ClassicNetwork/reservedIps; Microsoft.ClassicNetwork/virtualNetworks; Microsoft.ClassicNetwork/virtualNetworks/remoteVirtualNetworkPeeringProxies; Microsoft.ClassicNetwork/virtualNetworks/virtualNetworkPeerings; Microsoft.ClassicStorage/capabilities; Microsoft.ClassicStorage/checkStorageAccountAvailability; Microsoft.ClassicStorage/disks; Microsoft.ClassicStorage/images; Microsoft.ClassicStorage/operations; Microsoft.ClassicStorage/osImages; Microsoft.ClassicStorage/osPlatformImages; Microsoft.ClassicStorage/publicImages; Microsoft.ClassicStorage/quotas; Microsoft.ClassicStorage/storageAccounts; Microsoft.ClassicStorage/storageAccounts/blobServices; Microsoft.ClassicStorage/storageAccounts/fileServices; Microsoft.ClassicStorage/storageAccounts/metricDefinitions; Microsoft.ClassicStorage/storageAccounts/metrics; Microsoft.ClassicStorage/storageAccounts/queueServices; Microsoft.ClassicStorage/storageAccounts/services; Microsoft.ClassicStorage/storageAccounts/services/diagnosticSettings; Microsoft.ClassicStorage/storageAccounts/services/metricDefinitions; Microsoft.ClassicStorage/storageAccounts/services/metrics; Microsoft.ClassicStorage/storageAccounts/tableServices; Microsoft.ClassicStorage/storageAccounts/vmImages; Microsoft.ClassicStorage/vmImages; Microsoft.ClassicSubscription/operations Default 0 0 0 0 0 none Deny the deployment of classic resources Denies deployment of classic resource types under the assigned scope. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deny-classic-resources n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-mg false false Audit VMs that do not use managed disks This policy audits VMs that do not use managed disks /providers/microsoft.authorization/policydefinitions/06a78e20-9358-41c9-923c-fb736d382a4d Policy BuiltIn Compute False audit Default 0 0 0 0 0 none Deny virtual machines and virtual machine scale sets that do not use managed disk Deny virtual machines that do not use managed disk. It checks the managed disk property on virtual machine OS Disk fields. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deny-unmanageddisk n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-mg false false Microsoft cloud security benchmark The Microsoft cloud security benchmark initiative represents the policies and controls implementing security recommendations defined in Microsoft cloud security benchmark, see https://aka.ms/azsecbm. This also serves as the Microsoft Defender for Cloud default policy initiative. You can directly assign this initiative, or manage its policies and compliance results within Microsoft Defender for Cloud. /providers/microsoft.authorization/policysetdefinitions/1f3afdf9-d0c9-4c3d-847f-89da613e70a8 PolicySet BuiltIn Security Center False n/a Default 34 15 23 0 0 none Enable Monitoring in Microsoft Defender for Cloud Enable Monitoring in Microsoft Defender for Cloud. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-asc-monitoring n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-mg false false Configure Azure Activity logs to stream to specified Log Analytics workspace Deploys the diagnostic settings for Azure Activity to stream subscriptions audit logs to a Log Analytics workspace to monitor subscription-level events /providers/microsoft.authorization/policydefinitions/2465583e-4e78-4c15-b6be-a36cbc7c8b0f Policy BuiltIn Monitoring False DeployIfNotExists effect=DeployIfNotExists, logAnalytics=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 1 0 1 0 0 Monitoring Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/dcb59c88-f014-5e17-840c-6c9aecc66286), Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/82f0c3bf-808b-5863-bf9c-231cfbf9598a) Deploy-AzActivity-Log (SPObjId: 217aa040-8eb0-451b-b81c-0b8f3d200d5a) Deploy Diagnostic Settings for Activity Log to Log Analytics workspace Ensures that Activity Log Diagnostics settings are set to push logs into Log Analytics workspace. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-mg false false Enable audit category group resource logging for supported resources to Log Analytics Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This initiative deploys diagnostic setting using the audit category group to route logs to Log Analytics for all supported resources. /providers/microsoft.authorization/policysetdefinitions/f5b29bc4-feca-4cc6-a58a-772dd5e290a5 PolicySet BuiltIn Monitoring False n/a logAnalytics=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 4 0 8 0 Monitoring Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b922046a-7a3e-59da-a982-8a5b855791ce), Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/9df772a7-1ce7-5439-ab6b-5d31d69925cc) Deploy-Diag-Logs (SPObjId: 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57) Enable allLogs category group resource logging for supported resources to Log Analytics Resource logs should be enabled to track activities and events that take place on your resources and give you visibility and insights into any changes that occur. This initiative deploys diagnostic setting using the allLogs category group to route logs to an Event Hub for all supported resources. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-mg false false Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud Configure the multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud (WDATP, WDATP_EXCLUDE_LINUX_PUBLIC_PREVIEW, WDATP_UNIFIED_SOLUTION etc.). See: https://learn.microsoft.com/azure/defender-for-cloud/integration-defender-for-endpoint for more information. /providers/microsoft.authorization/policysetdefinitions/77b391e3-2d5d-40c3-83bf-65c846b3c6a3 PolicySet BuiltIn Security Center False n/a Default 0 3 0 1 0 Security Admin (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/d730d560-adce-52b7-b10c-36a8ad16a6d3) Deploy-MDEndpointsAMA (SPObjId: 7d365a6d-a7ae-4921-beca-5ce854a76960) Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud Configure the multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud (WDATP, WDATP_EXCLUDE_LINUX_PUBLIC_PREVIEW, WDATP_UNIFIED_SOLUTION etc.). See: https://learn.microsoft.com/azure/defender-for-cloud/integration-defender-for-endpoint for more information. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-mdendpointsama n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-mg false false Enforce Azure Compute Security Benchmark compliance auditing Enforce Azure Compute Security Benchmark compliance auditing for Windows and Linux virtual machines. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-acsb PolicySet Custom Guest Configuration true n/a Default 0 0 0 0 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/6e26cd22-b41b-5611-aafc-e2c56b14c060) Enforce-ACSB (SPObjId: e1f2e80c-5329-4804-824d-f0b44713985e) Enforce Azure Compute Security Baseline compliance auditing This initiative assignment enables Azure Compute Security Baseline compliance auditing for Windows and Linux virtual machines. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/enforce-acsb n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Download CSV semicolon | comma
Assignment Scope Type Assignment Scope Assignment Id Assignment DisplayName Assignment Policy/Set Effect Policy definition id Policy definition displayName Policy definition type Policy definition refId PolicySet definition id PolicySet definition displayName PolicySet definition type NonCompliant resources
MG /providers/Microsoft.Management/managementGroups/mibelle-mg /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/enforce-acsb Enforce Azure Compute Security Baseline compliance auditing policySetDefinition deployifnotexists /providers/microsoft.authorization/policydefinitions/331e8ea8-378a-410f-a2e5-ae22f38bb0da Deploy the Linux Guest Configuration extension to enable Guest Configuration assignments on Linux VMs (331e8ea8-378a-410f-a2e5-ae22f38bb0da) BuiltIn gclinux /providers/Microsoft.Management/managementGroups/mibelle-mg/providers/Microsoft.Authorization/policySetDefinitions/Enforce-ACSB Enforce Azure Compute Security Benchmark compliance auditing (Enforce-ACSB) Custom 4
MG /providers/Microsoft.Management/managementGroups/mibelle-mg /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log Deploy Diagnostic Settings for Activity Log to Log Analytics workspace policyDefinition deployifnotexists /providers/microsoft.authorization/policydefinitions/2465583e-4e78-4c15-b6be-a36cbc7c8b0f Configure Azure Activity logs to stream to specified Log Analytics workspace (2465583e-4e78-4c15-b6be-a36cbc7c8b0f) BuiltIn n/a n/a n/a 4
MG /providers/Microsoft.Management/managementGroups/mibelle-mg /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs Enable allLogs category group resource logging for supported resources to Log Analytics policySetDefinition deployifnotexists /providers/microsoft.authorization/policydefinitions/818719e5-1338-4776-9a9d-3c31e4df5986 Enable logging by category group for Log Analytics workspaces (microsoft.operationalinsights/workspaces) to Log Analytics (818719e5-1338-4776-9a9d-3c31e4df5986) BuiltIn operationalinsights-workspaces /providers/Microsoft.Authorization/policySetDefinitions/f5b29bc4-feca-4cc6-a58a-772dd5e290a5 Enable audit category group resource logging for supported resources to Log Analytics (f5b29bc4-feca-4cc6-a58a-772dd5e290a5) BuiltIn 1
MG /providers/Microsoft.Management/managementGroups/mibelle-platform-mg /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/d33eb38085bf40bd860fe43b Deploy-TrafficAnalytics-WestEurope policyDefinition deployifnotexists /providers/microsoft.authorization/policydefinitions/052c180e-287d-44c3-86ef-01aeae2d9774 Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics (052c180e-287d-44c3-86ef-01aeae2d9774) BuiltIn n/a n/a n/a 1
Download CSV semicolon | comma
Role Name RoleId Assignable Scopes Data CreatedOn CreatedBy UpdatedOn UpdatedBy
[mibelle-mg] Application owners (DevOps/AppOps) bb55c7d4-a9b2-5074-bbee-97b09074605c 1 (/providers/Microsoft.Management/managementGroups/mibelle-mg) false 06/12/2025 11:19:14 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
[mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 1 (/providers/Microsoft.Management/managementGroups/mibelle-mg) false 06/12/2025 11:19:14 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
[mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 1 (/providers/Microsoft.Management/managementGroups/mibelle-mg) false 06/12/2025 11:19:14 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
[mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 1 (/providers/Microsoft.Management/managementGroups/mibelle-mg) false 06/12/2025 11:19:14 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
v1-custom-role-3b2fdc69-67a4-42f2-a43e-b7fbad489b03 eac9e3ff-ee3d-0ea4-b91b-4b1cde3da152 1 (/subscriptions/3b2fdc69-67a4-42f2-a43e-b7fbad489b03) true 10/16/2025 07:09:08 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
v1-custom-role-d4493d1a-9fd5-4596-aff4-8c679eac0164 fa3940f3-4060-ef1b-997b-69b9fcbea8c1 1 (/subscriptions/d4493d1a-9fd5-4596-aff4-8c679eac0164) true 10/16/2025 08:21:19 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
v1-custom-role-e1dcabb1-2f79-4eb1-982d-e3df709c24aa 4baaded2-1ae8-d927-8341-6fc59be1ffd6 1 (/subscriptions/e1dcabb1-2f79-4eb1-982d-e3df709c24aa) true 10/16/2025 06:56:35 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
v1-custom-role-edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 3129e445-9330-52ad-1e78-065ce5aa09d0 1 (/subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880) true 10/16/2025 06:48:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
v1-custom-role-fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b 4295cd5f-8c43-984e-3417-b65aa1e071e1 1 (/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b) true 10/16/2025 07:01:27 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Download CSV semicolon | comma
Role Name RoleId Role Assignable Scopes
[mibelle-mg] Application owners (DevOps/AppOps) bb55c7d4-a9b2-5074-bbee-97b09074605c 1 (/providers/Microsoft.Management/managementGroups/mibelle-mg)
[mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 1 (/providers/Microsoft.Management/managementGroups/mibelle-mg)
Download CSV semicolon | comma
Role AssignmentId Role Name RoleId Impacted Mg/Sub
/subscriptions/3b2fdc69-67a4-42f2-a43e-b7fbad489b03/resourcegroups/mibelle-aut-psu-dev-rg/providers/microsoft.keyvault/vaults/mibautpsudeveuwkv02/providers/microsoft.authorization/roleassignments/7955be54-b468-4122-9493-9ec643a6c0d0 Key Vault Secrets User 4633458b-17de-408a-b874-0445c86b69e6 Mg: 0; Sub: 1
Download CSV semicolon | comma
Subscription SubscriptionId MgPath Role Identity
Download CSV semicolon | comma
*Depending on the number of rows and your computer´s performance the table may respond with delay, download the csv for better filtering experience
Scope Management Group Id Management Group Name SubscriptionId Subscription Name Assignment Scope Role Role Id Role Type Data Can do Role assignment Identity Displayname Identity SignInName Identity ObjectId Identity Type Applicability Applies through membership Group Details PIM PIM assignment type PIM start PIM end Role AssignmentId Related Policy Assignment CreatedOn CreatedBy
Ten mibelle-mg mibelle inherited Tenant User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false True CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member direct False /providers/microsoft.authorization/roleassignments/3f958da1-722a-4c03-8398-aab60735ecd3 none 05/07/2025 18:14:55 ObjectType: User Member, ObjectDisplayName: CSA-Jan.Stutz, ObjectSignInName: CSA-Jan.Stutz@MIBCloud.onmicrosoft.com, ObjectId: 43b3e278-6551-4566-83a8-c19abe643e64
Mg mibelle-mg mibelle thisScope MG [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/e14ef9ac-25e8-4ee7-887a-a6576bd5229d none 11/28/2025 07:57:36 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-mg mibelle thisScope MG Monitoring Contributor 749f88d5-cbae-40b8-bcfc-e573ddc772fa Builtin false False Deploy-AzActivity-Log n/a 217aa040-8eb0-451b-b81c-0b8f3d200d5a SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/dcb59c88-f014-5e17-840c-6c9aecc66286 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log (Configure Azure Activity logs to stream to specified Log Analytics workspace) 06/12/2025 17:56:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg mibelle thisScope MG Monitoring Contributor 749f88d5-cbae-40b8-bcfc-e573ddc772fa Builtin false False Deploy-Diag-Logs n/a 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b922046a-7a3e-59da-a982-8a5b855791ce /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs (Enable audit category group resource logging for supported resources to Log Analytics) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg mibelle thisScope MG Log Analytics Contributor 92aaf0da-9dab-42b6-94a3-d43ce8d16293 Builtin false False Deploy-AzActivity-Log n/a 217aa040-8eb0-451b-b81c-0b8f3d200d5a SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/82f0c3bf-808b-5863-bf9c-231cfbf9598a /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log (Configure Azure Activity logs to stream to specified Log Analytics workspace) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg mibelle thisScope MG Log Analytics Contributor 92aaf0da-9dab-42b6-94a3-d43ce8d16293 Builtin false False Deploy-Diag-Logs n/a 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/9df772a7-1ce7-5439-ab6b-5d31d69925cc /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs (Enable audit category group resource logging for supported resources to Log Analytics) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg mibelle thisScope MG Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Meier, Heinz-MIBELLEGROUP heinz.meier@mibelle.net 06addc33-6298-4f01-9f6b-709193f099cc User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-mg mibelle thisScope MG Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Subs-MibelleOnline-SubscriptionOwner n/a 1bdf326c-8c66-4ba9-8c2d-83312a1ddc02 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-mg mibelle thisScope MG Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-Reader n/a 1c529912-c479-41a1-8a03-e57256720fa4 Group direct 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-mg mibelle thisScope MG Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser n/a 1f3ede05-4301-42b1-8c95-2be94290e93c Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-mg mibelle thisScope MG Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-mg mibelle thisScope MG Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-mg mibelle thisScope MG Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Hasanow, Kilian-MIBELLEGROUP kilian.hasanow@mibelle.net 4270eb01-73cf-4e17-925e-47461737b40e User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-mg mibelle thisScope MG Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-mg mibelle thisScope MG Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Mibelle-AzGovWiz-prod n/a 44b03901-55d2-49a8-af3a-58228a81408c SP APP INT indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-mg mibelle thisScope MG Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-michael.peter csa-michael.peter@MIBCloud.mail.onmicrosoft.com 460bad8a-cc4d-41dc-9ddd-f24ba491e2a6 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-mg mibelle thisScope MG Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-mg mibelle thisScope MG Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner n/a 52364002-4a8b-4808-b4fc-864ed5f7d50d Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-mg mibelle thisScope MG Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Matej Paunovski CSA-matej.paunovski@MIBCloud.onmicrosoft.com 54f81d33-50db-475c-b686-4ef70aa0b4fe User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-mg mibelle thisScope MG Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Ouaouane, Taoufik-MIBELLEGROUP taoufik.ouaouane@mibelle.net 7100d1ce-5bd7-449d-abdd-52a7218922b3 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-mg mibelle thisScope MG Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-NetOps n/a 87e9d07b-5340-455c-b297-8bffe3b86f78 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-mg mibelle thisScope MG Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner n/a 9b120856-d4b2-4862-95df-bedf8d5fe1c3 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-mg mibelle thisScope MG Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-Baswaraj Marotrao Ramshette csa-baswarajmarotrao.ramshette@MIBCloud.onmicrosoft.com 9d8d246b-a1f9-4d9a-a54f-f7ae9f3af2ae User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-mg mibelle thisScope MG Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-SecOps n/a abf39027-4cb4-4298-8951-f984eaf9cb8e Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-mg mibelle thisScope MG Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Baumann, Jürg-MIBELLEGROUP juerg.baumann_mibellegroup.com#EXT#@MIBCloud.onmicrosoft.com bb2279b2-06ab-459a-b981-579701601f8a User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-mg mibelle thisScope MG Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin n/a cb058f58-c629-445f-9a10-75f9fcab694e Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-mg mibelle thisScope MG Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-mg mibelle thisScope MG Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Philipp.Schmidt CSA-Philipp.Schmidt@MIBCloud.onmicrosoft.com e40a73c8-6655-434d-8c8b-fdc4d9213499 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-mg mibelle thisScope MG Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Taoufik.Ouaouane csa-Taoufik.Ouaouane@mibelle.net e58ba28f-09ed-49c3-8f5e-31b05c258cde User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-mg mibelle thisScope MG Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Adrian.Bombelka CSA-Adrian.Bombelka@MIBCloud.onmicrosoft.com e86b38a8-e5d4-4888-b09d-390dcf9a2017 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-mg mibelle thisScope MG Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False Enforce-ACSB n/a e1f2e80c-5329-4804-824d-f0b44713985e SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/6e26cd22-b41b-5611-aafc-e2c56b14c060 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/enforce-acsb (Enforce Azure Compute Security Benchmark compliance auditing) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-mg mibelle thisScope MG Security Admin fb1c8493-542b-48eb-b624-b4c8fea62acd Builtin false False Deploy-MDEndpointsAMA n/a 7d365a6d-a7ae-4921-beca-5ce854a76960 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/d730d560-adce-52b7-b10c-36a8ad16a6d3 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-mdendpointsama (Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-decommissioned-mg Decommissioned inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/e14ef9ac-25e8-4ee7-887a-a6576bd5229d none 11/28/2025 07:57:36 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-decommissioned-mg Decommissioned inherited mibelle-mg Monitoring Contributor 749f88d5-cbae-40b8-bcfc-e573ddc772fa Builtin false False Deploy-AzActivity-Log n/a 217aa040-8eb0-451b-b81c-0b8f3d200d5a SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/dcb59c88-f014-5e17-840c-6c9aecc66286 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log (Configure Azure Activity logs to stream to specified Log Analytics workspace) 06/12/2025 17:56:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-decommissioned-mg Decommissioned inherited mibelle-mg Monitoring Contributor 749f88d5-cbae-40b8-bcfc-e573ddc772fa Builtin false False Deploy-Diag-Logs n/a 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b922046a-7a3e-59da-a982-8a5b855791ce /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs (Enable audit category group resource logging for supported resources to Log Analytics) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-decommissioned-mg Decommissioned inherited mibelle-mg Log Analytics Contributor 92aaf0da-9dab-42b6-94a3-d43ce8d16293 Builtin false False Deploy-AzActivity-Log n/a 217aa040-8eb0-451b-b81c-0b8f3d200d5a SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/82f0c3bf-808b-5863-bf9c-231cfbf9598a /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log (Configure Azure Activity logs to stream to specified Log Analytics workspace) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-decommissioned-mg Decommissioned inherited mibelle-mg Log Analytics Contributor 92aaf0da-9dab-42b6-94a3-d43ce8d16293 Builtin false False Deploy-Diag-Logs n/a 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/9df772a7-1ce7-5439-ab6b-5d31d69925cc /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs (Enable audit category group resource logging for supported resources to Log Analytics) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-decommissioned-mg Decommissioned inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Meier, Heinz-MIBELLEGROUP heinz.meier@mibelle.net 06addc33-6298-4f01-9f6b-709193f099cc User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-decommissioned-mg Decommissioned inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Subs-MibelleOnline-SubscriptionOwner n/a 1bdf326c-8c66-4ba9-8c2d-83312a1ddc02 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-decommissioned-mg Decommissioned inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-Reader n/a 1c529912-c479-41a1-8a03-e57256720fa4 Group direct 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-decommissioned-mg Decommissioned inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser n/a 1f3ede05-4301-42b1-8c95-2be94290e93c Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-decommissioned-mg Decommissioned inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-decommissioned-mg Decommissioned inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-decommissioned-mg Decommissioned inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Hasanow, Kilian-MIBELLEGROUP kilian.hasanow@mibelle.net 4270eb01-73cf-4e17-925e-47461737b40e User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-decommissioned-mg Decommissioned inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-decommissioned-mg Decommissioned inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Mibelle-AzGovWiz-prod n/a 44b03901-55d2-49a8-af3a-58228a81408c SP APP INT indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-decommissioned-mg Decommissioned inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-michael.peter csa-michael.peter@MIBCloud.mail.onmicrosoft.com 460bad8a-cc4d-41dc-9ddd-f24ba491e2a6 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-decommissioned-mg Decommissioned inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-decommissioned-mg Decommissioned inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner n/a 52364002-4a8b-4808-b4fc-864ed5f7d50d Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-decommissioned-mg Decommissioned inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Matej Paunovski CSA-matej.paunovski@MIBCloud.onmicrosoft.com 54f81d33-50db-475c-b686-4ef70aa0b4fe User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-decommissioned-mg Decommissioned inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Ouaouane, Taoufik-MIBELLEGROUP taoufik.ouaouane@mibelle.net 7100d1ce-5bd7-449d-abdd-52a7218922b3 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-decommissioned-mg Decommissioned inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-NetOps n/a 87e9d07b-5340-455c-b297-8bffe3b86f78 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-decommissioned-mg Decommissioned inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner n/a 9b120856-d4b2-4862-95df-bedf8d5fe1c3 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-decommissioned-mg Decommissioned inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-Baswaraj Marotrao Ramshette csa-baswarajmarotrao.ramshette@MIBCloud.onmicrosoft.com 9d8d246b-a1f9-4d9a-a54f-f7ae9f3af2ae User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-decommissioned-mg Decommissioned inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-SecOps n/a abf39027-4cb4-4298-8951-f984eaf9cb8e Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-decommissioned-mg Decommissioned inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Baumann, Jürg-MIBELLEGROUP juerg.baumann_mibellegroup.com#EXT#@MIBCloud.onmicrosoft.com bb2279b2-06ab-459a-b981-579701601f8a User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-decommissioned-mg Decommissioned inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin n/a cb058f58-c629-445f-9a10-75f9fcab694e Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-decommissioned-mg Decommissioned inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-decommissioned-mg Decommissioned inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Philipp.Schmidt CSA-Philipp.Schmidt@MIBCloud.onmicrosoft.com e40a73c8-6655-434d-8c8b-fdc4d9213499 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-decommissioned-mg Decommissioned inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Taoufik.Ouaouane csa-Taoufik.Ouaouane@mibelle.net e58ba28f-09ed-49c3-8f5e-31b05c258cde User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-decommissioned-mg Decommissioned inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Adrian.Bombelka CSA-Adrian.Bombelka@MIBCloud.onmicrosoft.com e86b38a8-e5d4-4888-b09d-390dcf9a2017 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-decommissioned-mg Decommissioned inherited mibelle-mg Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False Enforce-ACSB n/a e1f2e80c-5329-4804-824d-f0b44713985e SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/6e26cd22-b41b-5611-aafc-e2c56b14c060 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/enforce-acsb (Enforce Azure Compute Security Benchmark compliance auditing) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-decommissioned-mg Decommissioned inherited mibelle-mg Security Admin fb1c8493-542b-48eb-b624-b4c8fea62acd Builtin false False Deploy-MDEndpointsAMA n/a 7d365a6d-a7ae-4921-beca-5ce854a76960 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/d730d560-adce-52b7-b10c-36a8ad16a6d3 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-mdendpointsama (Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Ten mibelle-decommissioned-mg Decommissioned inherited Tenant User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false True CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member direct False /providers/microsoft.authorization/roleassignments/3f958da1-722a-4c03-8398-aab60735ecd3 none 05/07/2025 18:14:55 ObjectType: User Member, ObjectDisplayName: CSA-Jan.Stutz, ObjectSignInName: CSA-Jan.Stutz@MIBCloud.onmicrosoft.com, ObjectId: 43b3e278-6551-4566-83a8-c19abe643e64
Mg mibelle-decommissioned-mg Decommissioned thisScope MG Virtual Machine Contributor 9980e02c-c2be-4d73-94e8-173b1dc7cf3c Builtin false False Enforce-ALZ-Decomm n/a 449067cf-1d3a-494e-9c11-cb5b5e97fc69 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-decommissioned-mg/providers/microsoft.authorization/roleassignments/5e51d472-1e7a-5e45-8cf7-e3bb9d2323d4 /providers/microsoft.management/managementgroups/mibelle-decommissioned-mg/providers/microsoft.authorization/policyassignments/enforce-alz-decomm (Enforce policies in the Decommissioned Landing Zone) 06/12/2025 17:56:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-mg Landing Zones inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/e14ef9ac-25e8-4ee7-887a-a6576bd5229d none 11/28/2025 07:57:36 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-mg Landing Zones inherited mibelle-mg Monitoring Contributor 749f88d5-cbae-40b8-bcfc-e573ddc772fa Builtin false False Deploy-AzActivity-Log n/a 217aa040-8eb0-451b-b81c-0b8f3d200d5a SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/dcb59c88-f014-5e17-840c-6c9aecc66286 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log (Configure Azure Activity logs to stream to specified Log Analytics workspace) 06/12/2025 17:56:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-mg Landing Zones inherited mibelle-mg Monitoring Contributor 749f88d5-cbae-40b8-bcfc-e573ddc772fa Builtin false False Deploy-Diag-Logs n/a 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b922046a-7a3e-59da-a982-8a5b855791ce /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs (Enable audit category group resource logging for supported resources to Log Analytics) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-mg Landing Zones inherited mibelle-mg Log Analytics Contributor 92aaf0da-9dab-42b6-94a3-d43ce8d16293 Builtin false False Deploy-AzActivity-Log n/a 217aa040-8eb0-451b-b81c-0b8f3d200d5a SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/82f0c3bf-808b-5863-bf9c-231cfbf9598a /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log (Configure Azure Activity logs to stream to specified Log Analytics workspace) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-mg Landing Zones inherited mibelle-mg Log Analytics Contributor 92aaf0da-9dab-42b6-94a3-d43ce8d16293 Builtin false False Deploy-Diag-Logs n/a 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/9df772a7-1ce7-5439-ab6b-5d31d69925cc /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs (Enable audit category group resource logging for supported resources to Log Analytics) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-mg Landing Zones inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Meier, Heinz-MIBELLEGROUP heinz.meier@mibelle.net 06addc33-6298-4f01-9f6b-709193f099cc User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-mg Landing Zones inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Subs-MibelleOnline-SubscriptionOwner n/a 1bdf326c-8c66-4ba9-8c2d-83312a1ddc02 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-mg Landing Zones inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-Reader n/a 1c529912-c479-41a1-8a03-e57256720fa4 Group direct 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-mg Landing Zones inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser n/a 1f3ede05-4301-42b1-8c95-2be94290e93c Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-mg Landing Zones inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-mg Landing Zones inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-mg Landing Zones inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Hasanow, Kilian-MIBELLEGROUP kilian.hasanow@mibelle.net 4270eb01-73cf-4e17-925e-47461737b40e User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-mg Landing Zones inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-mg Landing Zones inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Mibelle-AzGovWiz-prod n/a 44b03901-55d2-49a8-af3a-58228a81408c SP APP INT indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-mg Landing Zones inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-michael.peter csa-michael.peter@MIBCloud.mail.onmicrosoft.com 460bad8a-cc4d-41dc-9ddd-f24ba491e2a6 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-mg Landing Zones inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-mg Landing Zones inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner n/a 52364002-4a8b-4808-b4fc-864ed5f7d50d Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-mg Landing Zones inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Matej Paunovski CSA-matej.paunovski@MIBCloud.onmicrosoft.com 54f81d33-50db-475c-b686-4ef70aa0b4fe User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-mg Landing Zones inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Ouaouane, Taoufik-MIBELLEGROUP taoufik.ouaouane@mibelle.net 7100d1ce-5bd7-449d-abdd-52a7218922b3 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-mg Landing Zones inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-NetOps n/a 87e9d07b-5340-455c-b297-8bffe3b86f78 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-mg Landing Zones inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner n/a 9b120856-d4b2-4862-95df-bedf8d5fe1c3 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-mg Landing Zones inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-Baswaraj Marotrao Ramshette csa-baswarajmarotrao.ramshette@MIBCloud.onmicrosoft.com 9d8d246b-a1f9-4d9a-a54f-f7ae9f3af2ae User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-mg Landing Zones inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-SecOps n/a abf39027-4cb4-4298-8951-f984eaf9cb8e Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-mg Landing Zones inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Baumann, Jürg-MIBELLEGROUP juerg.baumann_mibellegroup.com#EXT#@MIBCloud.onmicrosoft.com bb2279b2-06ab-459a-b981-579701601f8a User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-mg Landing Zones inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin n/a cb058f58-c629-445f-9a10-75f9fcab694e Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-mg Landing Zones inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-mg Landing Zones inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Philipp.Schmidt CSA-Philipp.Schmidt@MIBCloud.onmicrosoft.com e40a73c8-6655-434d-8c8b-fdc4d9213499 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-mg Landing Zones inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Taoufik.Ouaouane csa-Taoufik.Ouaouane@mibelle.net e58ba28f-09ed-49c3-8f5e-31b05c258cde User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-mg Landing Zones inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Adrian.Bombelka CSA-Adrian.Bombelka@MIBCloud.onmicrosoft.com e86b38a8-e5d4-4888-b09d-390dcf9a2017 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-mg Landing Zones inherited mibelle-mg Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False Enforce-ACSB n/a e1f2e80c-5329-4804-824d-f0b44713985e SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/6e26cd22-b41b-5611-aafc-e2c56b14c060 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/enforce-acsb (Enforce Azure Compute Security Benchmark compliance auditing) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-mg Landing Zones inherited mibelle-mg Security Admin fb1c8493-542b-48eb-b624-b4c8fea62acd Builtin false False Deploy-MDEndpointsAMA n/a 7d365a6d-a7ae-4921-beca-5ce854a76960 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/d730d560-adce-52b7-b10c-36a8ad16a6d3 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-mdendpointsama (Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Ten mibelle-landingzones-mg Landing Zones inherited Tenant User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false True CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member direct False /providers/microsoft.authorization/roleassignments/3f958da1-722a-4c03-8398-aab60735ecd3 none 05/07/2025 18:14:55 ObjectType: User Member, ObjectDisplayName: CSA-Jan.Stutz, ObjectSignInName: CSA-Jan.Stutz@MIBCloud.onmicrosoft.com, ObjectId: 43b3e278-6551-4566-83a8-c19abe643e64
Mg mibelle-landingzones-mg Landing Zones thisScope MG SQL Security Manager 056cd41c-7e88-42e1-933e-88ba6a50c9c3 Builtin false False Deploy-AzSqlDb-Auditing n/a afb169da-f80a-4dd6-abf3-b7fc08efb8ae SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/2f1eab15-c92e-52cd-8b0c-a60e52f1b331 /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deploy-azsqldb-auditing (Configure SQL servers to have auditing enabled to Log Analytics workspace) 06/12/2025 17:56:41 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-mg Landing Zones thisScope MG Log Analytics Contributor 92aaf0da-9dab-42b6-94a3-d43ce8d16293 Builtin false False Deploy-AzSqlDb-Auditing n/a afb169da-f80a-4dd6-abf3-b7fc08efb8ae SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/488f45ec-c535-5f65-85bf-acacd1bb93e8 /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deploy-azsqldb-auditing (Configure SQL servers to have auditing enabled to Log Analytics workspace) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-mg Landing Zones thisScope MG Virtual Machine Contributor 9980e02c-c2be-4d73-94e8-173b1dc7cf3c Builtin false False Enable-AUM-CheckUpdates n/a 4f27b633-c16b-47a6-ab24-737bb6cdad56 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/571da045-f503-5cb2-b123-ede8cfe0f15a /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates (Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines) 06/12/2025 17:56:38 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-mg Landing Zones thisScope MG SQL DB Contributor 9b7fa17d-e63e-47b0-bb0a-15c516ac86ec Builtin false False Deploy-SQL-TDE n/a de5ed213-fd75-471c-8d32-920072d6c378 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/af2f6b24-ac34-5f3b-9249-5a109d9d1528 /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deploy-sql-tde (Deploy SQL DB transparent data encryption) 06/12/2025 17:56:38 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-mg Landing Zones thisScope MG Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False 52a8c671384a4b609f1d7651 n/a 6e0d029a-fce4-400f-bff3-45b8d9a8342e SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/94dfdb33-b864-47c9-831d-366721beb989 /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/52a8c671384a4b609f1d7651 (Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics) 09/04/2025 06:12:52 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-mg Landing Zones thisScope MG Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False e9143c36572348c3ba0c67b1 n/a 9c3b725e-ce85-47ac-bf6f-c2fa0571c259 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/3fb7bac5-2328-4e74-a5b0-0d6d2a631693 /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/e9143c36572348c3ba0c67b1 (Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics) 09/04/2025 07:18:00 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-mg Landing Zones thisScope MG Azure Connected Machine Resource Administrator cd570a14-e51a-42ad-bac8-bafd67325302 Builtin false False Enable-AUM-CheckUpdates n/a 4f27b633-c16b-47a6-ab24-737bb6cdad56 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/7d65b18e-df43-5353-85a4-716e68ff7c7a /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates (Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-mg Landing Zones thisScope MG Managed Identity Operator f1a07417-d97a-45cb-824c-7a7467783830 Builtin false False Enable-AUM-CheckUpdates n/a 4f27b633-c16b-47a6-ab24-737bb6cdad56 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/b2c88903-f3a4-54ec-813c-46d650309b86 /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates (Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
MG mibelle-mg mibelle thisScope MG [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) True Eligible 07/04/2025 22:17:51
MG mibelle-mg mibelle thisScope MG [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) True Eligible 07/04/2025 22:17:51
MG mibelle-mg mibelle thisScope MG [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) True Eligible 07/04/2025 22:17:51
MG mibelle-mg mibelle thisScope MG [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) True Eligible 07/04/2025 22:17:51
MG mibelle-mg mibelle thisScope MG [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False SGU-MIB-RES-Azure-Magr-Mibelle-NetOps 87e9d07b-5340-455c-b297-8bffe3b86f78 Group direct True Eligible 07/04/2025 22:17:51
MG mibelle-mg mibelle thisScope MG [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) True Eligible 07/04/2025 22:17:51
MG mibelle-mg mibelle thisScope MG [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e) True Eligible 07/04/2025 22:17:18
MG mibelle-mg mibelle thisScope MG [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e) True Eligible 07/04/2025 22:17:18
MG mibelle-mg mibelle thisScope MG [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e) True Eligible 07/04/2025 22:17:18
MG mibelle-mg mibelle thisScope MG [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False SGU-MIB-RES-Azure-Magr-Mibelle-SecOps abf39027-4cb4-4298-8951-f984eaf9cb8e Group direct True Eligible 07/04/2025 22:17:18
MG mibelle-mg mibelle thisScope MG Reservation Purchaser f7b75c60-3036-4b75-91c3-6b41c27c1689 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser 1f3ede05-4301-42b1-8c95-2be94290e93c Group direct True Eligible 11/24/2025 07:50:25
MG mibelle-mg mibelle thisScope MG Reservation Purchaser f7b75c60-3036-4b75-91c3-6b41c27c1689 Builtin false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser (1f3ede05-4301-42b1-8c95-2be94290e93c) True Eligible 11/24/2025 07:50:25
MG mibelle-mg mibelle thisScope MG User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) True Eligible 07/04/2025 22:11:28
MG mibelle-mg mibelle thisScope MG User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) True Eligible 07/04/2025 22:11:28
MG mibelle-mg mibelle thisScope MG User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) True Eligible 07/04/2025 22:11:28
MG mibelle-mg mibelle thisScope MG User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin cb058f58-c629-445f-9a10-75f9fcab694e Group direct True Eligible 07/04/2025 22:11:28
MG mibelle-mg mibelle thisScope MG User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) True Eligible 07/04/2025 22:11:28
Mg mibelle-platform-mg Platform inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/e14ef9ac-25e8-4ee7-887a-a6576bd5229d none 11/28/2025 07:57:36 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-mg Platform inherited mibelle-mg Monitoring Contributor 749f88d5-cbae-40b8-bcfc-e573ddc772fa Builtin false False Deploy-AzActivity-Log n/a 217aa040-8eb0-451b-b81c-0b8f3d200d5a SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/dcb59c88-f014-5e17-840c-6c9aecc66286 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log (Configure Azure Activity logs to stream to specified Log Analytics workspace) 06/12/2025 17:56:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-mg Platform inherited mibelle-mg Monitoring Contributor 749f88d5-cbae-40b8-bcfc-e573ddc772fa Builtin false False Deploy-Diag-Logs n/a 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b922046a-7a3e-59da-a982-8a5b855791ce /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs (Enable audit category group resource logging for supported resources to Log Analytics) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-mg Platform inherited mibelle-mg Log Analytics Contributor 92aaf0da-9dab-42b6-94a3-d43ce8d16293 Builtin false False Deploy-AzActivity-Log n/a 217aa040-8eb0-451b-b81c-0b8f3d200d5a SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/82f0c3bf-808b-5863-bf9c-231cfbf9598a /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log (Configure Azure Activity logs to stream to specified Log Analytics workspace) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-mg Platform inherited mibelle-mg Log Analytics Contributor 92aaf0da-9dab-42b6-94a3-d43ce8d16293 Builtin false False Deploy-Diag-Logs n/a 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/9df772a7-1ce7-5439-ab6b-5d31d69925cc /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs (Enable audit category group resource logging for supported resources to Log Analytics) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-mg Platform inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Meier, Heinz-MIBELLEGROUP heinz.meier@mibelle.net 06addc33-6298-4f01-9f6b-709193f099cc User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-mg Platform inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Subs-MibelleOnline-SubscriptionOwner n/a 1bdf326c-8c66-4ba9-8c2d-83312a1ddc02 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-mg Platform inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-Reader n/a 1c529912-c479-41a1-8a03-e57256720fa4 Group direct 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-mg Platform inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser n/a 1f3ede05-4301-42b1-8c95-2be94290e93c Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-mg Platform inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-mg Platform inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-mg Platform inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Hasanow, Kilian-MIBELLEGROUP kilian.hasanow@mibelle.net 4270eb01-73cf-4e17-925e-47461737b40e User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-mg Platform inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-mg Platform inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Mibelle-AzGovWiz-prod n/a 44b03901-55d2-49a8-af3a-58228a81408c SP APP INT indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-mg Platform inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-michael.peter csa-michael.peter@MIBCloud.mail.onmicrosoft.com 460bad8a-cc4d-41dc-9ddd-f24ba491e2a6 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-mg Platform inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-mg Platform inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner n/a 52364002-4a8b-4808-b4fc-864ed5f7d50d Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-mg Platform inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Matej Paunovski CSA-matej.paunovski@MIBCloud.onmicrosoft.com 54f81d33-50db-475c-b686-4ef70aa0b4fe User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-mg Platform inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Ouaouane, Taoufik-MIBELLEGROUP taoufik.ouaouane@mibelle.net 7100d1ce-5bd7-449d-abdd-52a7218922b3 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-mg Platform inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-NetOps n/a 87e9d07b-5340-455c-b297-8bffe3b86f78 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-mg Platform inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner n/a 9b120856-d4b2-4862-95df-bedf8d5fe1c3 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-mg Platform inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-Baswaraj Marotrao Ramshette csa-baswarajmarotrao.ramshette@MIBCloud.onmicrosoft.com 9d8d246b-a1f9-4d9a-a54f-f7ae9f3af2ae User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-mg Platform inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-SecOps n/a abf39027-4cb4-4298-8951-f984eaf9cb8e Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-mg Platform inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Baumann, Jürg-MIBELLEGROUP juerg.baumann_mibellegroup.com#EXT#@MIBCloud.onmicrosoft.com bb2279b2-06ab-459a-b981-579701601f8a User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-mg Platform inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin n/a cb058f58-c629-445f-9a10-75f9fcab694e Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-mg Platform inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-mg Platform inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Philipp.Schmidt CSA-Philipp.Schmidt@MIBCloud.onmicrosoft.com e40a73c8-6655-434d-8c8b-fdc4d9213499 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-mg Platform inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Taoufik.Ouaouane csa-Taoufik.Ouaouane@mibelle.net e58ba28f-09ed-49c3-8f5e-31b05c258cde User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-mg Platform inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Adrian.Bombelka CSA-Adrian.Bombelka@MIBCloud.onmicrosoft.com e86b38a8-e5d4-4888-b09d-390dcf9a2017 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-mg Platform inherited mibelle-mg Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False Enforce-ACSB n/a e1f2e80c-5329-4804-824d-f0b44713985e SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/6e26cd22-b41b-5611-aafc-e2c56b14c060 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/enforce-acsb (Enforce Azure Compute Security Benchmark compliance auditing) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-mg Platform inherited mibelle-mg Security Admin fb1c8493-542b-48eb-b624-b4c8fea62acd Builtin false False Deploy-MDEndpointsAMA n/a 7d365a6d-a7ae-4921-beca-5ce854a76960 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/d730d560-adce-52b7-b10c-36a8ad16a6d3 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-mdendpointsama (Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Ten mibelle-platform-mg Platform inherited Tenant User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false True CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member direct False /providers/microsoft.authorization/roleassignments/3f958da1-722a-4c03-8398-aab60735ecd3 none 05/07/2025 18:14:55 ObjectType: User Member, ObjectDisplayName: CSA-Jan.Stutz, ObjectSignInName: CSA-Jan.Stutz@MIBCloud.onmicrosoft.com, ObjectId: 43b3e278-6551-4566-83a8-c19abe643e64
Mg mibelle-platform-mg Platform thisScope MG Virtual Machine Contributor 9980e02c-c2be-4d73-94e8-173b1dc7cf3c Builtin false False Enable-AUM-CheckUpdates n/a ce67e461-e4a3-4514-89cb-7eb8802f8f65 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/51e23aa4-bdf1-5059-8efc-453852a14d5e /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates (Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines) 06/12/2025 17:56:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-mg Platform thisScope MG Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False d33eb38085bf40bd860fe43b n/a 78dd5b73-2109-4a10-b2e4-6463304b4b4d SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/21c0b216-76ff-44ef-9430-19f801e102d5 /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/d33eb38085bf40bd860fe43b (Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics) 06/12/2025 18:15:25 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-mg Platform thisScope MG Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False 97339ff59e1744678fd92dea n/a c2b8a553-ec19-42b8-8855-6edc985eaffb SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/71689b0c-ca78-4285-9603-49a5497225d8 /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/97339ff59e1744678fd92dea (Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics) 09/04/2025 07:21:46 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-mg Platform thisScope MG Azure Connected Machine Resource Administrator cd570a14-e51a-42ad-bac8-bafd67325302 Builtin false False Enable-AUM-CheckUpdates n/a ce67e461-e4a3-4514-89cb-7eb8802f8f65 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/d72b7c0f-a23a-58ed-8e0a-40f49a5b6ab3 /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates (Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines) 06/12/2025 17:56:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-mg Platform thisScope MG Managed Identity Operator f1a07417-d97a-45cb-824c-7a7467783830 Builtin false False Enable-AUM-CheckUpdates n/a ce67e461-e4a3-4514-89cb-7eb8802f8f65 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/1f97b9d8-3c21-5b8b-9b36-72e77d4a90e0 /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates (Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines) 06/12/2025 17:56:41 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-sandbox-mg Sandbox inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/e14ef9ac-25e8-4ee7-887a-a6576bd5229d none 11/28/2025 07:57:36 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-sandbox-mg Sandbox inherited mibelle-mg Monitoring Contributor 749f88d5-cbae-40b8-bcfc-e573ddc772fa Builtin false False Deploy-AzActivity-Log n/a 217aa040-8eb0-451b-b81c-0b8f3d200d5a SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/dcb59c88-f014-5e17-840c-6c9aecc66286 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log (Configure Azure Activity logs to stream to specified Log Analytics workspace) 06/12/2025 17:56:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-sandbox-mg Sandbox inherited mibelle-mg Monitoring Contributor 749f88d5-cbae-40b8-bcfc-e573ddc772fa Builtin false False Deploy-Diag-Logs n/a 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b922046a-7a3e-59da-a982-8a5b855791ce /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs (Enable audit category group resource logging for supported resources to Log Analytics) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-sandbox-mg Sandbox inherited mibelle-mg Log Analytics Contributor 92aaf0da-9dab-42b6-94a3-d43ce8d16293 Builtin false False Deploy-AzActivity-Log n/a 217aa040-8eb0-451b-b81c-0b8f3d200d5a SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/82f0c3bf-808b-5863-bf9c-231cfbf9598a /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log (Configure Azure Activity logs to stream to specified Log Analytics workspace) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-sandbox-mg Sandbox inherited mibelle-mg Log Analytics Contributor 92aaf0da-9dab-42b6-94a3-d43ce8d16293 Builtin false False Deploy-Diag-Logs n/a 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/9df772a7-1ce7-5439-ab6b-5d31d69925cc /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs (Enable audit category group resource logging for supported resources to Log Analytics) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-sandbox-mg Sandbox inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Meier, Heinz-MIBELLEGROUP heinz.meier@mibelle.net 06addc33-6298-4f01-9f6b-709193f099cc User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-sandbox-mg Sandbox inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Subs-MibelleOnline-SubscriptionOwner n/a 1bdf326c-8c66-4ba9-8c2d-83312a1ddc02 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-sandbox-mg Sandbox inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-Reader n/a 1c529912-c479-41a1-8a03-e57256720fa4 Group direct 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-sandbox-mg Sandbox inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser n/a 1f3ede05-4301-42b1-8c95-2be94290e93c Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-sandbox-mg Sandbox inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-sandbox-mg Sandbox inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-sandbox-mg Sandbox inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Hasanow, Kilian-MIBELLEGROUP kilian.hasanow@mibelle.net 4270eb01-73cf-4e17-925e-47461737b40e User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-sandbox-mg Sandbox inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-sandbox-mg Sandbox inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Mibelle-AzGovWiz-prod n/a 44b03901-55d2-49a8-af3a-58228a81408c SP APP INT indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-sandbox-mg Sandbox inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-michael.peter csa-michael.peter@MIBCloud.mail.onmicrosoft.com 460bad8a-cc4d-41dc-9ddd-f24ba491e2a6 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-sandbox-mg Sandbox inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-sandbox-mg Sandbox inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner n/a 52364002-4a8b-4808-b4fc-864ed5f7d50d Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-sandbox-mg Sandbox inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Matej Paunovski CSA-matej.paunovski@MIBCloud.onmicrosoft.com 54f81d33-50db-475c-b686-4ef70aa0b4fe User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-sandbox-mg Sandbox inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Ouaouane, Taoufik-MIBELLEGROUP taoufik.ouaouane@mibelle.net 7100d1ce-5bd7-449d-abdd-52a7218922b3 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-sandbox-mg Sandbox inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-NetOps n/a 87e9d07b-5340-455c-b297-8bffe3b86f78 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-sandbox-mg Sandbox inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner n/a 9b120856-d4b2-4862-95df-bedf8d5fe1c3 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-sandbox-mg Sandbox inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-Baswaraj Marotrao Ramshette csa-baswarajmarotrao.ramshette@MIBCloud.onmicrosoft.com 9d8d246b-a1f9-4d9a-a54f-f7ae9f3af2ae User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-sandbox-mg Sandbox inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-SecOps n/a abf39027-4cb4-4298-8951-f984eaf9cb8e Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-sandbox-mg Sandbox inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Baumann, Jürg-MIBELLEGROUP juerg.baumann_mibellegroup.com#EXT#@MIBCloud.onmicrosoft.com bb2279b2-06ab-459a-b981-579701601f8a User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-sandbox-mg Sandbox inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin n/a cb058f58-c629-445f-9a10-75f9fcab694e Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-sandbox-mg Sandbox inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-sandbox-mg Sandbox inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Philipp.Schmidt CSA-Philipp.Schmidt@MIBCloud.onmicrosoft.com e40a73c8-6655-434d-8c8b-fdc4d9213499 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-sandbox-mg Sandbox inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Taoufik.Ouaouane csa-Taoufik.Ouaouane@mibelle.net e58ba28f-09ed-49c3-8f5e-31b05c258cde User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-sandbox-mg Sandbox inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Adrian.Bombelka CSA-Adrian.Bombelka@MIBCloud.onmicrosoft.com e86b38a8-e5d4-4888-b09d-390dcf9a2017 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-sandbox-mg Sandbox inherited mibelle-mg Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False Enforce-ACSB n/a e1f2e80c-5329-4804-824d-f0b44713985e SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/6e26cd22-b41b-5611-aafc-e2c56b14c060 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/enforce-acsb (Enforce Azure Compute Security Benchmark compliance auditing) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-sandbox-mg Sandbox inherited mibelle-mg Security Admin fb1c8493-542b-48eb-b624-b4c8fea62acd Builtin false False Deploy-MDEndpointsAMA n/a 7d365a6d-a7ae-4921-beca-5ce854a76960 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/d730d560-adce-52b7-b10c-36a8ad16a6d3 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-mdendpointsama (Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Ten mibelle-sandbox-mg Sandbox inherited Tenant User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false True CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member direct False /providers/microsoft.authorization/roleassignments/3f958da1-722a-4c03-8398-aab60735ecd3 none 05/07/2025 18:14:55 ObjectType: User Member, ObjectDisplayName: CSA-Jan.Stutz, ObjectSignInName: CSA-Jan.Stutz@MIBCloud.onmicrosoft.com, ObjectId: 43b3e278-6551-4566-83a8-c19abe643e64
Mg mibelle-platform-connectivity-mg Connectivity inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/e14ef9ac-25e8-4ee7-887a-a6576bd5229d none 11/28/2025 07:57:36 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-connectivity-mg Connectivity inherited mibelle-mg Monitoring Contributor 749f88d5-cbae-40b8-bcfc-e573ddc772fa Builtin false False Deploy-AzActivity-Log n/a 217aa040-8eb0-451b-b81c-0b8f3d200d5a SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/dcb59c88-f014-5e17-840c-6c9aecc66286 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log (Configure Azure Activity logs to stream to specified Log Analytics workspace) 06/12/2025 17:56:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-connectivity-mg Connectivity inherited mibelle-mg Monitoring Contributor 749f88d5-cbae-40b8-bcfc-e573ddc772fa Builtin false False Deploy-Diag-Logs n/a 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b922046a-7a3e-59da-a982-8a5b855791ce /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs (Enable audit category group resource logging for supported resources to Log Analytics) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-connectivity-mg Connectivity inherited mibelle-mg Log Analytics Contributor 92aaf0da-9dab-42b6-94a3-d43ce8d16293 Builtin false False Deploy-AzActivity-Log n/a 217aa040-8eb0-451b-b81c-0b8f3d200d5a SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/82f0c3bf-808b-5863-bf9c-231cfbf9598a /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log (Configure Azure Activity logs to stream to specified Log Analytics workspace) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-connectivity-mg Connectivity inherited mibelle-mg Log Analytics Contributor 92aaf0da-9dab-42b6-94a3-d43ce8d16293 Builtin false False Deploy-Diag-Logs n/a 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/9df772a7-1ce7-5439-ab6b-5d31d69925cc /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs (Enable audit category group resource logging for supported resources to Log Analytics) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-connectivity-mg Connectivity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Meier, Heinz-MIBELLEGROUP heinz.meier@mibelle.net 06addc33-6298-4f01-9f6b-709193f099cc User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-connectivity-mg Connectivity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Subs-MibelleOnline-SubscriptionOwner n/a 1bdf326c-8c66-4ba9-8c2d-83312a1ddc02 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-connectivity-mg Connectivity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-Reader n/a 1c529912-c479-41a1-8a03-e57256720fa4 Group direct 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-connectivity-mg Connectivity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser n/a 1f3ede05-4301-42b1-8c95-2be94290e93c Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-connectivity-mg Connectivity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-connectivity-mg Connectivity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-connectivity-mg Connectivity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Hasanow, Kilian-MIBELLEGROUP kilian.hasanow@mibelle.net 4270eb01-73cf-4e17-925e-47461737b40e User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-connectivity-mg Connectivity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-connectivity-mg Connectivity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Mibelle-AzGovWiz-prod n/a 44b03901-55d2-49a8-af3a-58228a81408c SP APP INT indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-connectivity-mg Connectivity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-michael.peter csa-michael.peter@MIBCloud.mail.onmicrosoft.com 460bad8a-cc4d-41dc-9ddd-f24ba491e2a6 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-connectivity-mg Connectivity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-connectivity-mg Connectivity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner n/a 52364002-4a8b-4808-b4fc-864ed5f7d50d Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-connectivity-mg Connectivity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Matej Paunovski CSA-matej.paunovski@MIBCloud.onmicrosoft.com 54f81d33-50db-475c-b686-4ef70aa0b4fe User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-connectivity-mg Connectivity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Ouaouane, Taoufik-MIBELLEGROUP taoufik.ouaouane@mibelle.net 7100d1ce-5bd7-449d-abdd-52a7218922b3 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-connectivity-mg Connectivity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-NetOps n/a 87e9d07b-5340-455c-b297-8bffe3b86f78 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-connectivity-mg Connectivity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner n/a 9b120856-d4b2-4862-95df-bedf8d5fe1c3 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-connectivity-mg Connectivity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-Baswaraj Marotrao Ramshette csa-baswarajmarotrao.ramshette@MIBCloud.onmicrosoft.com 9d8d246b-a1f9-4d9a-a54f-f7ae9f3af2ae User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-connectivity-mg Connectivity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-SecOps n/a abf39027-4cb4-4298-8951-f984eaf9cb8e Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-connectivity-mg Connectivity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Baumann, Jürg-MIBELLEGROUP juerg.baumann_mibellegroup.com#EXT#@MIBCloud.onmicrosoft.com bb2279b2-06ab-459a-b981-579701601f8a User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-connectivity-mg Connectivity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin n/a cb058f58-c629-445f-9a10-75f9fcab694e Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-connectivity-mg Connectivity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-connectivity-mg Connectivity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Philipp.Schmidt CSA-Philipp.Schmidt@MIBCloud.onmicrosoft.com e40a73c8-6655-434d-8c8b-fdc4d9213499 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-connectivity-mg Connectivity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Taoufik.Ouaouane csa-Taoufik.Ouaouane@mibelle.net e58ba28f-09ed-49c3-8f5e-31b05c258cde User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-connectivity-mg Connectivity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Adrian.Bombelka CSA-Adrian.Bombelka@MIBCloud.onmicrosoft.com e86b38a8-e5d4-4888-b09d-390dcf9a2017 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-connectivity-mg Connectivity inherited mibelle-mg Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False Enforce-ACSB n/a e1f2e80c-5329-4804-824d-f0b44713985e SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/6e26cd22-b41b-5611-aafc-e2c56b14c060 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/enforce-acsb (Enforce Azure Compute Security Benchmark compliance auditing) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-connectivity-mg Connectivity inherited mibelle-mg Security Admin fb1c8493-542b-48eb-b624-b4c8fea62acd Builtin false False Deploy-MDEndpointsAMA n/a 7d365a6d-a7ae-4921-beca-5ce854a76960 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/d730d560-adce-52b7-b10c-36a8ad16a6d3 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-mdendpointsama (Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-connectivity-mg Connectivity inherited mibelle-platform-mg Virtual Machine Contributor 9980e02c-c2be-4d73-94e8-173b1dc7cf3c Builtin false False Enable-AUM-CheckUpdates n/a ce67e461-e4a3-4514-89cb-7eb8802f8f65 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/51e23aa4-bdf1-5059-8efc-453852a14d5e /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates (Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines) 06/12/2025 17:56:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-connectivity-mg Connectivity inherited mibelle-platform-mg Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False d33eb38085bf40bd860fe43b n/a 78dd5b73-2109-4a10-b2e4-6463304b4b4d SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/21c0b216-76ff-44ef-9430-19f801e102d5 /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/d33eb38085bf40bd860fe43b (Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics) 06/12/2025 18:15:25 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-connectivity-mg Connectivity inherited mibelle-platform-mg Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False 97339ff59e1744678fd92dea n/a c2b8a553-ec19-42b8-8855-6edc985eaffb SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/71689b0c-ca78-4285-9603-49a5497225d8 /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/97339ff59e1744678fd92dea (Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics) 09/04/2025 07:21:46 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-connectivity-mg Connectivity inherited mibelle-platform-mg Azure Connected Machine Resource Administrator cd570a14-e51a-42ad-bac8-bafd67325302 Builtin false False Enable-AUM-CheckUpdates n/a ce67e461-e4a3-4514-89cb-7eb8802f8f65 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/d72b7c0f-a23a-58ed-8e0a-40f49a5b6ab3 /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates (Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines) 06/12/2025 17:56:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-connectivity-mg Connectivity inherited mibelle-platform-mg Managed Identity Operator f1a07417-d97a-45cb-824c-7a7467783830 Builtin false False Enable-AUM-CheckUpdates n/a ce67e461-e4a3-4514-89cb-7eb8802f8f65 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/1f97b9d8-3c21-5b8b-9b36-72e77d4a90e0 /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates (Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines) 06/12/2025 17:56:41 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Ten mibelle-platform-connectivity-mg Connectivity inherited Tenant User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false True CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member direct False /providers/microsoft.authorization/roleassignments/3f958da1-722a-4c03-8398-aab60735ecd3 none 05/07/2025 18:14:55 ObjectType: User Member, ObjectDisplayName: CSA-Jan.Stutz, ObjectSignInName: CSA-Jan.Stutz@MIBCloud.onmicrosoft.com, ObjectId: 43b3e278-6551-4566-83a8-c19abe643e64
Sub mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) True Eligible 07/04/2025 22:17:51
Mg mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/e14ef9ac-25e8-4ee7-887a-a6576bd5229d none 11/28/2025 07:57:36 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Sub mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) True Eligible 07/04/2025 22:17:51
Sub mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) True Eligible 07/04/2025 22:17:51
Sub mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) True Eligible 07/04/2025 22:17:51
Sub mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False SGU-MIB-RES-Azure-Magr-Mibelle-NetOps 87e9d07b-5340-455c-b297-8bffe3b86f78 Group direct True Eligible 07/04/2025 22:17:51
Sub mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) True Eligible 07/04/2025 22:17:51
Sub mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-mg [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e) True Eligible 07/04/2025 22:17:18
Sub mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-mg [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e) True Eligible 07/04/2025 22:17:18
Sub mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-mg [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e) True Eligible 07/04/2025 22:17:18
Sub mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-mg [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False SGU-MIB-RES-Azure-Magr-Mibelle-SecOps abf39027-4cb4-4298-8951-f984eaf9cb8e Group direct True Eligible 07/04/2025 22:17:18
Mg mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-mg Monitoring Contributor 749f88d5-cbae-40b8-bcfc-e573ddc772fa Builtin false False Deploy-AzActivity-Log n/a 217aa040-8eb0-451b-b81c-0b8f3d200d5a SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/dcb59c88-f014-5e17-840c-6c9aecc66286 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log (Configure Azure Activity logs to stream to specified Log Analytics workspace) 06/12/2025 17:56:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-mg Monitoring Contributor 749f88d5-cbae-40b8-bcfc-e573ddc772fa Builtin false False Deploy-Diag-Logs n/a 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b922046a-7a3e-59da-a982-8a5b855791ce /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs (Enable audit category group resource logging for supported resources to Log Analytics) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-mg Log Analytics Contributor 92aaf0da-9dab-42b6-94a3-d43ce8d16293 Builtin false False Deploy-AzActivity-Log n/a 217aa040-8eb0-451b-b81c-0b8f3d200d5a SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/82f0c3bf-808b-5863-bf9c-231cfbf9598a /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log (Configure Azure Activity logs to stream to specified Log Analytics workspace) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-mg Log Analytics Contributor 92aaf0da-9dab-42b6-94a3-d43ce8d16293 Builtin false False Deploy-Diag-Logs n/a 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/9df772a7-1ce7-5439-ab6b-5d31d69925cc /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs (Enable audit category group resource logging for supported resources to Log Analytics) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Meier, Heinz-MIBELLEGROUP heinz.meier@mibelle.net 06addc33-6298-4f01-9f6b-709193f099cc User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Subs-MibelleOnline-SubscriptionOwner n/a 1bdf326c-8c66-4ba9-8c2d-83312a1ddc02 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-Reader n/a 1c529912-c479-41a1-8a03-e57256720fa4 Group direct 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser n/a 1f3ede05-4301-42b1-8c95-2be94290e93c Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Hasanow, Kilian-MIBELLEGROUP kilian.hasanow@mibelle.net 4270eb01-73cf-4e17-925e-47461737b40e User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Mibelle-AzGovWiz-prod n/a 44b03901-55d2-49a8-af3a-58228a81408c SP APP INT indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-michael.peter csa-michael.peter@MIBCloud.mail.onmicrosoft.com 460bad8a-cc4d-41dc-9ddd-f24ba491e2a6 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner n/a 52364002-4a8b-4808-b4fc-864ed5f7d50d Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Matej Paunovski CSA-matej.paunovski@MIBCloud.onmicrosoft.com 54f81d33-50db-475c-b686-4ef70aa0b4fe User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Ouaouane, Taoufik-MIBELLEGROUP taoufik.ouaouane@mibelle.net 7100d1ce-5bd7-449d-abdd-52a7218922b3 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-NetOps n/a 87e9d07b-5340-455c-b297-8bffe3b86f78 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner n/a 9b120856-d4b2-4862-95df-bedf8d5fe1c3 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-Baswaraj Marotrao Ramshette csa-baswarajmarotrao.ramshette@MIBCloud.onmicrosoft.com 9d8d246b-a1f9-4d9a-a54f-f7ae9f3af2ae User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-SecOps n/a abf39027-4cb4-4298-8951-f984eaf9cb8e Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Baumann, Jürg-MIBELLEGROUP juerg.baumann_mibellegroup.com#EXT#@MIBCloud.onmicrosoft.com bb2279b2-06ab-459a-b981-579701601f8a User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin n/a cb058f58-c629-445f-9a10-75f9fcab694e Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Philipp.Schmidt CSA-Philipp.Schmidt@MIBCloud.onmicrosoft.com e40a73c8-6655-434d-8c8b-fdc4d9213499 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Taoufik.Ouaouane csa-Taoufik.Ouaouane@mibelle.net e58ba28f-09ed-49c3-8f5e-31b05c258cde User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Adrian.Bombelka CSA-Adrian.Bombelka@MIBCloud.onmicrosoft.com e86b38a8-e5d4-4888-b09d-390dcf9a2017 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-mg Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False Enforce-ACSB n/a e1f2e80c-5329-4804-824d-f0b44713985e SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/6e26cd22-b41b-5611-aafc-e2c56b14c060 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/enforce-acsb (Enforce Azure Compute Security Benchmark compliance auditing) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-mg Security Admin fb1c8493-542b-48eb-b624-b4c8fea62acd Builtin false False Deploy-MDEndpointsAMA n/a 7d365a6d-a7ae-4921-beca-5ce854a76960 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/d730d560-adce-52b7-b10c-36a8ad16a6d3 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-mdendpointsama (Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-mg Reservation Purchaser f7b75c60-3036-4b75-91c3-6b41c27c1689 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser 1f3ede05-4301-42b1-8c95-2be94290e93c Group direct True Eligible 11/24/2025 07:50:25
Sub mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-mg Reservation Purchaser f7b75c60-3036-4b75-91c3-6b41c27c1689 Builtin false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser (1f3ede05-4301-42b1-8c95-2be94290e93c) True Eligible 11/24/2025 07:50:25
Sub mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) True Eligible 07/04/2025 22:11:28
Sub mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) True Eligible 07/04/2025 22:11:28
Sub mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) True Eligible 07/04/2025 22:11:28
Sub mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin cb058f58-c629-445f-9a10-75f9fcab694e Group direct True Eligible 07/04/2025 22:11:28
Sub mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) True Eligible 07/04/2025 22:11:28
Sub mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-platform-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3) True Eligible 07/04/2025 22:47:30
Sub mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-platform-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3) True Eligible 07/04/2025 22:47:30
Sub mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-platform-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3) True Eligible 07/04/2025 22:47:30
Sub mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-platform-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3) True Eligible 07/04/2025 22:47:30
Sub mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-platform-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner 9b120856-d4b2-4862-95df-bedf8d5fe1c3 Group direct True Eligible 07/04/2025 22:47:30
Sub mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-platform-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3) True Eligible 07/04/2025 22:47:30
Sub mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-platform-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False CSA-Philipp.Schmidt CSA-Philipp.Schmidt@MIBCloud.onmicrosoft.com e40a73c8-6655-434d-8c8b-fdc4d9213499 User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3) True Eligible 07/04/2025 22:47:30
Mg mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-platform-mg Virtual Machine Contributor 9980e02c-c2be-4d73-94e8-173b1dc7cf3c Builtin false False Enable-AUM-CheckUpdates n/a ce67e461-e4a3-4514-89cb-7eb8802f8f65 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/51e23aa4-bdf1-5059-8efc-453852a14d5e /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates (Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines) 06/12/2025 17:56:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-platform-mg Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False d33eb38085bf40bd860fe43b n/a 78dd5b73-2109-4a10-b2e4-6463304b4b4d SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/21c0b216-76ff-44ef-9430-19f801e102d5 /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/d33eb38085bf40bd860fe43b (Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics) 06/12/2025 18:15:25 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-platform-mg Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False 97339ff59e1744678fd92dea n/a c2b8a553-ec19-42b8-8855-6edc985eaffb SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/71689b0c-ca78-4285-9603-49a5497225d8 /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/97339ff59e1744678fd92dea (Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics) 09/04/2025 07:21:46 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-platform-mg Azure Connected Machine Resource Administrator cd570a14-e51a-42ad-bac8-bafd67325302 Builtin false False Enable-AUM-CheckUpdates n/a ce67e461-e4a3-4514-89cb-7eb8802f8f65 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/d72b7c0f-a23a-58ed-8e0a-40f49a5b6ab3 /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates (Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines) 06/12/2025 17:56:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited mibelle-platform-mg Managed Identity Operator f1a07417-d97a-45cb-824c-7a7467783830 Builtin false False Enable-AUM-CheckUpdates n/a ce67e461-e4a3-4514-89cb-7eb8802f8f65 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/1f97b9d8-3c21-5b8b-9b36-72e77d4a90e0 /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates (Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines) 06/12/2025 17:56:41 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Ten mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity inherited Tenant User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false True CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member direct False /providers/microsoft.authorization/roleassignments/3f958da1-722a-4c03-8398-aab60735ecd3 none 05/07/2025 18:14:55 ObjectType: User Member, ObjectDisplayName: CSA-Jan.Stutz, ObjectSignInName: CSA-Jan.Stutz@MIBCloud.onmicrosoft.com, ObjectId: 43b3e278-6551-4566-83a8-c19abe643e64
Sub mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity thisScope Sub Key Vault Administrator 00482a5a-887f-4fb3-b363-3b7fe8e74483 Builtin true False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) 5 (Usr: 5, Grp: 0, SP: 0) False /subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/providers/microsoft.authorization/roleassignments/19b7e58d-a161-4789-b4e5-93a04958dba5 none 09/12/2025 09:03:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity thisScope Sub Key Vault Administrator 00482a5a-887f-4fb3-b363-3b7fe8e74483 Builtin true False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) 5 (Usr: 5, Grp: 0, SP: 0) False /subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/providers/microsoft.authorization/roleassignments/19b7e58d-a161-4789-b4e5-93a04958dba5 none 09/12/2025 09:03:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity thisScope Sub Key Vault Administrator 00482a5a-887f-4fb3-b363-3b7fe8e74483 Builtin true False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) 5 (Usr: 5, Grp: 0, SP: 0) False /subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/providers/microsoft.authorization/roleassignments/19b7e58d-a161-4789-b4e5-93a04958dba5 none 09/12/2025 09:03:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity thisScope Sub Key Vault Administrator 00482a5a-887f-4fb3-b363-3b7fe8e74483 Builtin true False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) 5 (Usr: 5, Grp: 0, SP: 0) False /subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/providers/microsoft.authorization/roleassignments/19b7e58d-a161-4789-b4e5-93a04958dba5 none 09/12/2025 09:03:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity thisScope Sub Key Vault Administrator 00482a5a-887f-4fb3-b363-3b7fe8e74483 Builtin true False SGU-MIB-RES-Azure-Magr-Mibelle-NetOps n/a 87e9d07b-5340-455c-b297-8bffe3b86f78 Group direct 5 (Usr: 5, Grp: 0, SP: 0) False /subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/providers/microsoft.authorization/roleassignments/19b7e58d-a161-4789-b4e5-93a04958dba5 none 09/12/2025 09:03:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity thisScope Sub Key Vault Administrator 00482a5a-887f-4fb3-b363-3b7fe8e74483 Builtin true False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) 5 (Usr: 5, Grp: 0, SP: 0) False /subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/providers/microsoft.authorization/roleassignments/19b7e58d-a161-4789-b4e5-93a04958dba5 none 09/12/2025 09:03:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity thisScope Sub Owner 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 Builtin false True CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member direct False /subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/providers/microsoft.authorization/roleassignments/b68e29a8-1e6b-442d-95c4-f32bfa641802 none 06/10/2025 07:26:55 IsNullOrEmpty
Sub mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity thisScope Sub v1-custom-role-edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 3129e445-9330-52ad-1e78-065ce5aa09d0 Custom true False v1-app-registration-edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 n/a bc9b95df-82ea-486e-a096-0142aabe35aa SP APP INT direct False /subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/providers/microsoft.authorization/roleassignments/377a1d79-25e2-a3fd-6f09-8c9e63efe3c4 none 10/16/2025 06:52:29 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
RG mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity thisScope Sub RG DNS Zone Contributor befefa01-2a29-4197-83a8-272ff33ce314 Builtin false False Mibelle-DNSMigration-prod n/a da11eb0f-75f8-40f7-9b4e-0ed2cd8924bb SP APP INT direct False /subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourcegroups/mibelle-hub-net-dns-prod-rg/providers/microsoft.authorization/roleassignments/ad639b90-0c1c-4dd4-b702-8a28ee11052b none 11/24/2025 08:59:51 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Res mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity thisScope Sub RG Res Storage Blob Data Reader 2a2b9908-6ea1-4ae2-8e65-a410df84e7d1 Builtin true False pirmin Felber (Test User SAP delegation) pirmin.felber-testuser@MIBCloud.onmicrosoft.com edf1afba-e97d-4011-9ebe-4b8d3013a408 User Member direct False /subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourcegroups/mibelle-hub-net-testvm-dev-rg/providers/microsoft.storage/storageaccounts/mibhubnetdst01/blobservices/default/containers/test/providers/microsoft.authorization/roleassignments/af31cd96-71e8-4d82-a564-3ad42d53b49f none 10/04/2025 18:24:18 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Res mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity thisScope Sub RG Res Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False pirmin Felber (Test User SAP delegation) pirmin.felber-testuser@MIBCloud.onmicrosoft.com edf1afba-e97d-4011-9ebe-4b8d3013a408 User Member direct False /subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourcegroups/mibelle-hub-net-testvm-dev-rg/providers/microsoft.storage/storageaccounts/mibhubnetdst01/providers/microsoft.authorization/roleassignments/8bafdb8e-6392-4374-a491-0fa380edaa11 none 10/04/2025 18:16:34 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Res mibelle-platform-connectivity-mg Connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity thisScope Sub RG Res Storage Blob Delegator db58b8e5-c6ad-4a2a-8342-4190687cbf4a Builtin false False pirmin Felber (Test User SAP delegation) pirmin.felber-testuser@MIBCloud.onmicrosoft.com edf1afba-e97d-4011-9ebe-4b8d3013a408 User Member direct False /subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourcegroups/mibelle-hub-net-testvm-dev-rg/providers/microsoft.storage/storageaccounts/mibhubnetdst01/providers/microsoft.authorization/roleassignments/2da98051-892b-46fa-ac3a-c3d9fe37e377 none 10/02/2025 09:30:02 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-corp-mg Corp inherited mibelle-landingzones-mg SQL Security Manager 056cd41c-7e88-42e1-933e-88ba6a50c9c3 Builtin false False Deploy-AzSqlDb-Auditing n/a afb169da-f80a-4dd6-abf3-b7fc08efb8ae SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/2f1eab15-c92e-52cd-8b0c-a60e52f1b331 /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deploy-azsqldb-auditing (Configure SQL servers to have auditing enabled to Log Analytics workspace) 06/12/2025 17:56:41 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-corp-mg Corp inherited mibelle-landingzones-mg Log Analytics Contributor 92aaf0da-9dab-42b6-94a3-d43ce8d16293 Builtin false False Deploy-AzSqlDb-Auditing n/a afb169da-f80a-4dd6-abf3-b7fc08efb8ae SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/488f45ec-c535-5f65-85bf-acacd1bb93e8 /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deploy-azsqldb-auditing (Configure SQL servers to have auditing enabled to Log Analytics workspace) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-corp-mg Corp inherited mibelle-landingzones-mg Virtual Machine Contributor 9980e02c-c2be-4d73-94e8-173b1dc7cf3c Builtin false False Enable-AUM-CheckUpdates n/a 4f27b633-c16b-47a6-ab24-737bb6cdad56 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/571da045-f503-5cb2-b123-ede8cfe0f15a /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates (Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines) 06/12/2025 17:56:38 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-corp-mg Corp inherited mibelle-landingzones-mg SQL DB Contributor 9b7fa17d-e63e-47b0-bb0a-15c516ac86ec Builtin false False Deploy-SQL-TDE n/a de5ed213-fd75-471c-8d32-920072d6c378 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/af2f6b24-ac34-5f3b-9249-5a109d9d1528 /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deploy-sql-tde (Deploy SQL DB transparent data encryption) 06/12/2025 17:56:38 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-corp-mg Corp inherited mibelle-landingzones-mg Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False 52a8c671384a4b609f1d7651 n/a 6e0d029a-fce4-400f-bff3-45b8d9a8342e SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/94dfdb33-b864-47c9-831d-366721beb989 /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/52a8c671384a4b609f1d7651 (Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics) 09/04/2025 06:12:52 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-corp-mg Corp inherited mibelle-landingzones-mg Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False e9143c36572348c3ba0c67b1 n/a 9c3b725e-ce85-47ac-bf6f-c2fa0571c259 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/3fb7bac5-2328-4e74-a5b0-0d6d2a631693 /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/e9143c36572348c3ba0c67b1 (Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics) 09/04/2025 07:18:00 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-corp-mg Corp inherited mibelle-landingzones-mg Azure Connected Machine Resource Administrator cd570a14-e51a-42ad-bac8-bafd67325302 Builtin false False Enable-AUM-CheckUpdates n/a 4f27b633-c16b-47a6-ab24-737bb6cdad56 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/7d65b18e-df43-5353-85a4-716e68ff7c7a /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates (Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-corp-mg Corp inherited mibelle-landingzones-mg Managed Identity Operator f1a07417-d97a-45cb-824c-7a7467783830 Builtin false False Enable-AUM-CheckUpdates n/a 4f27b633-c16b-47a6-ab24-737bb6cdad56 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/b2c88903-f3a4-54ec-813c-46d650309b86 /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates (Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-corp-mg Corp inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/e14ef9ac-25e8-4ee7-887a-a6576bd5229d none 11/28/2025 07:57:36 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-corp-mg Corp inherited mibelle-mg Monitoring Contributor 749f88d5-cbae-40b8-bcfc-e573ddc772fa Builtin false False Deploy-AzActivity-Log n/a 217aa040-8eb0-451b-b81c-0b8f3d200d5a SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/dcb59c88-f014-5e17-840c-6c9aecc66286 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log (Configure Azure Activity logs to stream to specified Log Analytics workspace) 06/12/2025 17:56:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-corp-mg Corp inherited mibelle-mg Monitoring Contributor 749f88d5-cbae-40b8-bcfc-e573ddc772fa Builtin false False Deploy-Diag-Logs n/a 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b922046a-7a3e-59da-a982-8a5b855791ce /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs (Enable audit category group resource logging for supported resources to Log Analytics) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-corp-mg Corp inherited mibelle-mg Log Analytics Contributor 92aaf0da-9dab-42b6-94a3-d43ce8d16293 Builtin false False Deploy-AzActivity-Log n/a 217aa040-8eb0-451b-b81c-0b8f3d200d5a SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/82f0c3bf-808b-5863-bf9c-231cfbf9598a /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log (Configure Azure Activity logs to stream to specified Log Analytics workspace) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-corp-mg Corp inherited mibelle-mg Log Analytics Contributor 92aaf0da-9dab-42b6-94a3-d43ce8d16293 Builtin false False Deploy-Diag-Logs n/a 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/9df772a7-1ce7-5439-ab6b-5d31d69925cc /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs (Enable audit category group resource logging for supported resources to Log Analytics) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-corp-mg Corp inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Meier, Heinz-MIBELLEGROUP heinz.meier@mibelle.net 06addc33-6298-4f01-9f6b-709193f099cc User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-corp-mg Corp inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Subs-MibelleOnline-SubscriptionOwner n/a 1bdf326c-8c66-4ba9-8c2d-83312a1ddc02 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-corp-mg Corp inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-Reader n/a 1c529912-c479-41a1-8a03-e57256720fa4 Group direct 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-corp-mg Corp inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser n/a 1f3ede05-4301-42b1-8c95-2be94290e93c Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-corp-mg Corp inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-corp-mg Corp inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-corp-mg Corp inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Hasanow, Kilian-MIBELLEGROUP kilian.hasanow@mibelle.net 4270eb01-73cf-4e17-925e-47461737b40e User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-corp-mg Corp inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-corp-mg Corp inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Mibelle-AzGovWiz-prod n/a 44b03901-55d2-49a8-af3a-58228a81408c SP APP INT indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-corp-mg Corp inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-michael.peter csa-michael.peter@MIBCloud.mail.onmicrosoft.com 460bad8a-cc4d-41dc-9ddd-f24ba491e2a6 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-corp-mg Corp inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-corp-mg Corp inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner n/a 52364002-4a8b-4808-b4fc-864ed5f7d50d Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-corp-mg Corp inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Matej Paunovski CSA-matej.paunovski@MIBCloud.onmicrosoft.com 54f81d33-50db-475c-b686-4ef70aa0b4fe User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-corp-mg Corp inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Ouaouane, Taoufik-MIBELLEGROUP taoufik.ouaouane@mibelle.net 7100d1ce-5bd7-449d-abdd-52a7218922b3 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-corp-mg Corp inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-NetOps n/a 87e9d07b-5340-455c-b297-8bffe3b86f78 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-corp-mg Corp inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner n/a 9b120856-d4b2-4862-95df-bedf8d5fe1c3 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-corp-mg Corp inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-Baswaraj Marotrao Ramshette csa-baswarajmarotrao.ramshette@MIBCloud.onmicrosoft.com 9d8d246b-a1f9-4d9a-a54f-f7ae9f3af2ae User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-corp-mg Corp inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-SecOps n/a abf39027-4cb4-4298-8951-f984eaf9cb8e Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-corp-mg Corp inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Baumann, Jürg-MIBELLEGROUP juerg.baumann_mibellegroup.com#EXT#@MIBCloud.onmicrosoft.com bb2279b2-06ab-459a-b981-579701601f8a User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-corp-mg Corp inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin n/a cb058f58-c629-445f-9a10-75f9fcab694e Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-corp-mg Corp inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-corp-mg Corp inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Philipp.Schmidt CSA-Philipp.Schmidt@MIBCloud.onmicrosoft.com e40a73c8-6655-434d-8c8b-fdc4d9213499 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-corp-mg Corp inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Taoufik.Ouaouane csa-Taoufik.Ouaouane@mibelle.net e58ba28f-09ed-49c3-8f5e-31b05c258cde User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-corp-mg Corp inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Adrian.Bombelka CSA-Adrian.Bombelka@MIBCloud.onmicrosoft.com e86b38a8-e5d4-4888-b09d-390dcf9a2017 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-corp-mg Corp inherited mibelle-mg Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False Enforce-ACSB n/a e1f2e80c-5329-4804-824d-f0b44713985e SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/6e26cd22-b41b-5611-aafc-e2c56b14c060 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/enforce-acsb (Enforce Azure Compute Security Benchmark compliance auditing) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-corp-mg Corp inherited mibelle-mg Security Admin fb1c8493-542b-48eb-b624-b4c8fea62acd Builtin false False Deploy-MDEndpointsAMA n/a 7d365a6d-a7ae-4921-beca-5ce854a76960 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/d730d560-adce-52b7-b10c-36a8ad16a6d3 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-mdendpointsama (Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Ten mibelle-landingzones-corp-mg Corp inherited Tenant User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false True CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member direct False /providers/microsoft.authorization/roleassignments/3f958da1-722a-4c03-8398-aab60735ecd3 none 05/07/2025 18:14:55 ObjectType: User Member, ObjectDisplayName: CSA-Jan.Stutz, ObjectSignInName: CSA-Jan.Stutz@MIBCloud.onmicrosoft.com, ObjectId: 43b3e278-6551-4566-83a8-c19abe643e64
Mg mibelle-landingzones-corp-mg Corp d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation inherited mibelle-landingzones-mg SQL Security Manager 056cd41c-7e88-42e1-933e-88ba6a50c9c3 Builtin false False Deploy-AzSqlDb-Auditing n/a afb169da-f80a-4dd6-abf3-b7fc08efb8ae SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/2f1eab15-c92e-52cd-8b0c-a60e52f1b331 /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deploy-azsqldb-auditing (Configure SQL servers to have auditing enabled to Log Analytics workspace) 06/12/2025 17:56:41 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-corp-mg Corp d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation inherited mibelle-landingzones-mg Log Analytics Contributor 92aaf0da-9dab-42b6-94a3-d43ce8d16293 Builtin false False Deploy-AzSqlDb-Auditing n/a afb169da-f80a-4dd6-abf3-b7fc08efb8ae SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/488f45ec-c535-5f65-85bf-acacd1bb93e8 /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deploy-azsqldb-auditing (Configure SQL servers to have auditing enabled to Log Analytics workspace) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-corp-mg Corp d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation inherited mibelle-landingzones-mg Virtual Machine Contributor 9980e02c-c2be-4d73-94e8-173b1dc7cf3c Builtin false False Enable-AUM-CheckUpdates n/a 4f27b633-c16b-47a6-ab24-737bb6cdad56 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/571da045-f503-5cb2-b123-ede8cfe0f15a /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates (Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines) 06/12/2025 17:56:38 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-corp-mg Corp d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation inherited mibelle-landingzones-mg SQL DB Contributor 9b7fa17d-e63e-47b0-bb0a-15c516ac86ec Builtin false False Deploy-SQL-TDE n/a de5ed213-fd75-471c-8d32-920072d6c378 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/af2f6b24-ac34-5f3b-9249-5a109d9d1528 /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deploy-sql-tde (Deploy SQL DB transparent data encryption) 06/12/2025 17:56:38 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-corp-mg Corp d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation inherited mibelle-landingzones-mg Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False 52a8c671384a4b609f1d7651 n/a 6e0d029a-fce4-400f-bff3-45b8d9a8342e SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/94dfdb33-b864-47c9-831d-366721beb989 /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/52a8c671384a4b609f1d7651 (Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics) 09/04/2025 06:12:52 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-corp-mg Corp d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation inherited mibelle-landingzones-mg Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False e9143c36572348c3ba0c67b1 n/a 9c3b725e-ce85-47ac-bf6f-c2fa0571c259 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/3fb7bac5-2328-4e74-a5b0-0d6d2a631693 /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/e9143c36572348c3ba0c67b1 (Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics) 09/04/2025 07:18:00 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-corp-mg Corp d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation inherited mibelle-landingzones-mg Azure Connected Machine Resource Administrator cd570a14-e51a-42ad-bac8-bafd67325302 Builtin false False Enable-AUM-CheckUpdates n/a 4f27b633-c16b-47a6-ab24-737bb6cdad56 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/7d65b18e-df43-5353-85a4-716e68ff7c7a /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates (Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-corp-mg Corp d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation inherited mibelle-landingzones-mg Managed Identity Operator f1a07417-d97a-45cb-824c-7a7467783830 Builtin false False Enable-AUM-CheckUpdates n/a 4f27b633-c16b-47a6-ab24-737bb6cdad56 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/b2c88903-f3a4-54ec-813c-46d650309b86 /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates (Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-corp-mg Corp d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/e14ef9ac-25e8-4ee7-887a-a6576bd5229d none 11/28/2025 07:57:36 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-corp-mg Corp d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation inherited mibelle-mg Monitoring Contributor 749f88d5-cbae-40b8-bcfc-e573ddc772fa Builtin false False Deploy-AzActivity-Log n/a 217aa040-8eb0-451b-b81c-0b8f3d200d5a SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/dcb59c88-f014-5e17-840c-6c9aecc66286 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log (Configure Azure Activity logs to stream to specified Log Analytics workspace) 06/12/2025 17:56:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-corp-mg Corp d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation inherited mibelle-mg Monitoring Contributor 749f88d5-cbae-40b8-bcfc-e573ddc772fa Builtin false False Deploy-Diag-Logs n/a 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b922046a-7a3e-59da-a982-8a5b855791ce /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs (Enable audit category group resource logging for supported resources to Log Analytics) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-corp-mg Corp d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation inherited mibelle-mg Log Analytics Contributor 92aaf0da-9dab-42b6-94a3-d43ce8d16293 Builtin false False Deploy-AzActivity-Log n/a 217aa040-8eb0-451b-b81c-0b8f3d200d5a SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/82f0c3bf-808b-5863-bf9c-231cfbf9598a /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log (Configure Azure Activity logs to stream to specified Log Analytics workspace) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-corp-mg Corp d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation inherited mibelle-mg Log Analytics Contributor 92aaf0da-9dab-42b6-94a3-d43ce8d16293 Builtin false False Deploy-Diag-Logs n/a 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/9df772a7-1ce7-5439-ab6b-5d31d69925cc /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs (Enable audit category group resource logging for supported resources to Log Analytics) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-corp-mg Corp d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Meier, Heinz-MIBELLEGROUP heinz.meier@mibelle.net 06addc33-6298-4f01-9f6b-709193f099cc User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-corp-mg Corp d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Subs-MibelleOnline-SubscriptionOwner n/a 1bdf326c-8c66-4ba9-8c2d-83312a1ddc02 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-corp-mg Corp d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-Reader n/a 1c529912-c479-41a1-8a03-e57256720fa4 Group direct 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-corp-mg Corp d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser n/a 1f3ede05-4301-42b1-8c95-2be94290e93c Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-corp-mg Corp d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-corp-mg Corp d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-corp-mg Corp d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Hasanow, Kilian-MIBELLEGROUP kilian.hasanow@mibelle.net 4270eb01-73cf-4e17-925e-47461737b40e User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-corp-mg Corp d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-corp-mg Corp d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Mibelle-AzGovWiz-prod n/a 44b03901-55d2-49a8-af3a-58228a81408c SP APP INT indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-corp-mg Corp d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-michael.peter csa-michael.peter@MIBCloud.mail.onmicrosoft.com 460bad8a-cc4d-41dc-9ddd-f24ba491e2a6 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-corp-mg Corp d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-corp-mg Corp d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner n/a 52364002-4a8b-4808-b4fc-864ed5f7d50d Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-corp-mg Corp d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Matej Paunovski CSA-matej.paunovski@MIBCloud.onmicrosoft.com 54f81d33-50db-475c-b686-4ef70aa0b4fe User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-corp-mg Corp d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Ouaouane, Taoufik-MIBELLEGROUP taoufik.ouaouane@mibelle.net 7100d1ce-5bd7-449d-abdd-52a7218922b3 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-corp-mg Corp d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-NetOps n/a 87e9d07b-5340-455c-b297-8bffe3b86f78 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-corp-mg Corp d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner n/a 9b120856-d4b2-4862-95df-bedf8d5fe1c3 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-corp-mg Corp d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-Baswaraj Marotrao Ramshette csa-baswarajmarotrao.ramshette@MIBCloud.onmicrosoft.com 9d8d246b-a1f9-4d9a-a54f-f7ae9f3af2ae User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-corp-mg Corp d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-SecOps n/a abf39027-4cb4-4298-8951-f984eaf9cb8e Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-corp-mg Corp d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Baumann, Jürg-MIBELLEGROUP juerg.baumann_mibellegroup.com#EXT#@MIBCloud.onmicrosoft.com bb2279b2-06ab-459a-b981-579701601f8a User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-corp-mg Corp d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin n/a cb058f58-c629-445f-9a10-75f9fcab694e Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-corp-mg Corp d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-corp-mg Corp d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Philipp.Schmidt CSA-Philipp.Schmidt@MIBCloud.onmicrosoft.com e40a73c8-6655-434d-8c8b-fdc4d9213499 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-corp-mg Corp d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Taoufik.Ouaouane csa-Taoufik.Ouaouane@mibelle.net e58ba28f-09ed-49c3-8f5e-31b05c258cde User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-corp-mg Corp d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Adrian.Bombelka CSA-Adrian.Bombelka@MIBCloud.onmicrosoft.com e86b38a8-e5d4-4888-b09d-390dcf9a2017 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-corp-mg Corp d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation inherited mibelle-mg Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False Enforce-ACSB n/a e1f2e80c-5329-4804-824d-f0b44713985e SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/6e26cd22-b41b-5611-aafc-e2c56b14c060 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/enforce-acsb (Enforce Azure Compute Security Benchmark compliance auditing) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-corp-mg Corp d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation inherited mibelle-mg Security Admin fb1c8493-542b-48eb-b624-b4c8fea62acd Builtin false False Deploy-MDEndpointsAMA n/a 7d365a6d-a7ae-4921-beca-5ce854a76960 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/d730d560-adce-52b7-b10c-36a8ad16a6d3 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-mdendpointsama (Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Ten mibelle-landingzones-corp-mg Corp d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation inherited Tenant User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false True CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member direct False /providers/microsoft.authorization/roleassignments/3f958da1-722a-4c03-8398-aab60735ecd3 none 05/07/2025 18:14:55 ObjectType: User Member, ObjectDisplayName: CSA-Jan.Stutz, ObjectSignInName: CSA-Jan.Stutz@MIBCloud.onmicrosoft.com, ObjectId: 43b3e278-6551-4566-83a8-c19abe643e64
Sub mibelle-landingzones-corp-mg Corp d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation thisScope Sub Owner 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 Builtin false True CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member direct False /subscriptions/d4493d1a-9fd5-4596-aff4-8c679eac0164/providers/microsoft.authorization/roleassignments/b605fdb3-4802-48ac-b896-815366e2941b none 08/29/2025 13:48:56 IsNullOrEmpty
Sub mibelle-landingzones-corp-mg Corp d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation thisScope Sub v1-custom-role-d4493d1a-9fd5-4596-aff4-8c679eac0164 fa3940f3-4060-ef1b-997b-69b9fcbea8c1 Custom true False v1-app-registration-d4493d1a-9fd5-4596-aff4-8c679eac0164 n/a dd3e0147-c485-4150-9df1-9a09dbfdbd19 SP APP INT direct False /subscriptions/d4493d1a-9fd5-4596-aff4-8c679eac0164/providers/microsoft.authorization/roleassignments/334047f4-4177-1a7a-b9c3-2794108b911d none 10/16/2025 08:21:28 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-identity-mg Identity inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/e14ef9ac-25e8-4ee7-887a-a6576bd5229d none 11/28/2025 07:57:36 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-identity-mg Identity inherited mibelle-mg Monitoring Contributor 749f88d5-cbae-40b8-bcfc-e573ddc772fa Builtin false False Deploy-AzActivity-Log n/a 217aa040-8eb0-451b-b81c-0b8f3d200d5a SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/dcb59c88-f014-5e17-840c-6c9aecc66286 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log (Configure Azure Activity logs to stream to specified Log Analytics workspace) 06/12/2025 17:56:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-identity-mg Identity inherited mibelle-mg Monitoring Contributor 749f88d5-cbae-40b8-bcfc-e573ddc772fa Builtin false False Deploy-Diag-Logs n/a 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b922046a-7a3e-59da-a982-8a5b855791ce /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs (Enable audit category group resource logging for supported resources to Log Analytics) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-identity-mg Identity inherited mibelle-mg Log Analytics Contributor 92aaf0da-9dab-42b6-94a3-d43ce8d16293 Builtin false False Deploy-AzActivity-Log n/a 217aa040-8eb0-451b-b81c-0b8f3d200d5a SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/82f0c3bf-808b-5863-bf9c-231cfbf9598a /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log (Configure Azure Activity logs to stream to specified Log Analytics workspace) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-identity-mg Identity inherited mibelle-mg Log Analytics Contributor 92aaf0da-9dab-42b6-94a3-d43ce8d16293 Builtin false False Deploy-Diag-Logs n/a 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/9df772a7-1ce7-5439-ab6b-5d31d69925cc /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs (Enable audit category group resource logging for supported resources to Log Analytics) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-identity-mg Identity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Meier, Heinz-MIBELLEGROUP heinz.meier@mibelle.net 06addc33-6298-4f01-9f6b-709193f099cc User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-identity-mg Identity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Subs-MibelleOnline-SubscriptionOwner n/a 1bdf326c-8c66-4ba9-8c2d-83312a1ddc02 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-identity-mg Identity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-Reader n/a 1c529912-c479-41a1-8a03-e57256720fa4 Group direct 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-identity-mg Identity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser n/a 1f3ede05-4301-42b1-8c95-2be94290e93c Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-identity-mg Identity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-identity-mg Identity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-identity-mg Identity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Hasanow, Kilian-MIBELLEGROUP kilian.hasanow@mibelle.net 4270eb01-73cf-4e17-925e-47461737b40e User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-identity-mg Identity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-identity-mg Identity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Mibelle-AzGovWiz-prod n/a 44b03901-55d2-49a8-af3a-58228a81408c SP APP INT indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-identity-mg Identity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-michael.peter csa-michael.peter@MIBCloud.mail.onmicrosoft.com 460bad8a-cc4d-41dc-9ddd-f24ba491e2a6 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-identity-mg Identity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-identity-mg Identity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner n/a 52364002-4a8b-4808-b4fc-864ed5f7d50d Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-identity-mg Identity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Matej Paunovski CSA-matej.paunovski@MIBCloud.onmicrosoft.com 54f81d33-50db-475c-b686-4ef70aa0b4fe User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-identity-mg Identity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Ouaouane, Taoufik-MIBELLEGROUP taoufik.ouaouane@mibelle.net 7100d1ce-5bd7-449d-abdd-52a7218922b3 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-identity-mg Identity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-NetOps n/a 87e9d07b-5340-455c-b297-8bffe3b86f78 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-identity-mg Identity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner n/a 9b120856-d4b2-4862-95df-bedf8d5fe1c3 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-identity-mg Identity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-Baswaraj Marotrao Ramshette csa-baswarajmarotrao.ramshette@MIBCloud.onmicrosoft.com 9d8d246b-a1f9-4d9a-a54f-f7ae9f3af2ae User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-identity-mg Identity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-SecOps n/a abf39027-4cb4-4298-8951-f984eaf9cb8e Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-identity-mg Identity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Baumann, Jürg-MIBELLEGROUP juerg.baumann_mibellegroup.com#EXT#@MIBCloud.onmicrosoft.com bb2279b2-06ab-459a-b981-579701601f8a User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-identity-mg Identity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin n/a cb058f58-c629-445f-9a10-75f9fcab694e Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-identity-mg Identity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-identity-mg Identity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Philipp.Schmidt CSA-Philipp.Schmidt@MIBCloud.onmicrosoft.com e40a73c8-6655-434d-8c8b-fdc4d9213499 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-identity-mg Identity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Taoufik.Ouaouane csa-Taoufik.Ouaouane@mibelle.net e58ba28f-09ed-49c3-8f5e-31b05c258cde User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-identity-mg Identity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Adrian.Bombelka CSA-Adrian.Bombelka@MIBCloud.onmicrosoft.com e86b38a8-e5d4-4888-b09d-390dcf9a2017 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-identity-mg Identity inherited mibelle-mg Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False Enforce-ACSB n/a e1f2e80c-5329-4804-824d-f0b44713985e SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/6e26cd22-b41b-5611-aafc-e2c56b14c060 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/enforce-acsb (Enforce Azure Compute Security Benchmark compliance auditing) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-identity-mg Identity inherited mibelle-mg Security Admin fb1c8493-542b-48eb-b624-b4c8fea62acd Builtin false False Deploy-MDEndpointsAMA n/a 7d365a6d-a7ae-4921-beca-5ce854a76960 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/d730d560-adce-52b7-b10c-36a8ad16a6d3 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-mdendpointsama (Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-identity-mg Identity inherited mibelle-platform-mg Virtual Machine Contributor 9980e02c-c2be-4d73-94e8-173b1dc7cf3c Builtin false False Enable-AUM-CheckUpdates n/a ce67e461-e4a3-4514-89cb-7eb8802f8f65 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/51e23aa4-bdf1-5059-8efc-453852a14d5e /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates (Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines) 06/12/2025 17:56:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-identity-mg Identity inherited mibelle-platform-mg Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False d33eb38085bf40bd860fe43b n/a 78dd5b73-2109-4a10-b2e4-6463304b4b4d SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/21c0b216-76ff-44ef-9430-19f801e102d5 /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/d33eb38085bf40bd860fe43b (Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics) 06/12/2025 18:15:25 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-identity-mg Identity inherited mibelle-platform-mg Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False 97339ff59e1744678fd92dea n/a c2b8a553-ec19-42b8-8855-6edc985eaffb SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/71689b0c-ca78-4285-9603-49a5497225d8 /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/97339ff59e1744678fd92dea (Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics) 09/04/2025 07:21:46 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-identity-mg Identity inherited mibelle-platform-mg Azure Connected Machine Resource Administrator cd570a14-e51a-42ad-bac8-bafd67325302 Builtin false False Enable-AUM-CheckUpdates n/a ce67e461-e4a3-4514-89cb-7eb8802f8f65 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/d72b7c0f-a23a-58ed-8e0a-40f49a5b6ab3 /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates (Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines) 06/12/2025 17:56:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-identity-mg Identity inherited mibelle-platform-mg Managed Identity Operator f1a07417-d97a-45cb-824c-7a7467783830 Builtin false False Enable-AUM-CheckUpdates n/a ce67e461-e4a3-4514-89cb-7eb8802f8f65 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/1f97b9d8-3c21-5b8b-9b36-72e77d4a90e0 /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates (Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines) 06/12/2025 17:56:41 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Ten mibelle-platform-identity-mg Identity inherited Tenant User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false True CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member direct False /providers/microsoft.authorization/roleassignments/3f958da1-722a-4c03-8398-aab60735ecd3 none 05/07/2025 18:14:55 ObjectType: User Member, ObjectDisplayName: CSA-Jan.Stutz, ObjectSignInName: CSA-Jan.Stutz@MIBCloud.onmicrosoft.com, ObjectId: 43b3e278-6551-4566-83a8-c19abe643e64
Sub mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) True Eligible 07/04/2025 22:17:51
Mg mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/e14ef9ac-25e8-4ee7-887a-a6576bd5229d none 11/28/2025 07:57:36 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Sub mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) True Eligible 07/04/2025 22:17:51
Sub mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) True Eligible 07/04/2025 22:17:51
Sub mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) True Eligible 07/04/2025 22:17:51
Sub mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False SGU-MIB-RES-Azure-Magr-Mibelle-NetOps 87e9d07b-5340-455c-b297-8bffe3b86f78 Group direct True Eligible 07/04/2025 22:17:51
Sub mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) True Eligible 07/04/2025 22:17:51
Sub mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-mg [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e) True Eligible 07/04/2025 22:17:18
Sub mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-mg [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e) True Eligible 07/04/2025 22:17:18
Sub mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-mg [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e) True Eligible 07/04/2025 22:17:18
Sub mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-mg [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False SGU-MIB-RES-Azure-Magr-Mibelle-SecOps abf39027-4cb4-4298-8951-f984eaf9cb8e Group direct True Eligible 07/04/2025 22:17:18
Mg mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-mg Monitoring Contributor 749f88d5-cbae-40b8-bcfc-e573ddc772fa Builtin false False Deploy-AzActivity-Log n/a 217aa040-8eb0-451b-b81c-0b8f3d200d5a SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/dcb59c88-f014-5e17-840c-6c9aecc66286 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log (Configure Azure Activity logs to stream to specified Log Analytics workspace) 06/12/2025 17:56:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-mg Monitoring Contributor 749f88d5-cbae-40b8-bcfc-e573ddc772fa Builtin false False Deploy-Diag-Logs n/a 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b922046a-7a3e-59da-a982-8a5b855791ce /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs (Enable audit category group resource logging for supported resources to Log Analytics) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-mg Log Analytics Contributor 92aaf0da-9dab-42b6-94a3-d43ce8d16293 Builtin false False Deploy-AzActivity-Log n/a 217aa040-8eb0-451b-b81c-0b8f3d200d5a SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/82f0c3bf-808b-5863-bf9c-231cfbf9598a /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log (Configure Azure Activity logs to stream to specified Log Analytics workspace) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-mg Log Analytics Contributor 92aaf0da-9dab-42b6-94a3-d43ce8d16293 Builtin false False Deploy-Diag-Logs n/a 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/9df772a7-1ce7-5439-ab6b-5d31d69925cc /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs (Enable audit category group resource logging for supported resources to Log Analytics) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Meier, Heinz-MIBELLEGROUP heinz.meier@mibelle.net 06addc33-6298-4f01-9f6b-709193f099cc User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Subs-MibelleOnline-SubscriptionOwner n/a 1bdf326c-8c66-4ba9-8c2d-83312a1ddc02 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-Reader n/a 1c529912-c479-41a1-8a03-e57256720fa4 Group direct 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser n/a 1f3ede05-4301-42b1-8c95-2be94290e93c Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Hasanow, Kilian-MIBELLEGROUP kilian.hasanow@mibelle.net 4270eb01-73cf-4e17-925e-47461737b40e User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Mibelle-AzGovWiz-prod n/a 44b03901-55d2-49a8-af3a-58228a81408c SP APP INT indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-michael.peter csa-michael.peter@MIBCloud.mail.onmicrosoft.com 460bad8a-cc4d-41dc-9ddd-f24ba491e2a6 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner n/a 52364002-4a8b-4808-b4fc-864ed5f7d50d Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Matej Paunovski CSA-matej.paunovski@MIBCloud.onmicrosoft.com 54f81d33-50db-475c-b686-4ef70aa0b4fe User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Ouaouane, Taoufik-MIBELLEGROUP taoufik.ouaouane@mibelle.net 7100d1ce-5bd7-449d-abdd-52a7218922b3 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-NetOps n/a 87e9d07b-5340-455c-b297-8bffe3b86f78 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner n/a 9b120856-d4b2-4862-95df-bedf8d5fe1c3 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-Baswaraj Marotrao Ramshette csa-baswarajmarotrao.ramshette@MIBCloud.onmicrosoft.com 9d8d246b-a1f9-4d9a-a54f-f7ae9f3af2ae User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-SecOps n/a abf39027-4cb4-4298-8951-f984eaf9cb8e Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Baumann, Jürg-MIBELLEGROUP juerg.baumann_mibellegroup.com#EXT#@MIBCloud.onmicrosoft.com bb2279b2-06ab-459a-b981-579701601f8a User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin n/a cb058f58-c629-445f-9a10-75f9fcab694e Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Philipp.Schmidt CSA-Philipp.Schmidt@MIBCloud.onmicrosoft.com e40a73c8-6655-434d-8c8b-fdc4d9213499 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Taoufik.Ouaouane csa-Taoufik.Ouaouane@mibelle.net e58ba28f-09ed-49c3-8f5e-31b05c258cde User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Adrian.Bombelka CSA-Adrian.Bombelka@MIBCloud.onmicrosoft.com e86b38a8-e5d4-4888-b09d-390dcf9a2017 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-mg Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False Enforce-ACSB n/a e1f2e80c-5329-4804-824d-f0b44713985e SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/6e26cd22-b41b-5611-aafc-e2c56b14c060 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/enforce-acsb (Enforce Azure Compute Security Benchmark compliance auditing) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-mg Security Admin fb1c8493-542b-48eb-b624-b4c8fea62acd Builtin false False Deploy-MDEndpointsAMA n/a 7d365a6d-a7ae-4921-beca-5ce854a76960 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/d730d560-adce-52b7-b10c-36a8ad16a6d3 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-mdendpointsama (Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-mg Reservation Purchaser f7b75c60-3036-4b75-91c3-6b41c27c1689 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser 1f3ede05-4301-42b1-8c95-2be94290e93c Group direct True Eligible 11/24/2025 07:50:25
Sub mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-mg Reservation Purchaser f7b75c60-3036-4b75-91c3-6b41c27c1689 Builtin false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser (1f3ede05-4301-42b1-8c95-2be94290e93c) True Eligible 11/24/2025 07:50:25
Sub mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) True Eligible 07/04/2025 22:11:28
Sub mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) True Eligible 07/04/2025 22:11:28
Sub mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) True Eligible 07/04/2025 22:11:28
Sub mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin cb058f58-c629-445f-9a10-75f9fcab694e Group direct True Eligible 07/04/2025 22:11:28
Sub mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) True Eligible 07/04/2025 22:11:28
Sub mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-platform-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3) True Eligible 07/04/2025 22:47:30
Sub mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-platform-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3) True Eligible 07/04/2025 22:47:30
Sub mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-platform-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3) True Eligible 07/04/2025 22:47:30
Sub mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-platform-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3) True Eligible 07/04/2025 22:47:30
Sub mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-platform-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner 9b120856-d4b2-4862-95df-bedf8d5fe1c3 Group direct True Eligible 07/04/2025 22:47:30
Sub mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-platform-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3) True Eligible 07/04/2025 22:47:30
Sub mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-platform-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False CSA-Philipp.Schmidt CSA-Philipp.Schmidt@MIBCloud.onmicrosoft.com e40a73c8-6655-434d-8c8b-fdc4d9213499 User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3) True Eligible 07/04/2025 22:47:30
Mg mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-platform-mg Virtual Machine Contributor 9980e02c-c2be-4d73-94e8-173b1dc7cf3c Builtin false False Enable-AUM-CheckUpdates n/a ce67e461-e4a3-4514-89cb-7eb8802f8f65 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/51e23aa4-bdf1-5059-8efc-453852a14d5e /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates (Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines) 06/12/2025 17:56:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-platform-mg Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False d33eb38085bf40bd860fe43b n/a 78dd5b73-2109-4a10-b2e4-6463304b4b4d SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/21c0b216-76ff-44ef-9430-19f801e102d5 /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/d33eb38085bf40bd860fe43b (Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics) 06/12/2025 18:15:25 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-platform-mg Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False 97339ff59e1744678fd92dea n/a c2b8a553-ec19-42b8-8855-6edc985eaffb SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/71689b0c-ca78-4285-9603-49a5497225d8 /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/97339ff59e1744678fd92dea (Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics) 09/04/2025 07:21:46 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-platform-mg Azure Connected Machine Resource Administrator cd570a14-e51a-42ad-bac8-bafd67325302 Builtin false False Enable-AUM-CheckUpdates n/a ce67e461-e4a3-4514-89cb-7eb8802f8f65 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/d72b7c0f-a23a-58ed-8e0a-40f49a5b6ab3 /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates (Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines) 06/12/2025 17:56:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited mibelle-platform-mg Managed Identity Operator f1a07417-d97a-45cb-824c-7a7467783830 Builtin false False Enable-AUM-CheckUpdates n/a ce67e461-e4a3-4514-89cb-7eb8802f8f65 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/1f97b9d8-3c21-5b8b-9b36-72e77d4a90e0 /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates (Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines) 06/12/2025 17:56:41 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Ten mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity inherited Tenant User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false True CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member direct False /providers/microsoft.authorization/roleassignments/3f958da1-722a-4c03-8398-aab60735ecd3 none 05/07/2025 18:14:55 ObjectType: User Member, ObjectDisplayName: CSA-Jan.Stutz, ObjectSignInName: CSA-Jan.Stutz@MIBCloud.onmicrosoft.com, ObjectId: 43b3e278-6551-4566-83a8-c19abe643e64
Sub mibelle-platform-identity-mg Identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity thisScope Sub v1-custom-role-e1dcabb1-2f79-4eb1-982d-e3df709c24aa 4baaded2-1ae8-d927-8341-6fc59be1ffd6 Custom true False v1-app-registration-e1dcabb1-2f79-4eb1-982d-e3df709c24aa n/a 4518b761-8764-4f6f-aaa4-abf4aee06171 SP APP INT direct False /subscriptions/e1dcabb1-2f79-4eb1-982d-e3df709c24aa/providers/microsoft.authorization/roleassignments/955d2a29-0ad9-8e50-9ef7-b0f1c3f0b955 none 10/16/2025 06:56:41 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
MG mibelle-landingzones-mg Landing Zones inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) True Eligible 07/04/2025 22:17:51
MG mibelle-landingzones-mg Landing Zones inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) True Eligible 07/04/2025 22:17:51
MG mibelle-landingzones-mg Landing Zones inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) True Eligible 07/04/2025 22:17:51
MG mibelle-landingzones-mg Landing Zones inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) True Eligible 07/04/2025 22:17:51
MG mibelle-landingzones-mg Landing Zones inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False SGU-MIB-RES-Azure-Magr-Mibelle-NetOps 87e9d07b-5340-455c-b297-8bffe3b86f78 Group direct True Eligible 07/04/2025 22:17:51
MG mibelle-landingzones-mg Landing Zones inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) True Eligible 07/04/2025 22:17:51
MG mibelle-landingzones-mg Landing Zones inherited mibelle-mg [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e) True Eligible 07/04/2025 22:17:18
MG mibelle-landingzones-mg Landing Zones inherited mibelle-mg [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e) True Eligible 07/04/2025 22:17:18
MG mibelle-landingzones-mg Landing Zones inherited mibelle-mg [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e) True Eligible 07/04/2025 22:17:18
MG mibelle-landingzones-mg Landing Zones inherited mibelle-mg [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False SGU-MIB-RES-Azure-Magr-Mibelle-SecOps abf39027-4cb4-4298-8951-f984eaf9cb8e Group direct True Eligible 07/04/2025 22:17:18
MG mibelle-landingzones-mg Landing Zones inherited mibelle-mg Reservation Purchaser f7b75c60-3036-4b75-91c3-6b41c27c1689 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser 1f3ede05-4301-42b1-8c95-2be94290e93c Group direct True Eligible 11/24/2025 07:50:25
MG mibelle-landingzones-mg Landing Zones inherited mibelle-mg Reservation Purchaser f7b75c60-3036-4b75-91c3-6b41c27c1689 Builtin false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser (1f3ede05-4301-42b1-8c95-2be94290e93c) True Eligible 11/24/2025 07:50:25
MG mibelle-landingzones-mg Landing Zones inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) True Eligible 07/04/2025 22:11:28
MG mibelle-landingzones-mg Landing Zones inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) True Eligible 07/04/2025 22:11:28
MG mibelle-landingzones-mg Landing Zones inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) True Eligible 07/04/2025 22:11:28
MG mibelle-landingzones-mg Landing Zones inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin cb058f58-c629-445f-9a10-75f9fcab694e Group direct True Eligible 07/04/2025 22:11:28
MG mibelle-landingzones-mg Landing Zones inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) True Eligible 07/04/2025 22:11:28
MG mibelle-landingzones-mg Landing Zones thisScope MG [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner (52364002-4a8b-4808-b4fc-864ed5f7d50d) True Eligible 07/04/2025 22:45:52
MG mibelle-landingzones-mg Landing Zones thisScope MG [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member nested SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner (52364002-4a8b-4808-b4fc-864ed5f7d50d) True Eligible 07/04/2025 22:45:52
MG mibelle-landingzones-mg Landing Zones thisScope MG [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False csa-michael.peter csa-michael.peter@MIBCloud.mail.onmicrosoft.com 460bad8a-cc4d-41dc-9ddd-f24ba491e2a6 User Member nested SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner (52364002-4a8b-4808-b4fc-864ed5f7d50d) True Eligible 07/04/2025 22:45:52
MG mibelle-landingzones-mg Landing Zones thisScope MG [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner (52364002-4a8b-4808-b4fc-864ed5f7d50d) True Eligible 07/04/2025 22:45:52
MG mibelle-landingzones-mg Landing Zones thisScope MG [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner 52364002-4a8b-4808-b4fc-864ed5f7d50d Group direct True Eligible 07/04/2025 22:45:52
MG mibelle-landingzones-mg Landing Zones thisScope MG [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member nested SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner (52364002-4a8b-4808-b4fc-864ed5f7d50d) True Eligible 07/04/2025 22:45:52
MG mibelle-landingzones-mg Landing Zones thisScope MG Key Vault Administrator 00482a5a-887f-4fb3-b363-3b7fe8e74483 Builtin false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member nested SGU-MIB-RES-Azure-Magr-MibelleLandingZone-KeyVaultAdmin (dc72503d-d80a-4f41-969b-59a0818f358c) True Eligible 09/05/2025 06:41:41
MG mibelle-landingzones-mg Landing Zones thisScope MG Key Vault Administrator 00482a5a-887f-4fb3-b363-3b7fe8e74483 Builtin false False csa-michael.peter csa-michael.peter@MIBCloud.mail.onmicrosoft.com 460bad8a-cc4d-41dc-9ddd-f24ba491e2a6 User Member nested SGU-MIB-RES-Azure-Magr-MibelleLandingZone-KeyVaultAdmin (dc72503d-d80a-4f41-969b-59a0818f358c) True Eligible 09/05/2025 06:41:41
MG mibelle-landingzones-mg Landing Zones thisScope MG Key Vault Administrator 00482a5a-887f-4fb3-b363-3b7fe8e74483 Builtin false False SGU-MIB-RES-Azure-Magr-MibelleLandingZone-KeyVaultAdmin dc72503d-d80a-4f41-969b-59a0818f358c Group direct True Eligible 09/05/2025 06:41:41
MG mibelle-landingzones-mg Landing Zones thisScope MG User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False SGU-MIB-RES-Azure-Magr-MibelleLandingZone-UserAccessAdmin 45d94cc4-a927-422c-a9a3-a0cfa1684fd7 Group direct True Eligible 09/05/2025 06:26:15
MG mibelle-landingzones-mg Landing Zones thisScope MG User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False csa-michael.peter csa-michael.peter@MIBCloud.mail.onmicrosoft.com 460bad8a-cc4d-41dc-9ddd-f24ba491e2a6 User Member nested SGU-MIB-RES-Azure-Magr-MibelleLandingZone-UserAccessAdmin (45d94cc4-a927-422c-a9a3-a0cfa1684fd7) True Eligible 09/05/2025 06:26:15
Mg mibelle-platform-management-mg Management inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/e14ef9ac-25e8-4ee7-887a-a6576bd5229d none 11/28/2025 07:57:36 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-management-mg Management inherited mibelle-mg Monitoring Contributor 749f88d5-cbae-40b8-bcfc-e573ddc772fa Builtin false False Deploy-AzActivity-Log n/a 217aa040-8eb0-451b-b81c-0b8f3d200d5a SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/dcb59c88-f014-5e17-840c-6c9aecc66286 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log (Configure Azure Activity logs to stream to specified Log Analytics workspace) 06/12/2025 17:56:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-management-mg Management inherited mibelle-mg Monitoring Contributor 749f88d5-cbae-40b8-bcfc-e573ddc772fa Builtin false False Deploy-Diag-Logs n/a 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b922046a-7a3e-59da-a982-8a5b855791ce /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs (Enable audit category group resource logging for supported resources to Log Analytics) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-management-mg Management inherited mibelle-mg Log Analytics Contributor 92aaf0da-9dab-42b6-94a3-d43ce8d16293 Builtin false False Deploy-AzActivity-Log n/a 217aa040-8eb0-451b-b81c-0b8f3d200d5a SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/82f0c3bf-808b-5863-bf9c-231cfbf9598a /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log (Configure Azure Activity logs to stream to specified Log Analytics workspace) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-management-mg Management inherited mibelle-mg Log Analytics Contributor 92aaf0da-9dab-42b6-94a3-d43ce8d16293 Builtin false False Deploy-Diag-Logs n/a 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/9df772a7-1ce7-5439-ab6b-5d31d69925cc /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs (Enable audit category group resource logging for supported resources to Log Analytics) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-management-mg Management inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Meier, Heinz-MIBELLEGROUP heinz.meier@mibelle.net 06addc33-6298-4f01-9f6b-709193f099cc User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-management-mg Management inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Subs-MibelleOnline-SubscriptionOwner n/a 1bdf326c-8c66-4ba9-8c2d-83312a1ddc02 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-management-mg Management inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-Reader n/a 1c529912-c479-41a1-8a03-e57256720fa4 Group direct 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-management-mg Management inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser n/a 1f3ede05-4301-42b1-8c95-2be94290e93c Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-management-mg Management inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-management-mg Management inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-management-mg Management inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Hasanow, Kilian-MIBELLEGROUP kilian.hasanow@mibelle.net 4270eb01-73cf-4e17-925e-47461737b40e User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-management-mg Management inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-management-mg Management inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Mibelle-AzGovWiz-prod n/a 44b03901-55d2-49a8-af3a-58228a81408c SP APP INT indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-management-mg Management inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-michael.peter csa-michael.peter@MIBCloud.mail.onmicrosoft.com 460bad8a-cc4d-41dc-9ddd-f24ba491e2a6 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-management-mg Management inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-management-mg Management inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner n/a 52364002-4a8b-4808-b4fc-864ed5f7d50d Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-management-mg Management inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Matej Paunovski CSA-matej.paunovski@MIBCloud.onmicrosoft.com 54f81d33-50db-475c-b686-4ef70aa0b4fe User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-management-mg Management inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Ouaouane, Taoufik-MIBELLEGROUP taoufik.ouaouane@mibelle.net 7100d1ce-5bd7-449d-abdd-52a7218922b3 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-management-mg Management inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-NetOps n/a 87e9d07b-5340-455c-b297-8bffe3b86f78 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-management-mg Management inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner n/a 9b120856-d4b2-4862-95df-bedf8d5fe1c3 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-management-mg Management inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-Baswaraj Marotrao Ramshette csa-baswarajmarotrao.ramshette@MIBCloud.onmicrosoft.com 9d8d246b-a1f9-4d9a-a54f-f7ae9f3af2ae User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-management-mg Management inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-SecOps n/a abf39027-4cb4-4298-8951-f984eaf9cb8e Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-management-mg Management inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Baumann, Jürg-MIBELLEGROUP juerg.baumann_mibellegroup.com#EXT#@MIBCloud.onmicrosoft.com bb2279b2-06ab-459a-b981-579701601f8a User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-management-mg Management inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin n/a cb058f58-c629-445f-9a10-75f9fcab694e Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-management-mg Management inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-management-mg Management inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Philipp.Schmidt CSA-Philipp.Schmidt@MIBCloud.onmicrosoft.com e40a73c8-6655-434d-8c8b-fdc4d9213499 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-management-mg Management inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Taoufik.Ouaouane csa-Taoufik.Ouaouane@mibelle.net e58ba28f-09ed-49c3-8f5e-31b05c258cde User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-management-mg Management inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Adrian.Bombelka CSA-Adrian.Bombelka@MIBCloud.onmicrosoft.com e86b38a8-e5d4-4888-b09d-390dcf9a2017 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-management-mg Management inherited mibelle-mg Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False Enforce-ACSB n/a e1f2e80c-5329-4804-824d-f0b44713985e SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/6e26cd22-b41b-5611-aafc-e2c56b14c060 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/enforce-acsb (Enforce Azure Compute Security Benchmark compliance auditing) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-management-mg Management inherited mibelle-mg Security Admin fb1c8493-542b-48eb-b624-b4c8fea62acd Builtin false False Deploy-MDEndpointsAMA n/a 7d365a6d-a7ae-4921-beca-5ce854a76960 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/d730d560-adce-52b7-b10c-36a8ad16a6d3 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-mdendpointsama (Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-management-mg Management inherited mibelle-platform-mg Virtual Machine Contributor 9980e02c-c2be-4d73-94e8-173b1dc7cf3c Builtin false False Enable-AUM-CheckUpdates n/a ce67e461-e4a3-4514-89cb-7eb8802f8f65 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/51e23aa4-bdf1-5059-8efc-453852a14d5e /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates (Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines) 06/12/2025 17:56:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-management-mg Management inherited mibelle-platform-mg Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False d33eb38085bf40bd860fe43b n/a 78dd5b73-2109-4a10-b2e4-6463304b4b4d SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/21c0b216-76ff-44ef-9430-19f801e102d5 /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/d33eb38085bf40bd860fe43b (Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics) 06/12/2025 18:15:25 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-management-mg Management inherited mibelle-platform-mg Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False 97339ff59e1744678fd92dea n/a c2b8a553-ec19-42b8-8855-6edc985eaffb SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/71689b0c-ca78-4285-9603-49a5497225d8 /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/97339ff59e1744678fd92dea (Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics) 09/04/2025 07:21:46 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-management-mg Management inherited mibelle-platform-mg Azure Connected Machine Resource Administrator cd570a14-e51a-42ad-bac8-bafd67325302 Builtin false False Enable-AUM-CheckUpdates n/a ce67e461-e4a3-4514-89cb-7eb8802f8f65 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/d72b7c0f-a23a-58ed-8e0a-40f49a5b6ab3 /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates (Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines) 06/12/2025 17:56:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-management-mg Management inherited mibelle-platform-mg Managed Identity Operator f1a07417-d97a-45cb-824c-7a7467783830 Builtin false False Enable-AUM-CheckUpdates n/a ce67e461-e4a3-4514-89cb-7eb8802f8f65 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/1f97b9d8-3c21-5b8b-9b36-72e77d4a90e0 /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates (Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines) 06/12/2025 17:56:41 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Ten mibelle-platform-management-mg Management inherited Tenant User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false True CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member direct False /providers/microsoft.authorization/roleassignments/3f958da1-722a-4c03-8398-aab60735ecd3 none 05/07/2025 18:14:55 ObjectType: User Member, ObjectDisplayName: CSA-Jan.Stutz, ObjectSignInName: CSA-Jan.Stutz@MIBCloud.onmicrosoft.com, ObjectId: 43b3e278-6551-4566-83a8-c19abe643e64
Sub mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) True Eligible 07/04/2025 22:17:51
Mg mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/e14ef9ac-25e8-4ee7-887a-a6576bd5229d none 11/28/2025 07:57:36 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Sub mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) True Eligible 07/04/2025 22:17:51
Sub mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) True Eligible 07/04/2025 22:17:51
Sub mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) True Eligible 07/04/2025 22:17:51
Sub mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False SGU-MIB-RES-Azure-Magr-Mibelle-NetOps 87e9d07b-5340-455c-b297-8bffe3b86f78 Group direct True Eligible 07/04/2025 22:17:51
Sub mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) True Eligible 07/04/2025 22:17:51
Sub mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-mg [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e) True Eligible 07/04/2025 22:17:18
Sub mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-mg [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e) True Eligible 07/04/2025 22:17:18
Sub mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-mg [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e) True Eligible 07/04/2025 22:17:18
Sub mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-mg [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False SGU-MIB-RES-Azure-Magr-Mibelle-SecOps abf39027-4cb4-4298-8951-f984eaf9cb8e Group direct True Eligible 07/04/2025 22:17:18
Mg mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-mg Monitoring Contributor 749f88d5-cbae-40b8-bcfc-e573ddc772fa Builtin false False Deploy-AzActivity-Log n/a 217aa040-8eb0-451b-b81c-0b8f3d200d5a SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/dcb59c88-f014-5e17-840c-6c9aecc66286 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log (Configure Azure Activity logs to stream to specified Log Analytics workspace) 06/12/2025 17:56:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-mg Monitoring Contributor 749f88d5-cbae-40b8-bcfc-e573ddc772fa Builtin false False Deploy-Diag-Logs n/a 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b922046a-7a3e-59da-a982-8a5b855791ce /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs (Enable audit category group resource logging for supported resources to Log Analytics) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-mg Log Analytics Contributor 92aaf0da-9dab-42b6-94a3-d43ce8d16293 Builtin false False Deploy-AzActivity-Log n/a 217aa040-8eb0-451b-b81c-0b8f3d200d5a SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/82f0c3bf-808b-5863-bf9c-231cfbf9598a /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log (Configure Azure Activity logs to stream to specified Log Analytics workspace) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-mg Log Analytics Contributor 92aaf0da-9dab-42b6-94a3-d43ce8d16293 Builtin false False Deploy-Diag-Logs n/a 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/9df772a7-1ce7-5439-ab6b-5d31d69925cc /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs (Enable audit category group resource logging for supported resources to Log Analytics) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Meier, Heinz-MIBELLEGROUP heinz.meier@mibelle.net 06addc33-6298-4f01-9f6b-709193f099cc User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Subs-MibelleOnline-SubscriptionOwner n/a 1bdf326c-8c66-4ba9-8c2d-83312a1ddc02 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-Reader n/a 1c529912-c479-41a1-8a03-e57256720fa4 Group direct 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser n/a 1f3ede05-4301-42b1-8c95-2be94290e93c Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Hasanow, Kilian-MIBELLEGROUP kilian.hasanow@mibelle.net 4270eb01-73cf-4e17-925e-47461737b40e User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Mibelle-AzGovWiz-prod n/a 44b03901-55d2-49a8-af3a-58228a81408c SP APP INT indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-michael.peter csa-michael.peter@MIBCloud.mail.onmicrosoft.com 460bad8a-cc4d-41dc-9ddd-f24ba491e2a6 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner n/a 52364002-4a8b-4808-b4fc-864ed5f7d50d Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Matej Paunovski CSA-matej.paunovski@MIBCloud.onmicrosoft.com 54f81d33-50db-475c-b686-4ef70aa0b4fe User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Ouaouane, Taoufik-MIBELLEGROUP taoufik.ouaouane@mibelle.net 7100d1ce-5bd7-449d-abdd-52a7218922b3 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-NetOps n/a 87e9d07b-5340-455c-b297-8bffe3b86f78 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner n/a 9b120856-d4b2-4862-95df-bedf8d5fe1c3 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-Baswaraj Marotrao Ramshette csa-baswarajmarotrao.ramshette@MIBCloud.onmicrosoft.com 9d8d246b-a1f9-4d9a-a54f-f7ae9f3af2ae User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-SecOps n/a abf39027-4cb4-4298-8951-f984eaf9cb8e Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Baumann, Jürg-MIBELLEGROUP juerg.baumann_mibellegroup.com#EXT#@MIBCloud.onmicrosoft.com bb2279b2-06ab-459a-b981-579701601f8a User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin n/a cb058f58-c629-445f-9a10-75f9fcab694e Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Philipp.Schmidt CSA-Philipp.Schmidt@MIBCloud.onmicrosoft.com e40a73c8-6655-434d-8c8b-fdc4d9213499 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Taoufik.Ouaouane csa-Taoufik.Ouaouane@mibelle.net e58ba28f-09ed-49c3-8f5e-31b05c258cde User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Adrian.Bombelka CSA-Adrian.Bombelka@MIBCloud.onmicrosoft.com e86b38a8-e5d4-4888-b09d-390dcf9a2017 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-mg Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False Enforce-ACSB n/a e1f2e80c-5329-4804-824d-f0b44713985e SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/6e26cd22-b41b-5611-aafc-e2c56b14c060 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/enforce-acsb (Enforce Azure Compute Security Benchmark compliance auditing) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-mg Security Admin fb1c8493-542b-48eb-b624-b4c8fea62acd Builtin false False Deploy-MDEndpointsAMA n/a 7d365a6d-a7ae-4921-beca-5ce854a76960 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/d730d560-adce-52b7-b10c-36a8ad16a6d3 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-mdendpointsama (Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-mg Reservation Purchaser f7b75c60-3036-4b75-91c3-6b41c27c1689 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser 1f3ede05-4301-42b1-8c95-2be94290e93c Group direct True Eligible 11/24/2025 07:50:25
Sub mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-mg Reservation Purchaser f7b75c60-3036-4b75-91c3-6b41c27c1689 Builtin false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser (1f3ede05-4301-42b1-8c95-2be94290e93c) True Eligible 11/24/2025 07:50:25
Sub mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) True Eligible 07/04/2025 22:11:28
Sub mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) True Eligible 07/04/2025 22:11:28
Sub mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) True Eligible 07/04/2025 22:11:28
Sub mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin cb058f58-c629-445f-9a10-75f9fcab694e Group direct True Eligible 07/04/2025 22:11:28
Sub mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) True Eligible 07/04/2025 22:11:28
Sub mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-platform-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3) True Eligible 07/04/2025 22:47:30
Sub mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-platform-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3) True Eligible 07/04/2025 22:47:30
Sub mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-platform-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3) True Eligible 07/04/2025 22:47:30
Sub mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-platform-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3) True Eligible 07/04/2025 22:47:30
Sub mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-platform-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner 9b120856-d4b2-4862-95df-bedf8d5fe1c3 Group direct True Eligible 07/04/2025 22:47:30
Sub mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-platform-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3) True Eligible 07/04/2025 22:47:30
Sub mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-platform-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False CSA-Philipp.Schmidt CSA-Philipp.Schmidt@MIBCloud.onmicrosoft.com e40a73c8-6655-434d-8c8b-fdc4d9213499 User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3) True Eligible 07/04/2025 22:47:30
Mg mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-platform-mg Virtual Machine Contributor 9980e02c-c2be-4d73-94e8-173b1dc7cf3c Builtin false False Enable-AUM-CheckUpdates n/a ce67e461-e4a3-4514-89cb-7eb8802f8f65 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/51e23aa4-bdf1-5059-8efc-453852a14d5e /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates (Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines) 06/12/2025 17:56:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-platform-mg Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False d33eb38085bf40bd860fe43b n/a 78dd5b73-2109-4a10-b2e4-6463304b4b4d SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/21c0b216-76ff-44ef-9430-19f801e102d5 /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/d33eb38085bf40bd860fe43b (Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics) 06/12/2025 18:15:25 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-platform-mg Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False 97339ff59e1744678fd92dea n/a c2b8a553-ec19-42b8-8855-6edc985eaffb SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/71689b0c-ca78-4285-9603-49a5497225d8 /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/97339ff59e1744678fd92dea (Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics) 09/04/2025 07:21:46 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-platform-mg Azure Connected Machine Resource Administrator cd570a14-e51a-42ad-bac8-bafd67325302 Builtin false False Enable-AUM-CheckUpdates n/a ce67e461-e4a3-4514-89cb-7eb8802f8f65 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/d72b7c0f-a23a-58ed-8e0a-40f49a5b6ab3 /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates (Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines) 06/12/2025 17:56:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited mibelle-platform-mg Managed Identity Operator f1a07417-d97a-45cb-824c-7a7467783830 Builtin false False Enable-AUM-CheckUpdates n/a ce67e461-e4a3-4514-89cb-7eb8802f8f65 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/1f97b9d8-3c21-5b8b-9b36-72e77d4a90e0 /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates (Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines) 06/12/2025 17:56:41 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Ten mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management inherited Tenant User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false True CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member direct False /providers/microsoft.authorization/roleassignments/3f958da1-722a-4c03-8398-aab60735ecd3 none 05/07/2025 18:14:55 ObjectType: User Member, ObjectDisplayName: CSA-Jan.Stutz, ObjectSignInName: CSA-Jan.Stutz@MIBCloud.onmicrosoft.com, ObjectId: 43b3e278-6551-4566-83a8-c19abe643e64
Sub mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management thisScope Sub [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False CSA-Selim.Aydin csa-Selim.Aydin@MIBCloud.onmicrosoft.com caa3dcbe-ca40-411a-8344-5d7a2e7fa1b7 User Member direct False /subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/providers/microsoft.authorization/roleassignments/dc0de26f-e06f-4bfb-b831-b75bbdb63c59 none 06/27/2025 10:14:02 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management thisScope Sub SQL Security Manager 056cd41c-7e88-42e1-933e-88ba6a50c9c3 Builtin false False Deploy-AzSqlDb-Auditing n/a afb169da-f80a-4dd6-abf3-b7fc08efb8ae SP MI Sys direct False /subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/providers/microsoft.authorization/roleassignments/ce81334b-c425-5087-9b8d-2119e050082b /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deploy-azsqldb-auditing (Configure SQL servers to have auditing enabled to Log Analytics workspace) 06/12/2025 17:56:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management thisScope Sub Owner 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 Builtin false True CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member direct False /subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/providers/microsoft.authorization/roleassignments/598a693f-b8f8-4beb-8cd6-6df76f1605b6 none 06/10/2025 07:28:11 IsNullOrEmpty
Sub mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management thisScope Sub Log Analytics Contributor 92aaf0da-9dab-42b6-94a3-d43ce8d16293 Builtin false False Deploy-AzSqlDb-Auditing n/a afb169da-f80a-4dd6-abf3-b7fc08efb8ae SP MI Sys direct False /subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/providers/microsoft.authorization/roleassignments/fbb2af70-7587-52bd-b3e1-54fcdbdb7ea4 /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deploy-azsqldb-auditing (Configure SQL servers to have auditing enabled to Log Analytics workspace) 06/12/2025 17:56:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management thisScope Sub v1-custom-role-fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b 4295cd5f-8c43-984e-3417-b65aa1e071e1 Custom true False v1-app-registration-fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b n/a 46c6a007-6a92-4e2c-bd31-26bc55b525e9 SP APP INT direct False /subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/providers/microsoft.authorization/roleassignments/e879571e-60d0-6592-13af-0c7083fe839b none 10/16/2025 07:01:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Res mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management thisScope Sub RG Res Key Vault Secrets Officer b86a8fe4-44ce-4948-aee5-eccb2c155cd7 Builtin true False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member direct False /subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-aztools-prod-rg/providers/microsoft.keyvault/vaults/mibmgmtaztoolspeuwkv01/providers/microsoft.authorization/roleassignments/a0b645af-25c6-4b05-8a89-947b83f4c2d5 none 07/01/2025 22:33:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Res mibelle-platform-management-mg Management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management thisScope Sub RG Res Key Vault Secrets Officer b86a8fe4-44ce-4948-aee5-eccb2c155cd7 Builtin true False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member direct False /subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-aztools-prod-rg/providers/microsoft.keyvault/vaults/mibmgmtaztoolspeuwkv01/providers/microsoft.authorization/roleassignments/ad224ff9-38cc-4564-a106-664bb61651a6 none 07/01/2025 22:33:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-online-mg Online inherited mibelle-landingzones-mg SQL Security Manager 056cd41c-7e88-42e1-933e-88ba6a50c9c3 Builtin false False Deploy-AzSqlDb-Auditing n/a afb169da-f80a-4dd6-abf3-b7fc08efb8ae SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/2f1eab15-c92e-52cd-8b0c-a60e52f1b331 /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deploy-azsqldb-auditing (Configure SQL servers to have auditing enabled to Log Analytics workspace) 06/12/2025 17:56:41 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-online-mg Online inherited mibelle-landingzones-mg Log Analytics Contributor 92aaf0da-9dab-42b6-94a3-d43ce8d16293 Builtin false False Deploy-AzSqlDb-Auditing n/a afb169da-f80a-4dd6-abf3-b7fc08efb8ae SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/488f45ec-c535-5f65-85bf-acacd1bb93e8 /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deploy-azsqldb-auditing (Configure SQL servers to have auditing enabled to Log Analytics workspace) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-online-mg Online inherited mibelle-landingzones-mg Virtual Machine Contributor 9980e02c-c2be-4d73-94e8-173b1dc7cf3c Builtin false False Enable-AUM-CheckUpdates n/a 4f27b633-c16b-47a6-ab24-737bb6cdad56 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/571da045-f503-5cb2-b123-ede8cfe0f15a /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates (Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines) 06/12/2025 17:56:38 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-online-mg Online inherited mibelle-landingzones-mg SQL DB Contributor 9b7fa17d-e63e-47b0-bb0a-15c516ac86ec Builtin false False Deploy-SQL-TDE n/a de5ed213-fd75-471c-8d32-920072d6c378 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/af2f6b24-ac34-5f3b-9249-5a109d9d1528 /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deploy-sql-tde (Deploy SQL DB transparent data encryption) 06/12/2025 17:56:38 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-online-mg Online inherited mibelle-landingzones-mg Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False 52a8c671384a4b609f1d7651 n/a 6e0d029a-fce4-400f-bff3-45b8d9a8342e SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/94dfdb33-b864-47c9-831d-366721beb989 /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/52a8c671384a4b609f1d7651 (Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics) 09/04/2025 06:12:52 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-online-mg Online inherited mibelle-landingzones-mg Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False e9143c36572348c3ba0c67b1 n/a 9c3b725e-ce85-47ac-bf6f-c2fa0571c259 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/3fb7bac5-2328-4e74-a5b0-0d6d2a631693 /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/e9143c36572348c3ba0c67b1 (Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics) 09/04/2025 07:18:00 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-online-mg Online inherited mibelle-landingzones-mg Azure Connected Machine Resource Administrator cd570a14-e51a-42ad-bac8-bafd67325302 Builtin false False Enable-AUM-CheckUpdates n/a 4f27b633-c16b-47a6-ab24-737bb6cdad56 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/7d65b18e-df43-5353-85a4-716e68ff7c7a /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates (Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-online-mg Online inherited mibelle-landingzones-mg Managed Identity Operator f1a07417-d97a-45cb-824c-7a7467783830 Builtin false False Enable-AUM-CheckUpdates n/a 4f27b633-c16b-47a6-ab24-737bb6cdad56 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/b2c88903-f3a4-54ec-813c-46d650309b86 /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates (Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-online-mg Online inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/e14ef9ac-25e8-4ee7-887a-a6576bd5229d none 11/28/2025 07:57:36 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-online-mg Online inherited mibelle-mg Monitoring Contributor 749f88d5-cbae-40b8-bcfc-e573ddc772fa Builtin false False Deploy-AzActivity-Log n/a 217aa040-8eb0-451b-b81c-0b8f3d200d5a SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/dcb59c88-f014-5e17-840c-6c9aecc66286 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log (Configure Azure Activity logs to stream to specified Log Analytics workspace) 06/12/2025 17:56:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-online-mg Online inherited mibelle-mg Monitoring Contributor 749f88d5-cbae-40b8-bcfc-e573ddc772fa Builtin false False Deploy-Diag-Logs n/a 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b922046a-7a3e-59da-a982-8a5b855791ce /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs (Enable audit category group resource logging for supported resources to Log Analytics) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-online-mg Online inherited mibelle-mg Log Analytics Contributor 92aaf0da-9dab-42b6-94a3-d43ce8d16293 Builtin false False Deploy-AzActivity-Log n/a 217aa040-8eb0-451b-b81c-0b8f3d200d5a SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/82f0c3bf-808b-5863-bf9c-231cfbf9598a /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log (Configure Azure Activity logs to stream to specified Log Analytics workspace) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-online-mg Online inherited mibelle-mg Log Analytics Contributor 92aaf0da-9dab-42b6-94a3-d43ce8d16293 Builtin false False Deploy-Diag-Logs n/a 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/9df772a7-1ce7-5439-ab6b-5d31d69925cc /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs (Enable audit category group resource logging for supported resources to Log Analytics) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-online-mg Online inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Meier, Heinz-MIBELLEGROUP heinz.meier@mibelle.net 06addc33-6298-4f01-9f6b-709193f099cc User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-online-mg Online inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Subs-MibelleOnline-SubscriptionOwner n/a 1bdf326c-8c66-4ba9-8c2d-83312a1ddc02 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-online-mg Online inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-Reader n/a 1c529912-c479-41a1-8a03-e57256720fa4 Group direct 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-online-mg Online inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser n/a 1f3ede05-4301-42b1-8c95-2be94290e93c Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-online-mg Online inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-online-mg Online inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-online-mg Online inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Hasanow, Kilian-MIBELLEGROUP kilian.hasanow@mibelle.net 4270eb01-73cf-4e17-925e-47461737b40e User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-online-mg Online inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-online-mg Online inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Mibelle-AzGovWiz-prod n/a 44b03901-55d2-49a8-af3a-58228a81408c SP APP INT indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-online-mg Online inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-michael.peter csa-michael.peter@MIBCloud.mail.onmicrosoft.com 460bad8a-cc4d-41dc-9ddd-f24ba491e2a6 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-online-mg Online inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-online-mg Online inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner n/a 52364002-4a8b-4808-b4fc-864ed5f7d50d Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-online-mg Online inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Matej Paunovski CSA-matej.paunovski@MIBCloud.onmicrosoft.com 54f81d33-50db-475c-b686-4ef70aa0b4fe User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-online-mg Online inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Ouaouane, Taoufik-MIBELLEGROUP taoufik.ouaouane@mibelle.net 7100d1ce-5bd7-449d-abdd-52a7218922b3 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-online-mg Online inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-NetOps n/a 87e9d07b-5340-455c-b297-8bffe3b86f78 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-online-mg Online inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner n/a 9b120856-d4b2-4862-95df-bedf8d5fe1c3 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-online-mg Online inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-Baswaraj Marotrao Ramshette csa-baswarajmarotrao.ramshette@MIBCloud.onmicrosoft.com 9d8d246b-a1f9-4d9a-a54f-f7ae9f3af2ae User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-online-mg Online inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-SecOps n/a abf39027-4cb4-4298-8951-f984eaf9cb8e Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-online-mg Online inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Baumann, Jürg-MIBELLEGROUP juerg.baumann_mibellegroup.com#EXT#@MIBCloud.onmicrosoft.com bb2279b2-06ab-459a-b981-579701601f8a User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-online-mg Online inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin n/a cb058f58-c629-445f-9a10-75f9fcab694e Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-online-mg Online inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-online-mg Online inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Philipp.Schmidt CSA-Philipp.Schmidt@MIBCloud.onmicrosoft.com e40a73c8-6655-434d-8c8b-fdc4d9213499 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-online-mg Online inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Taoufik.Ouaouane csa-Taoufik.Ouaouane@mibelle.net e58ba28f-09ed-49c3-8f5e-31b05c258cde User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-online-mg Online inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Adrian.Bombelka CSA-Adrian.Bombelka@MIBCloud.onmicrosoft.com e86b38a8-e5d4-4888-b09d-390dcf9a2017 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-online-mg Online inherited mibelle-mg Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False Enforce-ACSB n/a e1f2e80c-5329-4804-824d-f0b44713985e SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/6e26cd22-b41b-5611-aafc-e2c56b14c060 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/enforce-acsb (Enforce Azure Compute Security Benchmark compliance auditing) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-online-mg Online inherited mibelle-mg Security Admin fb1c8493-542b-48eb-b624-b4c8fea62acd Builtin false False Deploy-MDEndpointsAMA n/a 7d365a6d-a7ae-4921-beca-5ce854a76960 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/d730d560-adce-52b7-b10c-36a8ad16a6d3 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-mdendpointsama (Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Ten mibelle-landingzones-online-mg Online inherited Tenant User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false True CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member direct False /providers/microsoft.authorization/roleassignments/3f958da1-722a-4c03-8398-aab60735ecd3 none 05/07/2025 18:14:55 ObjectType: User Member, ObjectDisplayName: CSA-Jan.Stutz, ObjectSignInName: CSA-Jan.Stutz@MIBCloud.onmicrosoft.com, ObjectId: 43b3e278-6551-4566-83a8-c19abe643e64
Sub mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-landingzones-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner (52364002-4a8b-4808-b4fc-864ed5f7d50d) True Eligible 07/04/2025 22:45:52
Sub mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-landingzones-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member nested SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner (52364002-4a8b-4808-b4fc-864ed5f7d50d) True Eligible 07/04/2025 22:45:52
Sub mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-landingzones-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False csa-michael.peter csa-michael.peter@MIBCloud.mail.onmicrosoft.com 460bad8a-cc4d-41dc-9ddd-f24ba491e2a6 User Member nested SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner (52364002-4a8b-4808-b4fc-864ed5f7d50d) True Eligible 07/04/2025 22:45:52
Sub mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-landingzones-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner (52364002-4a8b-4808-b4fc-864ed5f7d50d) True Eligible 07/04/2025 22:45:52
Sub mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-landingzones-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner 52364002-4a8b-4808-b4fc-864ed5f7d50d Group direct True Eligible 07/04/2025 22:45:52
Sub mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-landingzones-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member nested SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner (52364002-4a8b-4808-b4fc-864ed5f7d50d) True Eligible 07/04/2025 22:45:52
Mg mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-landingzones-mg SQL Security Manager 056cd41c-7e88-42e1-933e-88ba6a50c9c3 Builtin false False Deploy-AzSqlDb-Auditing n/a afb169da-f80a-4dd6-abf3-b7fc08efb8ae SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/2f1eab15-c92e-52cd-8b0c-a60e52f1b331 /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deploy-azsqldb-auditing (Configure SQL servers to have auditing enabled to Log Analytics workspace) 06/12/2025 17:56:41 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-landingzones-mg Log Analytics Contributor 92aaf0da-9dab-42b6-94a3-d43ce8d16293 Builtin false False Deploy-AzSqlDb-Auditing n/a afb169da-f80a-4dd6-abf3-b7fc08efb8ae SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/488f45ec-c535-5f65-85bf-acacd1bb93e8 /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deploy-azsqldb-auditing (Configure SQL servers to have auditing enabled to Log Analytics workspace) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-landingzones-mg Virtual Machine Contributor 9980e02c-c2be-4d73-94e8-173b1dc7cf3c Builtin false False Enable-AUM-CheckUpdates n/a 4f27b633-c16b-47a6-ab24-737bb6cdad56 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/571da045-f503-5cb2-b123-ede8cfe0f15a /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates (Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines) 06/12/2025 17:56:38 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-landingzones-mg SQL DB Contributor 9b7fa17d-e63e-47b0-bb0a-15c516ac86ec Builtin false False Deploy-SQL-TDE n/a de5ed213-fd75-471c-8d32-920072d6c378 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/af2f6b24-ac34-5f3b-9249-5a109d9d1528 /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deploy-sql-tde (Deploy SQL DB transparent data encryption) 06/12/2025 17:56:38 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-landingzones-mg Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False 52a8c671384a4b609f1d7651 n/a 6e0d029a-fce4-400f-bff3-45b8d9a8342e SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/94dfdb33-b864-47c9-831d-366721beb989 /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/52a8c671384a4b609f1d7651 (Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics) 09/04/2025 06:12:52 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-landingzones-mg Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False e9143c36572348c3ba0c67b1 n/a 9c3b725e-ce85-47ac-bf6f-c2fa0571c259 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/3fb7bac5-2328-4e74-a5b0-0d6d2a631693 /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/e9143c36572348c3ba0c67b1 (Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics) 09/04/2025 07:18:00 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-landingzones-mg Azure Connected Machine Resource Administrator cd570a14-e51a-42ad-bac8-bafd67325302 Builtin false False Enable-AUM-CheckUpdates n/a 4f27b633-c16b-47a6-ab24-737bb6cdad56 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/7d65b18e-df43-5353-85a4-716e68ff7c7a /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates (Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-landingzones-mg Managed Identity Operator f1a07417-d97a-45cb-824c-7a7467783830 Builtin false False Enable-AUM-CheckUpdates n/a 4f27b633-c16b-47a6-ab24-737bb6cdad56 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/b2c88903-f3a4-54ec-813c-46d650309b86 /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates (Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-landingzones-mg Key Vault Administrator 00482a5a-887f-4fb3-b363-3b7fe8e74483 Builtin false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member nested SGU-MIB-RES-Azure-Magr-MibelleLandingZone-KeyVaultAdmin (dc72503d-d80a-4f41-969b-59a0818f358c) True Eligible 09/05/2025 06:41:41
Sub mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-landingzones-mg Key Vault Administrator 00482a5a-887f-4fb3-b363-3b7fe8e74483 Builtin false False csa-michael.peter csa-michael.peter@MIBCloud.mail.onmicrosoft.com 460bad8a-cc4d-41dc-9ddd-f24ba491e2a6 User Member nested SGU-MIB-RES-Azure-Magr-MibelleLandingZone-KeyVaultAdmin (dc72503d-d80a-4f41-969b-59a0818f358c) True Eligible 09/05/2025 06:41:41
Sub mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-landingzones-mg Key Vault Administrator 00482a5a-887f-4fb3-b363-3b7fe8e74483 Builtin false False SGU-MIB-RES-Azure-Magr-MibelleLandingZone-KeyVaultAdmin dc72503d-d80a-4f41-969b-59a0818f358c Group direct True Eligible 09/05/2025 06:41:41
Sub mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-landingzones-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False SGU-MIB-RES-Azure-Magr-MibelleLandingZone-UserAccessAdmin 45d94cc4-a927-422c-a9a3-a0cfa1684fd7 Group direct True Eligible 09/05/2025 06:26:15
Sub mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-landingzones-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False csa-michael.peter csa-michael.peter@MIBCloud.mail.onmicrosoft.com 460bad8a-cc4d-41dc-9ddd-f24ba491e2a6 User Member nested SGU-MIB-RES-Azure-Magr-MibelleLandingZone-UserAccessAdmin (45d94cc4-a927-422c-a9a3-a0cfa1684fd7) True Eligible 09/05/2025 06:26:15
Sub mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) True Eligible 07/04/2025 22:17:51
Mg mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/e14ef9ac-25e8-4ee7-887a-a6576bd5229d none 11/28/2025 07:57:36 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Sub mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) True Eligible 07/04/2025 22:17:51
Sub mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) True Eligible 07/04/2025 22:17:51
Sub mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) True Eligible 07/04/2025 22:17:51
Sub mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False SGU-MIB-RES-Azure-Magr-Mibelle-NetOps 87e9d07b-5340-455c-b297-8bffe3b86f78 Group direct True Eligible 07/04/2025 22:17:51
Sub mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) True Eligible 07/04/2025 22:17:51
Sub mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-mg [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e) True Eligible 07/04/2025 22:17:18
Sub mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-mg [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e) True Eligible 07/04/2025 22:17:18
Sub mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-mg [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e) True Eligible 07/04/2025 22:17:18
Sub mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-mg [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False SGU-MIB-RES-Azure-Magr-Mibelle-SecOps abf39027-4cb4-4298-8951-f984eaf9cb8e Group direct True Eligible 07/04/2025 22:17:18
Mg mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-mg Monitoring Contributor 749f88d5-cbae-40b8-bcfc-e573ddc772fa Builtin false False Deploy-AzActivity-Log n/a 217aa040-8eb0-451b-b81c-0b8f3d200d5a SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/dcb59c88-f014-5e17-840c-6c9aecc66286 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log (Configure Azure Activity logs to stream to specified Log Analytics workspace) 06/12/2025 17:56:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-mg Monitoring Contributor 749f88d5-cbae-40b8-bcfc-e573ddc772fa Builtin false False Deploy-Diag-Logs n/a 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b922046a-7a3e-59da-a982-8a5b855791ce /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs (Enable audit category group resource logging for supported resources to Log Analytics) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-mg Log Analytics Contributor 92aaf0da-9dab-42b6-94a3-d43ce8d16293 Builtin false False Deploy-AzActivity-Log n/a 217aa040-8eb0-451b-b81c-0b8f3d200d5a SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/82f0c3bf-808b-5863-bf9c-231cfbf9598a /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log (Configure Azure Activity logs to stream to specified Log Analytics workspace) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-mg Log Analytics Contributor 92aaf0da-9dab-42b6-94a3-d43ce8d16293 Builtin false False Deploy-Diag-Logs n/a 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/9df772a7-1ce7-5439-ab6b-5d31d69925cc /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs (Enable audit category group resource logging for supported resources to Log Analytics) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Meier, Heinz-MIBELLEGROUP heinz.meier@mibelle.net 06addc33-6298-4f01-9f6b-709193f099cc User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Subs-MibelleOnline-SubscriptionOwner n/a 1bdf326c-8c66-4ba9-8c2d-83312a1ddc02 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-Reader n/a 1c529912-c479-41a1-8a03-e57256720fa4 Group direct 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser n/a 1f3ede05-4301-42b1-8c95-2be94290e93c Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Hasanow, Kilian-MIBELLEGROUP kilian.hasanow@mibelle.net 4270eb01-73cf-4e17-925e-47461737b40e User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Mibelle-AzGovWiz-prod n/a 44b03901-55d2-49a8-af3a-58228a81408c SP APP INT indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-michael.peter csa-michael.peter@MIBCloud.mail.onmicrosoft.com 460bad8a-cc4d-41dc-9ddd-f24ba491e2a6 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner n/a 52364002-4a8b-4808-b4fc-864ed5f7d50d Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Matej Paunovski CSA-matej.paunovski@MIBCloud.onmicrosoft.com 54f81d33-50db-475c-b686-4ef70aa0b4fe User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Ouaouane, Taoufik-MIBELLEGROUP taoufik.ouaouane@mibelle.net 7100d1ce-5bd7-449d-abdd-52a7218922b3 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-NetOps n/a 87e9d07b-5340-455c-b297-8bffe3b86f78 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner n/a 9b120856-d4b2-4862-95df-bedf8d5fe1c3 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-Baswaraj Marotrao Ramshette csa-baswarajmarotrao.ramshette@MIBCloud.onmicrosoft.com 9d8d246b-a1f9-4d9a-a54f-f7ae9f3af2ae User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-SecOps n/a abf39027-4cb4-4298-8951-f984eaf9cb8e Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Baumann, Jürg-MIBELLEGROUP juerg.baumann_mibellegroup.com#EXT#@MIBCloud.onmicrosoft.com bb2279b2-06ab-459a-b981-579701601f8a User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin n/a cb058f58-c629-445f-9a10-75f9fcab694e Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Philipp.Schmidt CSA-Philipp.Schmidt@MIBCloud.onmicrosoft.com e40a73c8-6655-434d-8c8b-fdc4d9213499 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Taoufik.Ouaouane csa-Taoufik.Ouaouane@mibelle.net e58ba28f-09ed-49c3-8f5e-31b05c258cde User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Adrian.Bombelka CSA-Adrian.Bombelka@MIBCloud.onmicrosoft.com e86b38a8-e5d4-4888-b09d-390dcf9a2017 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) True Assigned 07/04/2025 22:16:52 eternity /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
Mg mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-mg Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False Enforce-ACSB n/a e1f2e80c-5329-4804-824d-f0b44713985e SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/6e26cd22-b41b-5611-aafc-e2c56b14c060 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/enforce-acsb (Enforce Azure Compute Security Benchmark compliance auditing) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Mg mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-mg Security Admin fb1c8493-542b-48eb-b624-b4c8fea62acd Builtin false False Deploy-MDEndpointsAMA n/a 7d365a6d-a7ae-4921-beca-5ce854a76960 SP MI Sys direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/d730d560-adce-52b7-b10c-36a8ad16a6d3 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-mdendpointsama (Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Sub mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-mg Reservation Purchaser f7b75c60-3036-4b75-91c3-6b41c27c1689 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser 1f3ede05-4301-42b1-8c95-2be94290e93c Group direct True Eligible 11/24/2025 07:50:25
Sub mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-mg Reservation Purchaser f7b75c60-3036-4b75-91c3-6b41c27c1689 Builtin false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser (1f3ede05-4301-42b1-8c95-2be94290e93c) True Eligible 11/24/2025 07:50:25
Sub mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) True Eligible 07/04/2025 22:11:28
Sub mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) True Eligible 07/04/2025 22:11:28
Sub mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) True Eligible 07/04/2025 22:11:28
Sub mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin cb058f58-c629-445f-9a10-75f9fcab694e Group direct True Eligible 07/04/2025 22:11:28
Sub mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) True Eligible 07/04/2025 22:11:28
Ten mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online inherited Tenant User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false True CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member direct False /providers/microsoft.authorization/roleassignments/3f958da1-722a-4c03-8398-aab60735ecd3 none 05/07/2025 18:14:55 ObjectType: User Member, ObjectDisplayName: CSA-Jan.Stutz, ObjectSignInName: CSA-Jan.Stutz@MIBCloud.onmicrosoft.com, ObjectId: 43b3e278-6551-4566-83a8-c19abe643e64
Sub mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online thisScope Sub [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False SGU-MIB-RES-Azure-Subs-MibelleOnline-SubscriptionOwner 1bdf326c-8c66-4ba9-8c2d-83312a1ddc02 Group direct True Eligible 10/23/2025 12:06:19
Sub mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online thisScope Sub [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False CSA-Matej Paunovski CSA-matej.paunovski@MIBCloud.onmicrosoft.com 54f81d33-50db-475c-b686-4ef70aa0b4fe User Member nested SGU-MIB-RES-Azure-Subs-MibelleOnline-SubscriptionOwner (1bdf326c-8c66-4ba9-8c2d-83312a1ddc02) True Eligible 10/23/2025 12:06:19
Sub mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online thisScope Sub [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False Ouaouane, Taoufik-MIBELLEGROUP taoufik.ouaouane@mibelle.net 7100d1ce-5bd7-449d-abdd-52a7218922b3 User Member nested SGU-MIB-RES-Azure-Subs-MibelleOnline-SubscriptionOwner (1bdf326c-8c66-4ba9-8c2d-83312a1ddc02) True Eligible 10/23/2025 12:06:19
Sub mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online thisScope Sub [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False Baumann, Jürg-MIBELLEGROUP juerg.baumann_mibellegroup.com#EXT#@MIBCloud.onmicrosoft.com bb2279b2-06ab-459a-b981-579701601f8a User Member nested SGU-MIB-RES-Azure-Subs-MibelleOnline-SubscriptionOwner (1bdf326c-8c66-4ba9-8c2d-83312a1ddc02) True Eligible 10/23/2025 12:06:19
Sub mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online thisScope Sub [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False CSA-Taoufik.Ouaouane csa-Taoufik.Ouaouane@mibelle.net e58ba28f-09ed-49c3-8f5e-31b05c258cde User Member nested SGU-MIB-RES-Azure-Subs-MibelleOnline-SubscriptionOwner (1bdf326c-8c66-4ba9-8c2d-83312a1ddc02) True Eligible 10/23/2025 12:06:19
Sub mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online thisScope Sub Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False SGU-MIB-RES-Azure-Subs-MibelleOnline-SubscriptionOwner 1bdf326c-8c66-4ba9-8c2d-83312a1ddc02 Group direct True Eligible 07/10/2025 11:13:23
Sub mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online thisScope Sub Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False CSA-Matej Paunovski CSA-matej.paunovski@MIBCloud.onmicrosoft.com 54f81d33-50db-475c-b686-4ef70aa0b4fe User Member nested SGU-MIB-RES-Azure-Subs-MibelleOnline-SubscriptionOwner (1bdf326c-8c66-4ba9-8c2d-83312a1ddc02) True Eligible 07/10/2025 11:13:23
Sub mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online thisScope Sub Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False Ouaouane, Taoufik-MIBELLEGROUP taoufik.ouaouane@mibelle.net 7100d1ce-5bd7-449d-abdd-52a7218922b3 User Member nested SGU-MIB-RES-Azure-Subs-MibelleOnline-SubscriptionOwner (1bdf326c-8c66-4ba9-8c2d-83312a1ddc02) True Eligible 07/10/2025 11:13:23
Sub mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online thisScope Sub Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False Baumann, Jürg-MIBELLEGROUP juerg.baumann_mibellegroup.com#EXT#@MIBCloud.onmicrosoft.com bb2279b2-06ab-459a-b981-579701601f8a User Member nested SGU-MIB-RES-Azure-Subs-MibelleOnline-SubscriptionOwner (1bdf326c-8c66-4ba9-8c2d-83312a1ddc02) True Eligible 07/10/2025 11:13:23
Sub mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online thisScope Sub Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False CSA-Taoufik.Ouaouane csa-Taoufik.Ouaouane@mibelle.net e58ba28f-09ed-49c3-8f5e-31b05c258cde User Member nested SGU-MIB-RES-Azure-Subs-MibelleOnline-SubscriptionOwner (1bdf326c-8c66-4ba9-8c2d-83312a1ddc02) True Eligible 07/10/2025 11:13:23
Sub mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online thisScope Sub v1-custom-role-3b2fdc69-67a4-42f2-a43e-b7fbad489b03 eac9e3ff-ee3d-0ea4-b91b-4b1cde3da152 Custom true False v1-app-registration-3b2fdc69-67a4-42f2-a43e-b7fbad489b03 n/a edfd1a69-18da-4f39-9a1e-230cb16f6150 SP APP INT direct False /subscriptions/3b2fdc69-67a4-42f2-a43e-b7fbad489b03/providers/microsoft.authorization/roleassignments/9b0f48a6-860b-62b0-7aac-a130722bfac4 none 10/16/2025 07:09:17 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
RG mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online thisScope Sub RG [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False SGU-MIB-RES-Azure-Rsgp-MibellePpsFabricProdRg-subscriptionOwner n/a 5e90f4a0-bef5-41db-8e9c-7b8b8ef3e6c2 Group direct 2 (Usr: 2, Grp: 0, SP: 0) False /subscriptions/3b2fdc69-67a4-42f2-a43e-b7fbad489b03/resourcegroups/mibelle-pps-fabric-prod-rg/providers/microsoft.authorization/roleassignments/7a355ecd-0d09-4e01-a413-cdffcd25bcca none 11/27/2025 11:40:14 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
RG mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online thisScope Sub RG [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False CSA-Ramon.Banz csa-ramon.banz@MIBCloud.onmicrosoft.com 6bc05491-37ba-40b4-b726-f304409d466f User Member indirect SGU-MIB-RES-Azure-Rsgp-MibellePpsFabricProdRg-subscriptionOwner (5e90f4a0-bef5-41db-8e9c-7b8b8ef3e6c2) 2 (Usr: 2, Grp: 0, SP: 0) False /subscriptions/3b2fdc69-67a4-42f2-a43e-b7fbad489b03/resourcegroups/mibelle-pps-fabric-prod-rg/providers/microsoft.authorization/roleassignments/7a355ecd-0d09-4e01-a413-cdffcd25bcca none 11/27/2025 11:40:14 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
RG mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online thisScope Sub RG [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False PowerBI-MIBELLEGROUP powerbi@mibelle.net 7438f8fb-ba2c-4b7e-9986-02074ceb2148 User Member indirect SGU-MIB-RES-Azure-Rsgp-MibellePpsFabricProdRg-subscriptionOwner (5e90f4a0-bef5-41db-8e9c-7b8b8ef3e6c2) 2 (Usr: 2, Grp: 0, SP: 0) False /subscriptions/3b2fdc69-67a4-42f2-a43e-b7fbad489b03/resourcegroups/mibelle-pps-fabric-prod-rg/providers/microsoft.authorization/roleassignments/7a355ecd-0d09-4e01-a413-cdffcd25bcca none 11/27/2025 11:40:14 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
RG mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online thisScope Sub RG Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False PowerBI-MIBELLEGROUP powerbi@mibelle.net 7438f8fb-ba2c-4b7e-9986-02074ceb2148 User Member direct False /subscriptions/3b2fdc69-67a4-42f2-a43e-b7fbad489b03/resourcegroups/mibelle-pps-fabric-prod-rg/providers/microsoft.authorization/roleassignments/a44c7b97-c33e-44bc-aaf0-58e77139f2c0 none 07/08/2025 05:47:42 ObjectType: User Member, ObjectDisplayName: CSA-Jan.Stutz, ObjectSignInName: CSA-Jan.Stutz@MIBCloud.onmicrosoft.com, ObjectId: 43b3e278-6551-4566-83a8-c19abe643e64
Res mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online thisScope Sub RG Res Key Vault Administrator 00482a5a-887f-4fb3-b363-3b7fe8e74483 Builtin true False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member direct False /subscriptions/3b2fdc69-67a4-42f2-a43e-b7fbad489b03/resourcegroups/mibelle-pki-prod-rg/providers/microsoft.keyvault/vaults/mibpkiscepmanprodeuwkv01/providers/microsoft.authorization/roleassignments/3d1e6154-69b8-48e6-b175-836b3f889e52 none 08/14/2025 15:50:00 ObjectType: User Member, ObjectDisplayName: csa-silvan.buehler, ObjectSignInName: csa-silvan.buehler@MIBCloud.onmicrosoft.com, ObjectId: 3bdc8531-5824-4ddc-82b1-dc494b4a1022
Res mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online thisScope Sub RG Res Storage Table Data Contributor 0a9a7e1f-b9d0-4cc4-a60d-0319b160aaa3 Builtin true False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member direct False /subscriptions/3b2fdc69-67a4-42f2-a43e-b7fbad489b03/resourcegroups/mibelle-pki-prod-rg/providers/microsoft.storage/storageaccounts/mibpkiscepmanpeuwst01/providers/microsoft.authorization/roleassignments/2cee37e3-7f5b-4e1f-a1c5-31b64a5256cf none 08/14/2025 15:49:39 ObjectType: User Member, ObjectDisplayName: csa-silvan.buehler, ObjectSignInName: csa-silvan.buehler@MIBCloud.onmicrosoft.com, ObjectId: 3bdc8531-5824-4ddc-82b1-dc494b4a1022
Res mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online thisScope Sub RG Res Storage Table Data Contributor 0a9a7e1f-b9d0-4cc4-a60d-0319b160aaa3 Builtin true False mibelle-pki-scepman-prod-euw-app-02 n/a 728ba4e5-6cd6-49e3-ba75-73eed711472e SP MI Sys direct False /subscriptions/3b2fdc69-67a4-42f2-a43e-b7fbad489b03/resourcegroups/mibelle-pki-prod-rg/providers/microsoft.storage/storageaccounts/mibpkiscepmanpeuwst01/providers/microsoft.authorization/roleassignments/cb8d8035-f17e-5773-b3cd-9bc205c49462 none 08/13/2025 09:25:14 ObjectType: User Member, ObjectDisplayName: csa-silvan.buehler, ObjectSignInName: csa-silvan.buehler@MIBCloud.onmicrosoft.com, ObjectId: 3bdc8531-5824-4ddc-82b1-dc494b4a1022
Res mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online thisScope Sub RG Res Storage Table Data Contributor 0a9a7e1f-b9d0-4cc4-a60d-0319b160aaa3 Builtin true False mibelle-pki-scepman-prod-euw-app-01 n/a ac50c0d4-0669-41e7-8e20-fc13dccf2ba7 SP MI Sys direct False /subscriptions/3b2fdc69-67a4-42f2-a43e-b7fbad489b03/resourcegroups/mibelle-pki-prod-rg/providers/microsoft.storage/storageaccounts/mibpkiscepmanpeuwst01/providers/microsoft.authorization/roleassignments/ce999a25-62f1-503b-9284-ee6c1ecb8063 none 08/13/2025 09:25:14 ObjectType: User Member, ObjectDisplayName: csa-silvan.buehler, ObjectSignInName: csa-silvan.buehler@MIBCloud.onmicrosoft.com, ObjectId: 3bdc8531-5824-4ddc-82b1-dc494b4a1022
Res mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online thisScope Sub RG Res Key Vault Crypto Officer 14b46e9e-c2b7-41b4-b07b-48a6ebf60603 Builtin true False mibelle-pki-scepman-prod-euw-app-01 n/a ac50c0d4-0669-41e7-8e20-fc13dccf2ba7 SP MI Sys direct False /subscriptions/3b2fdc69-67a4-42f2-a43e-b7fbad489b03/resourcegroups/mibelle-pki-prod-rg/providers/microsoft.keyvault/vaults/mibpkiscepmanprodeuwkv01/providers/microsoft.authorization/roleassignments/5a500fc5-5a6b-59b2-8f9c-9e1ca3b6648b none 08/13/2025 09:26:50 ObjectType: User Member, ObjectDisplayName: csa-silvan.buehler, ObjectSignInName: csa-silvan.buehler@MIBCloud.onmicrosoft.com, ObjectId: 3bdc8531-5824-4ddc-82b1-dc494b4a1022
Res mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online thisScope Sub RG Res Key Vault Secrets User 4633458b-17de-408a-b874-0445c86b69e6 Builtin true False mibelle-aut-psu-dev-euw-app-01 n/a 1f7c7c55-02e4-4af0-8ee0-e2d5f82a9ab5 SP MI Sys direct False /subscriptions/3b2fdc69-67a4-42f2-a43e-b7fbad489b03/resourcegroups/mibelle-aut-psu-dev-rg/providers/microsoft.keyvault/vaults/mibautpsudeveuwkv02/providers/microsoft.authorization/roleassignments/ecd99364-f831-42b0-a1e5-01cb2453febf none 09/25/2025 11:19:03 ObjectType: User Member, ObjectDisplayName: csa-michael.peter, ObjectSignInName: csa-michael.peter@MIBCloud.mail.onmicrosoft.com, ObjectId: 460bad8a-cc4d-41dc-9ddd-f24ba491e2a6
Res mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online thisScope Sub RG Res Key Vault Secrets User 4633458b-17de-408a-b874-0445c86b69e6 Builtin true False n/a n/a 4ef8a0ea-f2d8-46a5-a42f-0c27aab2e547 Unknown direct False /subscriptions/3b2fdc69-67a4-42f2-a43e-b7fbad489b03/resourcegroups/mibelle-aut-psu-dev-rg/providers/microsoft.keyvault/vaults/mibautpsudeveuwkv02/providers/microsoft.authorization/roleassignments/7955be54-b468-4122-9493-9ec643a6c0d0 none 09/25/2025 09:49:21 ObjectType: User Member, ObjectDisplayName: csa-michael.peter, ObjectSignInName: csa-michael.peter@MIBCloud.mail.onmicrosoft.com, ObjectId: 460bad8a-cc4d-41dc-9ddd-f24ba491e2a6
Res mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online thisScope Sub RG Res Key Vault Secrets User 4633458b-17de-408a-b874-0445c86b69e6 Builtin true False mibelle-pki-scepman-prod-euw-app-01 n/a ac50c0d4-0669-41e7-8e20-fc13dccf2ba7 SP MI Sys direct False /subscriptions/3b2fdc69-67a4-42f2-a43e-b7fbad489b03/resourcegroups/mibelle-pki-prod-rg/providers/microsoft.keyvault/vaults/mibpkiscepmanprodeuwkv01/providers/microsoft.authorization/roleassignments/90685712-7a4d-5754-9c62-b7631674c16b none 08/13/2025 09:26:50 ObjectType: User Member, ObjectDisplayName: csa-silvan.buehler, ObjectSignInName: csa-silvan.buehler@MIBCloud.onmicrosoft.com, ObjectId: 3bdc8531-5824-4ddc-82b1-dc494b4a1022
Res mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online thisScope Sub RG Res Key Vault Certificates Officer a4417e6f-fecd-4de8-b567-7b0420556985 Builtin true False mibelle-pki-scepman-prod-euw-app-01 n/a ac50c0d4-0669-41e7-8e20-fc13dccf2ba7 SP MI Sys direct False /subscriptions/3b2fdc69-67a4-42f2-a43e-b7fbad489b03/resourcegroups/mibelle-pki-prod-rg/providers/microsoft.keyvault/vaults/mibpkiscepmanprodeuwkv01/providers/microsoft.authorization/roleassignments/27eca0fc-d289-5ff3-99e6-fb6a59f13178 none 08/13/2025 09:26:50 ObjectType: User Member, ObjectDisplayName: csa-silvan.buehler, ObjectSignInName: csa-silvan.buehler@MIBCloud.onmicrosoft.com, ObjectId: 3bdc8531-5824-4ddc-82b1-dc494b4a1022
Res mibelle-landingzones-online-mg Online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online thisScope Sub RG Res Storage Blob Data Owner b7e6dc6d-f1e8-4753-8033-0f276bb0955b Builtin true False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member direct False /subscriptions/3b2fdc69-67a4-42f2-a43e-b7fbad489b03/resourcegroups/mibelle-sftp-prod-rg/providers/microsoft.storage/storageaccounts/mibsftphrprodeuwst01/providers/microsoft.authorization/roleassignments/63bc8011-dbf5-4379-b542-022cb723e773 none 10/29/2025 06:31:04 ObjectType: User Member, ObjectDisplayName: csa-silvan.buehler, ObjectSignInName: csa-silvan.buehler@MIBCloud.onmicrosoft.com, ObjectId: 3bdc8531-5824-4ddc-82b1-dc494b4a1022
MG mibelle-platform-mg Platform inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) True Eligible 07/04/2025 22:17:51
MG mibelle-platform-mg Platform inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) True Eligible 07/04/2025 22:17:51
MG mibelle-platform-mg Platform inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) True Eligible 07/04/2025 22:17:51
MG mibelle-platform-mg Platform inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) True Eligible 07/04/2025 22:17:51
MG mibelle-platform-mg Platform inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False SGU-MIB-RES-Azure-Magr-Mibelle-NetOps 87e9d07b-5340-455c-b297-8bffe3b86f78 Group direct True Eligible 07/04/2025 22:17:51
MG mibelle-platform-mg Platform inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) True Eligible 07/04/2025 22:17:51
MG mibelle-platform-mg Platform inherited mibelle-mg [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e) True Eligible 07/04/2025 22:17:18
MG mibelle-platform-mg Platform inherited mibelle-mg [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e) True Eligible 07/04/2025 22:17:18
MG mibelle-platform-mg Platform inherited mibelle-mg [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e) True Eligible 07/04/2025 22:17:18
MG mibelle-platform-mg Platform inherited mibelle-mg [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False SGU-MIB-RES-Azure-Magr-Mibelle-SecOps abf39027-4cb4-4298-8951-f984eaf9cb8e Group direct True Eligible 07/04/2025 22:17:18
MG mibelle-platform-mg Platform inherited mibelle-mg Reservation Purchaser f7b75c60-3036-4b75-91c3-6b41c27c1689 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser 1f3ede05-4301-42b1-8c95-2be94290e93c Group direct True Eligible 11/24/2025 07:50:25
MG mibelle-platform-mg Platform inherited mibelle-mg Reservation Purchaser f7b75c60-3036-4b75-91c3-6b41c27c1689 Builtin false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser (1f3ede05-4301-42b1-8c95-2be94290e93c) True Eligible 11/24/2025 07:50:25
MG mibelle-platform-mg Platform inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) True Eligible 07/04/2025 22:11:28
MG mibelle-platform-mg Platform inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) True Eligible 07/04/2025 22:11:28
MG mibelle-platform-mg Platform inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) True Eligible 07/04/2025 22:11:28
MG mibelle-platform-mg Platform inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin cb058f58-c629-445f-9a10-75f9fcab694e Group direct True Eligible 07/04/2025 22:11:28
MG mibelle-platform-mg Platform inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) True Eligible 07/04/2025 22:11:28
MG mibelle-platform-mg Platform thisScope MG [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3) True Eligible 07/04/2025 22:47:30
MG mibelle-platform-mg Platform thisScope MG [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3) True Eligible 07/04/2025 22:47:30
MG mibelle-platform-mg Platform thisScope MG [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3) True Eligible 07/04/2025 22:47:30
MG mibelle-platform-mg Platform thisScope MG [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3) True Eligible 07/04/2025 22:47:30
MG mibelle-platform-mg Platform thisScope MG [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner 9b120856-d4b2-4862-95df-bedf8d5fe1c3 Group direct True Eligible 07/04/2025 22:47:30
MG mibelle-platform-mg Platform thisScope MG [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3) True Eligible 07/04/2025 22:47:30
MG mibelle-platform-mg Platform thisScope MG [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False CSA-Philipp.Schmidt CSA-Philipp.Schmidt@MIBCloud.onmicrosoft.com e40a73c8-6655-434d-8c8b-fdc4d9213499 User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3) True Eligible 07/04/2025 22:47:30
MG mibelle-sandbox-mg Sandbox inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) True Eligible 07/04/2025 22:17:51
MG mibelle-sandbox-mg Sandbox inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) True Eligible 07/04/2025 22:17:51
MG mibelle-sandbox-mg Sandbox inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) True Eligible 07/04/2025 22:17:51
MG mibelle-sandbox-mg Sandbox inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) True Eligible 07/04/2025 22:17:51
MG mibelle-sandbox-mg Sandbox inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False SGU-MIB-RES-Azure-Magr-Mibelle-NetOps 87e9d07b-5340-455c-b297-8bffe3b86f78 Group direct True Eligible 07/04/2025 22:17:51
MG mibelle-sandbox-mg Sandbox inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) True Eligible 07/04/2025 22:17:51
MG mibelle-sandbox-mg Sandbox inherited mibelle-mg [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e) True Eligible 07/04/2025 22:17:18
MG mibelle-sandbox-mg Sandbox inherited mibelle-mg [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e) True Eligible 07/04/2025 22:17:18
MG mibelle-sandbox-mg Sandbox inherited mibelle-mg [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e) True Eligible 07/04/2025 22:17:18
MG mibelle-sandbox-mg Sandbox inherited mibelle-mg [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False SGU-MIB-RES-Azure-Magr-Mibelle-SecOps abf39027-4cb4-4298-8951-f984eaf9cb8e Group direct True Eligible 07/04/2025 22:17:18
MG mibelle-sandbox-mg Sandbox inherited mibelle-mg Reservation Purchaser f7b75c60-3036-4b75-91c3-6b41c27c1689 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser 1f3ede05-4301-42b1-8c95-2be94290e93c Group direct True Eligible 11/24/2025 07:50:25
MG mibelle-sandbox-mg Sandbox inherited mibelle-mg Reservation Purchaser f7b75c60-3036-4b75-91c3-6b41c27c1689 Builtin false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser (1f3ede05-4301-42b1-8c95-2be94290e93c) True Eligible 11/24/2025 07:50:25
MG mibelle-sandbox-mg Sandbox inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) True Eligible 07/04/2025 22:11:28
MG mibelle-sandbox-mg Sandbox inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) True Eligible 07/04/2025 22:11:28
MG mibelle-sandbox-mg Sandbox inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) True Eligible 07/04/2025 22:11:28
MG mibelle-sandbox-mg Sandbox inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin cb058f58-c629-445f-9a10-75f9fcab694e Group direct True Eligible 07/04/2025 22:11:28
MG mibelle-sandbox-mg Sandbox inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) True Eligible 07/04/2025 22:11:28
MG mibelle-sandbox-mg Sandbox thisScope MG Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member nested SGU-MIB-RES-Azure-Magr-MibelleSandbox-Contributor (51d1767f-b653-445e-b81b-7796472cd8b4) True Eligible 11/13/2025 14:31:08
MG mibelle-sandbox-mg Sandbox thisScope MG Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-MibelleSandbox-Contributor (51d1767f-b653-445e-b81b-7796472cd8b4) True Eligible 11/13/2025 14:31:08
MG mibelle-sandbox-mg Sandbox thisScope MG Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False SGU-MIB-RES-Azure-Magr-MibelleSandbox-Contributor 51d1767f-b653-445e-b81b-7796472cd8b4 Group direct True Eligible 11/13/2025 14:31:08
MG mibelle-sandbox-mg Sandbox thisScope MG Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member nested SGU-MIB-RES-Azure-Magr-MibelleSandbox-Contributor (51d1767f-b653-445e-b81b-7796472cd8b4) True Eligible 11/13/2025 14:31:08
MG mibelle-platform-management-mg Management inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) True Eligible 07/04/2025 22:17:51
MG mibelle-platform-management-mg Management inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) True Eligible 07/04/2025 22:17:51
MG mibelle-platform-management-mg Management inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) True Eligible 07/04/2025 22:17:51
MG mibelle-platform-management-mg Management inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) True Eligible 07/04/2025 22:17:51
MG mibelle-platform-management-mg Management inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False SGU-MIB-RES-Azure-Magr-Mibelle-NetOps 87e9d07b-5340-455c-b297-8bffe3b86f78 Group direct True Eligible 07/04/2025 22:17:51
MG mibelle-platform-management-mg Management inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) True Eligible 07/04/2025 22:17:51
MG mibelle-platform-management-mg Management inherited mibelle-mg [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e) True Eligible 07/04/2025 22:17:18
MG mibelle-platform-management-mg Management inherited mibelle-mg [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e) True Eligible 07/04/2025 22:17:18
MG mibelle-platform-management-mg Management inherited mibelle-mg [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e) True Eligible 07/04/2025 22:17:18
MG mibelle-platform-management-mg Management inherited mibelle-mg [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False SGU-MIB-RES-Azure-Magr-Mibelle-SecOps abf39027-4cb4-4298-8951-f984eaf9cb8e Group direct True Eligible 07/04/2025 22:17:18
MG mibelle-platform-management-mg Management inherited mibelle-mg Reservation Purchaser f7b75c60-3036-4b75-91c3-6b41c27c1689 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser 1f3ede05-4301-42b1-8c95-2be94290e93c Group direct True Eligible 11/24/2025 07:50:25
MG mibelle-platform-management-mg Management inherited mibelle-mg Reservation Purchaser f7b75c60-3036-4b75-91c3-6b41c27c1689 Builtin false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser (1f3ede05-4301-42b1-8c95-2be94290e93c) True Eligible 11/24/2025 07:50:25
MG mibelle-platform-management-mg Management inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) True Eligible 07/04/2025 22:11:28
MG mibelle-platform-management-mg Management inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) True Eligible 07/04/2025 22:11:28
MG mibelle-platform-management-mg Management inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) True Eligible 07/04/2025 22:11:28
MG mibelle-platform-management-mg Management inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin cb058f58-c629-445f-9a10-75f9fcab694e Group direct True Eligible 07/04/2025 22:11:28
MG mibelle-platform-management-mg Management inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) True Eligible 07/04/2025 22:11:28
MG mibelle-platform-management-mg Management inherited mibelle-platform-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3) True Eligible 07/04/2025 22:47:30
MG mibelle-platform-management-mg Management inherited mibelle-platform-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3) True Eligible 07/04/2025 22:47:30
MG mibelle-platform-management-mg Management inherited mibelle-platform-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3) True Eligible 07/04/2025 22:47:30
MG mibelle-platform-management-mg Management inherited mibelle-platform-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3) True Eligible 07/04/2025 22:47:30
MG mibelle-platform-management-mg Management inherited mibelle-platform-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner 9b120856-d4b2-4862-95df-bedf8d5fe1c3 Group direct True Eligible 07/04/2025 22:47:30
MG mibelle-platform-management-mg Management inherited mibelle-platform-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3) True Eligible 07/04/2025 22:47:30
MG mibelle-platform-management-mg Management inherited mibelle-platform-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False CSA-Philipp.Schmidt CSA-Philipp.Schmidt@MIBCloud.onmicrosoft.com e40a73c8-6655-434d-8c8b-fdc4d9213499 User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3) True Eligible 07/04/2025 22:47:30
MG mibelle-landingzones-online-mg Online inherited mibelle-landingzones-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner (52364002-4a8b-4808-b4fc-864ed5f7d50d) True Eligible 07/04/2025 22:45:52
MG mibelle-landingzones-online-mg Online inherited mibelle-landingzones-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member nested SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner (52364002-4a8b-4808-b4fc-864ed5f7d50d) True Eligible 07/04/2025 22:45:52
MG mibelle-landingzones-online-mg Online inherited mibelle-landingzones-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False csa-michael.peter csa-michael.peter@MIBCloud.mail.onmicrosoft.com 460bad8a-cc4d-41dc-9ddd-f24ba491e2a6 User Member nested SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner (52364002-4a8b-4808-b4fc-864ed5f7d50d) True Eligible 07/04/2025 22:45:52
MG mibelle-landingzones-online-mg Online inherited mibelle-landingzones-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner (52364002-4a8b-4808-b4fc-864ed5f7d50d) True Eligible 07/04/2025 22:45:52
MG mibelle-landingzones-online-mg Online inherited mibelle-landingzones-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner 52364002-4a8b-4808-b4fc-864ed5f7d50d Group direct True Eligible 07/04/2025 22:45:52
MG mibelle-landingzones-online-mg Online inherited mibelle-landingzones-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member nested SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner (52364002-4a8b-4808-b4fc-864ed5f7d50d) True Eligible 07/04/2025 22:45:52
MG mibelle-landingzones-online-mg Online inherited mibelle-landingzones-mg Key Vault Administrator 00482a5a-887f-4fb3-b363-3b7fe8e74483 Builtin false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member nested SGU-MIB-RES-Azure-Magr-MibelleLandingZone-KeyVaultAdmin (dc72503d-d80a-4f41-969b-59a0818f358c) True Eligible 09/05/2025 06:41:41
MG mibelle-landingzones-online-mg Online inherited mibelle-landingzones-mg Key Vault Administrator 00482a5a-887f-4fb3-b363-3b7fe8e74483 Builtin false False csa-michael.peter csa-michael.peter@MIBCloud.mail.onmicrosoft.com 460bad8a-cc4d-41dc-9ddd-f24ba491e2a6 User Member nested SGU-MIB-RES-Azure-Magr-MibelleLandingZone-KeyVaultAdmin (dc72503d-d80a-4f41-969b-59a0818f358c) True Eligible 09/05/2025 06:41:41
MG mibelle-landingzones-online-mg Online inherited mibelle-landingzones-mg Key Vault Administrator 00482a5a-887f-4fb3-b363-3b7fe8e74483 Builtin false False SGU-MIB-RES-Azure-Magr-MibelleLandingZone-KeyVaultAdmin dc72503d-d80a-4f41-969b-59a0818f358c Group direct True Eligible 09/05/2025 06:41:41
MG mibelle-landingzones-online-mg Online inherited mibelle-landingzones-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False SGU-MIB-RES-Azure-Magr-MibelleLandingZone-UserAccessAdmin 45d94cc4-a927-422c-a9a3-a0cfa1684fd7 Group direct True Eligible 09/05/2025 06:26:15
MG mibelle-landingzones-online-mg Online inherited mibelle-landingzones-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False csa-michael.peter csa-michael.peter@MIBCloud.mail.onmicrosoft.com 460bad8a-cc4d-41dc-9ddd-f24ba491e2a6 User Member nested SGU-MIB-RES-Azure-Magr-MibelleLandingZone-UserAccessAdmin (45d94cc4-a927-422c-a9a3-a0cfa1684fd7) True Eligible 09/05/2025 06:26:15
MG mibelle-landingzones-online-mg Online inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) True Eligible 07/04/2025 22:17:51
MG mibelle-landingzones-online-mg Online inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) True Eligible 07/04/2025 22:17:51
MG mibelle-landingzones-online-mg Online inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) True Eligible 07/04/2025 22:17:51
MG mibelle-landingzones-online-mg Online inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) True Eligible 07/04/2025 22:17:51
MG mibelle-landingzones-online-mg Online inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False SGU-MIB-RES-Azure-Magr-Mibelle-NetOps 87e9d07b-5340-455c-b297-8bffe3b86f78 Group direct True Eligible 07/04/2025 22:17:51
MG mibelle-landingzones-online-mg Online inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) True Eligible 07/04/2025 22:17:51
MG mibelle-landingzones-online-mg Online inherited mibelle-mg [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e) True Eligible 07/04/2025 22:17:18
MG mibelle-landingzones-online-mg Online inherited mibelle-mg [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e) True Eligible 07/04/2025 22:17:18
MG mibelle-landingzones-online-mg Online inherited mibelle-mg [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e) True Eligible 07/04/2025 22:17:18
MG mibelle-landingzones-online-mg Online inherited mibelle-mg [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False SGU-MIB-RES-Azure-Magr-Mibelle-SecOps abf39027-4cb4-4298-8951-f984eaf9cb8e Group direct True Eligible 07/04/2025 22:17:18
MG mibelle-landingzones-online-mg Online inherited mibelle-mg Reservation Purchaser f7b75c60-3036-4b75-91c3-6b41c27c1689 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser 1f3ede05-4301-42b1-8c95-2be94290e93c Group direct True Eligible 11/24/2025 07:50:25
MG mibelle-landingzones-online-mg Online inherited mibelle-mg Reservation Purchaser f7b75c60-3036-4b75-91c3-6b41c27c1689 Builtin false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser (1f3ede05-4301-42b1-8c95-2be94290e93c) True Eligible 11/24/2025 07:50:25
MG mibelle-landingzones-online-mg Online inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) True Eligible 07/04/2025 22:11:28
MG mibelle-landingzones-online-mg Online inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) True Eligible 07/04/2025 22:11:28
MG mibelle-landingzones-online-mg Online inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) True Eligible 07/04/2025 22:11:28
MG mibelle-landingzones-online-mg Online inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin cb058f58-c629-445f-9a10-75f9fcab694e Group direct True Eligible 07/04/2025 22:11:28
MG mibelle-landingzones-online-mg Online inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) True Eligible 07/04/2025 22:11:28
Download CSV semicolon | comma
Scope ScopeId ScopeName MgPath MgLevel Role Role Id Role type Identity ObjectId Identity DisplayName Identity SignInName Identity Type Identity Applicability Applies through (AAD Grp) PIM Eligibility PIM Eligibility inhherted (MG) PIM start PIM end PIM Eligibility Id
MG mibelle-mg mibelle a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg 2 [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom 2f4a309a-5870-443e-97e1-fd8b38a54b4c CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) Direct 07/04/2025 22:17:51 b731fab1-7109-41bd-ab1a-86825631a6eb
MG mibelle-mg mibelle a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg 2 User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin 2f4a309a-5870-443e-97e1-fd8b38a54b4c CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) Direct 07/04/2025 22:11:28 c1d2c66e-0756-435f-9669-ba1c83d98764
MG mibelle-mg mibelle a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg 2 [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom 43b3e278-6551-4566-83a8-c19abe643e64 CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e) Direct 07/04/2025 22:17:18 0196a210-7b93-4caa-b848-d4834553eb90
MG mibelle-mg mibelle a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg 2 [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom 43b3e278-6551-4566-83a8-c19abe643e64 CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) Direct 07/04/2025 22:17:51 b731fab1-7109-41bd-ab1a-86825631a6eb
MG mibelle-mg mibelle a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg 2 [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) Direct 07/04/2025 22:17:51 b731fab1-7109-41bd-ab1a-86825631a6eb
MG mibelle-mg mibelle a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg 2 User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) Direct 07/04/2025 22:11:28 c1d2c66e-0756-435f-9669-ba1c83d98764
MG mibelle-mg mibelle a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg 2 [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e) Direct 07/04/2025 22:17:18 0196a210-7b93-4caa-b848-d4834553eb90
MG mibelle-mg mibelle a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg 2 [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) Direct 07/04/2025 22:17:51 b731fab1-7109-41bd-ab1a-86825631a6eb
MG mibelle-mg mibelle a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg 2 User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) Direct 07/04/2025 22:11:28 c1d2c66e-0756-435f-9669-ba1c83d98764
MG mibelle-mg mibelle a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg 2 Reservation Purchaser f7b75c60-3036-4b75-91c3-6b41c27c1689 Builtin 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser (1f3ede05-4301-42b1-8c95-2be94290e93c) Direct 11/24/2025 07:50:25 c5b6b2c9-d2b0-4829-8529-4cc5b928fc29
MG mibelle-mg mibelle a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg 2 [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom 3bdc8531-5824-4ddc-82b1-dc494b4a1022 csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e) Direct 07/04/2025 22:17:18 0196a210-7b93-4caa-b848-d4834553eb90
MG mibelle-mg mibelle a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg 2 [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom 3bdc8531-5824-4ddc-82b1-dc494b4a1022 csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) Direct 07/04/2025 22:17:51 b731fab1-7109-41bd-ab1a-86825631a6eb
MG mibelle-mg mibelle a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg 2 User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin 3bdc8531-5824-4ddc-82b1-dc494b4a1022 csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) Direct 07/04/2025 22:11:28 c1d2c66e-0756-435f-9669-ba1c83d98764
MG mibelle-mg mibelle a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg 2 [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom 87e9d07b-5340-455c-b297-8bffe3b86f78 SGU-MIB-RES-Azure-Magr-Mibelle-NetOps Group direct Direct 07/04/2025 22:17:51 b731fab1-7109-41bd-ab1a-86825631a6eb
MG mibelle-mg mibelle a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg 2 Reservation Purchaser f7b75c60-3036-4b75-91c3-6b41c27c1689 Builtin 1f3ede05-4301-42b1-8c95-2be94290e93c SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser Group direct Direct 11/24/2025 07:50:25 c5b6b2c9-d2b0-4829-8529-4cc5b928fc29
MG mibelle-mg mibelle a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg 2 [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom abf39027-4cb4-4298-8951-f984eaf9cb8e SGU-MIB-RES-Azure-Magr-Mibelle-SecOps Group direct Direct 07/04/2025 22:17:18 0196a210-7b93-4caa-b848-d4834553eb90
MG mibelle-mg mibelle a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg 2 User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin cb058f58-c629-445f-9a10-75f9fcab694e SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin Group direct Direct 07/04/2025 22:11:28 c1d2c66e-0756-435f-9669-ba1c83d98764
MG mibelle-landingzones-mg Landing Zones a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg 3 [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom 2f4a309a-5870-443e-97e1-fd8b38a54b4c CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:51 b731fab1-7109-41bd-ab1a-86825631a6eb
MG mibelle-landingzones-mg Landing Zones a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg 3 User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin 2f4a309a-5870-443e-97e1-fd8b38a54b4c CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:11:28 c1d2c66e-0756-435f-9669-ba1c83d98764
MG mibelle-landingzones-mg Landing Zones a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg 3 Key Vault Administrator 00482a5a-887f-4fb3-b363-3b7fe8e74483 Builtin 2f4a309a-5870-443e-97e1-fd8b38a54b4c CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-MibelleLandingZone-KeyVaultAdmin (dc72503d-d80a-4f41-969b-59a0818f358c) Direct 09/05/2025 06:41:41 c4fb7e7b-7fff-4f4c-8af2-33f9e571bab7
MG mibelle-landingzones-mg Landing Zones a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg 3 [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom 43b3e278-6551-4566-83a8-c19abe643e64 CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:18 0196a210-7b93-4caa-b848-d4834553eb90
MG mibelle-landingzones-mg Landing Zones a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg 3 [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom 43b3e278-6551-4566-83a8-c19abe643e64 CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:51 b731fab1-7109-41bd-ab1a-86825631a6eb
MG mibelle-landingzones-mg Landing Zones a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg 3 [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom 43b3e278-6551-4566-83a8-c19abe643e64 CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner (52364002-4a8b-4808-b4fc-864ed5f7d50d) Direct 07/04/2025 22:45:52 fb1498a2-3367-4788-9442-805f9d1127e4
MG mibelle-landingzones-mg Landing Zones a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg 3 [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:51 b731fab1-7109-41bd-ab1a-86825631a6eb
MG mibelle-landingzones-mg Landing Zones a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg 3 User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:11:28 c1d2c66e-0756-435f-9669-ba1c83d98764
MG mibelle-landingzones-mg Landing Zones a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg 3 [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner (52364002-4a8b-4808-b4fc-864ed5f7d50d) Direct 07/04/2025 22:45:52 fb1498a2-3367-4788-9442-805f9d1127e4
MG mibelle-landingzones-mg Landing Zones a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg 3 Key Vault Administrator 00482a5a-887f-4fb3-b363-3b7fe8e74483 Builtin 460bad8a-cc4d-41dc-9ddd-f24ba491e2a6 csa-michael.peter csa-michael.peter@MIBCloud.mail.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-MibelleLandingZone-KeyVaultAdmin (dc72503d-d80a-4f41-969b-59a0818f358c) Direct 09/05/2025 06:41:41 c4fb7e7b-7fff-4f4c-8af2-33f9e571bab7
MG mibelle-landingzones-mg Landing Zones a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg 3 User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin 460bad8a-cc4d-41dc-9ddd-f24ba491e2a6 csa-michael.peter csa-michael.peter@MIBCloud.mail.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-MibelleLandingZone-UserAccessAdmin (45d94cc4-a927-422c-a9a3-a0cfa1684fd7) Direct 09/05/2025 06:26:15 d7bc1214-7907-4115-a0f1-e5f098189815
MG mibelle-landingzones-mg Landing Zones a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg 3 [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom 460bad8a-cc4d-41dc-9ddd-f24ba491e2a6 csa-michael.peter csa-michael.peter@MIBCloud.mail.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner (52364002-4a8b-4808-b4fc-864ed5f7d50d) Direct 07/04/2025 22:45:52 fb1498a2-3367-4788-9442-805f9d1127e4
MG mibelle-landingzones-mg Landing Zones a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg 3 [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:18 0196a210-7b93-4caa-b848-d4834553eb90
MG mibelle-landingzones-mg Landing Zones a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg 3 [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:51 b731fab1-7109-41bd-ab1a-86825631a6eb
MG mibelle-landingzones-mg Landing Zones a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg 3 User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:11:28 c1d2c66e-0756-435f-9669-ba1c83d98764
MG mibelle-landingzones-mg Landing Zones a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg 3 Reservation Purchaser f7b75c60-3036-4b75-91c3-6b41c27c1689 Builtin 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser (1f3ede05-4301-42b1-8c95-2be94290e93c) Inherited mibelle (mibelle-mg) [Level 2] 11/24/2025 07:50:25 c5b6b2c9-d2b0-4829-8529-4cc5b928fc29
MG mibelle-landingzones-mg Landing Zones a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg 3 [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner (52364002-4a8b-4808-b4fc-864ed5f7d50d) Direct 07/04/2025 22:45:52 fb1498a2-3367-4788-9442-805f9d1127e4
MG mibelle-landingzones-mg Landing Zones a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg 3 [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom 3bdc8531-5824-4ddc-82b1-dc494b4a1022 csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:18 0196a210-7b93-4caa-b848-d4834553eb90
MG mibelle-landingzones-mg Landing Zones a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg 3 [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom 3bdc8531-5824-4ddc-82b1-dc494b4a1022 csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:51 b731fab1-7109-41bd-ab1a-86825631a6eb
MG mibelle-landingzones-mg Landing Zones a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg 3 User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin 3bdc8531-5824-4ddc-82b1-dc494b4a1022 csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:11:28 c1d2c66e-0756-435f-9669-ba1c83d98764
MG mibelle-landingzones-mg Landing Zones a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg 3 [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom 3bdc8531-5824-4ddc-82b1-dc494b4a1022 csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner (52364002-4a8b-4808-b4fc-864ed5f7d50d) Direct 07/04/2025 22:45:52 fb1498a2-3367-4788-9442-805f9d1127e4
MG mibelle-landingzones-mg Landing Zones a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg 3 [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom 87e9d07b-5340-455c-b297-8bffe3b86f78 SGU-MIB-RES-Azure-Magr-Mibelle-NetOps Group direct Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:51 b731fab1-7109-41bd-ab1a-86825631a6eb
MG mibelle-landingzones-mg Landing Zones a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg 3 Reservation Purchaser f7b75c60-3036-4b75-91c3-6b41c27c1689 Builtin 1f3ede05-4301-42b1-8c95-2be94290e93c SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser Group direct Inherited mibelle (mibelle-mg) [Level 2] 11/24/2025 07:50:25 c5b6b2c9-d2b0-4829-8529-4cc5b928fc29
MG mibelle-landingzones-mg Landing Zones a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg 3 [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom abf39027-4cb4-4298-8951-f984eaf9cb8e SGU-MIB-RES-Azure-Magr-Mibelle-SecOps Group direct Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:18 0196a210-7b93-4caa-b848-d4834553eb90
MG mibelle-landingzones-mg Landing Zones a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg 3 User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin cb058f58-c629-445f-9a10-75f9fcab694e SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin Group direct Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:11:28 c1d2c66e-0756-435f-9669-ba1c83d98764
MG mibelle-landingzones-mg Landing Zones a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg 3 Key Vault Administrator 00482a5a-887f-4fb3-b363-3b7fe8e74483 Builtin dc72503d-d80a-4f41-969b-59a0818f358c SGU-MIB-RES-Azure-Magr-MibelleLandingZone-KeyVaultAdmin Group direct Direct 09/05/2025 06:41:41 c4fb7e7b-7fff-4f4c-8af2-33f9e571bab7
MG mibelle-landingzones-mg Landing Zones a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg 3 [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom 52364002-4a8b-4808-b4fc-864ed5f7d50d SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner Group direct Direct 07/04/2025 22:45:52 fb1498a2-3367-4788-9442-805f9d1127e4
MG mibelle-landingzones-mg Landing Zones a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg 3 User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin 45d94cc4-a927-422c-a9a3-a0cfa1684fd7 SGU-MIB-RES-Azure-Magr-MibelleLandingZone-UserAccessAdmin Group direct Direct 09/05/2025 06:26:15 d7bc1214-7907-4115-a0f1-e5f098189815
MG mibelle-platform-mg Platform a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg 3 [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom 2f4a309a-5870-443e-97e1-fd8b38a54b4c CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:51 b731fab1-7109-41bd-ab1a-86825631a6eb
MG mibelle-platform-mg Platform a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg 3 User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin 2f4a309a-5870-443e-97e1-fd8b38a54b4c CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:11:28 c1d2c66e-0756-435f-9669-ba1c83d98764
MG mibelle-platform-mg Platform a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg 3 [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom 2f4a309a-5870-443e-97e1-fd8b38a54b4c CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3) Direct 07/04/2025 22:47:30 eb187d77-ed49-45e7-944b-29337821a52b
MG mibelle-platform-mg Platform a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg 3 [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom 43b3e278-6551-4566-83a8-c19abe643e64 CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:18 0196a210-7b93-4caa-b848-d4834553eb90
MG mibelle-platform-mg Platform a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg 3 [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom 43b3e278-6551-4566-83a8-c19abe643e64 CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:51 b731fab1-7109-41bd-ab1a-86825631a6eb
MG mibelle-platform-mg Platform a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg 3 [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom 43b3e278-6551-4566-83a8-c19abe643e64 CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3) Direct 07/04/2025 22:47:30 eb187d77-ed49-45e7-944b-29337821a52b
MG mibelle-platform-mg Platform a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg 3 [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:51 b731fab1-7109-41bd-ab1a-86825631a6eb
MG mibelle-platform-mg Platform a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg 3 User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:11:28 c1d2c66e-0756-435f-9669-ba1c83d98764
MG mibelle-platform-mg Platform a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg 3 [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3) Direct 07/04/2025 22:47:30 eb187d77-ed49-45e7-944b-29337821a52b
MG mibelle-platform-mg Platform a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg 3 [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom e40a73c8-6655-434d-8c8b-fdc4d9213499 CSA-Philipp.Schmidt CSA-Philipp.Schmidt@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3) Direct 07/04/2025 22:47:30 eb187d77-ed49-45e7-944b-29337821a52b
MG mibelle-platform-mg Platform a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg 3 [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:18 0196a210-7b93-4caa-b848-d4834553eb90
MG mibelle-platform-mg Platform a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg 3 [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:51 b731fab1-7109-41bd-ab1a-86825631a6eb
MG mibelle-platform-mg Platform a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg 3 User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:11:28 c1d2c66e-0756-435f-9669-ba1c83d98764
MG mibelle-platform-mg Platform a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg 3 Reservation Purchaser f7b75c60-3036-4b75-91c3-6b41c27c1689 Builtin 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser (1f3ede05-4301-42b1-8c95-2be94290e93c) Inherited mibelle (mibelle-mg) [Level 2] 11/24/2025 07:50:25 c5b6b2c9-d2b0-4829-8529-4cc5b928fc29
MG mibelle-platform-mg Platform a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg 3 [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3) Direct 07/04/2025 22:47:30 eb187d77-ed49-45e7-944b-29337821a52b
MG mibelle-platform-mg Platform a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg 3 [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom 3bdc8531-5824-4ddc-82b1-dc494b4a1022 csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:18 0196a210-7b93-4caa-b848-d4834553eb90
MG mibelle-platform-mg Platform a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg 3 [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom 3bdc8531-5824-4ddc-82b1-dc494b4a1022 csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:51 b731fab1-7109-41bd-ab1a-86825631a6eb
MG mibelle-platform-mg Platform a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg 3 User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin 3bdc8531-5824-4ddc-82b1-dc494b4a1022 csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:11:28 c1d2c66e-0756-435f-9669-ba1c83d98764
MG mibelle-platform-mg Platform a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg 3 [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom 3bdc8531-5824-4ddc-82b1-dc494b4a1022 csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3) Direct 07/04/2025 22:47:30 eb187d77-ed49-45e7-944b-29337821a52b
MG mibelle-platform-mg Platform a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg 3 [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom 87e9d07b-5340-455c-b297-8bffe3b86f78 SGU-MIB-RES-Azure-Magr-Mibelle-NetOps Group direct Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:51 b731fab1-7109-41bd-ab1a-86825631a6eb
MG mibelle-platform-mg Platform a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg 3 Reservation Purchaser f7b75c60-3036-4b75-91c3-6b41c27c1689 Builtin 1f3ede05-4301-42b1-8c95-2be94290e93c SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser Group direct Inherited mibelle (mibelle-mg) [Level 2] 11/24/2025 07:50:25 c5b6b2c9-d2b0-4829-8529-4cc5b928fc29
MG mibelle-platform-mg Platform a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg 3 [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom abf39027-4cb4-4298-8951-f984eaf9cb8e SGU-MIB-RES-Azure-Magr-Mibelle-SecOps Group direct Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:18 0196a210-7b93-4caa-b848-d4834553eb90
MG mibelle-platform-mg Platform a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg 3 User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin cb058f58-c629-445f-9a10-75f9fcab694e SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin Group direct Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:11:28 c1d2c66e-0756-435f-9669-ba1c83d98764
MG mibelle-platform-mg Platform a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg 3 [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom 9b120856-d4b2-4862-95df-bedf8d5fe1c3 SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner Group direct Direct 07/04/2025 22:47:30 eb187d77-ed49-45e7-944b-29337821a52b
MG mibelle-sandbox-mg Sandbox a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-sandbox-mg 3 Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin 2f4a309a-5870-443e-97e1-fd8b38a54b4c CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-MibelleSandbox-Contributor (51d1767f-b653-445e-b81b-7796472cd8b4) Direct 11/13/2025 14:31:08 75c34e91-578e-4c31-b7b7-0262aad7679d
MG mibelle-sandbox-mg Sandbox a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-sandbox-mg 3 [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom 2f4a309a-5870-443e-97e1-fd8b38a54b4c CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:51 b731fab1-7109-41bd-ab1a-86825631a6eb
MG mibelle-sandbox-mg Sandbox a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-sandbox-mg 3 User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin 2f4a309a-5870-443e-97e1-fd8b38a54b4c CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:11:28 c1d2c66e-0756-435f-9669-ba1c83d98764
MG mibelle-sandbox-mg Sandbox a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-sandbox-mg 3 [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom 43b3e278-6551-4566-83a8-c19abe643e64 CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:18 0196a210-7b93-4caa-b848-d4834553eb90
MG mibelle-sandbox-mg Sandbox a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-sandbox-mg 3 [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom 43b3e278-6551-4566-83a8-c19abe643e64 CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:51 b731fab1-7109-41bd-ab1a-86825631a6eb
MG mibelle-sandbox-mg Sandbox a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-sandbox-mg 3 Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-MibelleSandbox-Contributor (51d1767f-b653-445e-b81b-7796472cd8b4) Direct 11/13/2025 14:31:08 75c34e91-578e-4c31-b7b7-0262aad7679d
MG mibelle-sandbox-mg Sandbox a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-sandbox-mg 3 [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:51 b731fab1-7109-41bd-ab1a-86825631a6eb
MG mibelle-sandbox-mg Sandbox a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-sandbox-mg 3 User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:11:28 c1d2c66e-0756-435f-9669-ba1c83d98764
MG mibelle-sandbox-mg Sandbox a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-sandbox-mg 3 [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:18 0196a210-7b93-4caa-b848-d4834553eb90
MG mibelle-sandbox-mg Sandbox a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-sandbox-mg 3 Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-MibelleSandbox-Contributor (51d1767f-b653-445e-b81b-7796472cd8b4) Direct 11/13/2025 14:31:08 75c34e91-578e-4c31-b7b7-0262aad7679d
MG mibelle-sandbox-mg Sandbox a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-sandbox-mg 3 [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:51 b731fab1-7109-41bd-ab1a-86825631a6eb
MG mibelle-sandbox-mg Sandbox a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-sandbox-mg 3 User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:11:28 c1d2c66e-0756-435f-9669-ba1c83d98764
MG mibelle-sandbox-mg Sandbox a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-sandbox-mg 3 Reservation Purchaser f7b75c60-3036-4b75-91c3-6b41c27c1689 Builtin 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser (1f3ede05-4301-42b1-8c95-2be94290e93c) Inherited mibelle (mibelle-mg) [Level 2] 11/24/2025 07:50:25 c5b6b2c9-d2b0-4829-8529-4cc5b928fc29
MG mibelle-sandbox-mg Sandbox a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-sandbox-mg 3 [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom 3bdc8531-5824-4ddc-82b1-dc494b4a1022 csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:18 0196a210-7b93-4caa-b848-d4834553eb90
MG mibelle-sandbox-mg Sandbox a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-sandbox-mg 3 [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom 3bdc8531-5824-4ddc-82b1-dc494b4a1022 csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:51 b731fab1-7109-41bd-ab1a-86825631a6eb
MG mibelle-sandbox-mg Sandbox a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-sandbox-mg 3 User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin 3bdc8531-5824-4ddc-82b1-dc494b4a1022 csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:11:28 c1d2c66e-0756-435f-9669-ba1c83d98764
MG mibelle-sandbox-mg Sandbox a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-sandbox-mg 3 [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom 87e9d07b-5340-455c-b297-8bffe3b86f78 SGU-MIB-RES-Azure-Magr-Mibelle-NetOps Group direct Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:51 b731fab1-7109-41bd-ab1a-86825631a6eb
MG mibelle-sandbox-mg Sandbox a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-sandbox-mg 3 Reservation Purchaser f7b75c60-3036-4b75-91c3-6b41c27c1689 Builtin 1f3ede05-4301-42b1-8c95-2be94290e93c SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser Group direct Inherited mibelle (mibelle-mg) [Level 2] 11/24/2025 07:50:25 c5b6b2c9-d2b0-4829-8529-4cc5b928fc29
MG mibelle-sandbox-mg Sandbox a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-sandbox-mg 3 [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom abf39027-4cb4-4298-8951-f984eaf9cb8e SGU-MIB-RES-Azure-Magr-Mibelle-SecOps Group direct Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:18 0196a210-7b93-4caa-b848-d4834553eb90
MG mibelle-sandbox-mg Sandbox a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-sandbox-mg 3 User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin cb058f58-c629-445f-9a10-75f9fcab694e SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin Group direct Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:11:28 c1d2c66e-0756-435f-9669-ba1c83d98764
MG mibelle-sandbox-mg Sandbox a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-sandbox-mg 3 Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin 51d1767f-b653-445e-b81b-7796472cd8b4 SGU-MIB-RES-Azure-Magr-MibelleSandbox-Contributor Group direct Direct 11/13/2025 14:31:08 75c34e91-578e-4c31-b7b7-0262aad7679d
MG mibelle-platform-management-mg Management a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg 4 [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom 2f4a309a-5870-443e-97e1-fd8b38a54b4c CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:51 b731fab1-7109-41bd-ab1a-86825631a6eb
MG mibelle-platform-management-mg Management a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg 4 User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin 2f4a309a-5870-443e-97e1-fd8b38a54b4c CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:11:28 c1d2c66e-0756-435f-9669-ba1c83d98764
MG mibelle-platform-management-mg Management a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg 4 [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom 2f4a309a-5870-443e-97e1-fd8b38a54b4c CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3) Inherited Platform (mibelle-platform-mg) [Level 3] 07/04/2025 22:47:30 eb187d77-ed49-45e7-944b-29337821a52b
MG mibelle-platform-management-mg Management a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg 4 [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom 43b3e278-6551-4566-83a8-c19abe643e64 CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:18 0196a210-7b93-4caa-b848-d4834553eb90
MG mibelle-platform-management-mg Management a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg 4 [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom 43b3e278-6551-4566-83a8-c19abe643e64 CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:51 b731fab1-7109-41bd-ab1a-86825631a6eb
MG mibelle-platform-management-mg Management a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg 4 [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom 43b3e278-6551-4566-83a8-c19abe643e64 CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3) Inherited Platform (mibelle-platform-mg) [Level 3] 07/04/2025 22:47:30 eb187d77-ed49-45e7-944b-29337821a52b
MG mibelle-platform-management-mg Management a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg 4 [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:51 b731fab1-7109-41bd-ab1a-86825631a6eb
MG mibelle-platform-management-mg Management a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg 4 User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:11:28 c1d2c66e-0756-435f-9669-ba1c83d98764
MG mibelle-platform-management-mg Management a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg 4 [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3) Inherited Platform (mibelle-platform-mg) [Level 3] 07/04/2025 22:47:30 eb187d77-ed49-45e7-944b-29337821a52b
MG mibelle-platform-management-mg Management a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg 4 [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom e40a73c8-6655-434d-8c8b-fdc4d9213499 CSA-Philipp.Schmidt CSA-Philipp.Schmidt@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3) Inherited Platform (mibelle-platform-mg) [Level 3] 07/04/2025 22:47:30 eb187d77-ed49-45e7-944b-29337821a52b
MG mibelle-platform-management-mg Management a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg 4 [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:18 0196a210-7b93-4caa-b848-d4834553eb90
MG mibelle-platform-management-mg Management a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg 4 [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:51 b731fab1-7109-41bd-ab1a-86825631a6eb
MG mibelle-platform-management-mg Management a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg 4 User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:11:28 c1d2c66e-0756-435f-9669-ba1c83d98764
MG mibelle-platform-management-mg Management a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg 4 Reservation Purchaser f7b75c60-3036-4b75-91c3-6b41c27c1689 Builtin 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser (1f3ede05-4301-42b1-8c95-2be94290e93c) Inherited mibelle (mibelle-mg) [Level 2] 11/24/2025 07:50:25 c5b6b2c9-d2b0-4829-8529-4cc5b928fc29
MG mibelle-platform-management-mg Management a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg 4 [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3) Inherited Platform (mibelle-platform-mg) [Level 3] 07/04/2025 22:47:30 eb187d77-ed49-45e7-944b-29337821a52b
MG mibelle-platform-management-mg Management a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg 4 [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom 3bdc8531-5824-4ddc-82b1-dc494b4a1022 csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:18 0196a210-7b93-4caa-b848-d4834553eb90
MG mibelle-platform-management-mg Management a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg 4 [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom 3bdc8531-5824-4ddc-82b1-dc494b4a1022 csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:51 b731fab1-7109-41bd-ab1a-86825631a6eb
MG mibelle-platform-management-mg Management a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg 4 User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin 3bdc8531-5824-4ddc-82b1-dc494b4a1022 csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:11:28 c1d2c66e-0756-435f-9669-ba1c83d98764
MG mibelle-platform-management-mg Management a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg 4 [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom 3bdc8531-5824-4ddc-82b1-dc494b4a1022 csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3) Inherited Platform (mibelle-platform-mg) [Level 3] 07/04/2025 22:47:30 eb187d77-ed49-45e7-944b-29337821a52b
MG mibelle-platform-management-mg Management a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg 4 [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom 87e9d07b-5340-455c-b297-8bffe3b86f78 SGU-MIB-RES-Azure-Magr-Mibelle-NetOps Group direct Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:51 b731fab1-7109-41bd-ab1a-86825631a6eb
MG mibelle-platform-management-mg Management a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg 4 Reservation Purchaser f7b75c60-3036-4b75-91c3-6b41c27c1689 Builtin 1f3ede05-4301-42b1-8c95-2be94290e93c SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser Group direct Inherited mibelle (mibelle-mg) [Level 2] 11/24/2025 07:50:25 c5b6b2c9-d2b0-4829-8529-4cc5b928fc29
MG mibelle-platform-management-mg Management a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg 4 [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom abf39027-4cb4-4298-8951-f984eaf9cb8e SGU-MIB-RES-Azure-Magr-Mibelle-SecOps Group direct Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:18 0196a210-7b93-4caa-b848-d4834553eb90
MG mibelle-platform-management-mg Management a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg 4 User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin cb058f58-c629-445f-9a10-75f9fcab694e SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin Group direct Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:11:28 c1d2c66e-0756-435f-9669-ba1c83d98764
MG mibelle-platform-management-mg Management a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg 4 [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom 9b120856-d4b2-4862-95df-bedf8d5fe1c3 SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner Group direct Inherited Platform (mibelle-platform-mg) [Level 3] 07/04/2025 22:47:30 eb187d77-ed49-45e7-944b-29337821a52b
MG mibelle-landingzones-online-mg Online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg 4 [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom 2f4a309a-5870-443e-97e1-fd8b38a54b4c CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:51 b731fab1-7109-41bd-ab1a-86825631a6eb
MG mibelle-landingzones-online-mg Online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg 4 User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin 2f4a309a-5870-443e-97e1-fd8b38a54b4c CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:11:28 c1d2c66e-0756-435f-9669-ba1c83d98764
MG mibelle-landingzones-online-mg Online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg 4 Key Vault Administrator 00482a5a-887f-4fb3-b363-3b7fe8e74483 Builtin 2f4a309a-5870-443e-97e1-fd8b38a54b4c CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-MibelleLandingZone-KeyVaultAdmin (dc72503d-d80a-4f41-969b-59a0818f358c) Inherited Landing Zones (mibelle-landingzones-mg) [Level 3] 09/05/2025 06:41:41 c4fb7e7b-7fff-4f4c-8af2-33f9e571bab7
MG mibelle-landingzones-online-mg Online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg 4 [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom 43b3e278-6551-4566-83a8-c19abe643e64 CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:18 0196a210-7b93-4caa-b848-d4834553eb90
MG mibelle-landingzones-online-mg Online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg 4 [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom 43b3e278-6551-4566-83a8-c19abe643e64 CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:51 b731fab1-7109-41bd-ab1a-86825631a6eb
MG mibelle-landingzones-online-mg Online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg 4 [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom 43b3e278-6551-4566-83a8-c19abe643e64 CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner (52364002-4a8b-4808-b4fc-864ed5f7d50d) Inherited Landing Zones (mibelle-landingzones-mg) [Level 3] 07/04/2025 22:45:52 fb1498a2-3367-4788-9442-805f9d1127e4
MG mibelle-landingzones-online-mg Online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg 4 [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:51 b731fab1-7109-41bd-ab1a-86825631a6eb
MG mibelle-landingzones-online-mg Online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg 4 User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:11:28 c1d2c66e-0756-435f-9669-ba1c83d98764
MG mibelle-landingzones-online-mg Online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg 4 [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner (52364002-4a8b-4808-b4fc-864ed5f7d50d) Inherited Landing Zones (mibelle-landingzones-mg) [Level 3] 07/04/2025 22:45:52 fb1498a2-3367-4788-9442-805f9d1127e4
MG mibelle-landingzones-online-mg Online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg 4 Key Vault Administrator 00482a5a-887f-4fb3-b363-3b7fe8e74483 Builtin 460bad8a-cc4d-41dc-9ddd-f24ba491e2a6 csa-michael.peter csa-michael.peter@MIBCloud.mail.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-MibelleLandingZone-KeyVaultAdmin (dc72503d-d80a-4f41-969b-59a0818f358c) Inherited Landing Zones (mibelle-landingzones-mg) [Level 3] 09/05/2025 06:41:41 c4fb7e7b-7fff-4f4c-8af2-33f9e571bab7
MG mibelle-landingzones-online-mg Online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg 4 User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin 460bad8a-cc4d-41dc-9ddd-f24ba491e2a6 csa-michael.peter csa-michael.peter@MIBCloud.mail.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-MibelleLandingZone-UserAccessAdmin (45d94cc4-a927-422c-a9a3-a0cfa1684fd7) Inherited Landing Zones (mibelle-landingzones-mg) [Level 3] 09/05/2025 06:26:15 d7bc1214-7907-4115-a0f1-e5f098189815
MG mibelle-landingzones-online-mg Online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg 4 [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom 460bad8a-cc4d-41dc-9ddd-f24ba491e2a6 csa-michael.peter csa-michael.peter@MIBCloud.mail.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner (52364002-4a8b-4808-b4fc-864ed5f7d50d) Inherited Landing Zones (mibelle-landingzones-mg) [Level 3] 07/04/2025 22:45:52 fb1498a2-3367-4788-9442-805f9d1127e4
MG mibelle-landingzones-online-mg Online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg 4 [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:18 0196a210-7b93-4caa-b848-d4834553eb90
MG mibelle-landingzones-online-mg Online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg 4 [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:51 b731fab1-7109-41bd-ab1a-86825631a6eb
MG mibelle-landingzones-online-mg Online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg 4 User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:11:28 c1d2c66e-0756-435f-9669-ba1c83d98764
MG mibelle-landingzones-online-mg Online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg 4 Reservation Purchaser f7b75c60-3036-4b75-91c3-6b41c27c1689 Builtin 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser (1f3ede05-4301-42b1-8c95-2be94290e93c) Inherited mibelle (mibelle-mg) [Level 2] 11/24/2025 07:50:25 c5b6b2c9-d2b0-4829-8529-4cc5b928fc29
MG mibelle-landingzones-online-mg Online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg 4 [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner (52364002-4a8b-4808-b4fc-864ed5f7d50d) Inherited Landing Zones (mibelle-landingzones-mg) [Level 3] 07/04/2025 22:45:52 fb1498a2-3367-4788-9442-805f9d1127e4
MG mibelle-landingzones-online-mg Online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg 4 [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom 3bdc8531-5824-4ddc-82b1-dc494b4a1022 csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:18 0196a210-7b93-4caa-b848-d4834553eb90
MG mibelle-landingzones-online-mg Online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg 4 [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom 3bdc8531-5824-4ddc-82b1-dc494b4a1022 csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:51 b731fab1-7109-41bd-ab1a-86825631a6eb
MG mibelle-landingzones-online-mg Online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg 4 User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin 3bdc8531-5824-4ddc-82b1-dc494b4a1022 csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:11:28 c1d2c66e-0756-435f-9669-ba1c83d98764
MG mibelle-landingzones-online-mg Online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg 4 [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom 3bdc8531-5824-4ddc-82b1-dc494b4a1022 csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner (52364002-4a8b-4808-b4fc-864ed5f7d50d) Inherited Landing Zones (mibelle-landingzones-mg) [Level 3] 07/04/2025 22:45:52 fb1498a2-3367-4788-9442-805f9d1127e4
MG mibelle-landingzones-online-mg Online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg 4 [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom 87e9d07b-5340-455c-b297-8bffe3b86f78 SGU-MIB-RES-Azure-Magr-Mibelle-NetOps Group direct Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:51 b731fab1-7109-41bd-ab1a-86825631a6eb
MG mibelle-landingzones-online-mg Online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg 4 Reservation Purchaser f7b75c60-3036-4b75-91c3-6b41c27c1689 Builtin 1f3ede05-4301-42b1-8c95-2be94290e93c SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser Group direct Inherited mibelle (mibelle-mg) [Level 2] 11/24/2025 07:50:25 c5b6b2c9-d2b0-4829-8529-4cc5b928fc29
MG mibelle-landingzones-online-mg Online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg 4 [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom abf39027-4cb4-4298-8951-f984eaf9cb8e SGU-MIB-RES-Azure-Magr-Mibelle-SecOps Group direct Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:18 0196a210-7b93-4caa-b848-d4834553eb90
MG mibelle-landingzones-online-mg Online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg 4 User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin cb058f58-c629-445f-9a10-75f9fcab694e SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin Group direct Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:11:28 c1d2c66e-0756-435f-9669-ba1c83d98764
MG mibelle-landingzones-online-mg Online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg 4 Key Vault Administrator 00482a5a-887f-4fb3-b363-3b7fe8e74483 Builtin dc72503d-d80a-4f41-969b-59a0818f358c SGU-MIB-RES-Azure-Magr-MibelleLandingZone-KeyVaultAdmin Group direct Inherited Landing Zones (mibelle-landingzones-mg) [Level 3] 09/05/2025 06:41:41 c4fb7e7b-7fff-4f4c-8af2-33f9e571bab7
MG mibelle-landingzones-online-mg Online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg 4 [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom 52364002-4a8b-4808-b4fc-864ed5f7d50d SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner Group direct Inherited Landing Zones (mibelle-landingzones-mg) [Level 3] 07/04/2025 22:45:52 fb1498a2-3367-4788-9442-805f9d1127e4
MG mibelle-landingzones-online-mg Online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg 4 User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin 45d94cc4-a927-422c-a9a3-a0cfa1684fd7 SGU-MIB-RES-Azure-Magr-MibelleLandingZone-UserAccessAdmin Group direct Inherited Landing Zones (mibelle-landingzones-mg) [Level 3] 09/05/2025 06:26:15 d7bc1214-7907-4115-a0f1-e5f098189815
Sub edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 3 [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom 2f4a309a-5870-443e-97e1-fd8b38a54b4c CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:51 b731fab1-7109-41bd-ab1a-86825631a6eb
Sub edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 3 User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin 2f4a309a-5870-443e-97e1-fd8b38a54b4c CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:11:28 c1d2c66e-0756-435f-9669-ba1c83d98764
Sub edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 3 [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom 2f4a309a-5870-443e-97e1-fd8b38a54b4c CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3) Inherited Platform (mibelle-platform-mg) [Level 3] 07/04/2025 22:47:30 eb187d77-ed49-45e7-944b-29337821a52b
Sub edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 3 [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom 43b3e278-6551-4566-83a8-c19abe643e64 CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:18 0196a210-7b93-4caa-b848-d4834553eb90
Sub edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 3 [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom 43b3e278-6551-4566-83a8-c19abe643e64 CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:51 b731fab1-7109-41bd-ab1a-86825631a6eb
Sub edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 3 [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom 43b3e278-6551-4566-83a8-c19abe643e64 CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3) Inherited Platform (mibelle-platform-mg) [Level 3] 07/04/2025 22:47:30 eb187d77-ed49-45e7-944b-29337821a52b
Sub edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 3 [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:51 b731fab1-7109-41bd-ab1a-86825631a6eb
Sub edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 3 User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:11:28 c1d2c66e-0756-435f-9669-ba1c83d98764
Sub edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 3 [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3) Inherited Platform (mibelle-platform-mg) [Level 3] 07/04/2025 22:47:30 eb187d77-ed49-45e7-944b-29337821a52b
Sub edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 3 [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom e40a73c8-6655-434d-8c8b-fdc4d9213499 CSA-Philipp.Schmidt CSA-Philipp.Schmidt@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3) Inherited Platform (mibelle-platform-mg) [Level 3] 07/04/2025 22:47:30 eb187d77-ed49-45e7-944b-29337821a52b
Sub edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 3 [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:18 0196a210-7b93-4caa-b848-d4834553eb90
Sub edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 3 [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:51 b731fab1-7109-41bd-ab1a-86825631a6eb
Sub edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 3 User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:11:28 c1d2c66e-0756-435f-9669-ba1c83d98764
Sub edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 3 Reservation Purchaser f7b75c60-3036-4b75-91c3-6b41c27c1689 Builtin 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser (1f3ede05-4301-42b1-8c95-2be94290e93c) Inherited mibelle (mibelle-mg) [Level 2] 11/24/2025 07:50:25 c5b6b2c9-d2b0-4829-8529-4cc5b928fc29
Sub edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 3 [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3) Inherited Platform (mibelle-platform-mg) [Level 3] 07/04/2025 22:47:30 eb187d77-ed49-45e7-944b-29337821a52b
Sub edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 3 [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom 3bdc8531-5824-4ddc-82b1-dc494b4a1022 csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:18 0196a210-7b93-4caa-b848-d4834553eb90
Sub edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 3 [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom 3bdc8531-5824-4ddc-82b1-dc494b4a1022 csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:51 b731fab1-7109-41bd-ab1a-86825631a6eb
Sub edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 3 User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin 3bdc8531-5824-4ddc-82b1-dc494b4a1022 csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:11:28 c1d2c66e-0756-435f-9669-ba1c83d98764
Sub edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 3 [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom 3bdc8531-5824-4ddc-82b1-dc494b4a1022 csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3) Inherited Platform (mibelle-platform-mg) [Level 3] 07/04/2025 22:47:30 eb187d77-ed49-45e7-944b-29337821a52b
Sub edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 3 [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom 87e9d07b-5340-455c-b297-8bffe3b86f78 SGU-MIB-RES-Azure-Magr-Mibelle-NetOps Group direct Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:51 b731fab1-7109-41bd-ab1a-86825631a6eb
Sub edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 3 Reservation Purchaser f7b75c60-3036-4b75-91c3-6b41c27c1689 Builtin 1f3ede05-4301-42b1-8c95-2be94290e93c SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser Group direct Inherited mibelle (mibelle-mg) [Level 2] 11/24/2025 07:50:25 c5b6b2c9-d2b0-4829-8529-4cc5b928fc29
Sub edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 3 [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom abf39027-4cb4-4298-8951-f984eaf9cb8e SGU-MIB-RES-Azure-Magr-Mibelle-SecOps Group direct Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:18 0196a210-7b93-4caa-b848-d4834553eb90
Sub edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 3 User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin cb058f58-c629-445f-9a10-75f9fcab694e SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin Group direct Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:11:28 c1d2c66e-0756-435f-9669-ba1c83d98764
Sub edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 3 [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom 9b120856-d4b2-4862-95df-bedf8d5fe1c3 SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner Group direct Inherited Platform (mibelle-platform-mg) [Level 3] 07/04/2025 22:47:30 eb187d77-ed49-45e7-944b-29337821a52b
Sub e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa 3 [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom 2f4a309a-5870-443e-97e1-fd8b38a54b4c CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:51 b731fab1-7109-41bd-ab1a-86825631a6eb
Sub e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa 3 User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin 2f4a309a-5870-443e-97e1-fd8b38a54b4c CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:11:28 c1d2c66e-0756-435f-9669-ba1c83d98764
Sub e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa 3 [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom 2f4a309a-5870-443e-97e1-fd8b38a54b4c CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3) Inherited Platform (mibelle-platform-mg) [Level 3] 07/04/2025 22:47:30 eb187d77-ed49-45e7-944b-29337821a52b
Sub e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa 3 [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom 43b3e278-6551-4566-83a8-c19abe643e64 CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:18 0196a210-7b93-4caa-b848-d4834553eb90
Sub e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa 3 [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom 43b3e278-6551-4566-83a8-c19abe643e64 CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:51 b731fab1-7109-41bd-ab1a-86825631a6eb
Sub e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa 3 [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom 43b3e278-6551-4566-83a8-c19abe643e64 CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3) Inherited Platform (mibelle-platform-mg) [Level 3] 07/04/2025 22:47:30 eb187d77-ed49-45e7-944b-29337821a52b
Sub e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa 3 [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:51 b731fab1-7109-41bd-ab1a-86825631a6eb
Sub e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa 3 User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:11:28 c1d2c66e-0756-435f-9669-ba1c83d98764
Sub e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa 3 [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3) Inherited Platform (mibelle-platform-mg) [Level 3] 07/04/2025 22:47:30 eb187d77-ed49-45e7-944b-29337821a52b
Sub e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa 3 [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom e40a73c8-6655-434d-8c8b-fdc4d9213499 CSA-Philipp.Schmidt CSA-Philipp.Schmidt@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3) Inherited Platform (mibelle-platform-mg) [Level 3] 07/04/2025 22:47:30 eb187d77-ed49-45e7-944b-29337821a52b
Sub e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa 3 [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:18 0196a210-7b93-4caa-b848-d4834553eb90
Sub e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa 3 [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:51 b731fab1-7109-41bd-ab1a-86825631a6eb
Sub e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa 3 User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:11:28 c1d2c66e-0756-435f-9669-ba1c83d98764
Sub e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa 3 Reservation Purchaser f7b75c60-3036-4b75-91c3-6b41c27c1689 Builtin 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser (1f3ede05-4301-42b1-8c95-2be94290e93c) Inherited mibelle (mibelle-mg) [Level 2] 11/24/2025 07:50:25 c5b6b2c9-d2b0-4829-8529-4cc5b928fc29
Sub e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa 3 [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3) Inherited Platform (mibelle-platform-mg) [Level 3] 07/04/2025 22:47:30 eb187d77-ed49-45e7-944b-29337821a52b
Sub e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa 3 [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom 3bdc8531-5824-4ddc-82b1-dc494b4a1022 csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:18 0196a210-7b93-4caa-b848-d4834553eb90
Sub e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa 3 [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom 3bdc8531-5824-4ddc-82b1-dc494b4a1022 csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:51 b731fab1-7109-41bd-ab1a-86825631a6eb
Sub e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa 3 User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin 3bdc8531-5824-4ddc-82b1-dc494b4a1022 csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:11:28 c1d2c66e-0756-435f-9669-ba1c83d98764
Sub e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa 3 [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom 3bdc8531-5824-4ddc-82b1-dc494b4a1022 csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3) Inherited Platform (mibelle-platform-mg) [Level 3] 07/04/2025 22:47:30 eb187d77-ed49-45e7-944b-29337821a52b
Sub e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa 3 [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom 87e9d07b-5340-455c-b297-8bffe3b86f78 SGU-MIB-RES-Azure-Magr-Mibelle-NetOps Group direct Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:51 b731fab1-7109-41bd-ab1a-86825631a6eb
Sub e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa 3 Reservation Purchaser f7b75c60-3036-4b75-91c3-6b41c27c1689 Builtin 1f3ede05-4301-42b1-8c95-2be94290e93c SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser Group direct Inherited mibelle (mibelle-mg) [Level 2] 11/24/2025 07:50:25 c5b6b2c9-d2b0-4829-8529-4cc5b928fc29
Sub e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa 3 [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom abf39027-4cb4-4298-8951-f984eaf9cb8e SGU-MIB-RES-Azure-Magr-Mibelle-SecOps Group direct Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:18 0196a210-7b93-4caa-b848-d4834553eb90
Sub e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa 3 User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin cb058f58-c629-445f-9a10-75f9fcab694e SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin Group direct Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:11:28 c1d2c66e-0756-435f-9669-ba1c83d98764
Sub e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa 3 [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom 9b120856-d4b2-4862-95df-bedf8d5fe1c3 SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner Group direct Inherited Platform (mibelle-platform-mg) [Level 3] 07/04/2025 22:47:30 eb187d77-ed49-45e7-944b-29337821a52b
Sub fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b 3 [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom 2f4a309a-5870-443e-97e1-fd8b38a54b4c CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:51 b731fab1-7109-41bd-ab1a-86825631a6eb
Sub fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b 3 User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin 2f4a309a-5870-443e-97e1-fd8b38a54b4c CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:11:28 c1d2c66e-0756-435f-9669-ba1c83d98764
Sub fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b 3 [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom 2f4a309a-5870-443e-97e1-fd8b38a54b4c CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3) Inherited Platform (mibelle-platform-mg) [Level 3] 07/04/2025 22:47:30 eb187d77-ed49-45e7-944b-29337821a52b
Sub fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b 3 [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom 43b3e278-6551-4566-83a8-c19abe643e64 CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:18 0196a210-7b93-4caa-b848-d4834553eb90
Sub fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b 3 [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom 43b3e278-6551-4566-83a8-c19abe643e64 CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:51 b731fab1-7109-41bd-ab1a-86825631a6eb
Sub fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b 3 [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom 43b3e278-6551-4566-83a8-c19abe643e64 CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3) Inherited Platform (mibelle-platform-mg) [Level 3] 07/04/2025 22:47:30 eb187d77-ed49-45e7-944b-29337821a52b
Sub fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b 3 [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:51 b731fab1-7109-41bd-ab1a-86825631a6eb
Sub fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b 3 User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:11:28 c1d2c66e-0756-435f-9669-ba1c83d98764
Sub fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b 3 [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3) Inherited Platform (mibelle-platform-mg) [Level 3] 07/04/2025 22:47:30 eb187d77-ed49-45e7-944b-29337821a52b
Sub fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b 3 [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom e40a73c8-6655-434d-8c8b-fdc4d9213499 CSA-Philipp.Schmidt CSA-Philipp.Schmidt@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3) Inherited Platform (mibelle-platform-mg) [Level 3] 07/04/2025 22:47:30 eb187d77-ed49-45e7-944b-29337821a52b
Sub fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b 3 [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:18 0196a210-7b93-4caa-b848-d4834553eb90
Sub fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b 3 [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:51 b731fab1-7109-41bd-ab1a-86825631a6eb
Sub fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b 3 User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:11:28 c1d2c66e-0756-435f-9669-ba1c83d98764
Sub fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b 3 Reservation Purchaser f7b75c60-3036-4b75-91c3-6b41c27c1689 Builtin 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser (1f3ede05-4301-42b1-8c95-2be94290e93c) Inherited mibelle (mibelle-mg) [Level 2] 11/24/2025 07:50:25 c5b6b2c9-d2b0-4829-8529-4cc5b928fc29
Sub fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b 3 [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3) Inherited Platform (mibelle-platform-mg) [Level 3] 07/04/2025 22:47:30 eb187d77-ed49-45e7-944b-29337821a52b
Sub fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b 3 [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom 3bdc8531-5824-4ddc-82b1-dc494b4a1022 csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:18 0196a210-7b93-4caa-b848-d4834553eb90
Sub fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b 3 [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom 3bdc8531-5824-4ddc-82b1-dc494b4a1022 csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:51 b731fab1-7109-41bd-ab1a-86825631a6eb
Sub fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b 3 User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin 3bdc8531-5824-4ddc-82b1-dc494b4a1022 csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:11:28 c1d2c66e-0756-435f-9669-ba1c83d98764
Sub fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b 3 [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom 3bdc8531-5824-4ddc-82b1-dc494b4a1022 csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3) Inherited Platform (mibelle-platform-mg) [Level 3] 07/04/2025 22:47:30 eb187d77-ed49-45e7-944b-29337821a52b
Sub fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b 3 [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom 87e9d07b-5340-455c-b297-8bffe3b86f78 SGU-MIB-RES-Azure-Magr-Mibelle-NetOps Group direct Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:51 b731fab1-7109-41bd-ab1a-86825631a6eb
Sub fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b 3 Reservation Purchaser f7b75c60-3036-4b75-91c3-6b41c27c1689 Builtin 1f3ede05-4301-42b1-8c95-2be94290e93c SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser Group direct Inherited mibelle (mibelle-mg) [Level 2] 11/24/2025 07:50:25 c5b6b2c9-d2b0-4829-8529-4cc5b928fc29
Sub fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b 3 [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom abf39027-4cb4-4298-8951-f984eaf9cb8e SGU-MIB-RES-Azure-Magr-Mibelle-SecOps Group direct Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:18 0196a210-7b93-4caa-b848-d4834553eb90
Sub fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b 3 User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin cb058f58-c629-445f-9a10-75f9fcab694e SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin Group direct Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:11:28 c1d2c66e-0756-435f-9669-ba1c83d98764
Sub fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b 3 [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom 9b120856-d4b2-4862-95df-bedf8d5fe1c3 SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner Group direct Inherited Platform (mibelle-platform-mg) [Level 3] 07/04/2025 22:47:30 eb187d77-ed49-45e7-944b-29337821a52b
Sub 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 3 [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom bb2279b2-06ab-459a-b981-579701601f8a Baumann, Jürg-MIBELLEGROUP juerg.baumann_mibellegroup.com#EXT#@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Subs-MibelleOnline-SubscriptionOwner (1bdf326c-8c66-4ba9-8c2d-83312a1ddc02) Direct 10/23/2025 12:06:19 8297ccaf-382d-4ac4-b94d-31045c4f0143
Sub 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 3 Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin bb2279b2-06ab-459a-b981-579701601f8a Baumann, Jürg-MIBELLEGROUP juerg.baumann_mibellegroup.com#EXT#@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Subs-MibelleOnline-SubscriptionOwner (1bdf326c-8c66-4ba9-8c2d-83312a1ddc02) Direct 07/10/2025 11:13:23 e541d72f-e58d-4a50-a18b-d6db035375c1
Sub 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 3 [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom 2f4a309a-5870-443e-97e1-fd8b38a54b4c CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:51 b731fab1-7109-41bd-ab1a-86825631a6eb
Sub 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 3 User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin 2f4a309a-5870-443e-97e1-fd8b38a54b4c CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:11:28 c1d2c66e-0756-435f-9669-ba1c83d98764
Sub 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 3 Key Vault Administrator 00482a5a-887f-4fb3-b363-3b7fe8e74483 Builtin 2f4a309a-5870-443e-97e1-fd8b38a54b4c CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-MibelleLandingZone-KeyVaultAdmin (dc72503d-d80a-4f41-969b-59a0818f358c) Inherited Landing Zones (mibelle-landingzones-mg) [Level 3] 09/05/2025 06:41:41 c4fb7e7b-7fff-4f4c-8af2-33f9e571bab7
Sub 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 3 [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom 43b3e278-6551-4566-83a8-c19abe643e64 CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:18 0196a210-7b93-4caa-b848-d4834553eb90
Sub 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 3 [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom 43b3e278-6551-4566-83a8-c19abe643e64 CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:51 b731fab1-7109-41bd-ab1a-86825631a6eb
Sub 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 3 [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom 43b3e278-6551-4566-83a8-c19abe643e64 CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner (52364002-4a8b-4808-b4fc-864ed5f7d50d) Inherited Landing Zones (mibelle-landingzones-mg) [Level 3] 07/04/2025 22:45:52 fb1498a2-3367-4788-9442-805f9d1127e4
Sub 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 3 [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:51 b731fab1-7109-41bd-ab1a-86825631a6eb
Sub 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 3 User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:11:28 c1d2c66e-0756-435f-9669-ba1c83d98764
Sub 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 3 [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner (52364002-4a8b-4808-b4fc-864ed5f7d50d) Inherited Landing Zones (mibelle-landingzones-mg) [Level 3] 07/04/2025 22:45:52 fb1498a2-3367-4788-9442-805f9d1127e4
Sub 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 3 [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom 54f81d33-50db-475c-b686-4ef70aa0b4fe CSA-Matej Paunovski CSA-matej.paunovski@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Subs-MibelleOnline-SubscriptionOwner (1bdf326c-8c66-4ba9-8c2d-83312a1ddc02) Direct 10/23/2025 12:06:19 8297ccaf-382d-4ac4-b94d-31045c4f0143
Sub 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 3 Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin 54f81d33-50db-475c-b686-4ef70aa0b4fe CSA-Matej Paunovski CSA-matej.paunovski@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Subs-MibelleOnline-SubscriptionOwner (1bdf326c-8c66-4ba9-8c2d-83312a1ddc02) Direct 07/10/2025 11:13:23 e541d72f-e58d-4a50-a18b-d6db035375c1
Sub 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 3 Key Vault Administrator 00482a5a-887f-4fb3-b363-3b7fe8e74483 Builtin 460bad8a-cc4d-41dc-9ddd-f24ba491e2a6 csa-michael.peter csa-michael.peter@MIBCloud.mail.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-MibelleLandingZone-KeyVaultAdmin (dc72503d-d80a-4f41-969b-59a0818f358c) Inherited Landing Zones (mibelle-landingzones-mg) [Level 3] 09/05/2025 06:41:41 c4fb7e7b-7fff-4f4c-8af2-33f9e571bab7
Sub 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 3 User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin 460bad8a-cc4d-41dc-9ddd-f24ba491e2a6 csa-michael.peter csa-michael.peter@MIBCloud.mail.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-MibelleLandingZone-UserAccessAdmin (45d94cc4-a927-422c-a9a3-a0cfa1684fd7) Inherited Landing Zones (mibelle-landingzones-mg) [Level 3] 09/05/2025 06:26:15 d7bc1214-7907-4115-a0f1-e5f098189815
Sub 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 3 [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom 460bad8a-cc4d-41dc-9ddd-f24ba491e2a6 csa-michael.peter csa-michael.peter@MIBCloud.mail.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner (52364002-4a8b-4808-b4fc-864ed5f7d50d) Inherited Landing Zones (mibelle-landingzones-mg) [Level 3] 07/04/2025 22:45:52 fb1498a2-3367-4788-9442-805f9d1127e4
Sub 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 3 [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:18 0196a210-7b93-4caa-b848-d4834553eb90
Sub 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 3 [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:51 b731fab1-7109-41bd-ab1a-86825631a6eb
Sub 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 3 User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:11:28 c1d2c66e-0756-435f-9669-ba1c83d98764
Sub 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 3 Reservation Purchaser f7b75c60-3036-4b75-91c3-6b41c27c1689 Builtin 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser (1f3ede05-4301-42b1-8c95-2be94290e93c) Inherited mibelle (mibelle-mg) [Level 2] 11/24/2025 07:50:25 c5b6b2c9-d2b0-4829-8529-4cc5b928fc29
Sub 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 3 [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner (52364002-4a8b-4808-b4fc-864ed5f7d50d) Inherited Landing Zones (mibelle-landingzones-mg) [Level 3] 07/04/2025 22:45:52 fb1498a2-3367-4788-9442-805f9d1127e4
Sub 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 3 [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom 3bdc8531-5824-4ddc-82b1-dc494b4a1022 csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:18 0196a210-7b93-4caa-b848-d4834553eb90
Sub 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 3 [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom 3bdc8531-5824-4ddc-82b1-dc494b4a1022 csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:51 b731fab1-7109-41bd-ab1a-86825631a6eb
Sub 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 3 User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin 3bdc8531-5824-4ddc-82b1-dc494b4a1022 csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e) Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:11:28 c1d2c66e-0756-435f-9669-ba1c83d98764
Sub 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 3 [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom 3bdc8531-5824-4ddc-82b1-dc494b4a1022 csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com User Member nested SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner (52364002-4a8b-4808-b4fc-864ed5f7d50d) Inherited Landing Zones (mibelle-landingzones-mg) [Level 3] 07/04/2025 22:45:52 fb1498a2-3367-4788-9442-805f9d1127e4
Sub 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 3 [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom e58ba28f-09ed-49c3-8f5e-31b05c258cde CSA-Taoufik.Ouaouane csa-Taoufik.Ouaouane@mibelle.net User Member nested SGU-MIB-RES-Azure-Subs-MibelleOnline-SubscriptionOwner (1bdf326c-8c66-4ba9-8c2d-83312a1ddc02) Direct 10/23/2025 12:06:19 8297ccaf-382d-4ac4-b94d-31045c4f0143
Sub 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 3 Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin e58ba28f-09ed-49c3-8f5e-31b05c258cde CSA-Taoufik.Ouaouane csa-Taoufik.Ouaouane@mibelle.net User Member nested SGU-MIB-RES-Azure-Subs-MibelleOnline-SubscriptionOwner (1bdf326c-8c66-4ba9-8c2d-83312a1ddc02) Direct 07/10/2025 11:13:23 e541d72f-e58d-4a50-a18b-d6db035375c1
Sub 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 3 [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom 7100d1ce-5bd7-449d-abdd-52a7218922b3 Ouaouane, Taoufik-MIBELLEGROUP taoufik.ouaouane@mibelle.net User Member nested SGU-MIB-RES-Azure-Subs-MibelleOnline-SubscriptionOwner (1bdf326c-8c66-4ba9-8c2d-83312a1ddc02) Direct 10/23/2025 12:06:19 8297ccaf-382d-4ac4-b94d-31045c4f0143
Sub 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 3 Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin 7100d1ce-5bd7-449d-abdd-52a7218922b3 Ouaouane, Taoufik-MIBELLEGROUP taoufik.ouaouane@mibelle.net User Member nested SGU-MIB-RES-Azure-Subs-MibelleOnline-SubscriptionOwner (1bdf326c-8c66-4ba9-8c2d-83312a1ddc02) Direct 07/10/2025 11:13:23 e541d72f-e58d-4a50-a18b-d6db035375c1
Sub 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 3 [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom 87e9d07b-5340-455c-b297-8bffe3b86f78 SGU-MIB-RES-Azure-Magr-Mibelle-NetOps Group direct Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:51 b731fab1-7109-41bd-ab1a-86825631a6eb
Sub 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 3 Reservation Purchaser f7b75c60-3036-4b75-91c3-6b41c27c1689 Builtin 1f3ede05-4301-42b1-8c95-2be94290e93c SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser Group direct Inherited mibelle (mibelle-mg) [Level 2] 11/24/2025 07:50:25 c5b6b2c9-d2b0-4829-8529-4cc5b928fc29
Sub 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 3 [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom abf39027-4cb4-4298-8951-f984eaf9cb8e SGU-MIB-RES-Azure-Magr-Mibelle-SecOps Group direct Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:17:18 0196a210-7b93-4caa-b848-d4834553eb90
Sub 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 3 User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin cb058f58-c629-445f-9a10-75f9fcab694e SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin Group direct Inherited mibelle (mibelle-mg) [Level 2] 07/04/2025 22:11:28 c1d2c66e-0756-435f-9669-ba1c83d98764
Sub 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 3 Key Vault Administrator 00482a5a-887f-4fb3-b363-3b7fe8e74483 Builtin dc72503d-d80a-4f41-969b-59a0818f358c SGU-MIB-RES-Azure-Magr-MibelleLandingZone-KeyVaultAdmin Group direct Inherited Landing Zones (mibelle-landingzones-mg) [Level 3] 09/05/2025 06:41:41 c4fb7e7b-7fff-4f4c-8af2-33f9e571bab7
Sub 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 3 [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom 52364002-4a8b-4808-b4fc-864ed5f7d50d SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner Group direct Inherited Landing Zones (mibelle-landingzones-mg) [Level 3] 07/04/2025 22:45:52 fb1498a2-3367-4788-9442-805f9d1127e4
Sub 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 3 User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin 45d94cc4-a927-422c-a9a3-a0cfa1684fd7 SGU-MIB-RES-Azure-Magr-MibelleLandingZone-UserAccessAdmin Group direct Inherited Landing Zones (mibelle-landingzones-mg) [Level 3] 09/05/2025 06:26:15 d7bc1214-7907-4115-a0f1-e5f098189815
Sub 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 3 [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom 1bdf326c-8c66-4ba9-8c2d-83312a1ddc02 SGU-MIB-RES-Azure-Subs-MibelleOnline-SubscriptionOwner Group direct Direct 10/23/2025 12:06:19 8297ccaf-382d-4ac4-b94d-31045c4f0143
Sub 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 3 Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin 1bdf326c-8c66-4ba9-8c2d-83312a1ddc02 SGU-MIB-RES-Azure-Subs-MibelleOnline-SubscriptionOwner Group direct Direct 07/10/2025 11:13:23 e541d72f-e58d-4a50-a18b-d6db035375c1

0 Custom Role definitions Owner permissions (ManagementGroup 'mibelle-mg' and descendants wide)

Download CSV semicolon | comma
Role Name RoleId Type Role assignments Assignable Scopes
Azure AI Account Owner e47c6f54-e4a2-4754-9501-8e0985b135e1 BuiltIn 0
Azure AI Project Manager eadc314b-1a2d-4efa-be10-5d325db5065e BuiltIn 0
Azure Container Storage Contributor 95dd08a6-00bd-4661-84bf-f6726f83a4d0 BuiltIn 0
Azure Container Storage Owner 95de85bd-744d-4664-9dde-11430bc34793 BuiltIn 0
Azure File Sync Administrator 92b92042-07d9-4307-87f7-36a593fc5850 BuiltIn 0
Azure IoT Operations Onboarding 7b7c71ed-33fa-4ed2-a91a-e56d5da260b5 BuiltIn 0
Azure Migrate Execute Expert 1cfa4eac-9a23-481c-a793-bfb6958e836b BuiltIn 0
Azure Migrate Owner fd8ea4d5-6509-4db0-bada-356ab233b4fa BuiltIn 0
Azure Resilience Management Drills Administrator c914561b-1575-4601-af9c-a1356bf59818 BuiltIn 0
Azure Resilience Management Drills Assets Administrator 5a2ec2f1-2375-4950-9906-59ec1d979249 BuiltIn 0
Azure Resilience Management Drills Target Resource Administrator e4c7f620-39b8-4688-bba2-70dd82ef367b BuiltIn 0
Azure Resilience Management Goals Administrator a2b7cc47-30ec-462f-a2f4-9ac6e1c266af BuiltIn 0
Azure Resilience Management Recovery Administrator 481d9636-d9f0-468b-b93d-6056318e6f36 BuiltIn 0
Azure Resilience Management Recovery Contributor 4c7fd853-7345-4453-babd-e9481e9b460b BuiltIn 0
Azure Sphere Owner 5a382001-fe36-41ff-bba4-8bf06bd54da9 BuiltIn 0
Azure Stack HCI Administrator bda0d508-adf1-4af0-9c28-88919fc3ae06 BuiltIn 0
Defender CSPM Storage Scanner Operator 8480c0f0-4509-4229-9339-7c10018cb8c4 BuiltIn 0
Defender for Storage Scanner Operator 0f641de8-0b88-4198-bdef-bd8b45ceba96 BuiltIn 0
DevCenter Owner 4c6569b6-f23e-4295-9b90-bd4cc4ff3292 BuiltIn 0
Key Vault Data Access Administrator 8b54135c-b56d-4d72-a534-26097cfdc8d8 BuiltIn 0
Microsoft Discovery Platform Administrator (Preview) 7a2b6e6c-472e-4b39-8878-a26eb63d75c6 BuiltIn 0
Owner 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 BuiltIn 3 (/subscriptions/d4493d1a-9fd5-4596-aff4-8c679eac0164/providers/microsoft.authorization/roleassignments/b605fdb3-4802-48ac-b896-815366e2941b, /subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/providers/microsoft.authorization/roleassignments/b68e29a8-1e6b-442d-95c4-f32bfa641802, /subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/providers/microsoft.authorization/roleassignments/598a693f-b8f8-4beb-8cd6-6df76f1605b6)
Reservations Administrator a8889054-8d42-49c9-bc1c-52486c10e7cd BuiltIn 0
Role Based Access Control Administrator f58310d9-a9f6-439a-9e8d-f62e7b41a168 BuiltIn 0
Savings plan Administrator 182a574c-b3c6-4acc-b019-48ae44cd4677 BuiltIn 0
Storage Actions Task Assignment Contributor 77789c21-1643-48a2-8f27-47f858540b51 BuiltIn 0
User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 BuiltIn 1 (/providers/microsoft.authorization/roleassignments/3f958da1-722a-4c03-8398-aab60735ecd3)
Virtual Machine Data Access Administrator (preview) 66f75aeb-eabe-4b70-9f1e-c350c4c9ad04 BuiltIn 0

0 Owner permission assignments to ServicePrincipal (ManagementGroup 'mibelle-mg' and descendants wide)

Download CSV semicolon | comma
Role Name RoleId Role Assignment Obj Type Obj DisplayName Obj SignInName ObjId Impacted Mg/Sub
Owner 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 /subscriptions/d4493d1a-9fd5-4596-aff4-8c679eac0164/providers/microsoft.authorization/roleassignments/b605fdb3-4802-48ac-b896-815366e2941b User CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 Mg: 0; Sub: 1
Owner 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 /subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/providers/microsoft.authorization/roleassignments/b68e29a8-1e6b-442d-95c4-f32bfa641802 User CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 Mg: 0; Sub: 1
Owner 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 /subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/providers/microsoft.authorization/roleassignments/598a693f-b8f8-4beb-8cd6-6df76f1605b6 User CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 Mg: 0; Sub: 1
Download CSV semicolon | comma
Role Name RoleId Role Assignment Obj Type Obj DisplayName Obj SignInName ObjId Impacted Mg/Sub
User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 /providers/microsoft.authorization/roleassignments/3f958da1-722a-4c03-8398-aab60735ecd3 User CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 Mg: 10; Sub: 5

0 Guest Users with high permissions (ManagementGroup 'mibelle-mg' and descendants wide)

0 Blueprint definitions

0 Blueprint assignments

0 Orphaned Blueprint definitions

Download CSV semicolon | comma
Level ManagementGroup ManagementGroup Id Mg children (total) Mg children (direct) Sub children (total) Sub children (direct) MG MDfC Score Path
0 -1 0 0 0 n/a
1 mibelle mibelle-mg 9 4 5 0 55.55 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg
2 Decommissioned mibelle-decommissioned-mg 0 0 0 0 n/a a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-decommissioned-mg
2 Landing Zones mibelle-landingzones-mg 2 2 2 0 82.5 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg
2 Platform mibelle-platform-mg 3 3 3 0 53.49 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg
2 Sandbox mibelle-sandbox-mg 0 0 0 0 n/a a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-sandbox-mg
3 Corp mibelle-landingzones-corp-mg 0 0 1 1 84.62 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg
3 Online mibelle-landingzones-online-mg 0 0 1 1 82.08 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg
3 Connectivity mibelle-platform-connectivity-mg 0 0 1 1 39.38 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg
3 Identity mibelle-platform-identity-mg 0 0 1 1 60.72 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg
3 Management mibelle-platform-management-mg 0 0 1 1 55 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg

Hierarchy Settings | Default Management Group Id: 'unknown.' learn

Hierarchy Settings | Require authorization for Management Group creation: 'unknown.' learn

Supported Microsoft Azure offers learn
Understand Microsoft Defender for Cloud Secure Score Video , Blog , learn
Download CSV semicolon | comma
Subscription SubscriptionId QuotaId Role assignment limit Tags Owner (at Scope) direct Owner (at Scope) indirect Owner (PIM eligible at scope) User Access Administrator (at Scope) direct User Access Administrator (at Scope) indirect User Access Administrator (PIM eligible at scope) MDfC Score MDfC 'Email notifications' state MDfC 'Email notifications' severity MDfC 'Email notifications' roles MDfC 'Email notifications' emails Advisor score Advisor Cost score Advisor HighAvailability score Advisor OperationalExcellence score Advisor Performance score Advisor Security score Management Group Path
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 PayAsYouGo_2014-09-01 4000 1 0 0 0 0 1 39.38% (14.57 of 37 points) n/a n/a n/a n/a 62.71 26.74 82.78 61.96 100 42.08 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa PayAsYouGo_2014-09-01 4000 0 0 0 0 0 1 60.71% (17 of 28 points) n/a n/a n/a n/a 82.79 100 81.02 72.22 100 60.71 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 PayAsYouGo_2014-09-01 4000 1 0 0 0 0 0 84.62% (11 of 13 points) n/a n/a n/a n/a 84.22 48.43 88.06 100 100 84.62 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b PayAsYouGo_2014-09-01 4000 1 0 0 0 0 1 55% (13.75 of 25 points) n/a n/a n/a n/a 87.07 100 78.91 100 100 56.44 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 PayAsYouGo_2014-09-01 4000 0 0 0 0 0 2 82.08% (10.67 of 13 points) n/a n/a n/a n/a 71.95 70.94 83.55 25 100 80.23 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg

0 Subscriptions out-of-scope

Resource naming and tagging decision guide learn
Download CSV semicolon | comma
Scope TagName Count
AllScopes Environment 6
AllScopes fastpathenabled 4
AllScopes hidden-link: /app-insights-resource-id 2
AllScopes hidden-title 1
AllScopes InterfaceType 15
AllScopes ms-resource-usage 1
AllScopes provider 18
AllScopes publisher 18
AllScopes TAG-Mibellegroup-Server-Update 115
AllScopes template 18
Resource Environment 6
Resource fastpathenabled 4
Resource hidden-link: /app-insights-resource-id 2
Resource hidden-title 1
Resource InterfaceType 15
Resource ms-resource-usage 1
Resource provider 18
Resource publisher 18
Resource TAG-Mibellegroup-Server-Update 115
Resource template 18
Download CSV semicolon | comma
ResourceType Resource Count
microsoft.app/containerapps 1
microsoft.app/managedenvironments 1
microsoft.automation/automationaccounts 1
microsoft.automation/automationaccounts/runbooks 1
microsoft.azurearcdata/sqlserverinstances 40
microsoft.azurearcdata/sqlserverinstances/databases 296
microsoft.compute/availabilitysets 2
microsoft.compute/disks 10
microsoft.compute/sshpublickeys 10
microsoft.compute/virtualmachines 7
microsoft.compute/virtualmachines/extensions 6
microsoft.connectedvmwarevsphere/vcenters 1
microsoft.containerregistry/registries 1
microsoft.devtestlab/schedules 1
microsoft.extendedlocation/customlocations 1
microsoft.fabric/capacities 1
microsoft.hybridcompute/machines 116
microsoft.hybridcompute/machines/extensions 266
microsoft.hybridcompute/privatelinkscopes 1
microsoft.insights/actiongroups 3
microsoft.insights/components 5
microsoft.insights/datacollectionendpoints 1
microsoft.insights/datacollectionrules 4
microsoft.insights/scheduledqueryrules 1
microsoft.insights/workbooks 1
microsoft.keyvault/vaults 5
microsoft.logic/workflows 2
microsoft.maintenance/maintenanceconfigurations 21
microsoft.managedidentity/userassignedidentities 1
microsoft.network/applicationsecuritygroups 2
microsoft.network/bastionhosts 1
microsoft.network/dnszones 19
microsoft.network/loadbalancers 1
microsoft.network/networkinterfaces 17
microsoft.network/networksecuritygroups 3
microsoft.network/networkwatchers 5
microsoft.network/networkwatchers/flowlogs 2
microsoft.network/privateendpoints 1
microsoft.network/publicipaddresses 4
microsoft.network/routetables 2
microsoft.network/virtualhubs 1
microsoft.network/virtualnetworks 3
microsoft.operationalinsights/querypacks 1
microsoft.operationalinsights/workspaces 6
microsoft.powerbidedicated/capacities 1
microsoft.resourceconnector/appliances 1
microsoft.saas/resources 1
microsoft.storage/storageaccounts 16
microsoft.visualstudio/account 1
microsoft.web/certificates 2
microsoft.web/connectiongateways 1
microsoft.web/connections 7
microsoft.web/serverfarms 6
microsoft.web/sites 7
Download CSV semicolon | comma
ResourceType Location Resource Count
microsoft.app/containerapps westeurope 1
microsoft.app/managedenvironments westeurope 1
microsoft.automation/automationaccounts westeurope 1
microsoft.automation/automationaccounts/runbooks westeurope 1
microsoft.azurearcdata/sqlserverinstances westeurope 40
microsoft.azurearcdata/sqlserverinstances/databases westeurope 296
microsoft.compute/availabilitysets westeurope 2
microsoft.compute/disks westeurope 10
microsoft.compute/sshpublickeys westeurope 10
microsoft.compute/virtualmachines westeurope 7
microsoft.compute/virtualmachines/extensions westeurope 6
microsoft.connectedvmwarevsphere/vcenters westeurope 1
microsoft.containerregistry/registries westeurope 1
microsoft.devtestlab/schedules westeurope 1
microsoft.extendedlocation/customlocations westeurope 1
microsoft.fabric/capacities westeurope 1
microsoft.hybridcompute/machines westeurope 116
microsoft.hybridcompute/machines/extensions westeurope 266
microsoft.hybridcompute/privatelinkscopes westeurope 1
microsoft.insights/actiongroups germanywestcentral 1
microsoft.insights/actiongroups global 2
microsoft.insights/components switzerlandnorth 1
microsoft.insights/components westeurope 4
microsoft.insights/datacollectionendpoints westeurope 1
microsoft.insights/datacollectionrules westeurope 4
microsoft.insights/scheduledqueryrules westeurope 1
microsoft.insights/workbooks westeurope 1
microsoft.keyvault/vaults westeurope 5
microsoft.logic/workflows westeurope 2
microsoft.maintenance/maintenanceconfigurations switzerlandnorth 7
microsoft.maintenance/maintenanceconfigurations westeurope 14
microsoft.managedidentity/userassignedidentities westeurope 1
microsoft.network/applicationsecuritygroups westeurope 2
microsoft.network/bastionhosts westeurope 1
microsoft.network/dnszones global 19
microsoft.network/loadbalancers westeurope 1
microsoft.network/networkinterfaces westeurope 17
microsoft.network/networksecuritygroups westeurope 3
microsoft.network/networkwatchers northeurope 1
microsoft.network/networkwatchers westeurope 4
microsoft.network/networkwatchers/flowlogs westeurope 2
microsoft.network/privateendpoints westeurope 1
microsoft.network/publicipaddresses westeurope 4
microsoft.network/routetables westeurope 2
microsoft.network/virtualhubs westeurope 1
microsoft.network/virtualnetworks westeurope 3
microsoft.operationalinsights/querypacks westeurope 1
microsoft.operationalinsights/workspaces switzerlandnorth 1
microsoft.operationalinsights/workspaces westeurope 5
microsoft.powerbidedicated/capacities westeurope 1
microsoft.resourceconnector/appliances westeurope 1
microsoft.saas/resources global 1
microsoft.storage/storageaccounts northeurope 1
microsoft.storage/storageaccounts westeurope 15
microsoft.visualstudio/account northeurope 1
microsoft.web/certificates westeurope 2
microsoft.web/connectiongateways westeurope 1
microsoft.web/connections westeurope 7
microsoft.web/serverfarms westeurope 6
microsoft.web/sites westeurope 7

No Resource fluctuation since last run

CAF - Recommended abbreviations for Azure resource types learn
Resource details can be found in the CSV output *_ResourcesAll.csv
Download CSV semicolon | comma
ResourceType Recommendation ResourceFriendlyName passed failed passed percentage
microsoft.automation/automationaccounts aa- Automation account 0 1 0%
microsoft.compute/availabilitysets avail- Availability set 0 2 0%
microsoft.compute/disks disk, osdisk Managed disk (data), Managed disk (OS) 0 10 0%
microsoft.compute/virtualmachines vm Virtual machine 0 7 0%
microsoft.containerregistry/registries cr Container registry 0 1 0%
microsoft.hybridcompute/machines arcs- Azure Arc enabled server 0 116 0%
microsoft.insights/actiongroups ag- Azure Monitor action group 0 3 0%
microsoft.insights/components appi- Application Insights 0 5 0%
microsoft.keyvault/vaults kv- Key vault 0 5 0%
microsoft.logic/workflows logic- Logic apps 0 2 0%
microsoft.managedidentity/userassignedidentities id- Managed Identity 0 1 0%
microsoft.network/applicationsecuritygroups asg- Application security group (ASG) 0 2 0%
microsoft.network/bastionhosts bas- Bastion 0 1 0%
microsoft.network/dnszones dnsz- DNS 0 19 0%
microsoft.network/loadbalancers lbe-, lbi- Load balancer (external), Load balancer (internal) 0 1 0%
microsoft.network/networkinterfaces nic- Network interface (NIC) 0 17 0%
microsoft.network/networksecuritygroups nsg- Network security group (NSG) 0 3 0%
microsoft.network/networkwatchers nw- Network Watcher 0 5 0%
microsoft.network/publicipaddresses pip- Public IP address 0 4 0%
microsoft.network/routetables rt- Route table 0 2 0%
microsoft.network/virtualnetworks vnet- Virtual network 0 3 0%
microsoft.operationalinsights/workspaces log- Log Analytics workspace 0 6 0%
microsoft.powerbidedicated/capacities pbi- Power BI Embedded 0 1 0%
microsoft.storage/storageaccounts st, stvm Storage account, VM storage account 0 16 0%
microsoft.web/serverfarms plan- App Service plan 0 6 0%
microsoft.web/sites app-, func-, ase- Web app, Function app, App Service environment 0 7 0%
'Azure Orphan Resources' ARG queries and workbooks GitHub
Resource details can be found in the CSV output *_ResourcesCostOptimizationAndCleanup.csv
Download CSV semicolon | comma
ResourceType Resource count Subscriptions count Intent Cost Currency
microsoft.network/publicipaddresses 1 1 cost savings use parameter -DoAzureConsumption to show potential savings
microsoft.web/connections 5 1 misconfiguration
Download CSV semicolon | comma
Provider Registered Registering NotRegistered Unregistering
ArizeAi.ObservabilityEval 0 0 5 0
Astronomer.Astro 0 0 5 0
Dell.Storage 0 0 5 0
Dynatrace.Observability 0 0 5 0
GitHub.Network 0 0 5 0
Informatica.DataManagement 0 0 5 0
LambdaTest.HyperExecute 0 0 5 0
Liftrbasic.Samplerp 0 0 5 0
Microsoft.AAD 0 0 5 0
Microsoft.AadCustomSecurityAttributesDiagnosticSettings 0 0 5 0
microsoft.aadiam 0 0 5 0
Microsoft.Addons 0 0 5 0
Microsoft.ADHybridHealthService 5 0 0 0
Microsoft.Advisor 5 0 0 0
Microsoft.AgFoodPlatform 0 0 5 0
Microsoft.AgriculturePlatform 0 0 5 0
Microsoft.AlertsManagement 2 0 3 0
Microsoft.AnalysisServices 0 0 5 0
Microsoft.ApiCenter 0 0 5 0
Microsoft.ApiManagement 0 0 5 0
Microsoft.App 1 0 4 0
Microsoft.AppAssessment 0 0 5 0
Microsoft.AppComplianceAutomation 0 0 5 0
Microsoft.AppConfiguration 0 0 5 0
Microsoft.ApplicationMigration 0 0 5 0
Microsoft.AppLink 0 0 5 0
Microsoft.AppPlatform 0 0 5 0
Microsoft.ArcContainerStorage 0 0 5 0
Microsoft.Attestation 0 0 5 0
Microsoft.Authorization 5 0 0 0
Microsoft.Automanage 0 0 5 0
Microsoft.Automation 1 0 4 0
Microsoft.AVS 0 0 5 0
Microsoft.AwsConnector 0 0 5 0
Microsoft.AzureActiveDirectory 0 0 5 0
Microsoft.AzureArcData 1 0 4 0
Microsoft.AzureBusinessContinuity 0 0 5 0
Microsoft.AzureDataTransfer 0 0 5 0
Microsoft.AzureFleet 0 0 5 0
Microsoft.AzureImageTestingForLinux 0 0 5 0
Microsoft.AzureLargeInstance 0 0 5 0
Microsoft.AzurePlaywrightService 0 0 5 0
Microsoft.AzureResilienceManagement 0 0 5 0
Microsoft.AzureScan 0 0 5 0
Microsoft.AzureSphere 0 0 5 0
Microsoft.AzureStack 0 0 5 0
Microsoft.AzureStackHCI 0 0 5 0
Microsoft.AzureTerraform 0 0 5 0
Microsoft.BackupSolutions 0 0 5 0
Microsoft.BareMetal 0 0 5 0
Microsoft.BareMetalInfrastructure 0 0 5 0
Microsoft.Batch 0 0 5 0
Microsoft.Billing 5 0 0 0
Microsoft.BillingBenefits 0 0 5 0
Microsoft.Bing 0 0 5 0
Microsoft.BlockchainTokens 0 0 5 0
Microsoft.Blueprint 0 0 5 0
Microsoft.BotService 0 0 5 0
Microsoft.Cache 0 0 5 0
Microsoft.Capacity 5 0 0 0
Microsoft.Carbon 0 0 5 0
Microsoft.Cdn 0 0 5 0
Microsoft.CertificateRegistration 0 0 5 0
Microsoft.ChangeSafety 5 0 0 0
Microsoft.Chaos 0 0 5 0
Microsoft.ClassicCompute 0 0 5 0
Microsoft.ClassicInfrastructureMigrate 0 0 5 0
Microsoft.ClassicNetwork 0 0 5 0
Microsoft.ClassicStorage 0 0 5 0
Microsoft.ClassicSubscription 5 0 0 0
Microsoft.CleanRoom 0 0 5 0
Microsoft.CloudDevicePlatform 0 0 5 0
Microsoft.CloudHealth 0 0 5 0
Microsoft.CloudShell 1 0 4 0
Microsoft.CloudTest 0 0 5 0
Microsoft.CodeSigning 0 0 5 0
Microsoft.CognitiveServices 0 0 5 0
Microsoft.Commerce 5 0 0 0
Microsoft.Communication 1 0 4 0
Microsoft.Community 0 0 5 0
Microsoft.Compute 3 0 2 0
Microsoft.ComputeLimit 0 0 5 0
Microsoft.ComputeSchedule 0 0 5 0
Microsoft.ConfidentialLedger 0 0 5 0
Microsoft.Confluent 0 0 5 0
Microsoft.ConnectedCache 0 0 5 0
Microsoft.ConnectedCredentials 0 0 5 0
microsoft.connectedopenstack 0 0 5 0
Microsoft.ConnectedVehicle 0 0 5 0
Microsoft.ConnectedVMwarevSphere 1 0 4 0
Microsoft.Consumption 5 0 0 0
Microsoft.ContainerInstance 0 0 5 0
Microsoft.ContainerRegistry 1 0 4 0
Microsoft.ContainerService 1 0 4 0
Microsoft.CostManagement 5 0 0 0
Microsoft.CostManagementExports 0 0 5 0
Microsoft.CustomerLockbox 0 0 5 0
Microsoft.CustomProviders 0 0 5 0
Microsoft.D365CustomerInsights 0 0 5 0
Microsoft.Dashboard 0 0 5 0
Microsoft.DatabaseFleetManager 0 0 5 0
Microsoft.DatabaseWatcher 0 0 5 0
Microsoft.DataBox 0 0 5 0
Microsoft.DataBoxEdge 0 0 5 0
Microsoft.Databricks 0 0 5 0
Microsoft.Datadog 0 0 5 0
Microsoft.DataFactory 0 0 5 0
Microsoft.DataLakeAnalytics 0 0 5 0
Microsoft.DataLakeStore 0 0 5 0
Microsoft.DataMigration 0 0 5 0
Microsoft.DataProtection 0 0 5 0
Microsoft.DataReplication 0 0 5 0
Microsoft.DataShare 0 0 5 0
Microsoft.DBforMariaDB 0 0 5 0
Microsoft.DBforMySQL 0 0 5 0
Microsoft.DBforPostgreSQL 0 0 5 0
Microsoft.DependencyMap 0 0 5 0
Microsoft.DesktopVirtualization 0 0 5 0
Microsoft.DevCenter 0 0 5 0
Microsoft.DevelopmentWindows365 0 0 5 0
Microsoft.DevHub 0 0 5 0
Microsoft.DeviceOnboarding 0 0 5 0
Microsoft.DeviceRegistry 0 0 5 0
Microsoft.Devices 0 0 5 0
Microsoft.DeviceUpdate 0 0 5 0
Microsoft.DevOpsInfrastructure 0 0 5 0
Microsoft.DevTestLab 2 0 3 0
Microsoft.DigitalTwins 0 0 5 0
Microsoft.Discovery 0 0 5 0
Microsoft.DocumentDB 0 0 5 0
Microsoft.DomainRegistration 1 0 4 0
Microsoft.DurableTask 0 0 5 0
Microsoft.Easm 0 0 5 0
Microsoft.Edge 0 0 5 0
Microsoft.EdgeManagement 0 0 5 0
Microsoft.EdgeMarketplace 0 0 5 0
Microsoft.EdgeOrder 0 0 5 0
Microsoft.EdgeOrderPartner 0 0 5 0
Microsoft.EdgeZones 0 0 5 0
Microsoft.Elastic 0 0 5 0
Microsoft.ElasticSan 0 0 5 0
Microsoft.EnterpriseSupport 0 0 5 0
Microsoft.EntitlementManagement 0 0 5 0
Microsoft.EntraIDGovernance 0 0 5 0
Microsoft.EntraIdGovernanceAccelerator 0 0 5 0
Microsoft.ErrorAtlas 0 0 5 0
Microsoft.EventGrid 0 0 5 0
Microsoft.EventHub 0 0 5 0
Microsoft.Experimentation 0 0 5 0
Microsoft.ExtendedLocation 1 0 4 0
Microsoft.Fabric 2 0 3 0
Microsoft.Features 5 0 0 0
Microsoft.FileShares 0 0 5 0
Microsoft.FluidRelay 0 0 5 0
Microsoft.GCPConnector 0 0 5 0
Microsoft.GraphServices 0 0 5 0
Microsoft.GuestConfiguration 5 0 0 0
Microsoft.HanaOnAzure 0 0 5 0
Microsoft.HardwareSecurityModules 0 0 5 0
Microsoft.HDInsight 0 0 5 0
Microsoft.HealthBot 0 0 5 0
Microsoft.HealthcareApis 0 0 5 0
Microsoft.HealthcareInterop 0 0 5 0
Microsoft.HealthDataAIServices 0 0 5 0
Microsoft.HealthModel 0 0 5 0
Microsoft.HealthPlatform 0 0 5 0
Microsoft.Help 1 0 4 0
Microsoft.HybridCloud 0 0 5 0
Microsoft.HybridCompute 1 0 4 0
Microsoft.HybridConnectivity 1 0 4 0
Microsoft.HybridContainerService 0 0 5 0
Microsoft.HybridNetwork 0 0 5 0
Microsoft.Impact 0 0 5 0
microsoft.insights 5 0 0 0
Microsoft.IntegrationSpaces 0 0 5 0
Microsoft.IoTCentral 0 0 5 0
Microsoft.IoTFirmwareDefense 0 0 5 0
Microsoft.IoTOperations 0 0 5 0
Microsoft.IoTOperationsDataProcessor 0 0 5 0
Microsoft.IoTSecurity 0 0 5 0
Microsoft.KeyVault 4 0 1 0
Microsoft.Kubernetes 1 0 4 0
Microsoft.KubernetesConfiguration 1 0 4 0
Microsoft.KubernetesRuntime 0 0 5 0
Microsoft.Kusto 0 0 5 0
Microsoft.LabServices 0 0 5 0
Microsoft.LoadTestService 0 0 5 0
Microsoft.Logic 1 0 4 0
Microsoft.MachineLearningServices 0 0 5 0
Microsoft.Maintenance 1 0 4 0
Microsoft.ManagedIdentity 5 0 0 0
Microsoft.ManagedNetworkFabric 0 0 5 0
Microsoft.ManagedServices 0 0 5 0
Microsoft.Management 2 0 3 0
Microsoft.Maps 0 0 5 0
Microsoft.Marketplace 0 0 5 0
Microsoft.MarketplaceOrdering 5 0 0 0
Microsoft.MessagingCatalog 0 0 5 0
Microsoft.MessagingConnectors 0 0 5 0
Microsoft.Migrate 0 0 5 0
Microsoft.Mission 0 0 5 0
Microsoft.Monitor 0 0 5 0
Microsoft.MySQLDiscovery 0 0 5 0
Microsoft.NetApp 0 0 5 0
Microsoft.Network 4 0 1 0
Microsoft.NetworkCloud 0 0 5 0
Microsoft.NetworkFunction 0 0 5 0
Microsoft.NexusIdentity 0 0 5 0
Microsoft.NotificationHubs 0 0 5 0
Microsoft.Nutanix 0 0 5 0
Microsoft.ObjectStore 0 0 5 0
Microsoft.OffAzure 0 0 5 0
Microsoft.OffAzureSpringBoot 0 0 5 0
Microsoft.OnlineExperimentation 0 0 5 0
Microsoft.OpenEnergyPlatform 0 0 5 0
Microsoft.OperationalInsights 3 0 2 0
Microsoft.OperationsManagement 0 0 5 0
Microsoft.OperatorVoicemail 0 0 5 0
Microsoft.OracleDiscovery 0 0 5 0
Microsoft.Orbital 0 0 5 0
Microsoft.PartnerManagedConsumerRecurrence 0 0 5 0
Microsoft.Peering 0 0 5 0
Microsoft.Pki 0 0 5 0
Microsoft.PolicyInsights 5 0 0 0
Microsoft.Portal 5 0 0 0
Microsoft.PortalServices 0 0 5 0
Microsoft.PowerBI 0 0 5 0
Microsoft.PowerBIDedicated 1 0 4 0
Microsoft.PowerPlatform 0 0 5 0
Microsoft.Premonition 0 0 5 0
Microsoft.ProfessionalService 0 0 5 0
Microsoft.ProviderHub 0 0 5 0
Microsoft.Purview 0 0 5 0
Microsoft.Quantum 0 0 5 0
Microsoft.Quota 1 0 4 0
Microsoft.RecommendationsService 0 0 5 0
Microsoft.RecoveryServices 0 0 5 0
Microsoft.RedHatOpenShift 0 0 5 0
Microsoft.Relationships 0 0 5 0
Microsoft.Relay 0 0 5 0
Microsoft.ResourceBuilder 0 0 5 0
Microsoft.ResourceConnector 1 0 4 0
Microsoft.ResourceGraph 5 0 0 0
Microsoft.ResourceHealth 2 0 3 0
Microsoft.ResourceIntelligence 5 0 0 0
Microsoft.ResourceNotifications 5 0 0 0
Microsoft.Resources 5 0 0 0
Microsoft.SaaS 1 0 4 0
Microsoft.SaaSHub 0 0 5 0
Microsoft.Scom 0 0 5 0
Microsoft.SCVMM 0 0 5 0
Microsoft.Search 0 0 5 0
Microsoft.SecretSyncController 0 0 5 0
Microsoft.Security 5 0 0 0
Microsoft.SecurityCopilot 0 0 5 0
Microsoft.SecurityDetonation 0 0 5 0
Microsoft.SecurityInsights 0 0 5 0
Microsoft.SecurityPlatform 0 0 5 0
Microsoft.SentinelPlatformServices 0 0 5 0
Microsoft.SerialConsole 5 0 0 0
Microsoft.ServiceBus 0 0 5 0
Microsoft.ServiceFabric 0 0 5 0
Microsoft.ServiceFabricMesh 0 0 5 0
Microsoft.ServiceLinker 0 0 5 0
Microsoft.ServiceNetworking 0 0 5 0
Microsoft.ServicesHub 0 0 5 0
Microsoft.SignalRService 0 0 5 0
Microsoft.Singularity 0 0 5 0
Microsoft.SoftwarePlan 0 0 5 0
Microsoft.Solutions 0 0 5 0
Microsoft.Sovereign 0 0 5 0
Microsoft.Sql 0 0 5 0
Microsoft.SqlVirtualMachine 0 0 5 0
Microsoft.StandbyPool 0 0 5 0
Microsoft.Storage 5 0 0 0
Microsoft.StorageActions 0 0 5 0
Microsoft.StorageCache 0 0 5 0
Microsoft.StorageDiscovery 0 0 5 0
Microsoft.StorageMover 0 0 5 0
Microsoft.StorageSync 0 0 5 0
Microsoft.StorageTasks 0 0 5 0
Microsoft.StreamAnalytics 0 0 5 0
Microsoft.Subscription 0 0 5 0
Microsoft.SupercomputerInfrastructure 0 0 5 0
microsoft.support 5 0 0 0
Microsoft.SustainabilityServices 0 0 5 0
Microsoft.Synapse 0 0 5 0
Microsoft.Syntex 0 0 5 0
Microsoft.ToolchainOrchestrator 0 0 5 0
Microsoft.UpdateManager 0 0 5 0
Microsoft.UsageBilling 0 0 5 0
Microsoft.Validate 0 0 5 0
Microsoft.VerifiedId 0 0 5 0
Microsoft.VideoIndexer 0 0 5 0
Microsoft.VirtualMachineImages 0 0 5 0
microsoft.visualstudio 1 0 4 0
Microsoft.VMware 0 0 5 0
Microsoft.VoiceServices 0 0 5 0
Microsoft.Web 3 0 2 0
Microsoft.WeightsAndBiases 0 0 5 0
Microsoft.Windows365 0 0 5 0
Microsoft.WindowsPushNotificationServices 0 0 5 0
Microsoft.WorkloadBuilder 0 0 5 0
Microsoft.Workloads 0 0 5 0
MongoDB.Atlas 0 0 5 0
Neon.Postgres 0 0 5 0
NewRelic.Observability 0 0 5 0
NGINX.NGINXPLUS 0 0 5 0
Oracle.Database 0 0 5 0
PaloAltoNetworks.Cloudngfw 0 0 5 0
Pinecone.VectorDb 0 0 5 0
PureStorage.Block 0 0 5 0
Qumulo.Storage 0 0 5 0
Download CSV semicolon | comma
Subscription SubscriptionId Subscription MG path Provider State
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 ArizeAi.ObservabilityEval NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Astronomer.Astro NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Dell.Storage NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Dynatrace.Observability NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 GitHub.Network NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Informatica.DataManagement NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 LambdaTest.HyperExecute NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Liftrbasic.Samplerp NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.AAD NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.AadCustomSecurityAttributesDiagnosticSettings NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 microsoft.aadiam NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.Addons NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.ADHybridHealthService Registered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.Advisor Registered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.AgFoodPlatform NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.AgriculturePlatform NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.AlertsManagement NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.AnalysisServices NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.ApiCenter NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.ApiManagement NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.App Registered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.AppAssessment NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.AppComplianceAutomation NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.AppConfiguration NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.ApplicationMigration NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.AppLink NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.AppPlatform NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.ArcContainerStorage NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.Attestation NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.Authorization Registered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.Automanage NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.Automation NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.AVS NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.AwsConnector NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.AzureActiveDirectory NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.AzureArcData NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.AzureBusinessContinuity NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.AzureDataTransfer NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.AzureFleet NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.AzureImageTestingForLinux NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.AzureLargeInstance NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.AzurePlaywrightService NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.AzureResilienceManagement NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.AzureScan NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.AzureSphere NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.AzureStack NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.AzureStackHCI NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.AzureTerraform NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.BackupSolutions NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.BareMetal NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.BareMetalInfrastructure NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.Batch NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.Billing Registered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.BillingBenefits NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.Bing NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.BlockchainTokens NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.Blueprint NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.BotService NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.Cache NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.Capacity Registered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.Carbon NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.Cdn NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.CertificateRegistration NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.ChangeSafety Registered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.Chaos NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.ClassicCompute NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.ClassicInfrastructureMigrate NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.ClassicNetwork NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.ClassicStorage NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.ClassicSubscription Registered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.CleanRoom NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.CloudDevicePlatform NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.CloudHealth NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.CloudShell NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.CloudTest NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.CodeSigning NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.CognitiveServices NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.Commerce Registered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.Communication Registered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.Community NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.Compute Registered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.ComputeLimit NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.ComputeSchedule NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.ConfidentialLedger NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.Confluent NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.ConnectedCache NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.ConnectedCredentials NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 microsoft.connectedopenstack NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.ConnectedVehicle NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.ConnectedVMwarevSphere NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.Consumption Registered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.ContainerInstance NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.ContainerRegistry Registered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.ContainerService NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.CostManagement Registered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.CostManagementExports NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.CustomerLockbox NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.CustomProviders NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.D365CustomerInsights NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.Dashboard NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.DatabaseFleetManager NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.DatabaseWatcher NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.DataBox NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.DataBoxEdge NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.Databricks NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.Datadog NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.DataFactory NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.DataLakeAnalytics NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.DataLakeStore NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.DataMigration NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.DataProtection NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.DataReplication NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.DataShare NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.DBforMariaDB NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.DBforMySQL NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.DBforPostgreSQL NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.DependencyMap NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.DesktopVirtualization NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.DevCenter NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.DevelopmentWindows365 NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.DevHub NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.DeviceOnboarding NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.DeviceRegistry NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.Devices NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.DeviceUpdate NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.DevOpsInfrastructure NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.DevTestLab NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.DigitalTwins NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.Discovery NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.DocumentDB NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.DomainRegistration Registered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.DurableTask NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.Easm NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.Edge NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.EdgeManagement NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.EdgeMarketplace NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.EdgeOrder NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.EdgeOrderPartner NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.EdgeZones NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.Elastic NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.ElasticSan NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.EnterpriseSupport NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.EntitlementManagement NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.EntraIDGovernance NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.EntraIdGovernanceAccelerator NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.ErrorAtlas NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.EventGrid NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.EventHub NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.Experimentation NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.ExtendedLocation NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.Fabric Registered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.Features Registered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.FileShares NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.FluidRelay NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.GCPConnector NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.GraphServices NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.GuestConfiguration Registered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.HanaOnAzure NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.HardwareSecurityModules NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.HDInsight NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.HealthBot NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.HealthcareApis NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.HealthcareInterop NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.HealthDataAIServices NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.HealthModel NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.HealthPlatform NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.Help NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.HybridCloud NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.HybridCompute NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.HybridConnectivity NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.HybridContainerService NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.HybridNetwork NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.Impact NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 microsoft.insights Registered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.IntegrationSpaces NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.IoTCentral NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.IoTFirmwareDefense NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.IoTOperations NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.IoTOperationsDataProcessor NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.IoTSecurity NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.KeyVault Registered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.Kubernetes NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.KubernetesConfiguration NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.KubernetesRuntime NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.Kusto NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.LabServices NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.LoadTestService NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.Logic Registered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.MachineLearningServices NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.Maintenance NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.ManagedIdentity Registered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.ManagedNetworkFabric NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.ManagedServices NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.Management Registered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.Maps NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.Marketplace NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.MarketplaceOrdering Registered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.MessagingCatalog NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.MessagingConnectors NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.Migrate NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.Mission NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.Monitor NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.MySQLDiscovery NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.NetApp NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.Network Registered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.NetworkCloud NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.NetworkFunction NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.NexusIdentity NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.NotificationHubs NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.Nutanix NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.ObjectStore NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.OffAzure NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.OffAzureSpringBoot NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.OnlineExperimentation NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.OpenEnergyPlatform NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.OperationalInsights Registered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.OperationsManagement NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.OperatorVoicemail NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.OracleDiscovery NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.Orbital NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.PartnerManagedConsumerRecurrence NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.Peering NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.Pki NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.PolicyInsights Registered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.Portal Registered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.PortalServices NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.PowerBI NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.PowerBIDedicated Registered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.PowerPlatform NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.Premonition NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.ProfessionalService NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.ProviderHub NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.Purview NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.Quantum NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.Quota NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.RecommendationsService NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.RecoveryServices NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.RedHatOpenShift NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.Relationships NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.Relay NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.ResourceBuilder NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.ResourceConnector NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.ResourceGraph Registered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.ResourceHealth NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.ResourceIntelligence Registered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.ResourceNotifications Registered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.Resources Registered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.SaaS Registered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.SaaSHub NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.Scom NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.SCVMM NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.Search NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.SecretSyncController NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.Security Registered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.SecurityCopilot NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.SecurityDetonation NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.SecurityInsights NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.SecurityPlatform NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.SentinelPlatformServices NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.SerialConsole Registered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.ServiceBus NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.ServiceFabric NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.ServiceFabricMesh NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.ServiceLinker NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.ServiceNetworking NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.ServicesHub NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.SignalRService NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.Singularity NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.SoftwarePlan NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.Solutions NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.Sovereign NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.Sql NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.SqlVirtualMachine NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.StandbyPool NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.Storage Registered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.StorageActions NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.StorageCache NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.StorageDiscovery NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.StorageMover NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.StorageSync NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.StorageTasks NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.StreamAnalytics NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.Subscription NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.SupercomputerInfrastructure NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 microsoft.support Registered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.SustainabilityServices NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.Synapse NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.Syntex NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.ToolchainOrchestrator NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.UpdateManager NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.UsageBilling NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.Validate NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.VerifiedId NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.VideoIndexer NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.VirtualMachineImages NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 microsoft.visualstudio Registered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.VMware NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.VoiceServices NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.Web Registered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.WeightsAndBiases NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.Windows365 NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.WindowsPushNotificationServices NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.WorkloadBuilder NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Microsoft.Workloads NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 MongoDB.Atlas NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Neon.Postgres NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 NewRelic.Observability NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 NGINX.NGINXPLUS NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Oracle.Database NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 PaloAltoNetworks.Cloudngfw NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Pinecone.VectorDb NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 PureStorage.Block NotRegistered
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Qumulo.Storage NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 ArizeAi.ObservabilityEval NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Astronomer.Astro NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Dell.Storage NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Dynatrace.Observability NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 GitHub.Network NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Informatica.DataManagement NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 LambdaTest.HyperExecute NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Liftrbasic.Samplerp NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.AAD NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.AadCustomSecurityAttributesDiagnosticSettings NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 microsoft.aadiam NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.Addons NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.ADHybridHealthService Registered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.Advisor Registered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.AgFoodPlatform NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.AgriculturePlatform NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.AlertsManagement NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.AnalysisServices NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.ApiCenter NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.ApiManagement NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.App NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.AppAssessment NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.AppComplianceAutomation NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.AppConfiguration NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.ApplicationMigration NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.AppLink NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.AppPlatform NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.ArcContainerStorage NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.Attestation NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.Authorization Registered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.Automanage NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.Automation NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.AVS NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.AwsConnector NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.AzureActiveDirectory NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.AzureArcData NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.AzureBusinessContinuity NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.AzureDataTransfer NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.AzureFleet NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.AzureImageTestingForLinux NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.AzureLargeInstance NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.AzurePlaywrightService NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.AzureResilienceManagement NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.AzureScan NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.AzureSphere NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.AzureStack NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.AzureStackHCI NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.AzureTerraform NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.BackupSolutions NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.BareMetal NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.BareMetalInfrastructure NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.Batch NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.Billing Registered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.BillingBenefits NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.Bing NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.BlockchainTokens NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.Blueprint NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.BotService NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.Cache NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.Capacity Registered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.Carbon NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.Cdn NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.CertificateRegistration NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.ChangeSafety Registered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.Chaos NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.ClassicCompute NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.ClassicInfrastructureMigrate NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.ClassicNetwork NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.ClassicStorage NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.ClassicSubscription Registered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.CleanRoom NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.CloudDevicePlatform NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.CloudHealth NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.CloudShell NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.CloudTest NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.CodeSigning NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.CognitiveServices NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.Commerce Registered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.Communication NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.Community NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.Compute NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.ComputeLimit NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.ComputeSchedule NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.ConfidentialLedger NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.Confluent NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.ConnectedCache NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.ConnectedCredentials NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 microsoft.connectedopenstack NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.ConnectedVehicle NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.ConnectedVMwarevSphere NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.Consumption Registered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.ContainerInstance NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.ContainerRegistry NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.ContainerService NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.CostManagement Registered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.CostManagementExports NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.CustomerLockbox NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.CustomProviders NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.D365CustomerInsights NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.Dashboard NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.DatabaseFleetManager NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.DatabaseWatcher NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.DataBox NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.DataBoxEdge NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.Databricks NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.Datadog NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.DataFactory NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.DataLakeAnalytics NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.DataLakeStore NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.DataMigration NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.DataProtection NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.DataReplication NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.DataShare NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.DBforMariaDB NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.DBforMySQL NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.DBforPostgreSQL NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.DependencyMap NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.DesktopVirtualization NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.DevCenter NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.DevelopmentWindows365 NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.DevHub NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.DeviceOnboarding NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.DeviceRegistry NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.Devices NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.DeviceUpdate NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.DevOpsInfrastructure NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.DevTestLab NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.DigitalTwins NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.Discovery NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.DocumentDB NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.DomainRegistration NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.DurableTask NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.Easm NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.Edge NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.EdgeManagement NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.EdgeMarketplace NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.EdgeOrder NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.EdgeOrderPartner NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.EdgeZones NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.Elastic NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.ElasticSan NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.EnterpriseSupport NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.EntitlementManagement NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.EntraIDGovernance NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.EntraIdGovernanceAccelerator NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.ErrorAtlas NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.EventGrid NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.EventHub NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.Experimentation NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.ExtendedLocation NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.Fabric NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.Features Registered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.FileShares NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.FluidRelay NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.GCPConnector NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.GraphServices NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.GuestConfiguration Registered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.HanaOnAzure NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.HardwareSecurityModules NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.HDInsight NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.HealthBot NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.HealthcareApis NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.HealthcareInterop NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.HealthDataAIServices NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.HealthModel NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.HealthPlatform NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.Help NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.HybridCloud NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.HybridCompute NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.HybridConnectivity NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.HybridContainerService NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.HybridNetwork NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.Impact NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 microsoft.insights Registered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.IntegrationSpaces NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.IoTCentral NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.IoTFirmwareDefense NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.IoTOperations NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.IoTOperationsDataProcessor NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.IoTSecurity NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.KeyVault Registered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.Kubernetes NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.KubernetesConfiguration NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.KubernetesRuntime NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.Kusto NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.LabServices NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.LoadTestService NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.Logic NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.MachineLearningServices NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.Maintenance NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.ManagedIdentity Registered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.ManagedNetworkFabric NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.ManagedServices NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.Management NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.Maps NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.Marketplace NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.MarketplaceOrdering Registered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.MessagingCatalog NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.MessagingConnectors NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.Migrate NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.Mission NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.Monitor NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.MySQLDiscovery NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.NetApp NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.Network NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.NetworkCloud NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.NetworkFunction NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.NexusIdentity NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.NotificationHubs NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.Nutanix NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.ObjectStore NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.OffAzure NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.OffAzureSpringBoot NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.OnlineExperimentation NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.OpenEnergyPlatform NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.OperationalInsights Registered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.OperationsManagement NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.OperatorVoicemail NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.OracleDiscovery NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.Orbital NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.PartnerManagedConsumerRecurrence NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.Peering NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.Pki NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.PolicyInsights Registered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.Portal Registered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.PortalServices NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.PowerBI NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.PowerBIDedicated NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.PowerPlatform NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.Premonition NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.ProfessionalService NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.ProviderHub NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.Purview NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.Quantum NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.Quota NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.RecommendationsService NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.RecoveryServices NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.RedHatOpenShift NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.Relationships NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.Relay NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.ResourceBuilder NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.ResourceConnector NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.ResourceGraph Registered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.ResourceHealth NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.ResourceIntelligence Registered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.ResourceNotifications Registered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.Resources Registered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.SaaS NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.SaaSHub NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.Scom NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.SCVMM NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.Search NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.SecretSyncController NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.Security Registered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.SecurityCopilot NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.SecurityDetonation NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.SecurityInsights NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.SecurityPlatform NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.SentinelPlatformServices NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.SerialConsole Registered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.ServiceBus NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.ServiceFabric NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.ServiceFabricMesh NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.ServiceLinker NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.ServiceNetworking NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.ServicesHub NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.SignalRService NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.Singularity NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.SoftwarePlan NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.Solutions NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.Sovereign NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.Sql NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.SqlVirtualMachine NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.StandbyPool NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.Storage Registered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.StorageActions NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.StorageCache NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.StorageDiscovery NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.StorageMover NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.StorageSync NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.StorageTasks NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.StreamAnalytics NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.Subscription NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.SupercomputerInfrastructure NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 microsoft.support Registered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.SustainabilityServices NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.Synapse NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.Syntex NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.ToolchainOrchestrator NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.UpdateManager NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.UsageBilling NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.Validate NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.VerifiedId NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.VideoIndexer NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.VirtualMachineImages NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 microsoft.visualstudio NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.VMware NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.VoiceServices NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.Web Registered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.WeightsAndBiases NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.Windows365 NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.WindowsPushNotificationServices NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.WorkloadBuilder NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Microsoft.Workloads NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 MongoDB.Atlas NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Neon.Postgres NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 NewRelic.Observability NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 NGINX.NGINXPLUS NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Oracle.Database NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 PaloAltoNetworks.Cloudngfw NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Pinecone.VectorDb NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 PureStorage.Block NotRegistered
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Qumulo.Storage NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa ArizeAi.ObservabilityEval NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Astronomer.Astro NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Dell.Storage NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Dynatrace.Observability NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa GitHub.Network NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Informatica.DataManagement NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa LambdaTest.HyperExecute NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Liftrbasic.Samplerp NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.AAD NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.AadCustomSecurityAttributesDiagnosticSettings NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa microsoft.aadiam NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.Addons NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.ADHybridHealthService Registered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.Advisor Registered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.AgFoodPlatform NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.AgriculturePlatform NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.AlertsManagement NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.AnalysisServices NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.ApiCenter NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.ApiManagement NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.App NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.AppAssessment NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.AppComplianceAutomation NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.AppConfiguration NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.ApplicationMigration NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.AppLink NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.AppPlatform NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.ArcContainerStorage NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.Attestation NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.Authorization Registered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.Automanage NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.Automation NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.AVS NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.AwsConnector NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.AzureActiveDirectory NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.AzureArcData NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.AzureBusinessContinuity NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.AzureDataTransfer NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.AzureFleet NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.AzureImageTestingForLinux NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.AzureLargeInstance NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.AzurePlaywrightService NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.AzureResilienceManagement NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.AzureScan NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.AzureSphere NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.AzureStack NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.AzureStackHCI NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.AzureTerraform NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.BackupSolutions NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.BareMetal NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.BareMetalInfrastructure NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.Batch NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.Billing Registered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.BillingBenefits NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.Bing NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.BlockchainTokens NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.Blueprint NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.BotService NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.Cache NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.Capacity Registered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.Carbon NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.Cdn NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.CertificateRegistration NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.ChangeSafety Registered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.Chaos NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.ClassicCompute NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.ClassicInfrastructureMigrate NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.ClassicNetwork NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.ClassicStorage NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.ClassicSubscription Registered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.CleanRoom NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.CloudDevicePlatform NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.CloudHealth NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.CloudShell NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.CloudTest NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.CodeSigning NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.CognitiveServices NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.Commerce Registered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.Communication NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.Community NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.Compute Registered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.ComputeLimit NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.ComputeSchedule NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.ConfidentialLedger NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.Confluent NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.ConnectedCache NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.ConnectedCredentials NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa microsoft.connectedopenstack NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.ConnectedVehicle NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.ConnectedVMwarevSphere NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.Consumption Registered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.ContainerInstance NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.ContainerRegistry NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.ContainerService NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.CostManagement Registered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.CostManagementExports NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.CustomerLockbox NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.CustomProviders NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.D365CustomerInsights NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.Dashboard NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.DatabaseFleetManager NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.DatabaseWatcher NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.DataBox NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.DataBoxEdge NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.Databricks NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.Datadog NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.DataFactory NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.DataLakeAnalytics NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.DataLakeStore NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.DataMigration NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.DataProtection NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.DataReplication NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.DataShare NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.DBforMariaDB NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.DBforMySQL NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.DBforPostgreSQL NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.DependencyMap NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.DesktopVirtualization NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.DevCenter NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.DevelopmentWindows365 NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.DevHub NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.DeviceOnboarding NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.DeviceRegistry NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.Devices NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.DeviceUpdate NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.DevOpsInfrastructure NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.DevTestLab Registered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.DigitalTwins NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.Discovery NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.DocumentDB NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.DomainRegistration NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.DurableTask NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.Easm NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.Edge NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.EdgeManagement NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.EdgeMarketplace NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.EdgeOrder NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.EdgeOrderPartner NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.EdgeZones NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.Elastic NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.ElasticSan NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.EnterpriseSupport NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.EntitlementManagement NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.EntraIDGovernance NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.EntraIdGovernanceAccelerator NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.ErrorAtlas NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.EventGrid NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.EventHub NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.Experimentation NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.ExtendedLocation NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.Fabric NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.Features Registered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.FileShares NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.FluidRelay NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.GCPConnector NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.GraphServices NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.GuestConfiguration Registered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.HanaOnAzure NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.HardwareSecurityModules NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.HDInsight NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.HealthBot NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.HealthcareApis NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.HealthcareInterop NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.HealthDataAIServices NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.HealthModel NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.HealthPlatform NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.Help NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.HybridCloud NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.HybridCompute NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.HybridConnectivity NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.HybridContainerService NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.HybridNetwork NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.Impact NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa microsoft.insights Registered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.IntegrationSpaces NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.IoTCentral NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.IoTFirmwareDefense NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.IoTOperations NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.IoTOperationsDataProcessor NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.IoTSecurity NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.KeyVault NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.Kubernetes NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.KubernetesConfiguration NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.KubernetesRuntime NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.Kusto NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.LabServices NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.LoadTestService NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.Logic NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.MachineLearningServices NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.Maintenance NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.ManagedIdentity Registered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.ManagedNetworkFabric NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.ManagedServices NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.Management NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.Maps NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.Marketplace NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.MarketplaceOrdering Registered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.MessagingCatalog NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.MessagingConnectors NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.Migrate NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.Mission NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.Monitor NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.MySQLDiscovery NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.NetApp NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.Network Registered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.NetworkCloud NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.NetworkFunction NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.NexusIdentity NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.NotificationHubs NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.Nutanix NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.ObjectStore NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.OffAzure NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.OffAzureSpringBoot NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.OnlineExperimentation NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.OpenEnergyPlatform NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.OperationalInsights NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.OperationsManagement NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.OperatorVoicemail NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.OracleDiscovery NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.Orbital NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.PartnerManagedConsumerRecurrence NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.Peering NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.Pki NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.PolicyInsights Registered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.Portal Registered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.PortalServices NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.PowerBI NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.PowerBIDedicated NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.PowerPlatform NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.Premonition NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.ProfessionalService NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.ProviderHub NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.Purview NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.Quantum NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.Quota NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.RecommendationsService NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.RecoveryServices NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.RedHatOpenShift NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.Relationships NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.Relay NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.ResourceBuilder NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.ResourceConnector NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.ResourceGraph Registered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.ResourceHealth Registered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.ResourceIntelligence Registered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.ResourceNotifications Registered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.Resources Registered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.SaaS NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.SaaSHub NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.Scom NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.SCVMM NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.Search NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.SecretSyncController NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.Security Registered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.SecurityCopilot NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.SecurityDetonation NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.SecurityInsights NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.SecurityPlatform NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.SentinelPlatformServices NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.SerialConsole Registered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.ServiceBus NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.ServiceFabric NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.ServiceFabricMesh NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.ServiceLinker NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.ServiceNetworking NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.ServicesHub NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.SignalRService NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.Singularity NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.SoftwarePlan NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.Solutions NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.Sovereign NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.Sql NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.SqlVirtualMachine NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.StandbyPool NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.Storage Registered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.StorageActions NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.StorageCache NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.StorageDiscovery NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.StorageMover NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.StorageSync NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.StorageTasks NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.StreamAnalytics NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.Subscription NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.SupercomputerInfrastructure NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa microsoft.support Registered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.SustainabilityServices NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.Synapse NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.Syntex NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.ToolchainOrchestrator NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.UpdateManager NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.UsageBilling NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.Validate NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.VerifiedId NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.VideoIndexer NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.VirtualMachineImages NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa microsoft.visualstudio NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.VMware NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.VoiceServices NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.Web NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.WeightsAndBiases NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.Windows365 NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.WindowsPushNotificationServices NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.WorkloadBuilder NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Microsoft.Workloads NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa MongoDB.Atlas NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Neon.Postgres NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa NewRelic.Observability NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa NGINX.NGINXPLUS NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Oracle.Database NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa PaloAltoNetworks.Cloudngfw NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Pinecone.VectorDb NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa PureStorage.Block NotRegistered
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Qumulo.Storage NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 ArizeAi.ObservabilityEval NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Astronomer.Astro NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Dell.Storage NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Dynatrace.Observability NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 GitHub.Network NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Informatica.DataManagement NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 LambdaTest.HyperExecute NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Liftrbasic.Samplerp NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.AAD NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.AadCustomSecurityAttributesDiagnosticSettings NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 microsoft.aadiam NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.Addons NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.ADHybridHealthService Registered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.Advisor Registered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.AgFoodPlatform NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.AgriculturePlatform NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.AlertsManagement Registered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.AnalysisServices NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.ApiCenter NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.ApiManagement NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.App NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.AppAssessment NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.AppComplianceAutomation NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.AppConfiguration NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.ApplicationMigration NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.AppLink NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.AppPlatform NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.ArcContainerStorage NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.Attestation NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.Authorization Registered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.Automanage NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.Automation NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.AVS NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.AwsConnector NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.AzureActiveDirectory NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.AzureArcData NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.AzureBusinessContinuity NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.AzureDataTransfer NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.AzureFleet NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.AzureImageTestingForLinux NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.AzureLargeInstance NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.AzurePlaywrightService NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.AzureResilienceManagement NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.AzureScan NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.AzureSphere NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.AzureStack NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.AzureStackHCI NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.AzureTerraform NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.BackupSolutions NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.BareMetal NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.BareMetalInfrastructure NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.Batch NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.Billing Registered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.BillingBenefits NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.Bing NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.BlockchainTokens NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.Blueprint NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.BotService NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.Cache NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.Capacity Registered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.Carbon NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.Cdn NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.CertificateRegistration NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.ChangeSafety Registered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.Chaos NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.ClassicCompute NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.ClassicInfrastructureMigrate NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.ClassicNetwork NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.ClassicStorage NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.ClassicSubscription Registered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.CleanRoom NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.CloudDevicePlatform NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.CloudHealth NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.CloudShell NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.CloudTest NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.CodeSigning NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.CognitiveServices NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.Commerce Registered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.Communication NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.Community NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.Compute Registered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.ComputeLimit NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.ComputeSchedule NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.ConfidentialLedger NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.Confluent NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.ConnectedCache NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.ConnectedCredentials NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 microsoft.connectedopenstack NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.ConnectedVehicle NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.ConnectedVMwarevSphere NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.Consumption Registered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.ContainerInstance NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.ContainerRegistry NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.ContainerService Registered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.CostManagement Registered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.CostManagementExports NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.CustomerLockbox NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.CustomProviders NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.D365CustomerInsights NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.Dashboard NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.DatabaseFleetManager NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.DatabaseWatcher NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.DataBox NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.DataBoxEdge NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.Databricks NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.Datadog NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.DataFactory NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.DataLakeAnalytics NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.DataLakeStore NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.DataMigration NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.DataProtection NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.DataReplication NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.DataShare NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.DBforMariaDB NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.DBforMySQL NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.DBforPostgreSQL NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.DependencyMap NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.DesktopVirtualization NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.DevCenter NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.DevelopmentWindows365 NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.DevHub NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.DeviceOnboarding NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.DeviceRegistry NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.Devices NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.DeviceUpdate NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.DevOpsInfrastructure NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.DevTestLab Registered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.DigitalTwins NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.Discovery NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.DocumentDB NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.DomainRegistration NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.DurableTask NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.Easm NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.Edge NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.EdgeManagement NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.EdgeMarketplace NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.EdgeOrder NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.EdgeOrderPartner NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.EdgeZones NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.Elastic NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.ElasticSan NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.EnterpriseSupport NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.EntitlementManagement NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.EntraIDGovernance NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.EntraIdGovernanceAccelerator NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.ErrorAtlas NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.EventGrid NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.EventHub NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.Experimentation NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.ExtendedLocation NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.Fabric Registered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.Features Registered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.FileShares NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.FluidRelay NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.GCPConnector NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.GraphServices NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.GuestConfiguration Registered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.HanaOnAzure NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.HardwareSecurityModules NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.HDInsight NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.HealthBot NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.HealthcareApis NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.HealthcareInterop NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.HealthDataAIServices NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.HealthModel NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.HealthPlatform NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.Help NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.HybridCloud NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.HybridCompute NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.HybridConnectivity NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.HybridContainerService NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.HybridNetwork NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.Impact NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 microsoft.insights Registered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.IntegrationSpaces NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.IoTCentral NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.IoTFirmwareDefense NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.IoTOperations NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.IoTOperationsDataProcessor NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.IoTSecurity NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.KeyVault Registered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.Kubernetes NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.KubernetesConfiguration NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.KubernetesRuntime NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.Kusto NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.LabServices NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.LoadTestService NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.Logic NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.MachineLearningServices NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.Maintenance NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.ManagedIdentity Registered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.ManagedNetworkFabric NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.ManagedServices NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.Management NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.Maps NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.Marketplace NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.MarketplaceOrdering Registered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.MessagingCatalog NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.MessagingConnectors NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.Migrate NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.Mission NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.Monitor NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.MySQLDiscovery NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.NetApp NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.Network Registered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.NetworkCloud NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.NetworkFunction NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.NexusIdentity NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.NotificationHubs NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.Nutanix NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.ObjectStore NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.OffAzure NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.OffAzureSpringBoot NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.OnlineExperimentation NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.OpenEnergyPlatform NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.OperationalInsights NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.OperationsManagement NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.OperatorVoicemail NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.OracleDiscovery NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.Orbital NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.PartnerManagedConsumerRecurrence NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.Peering NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.Pki NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.PolicyInsights Registered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.Portal Registered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.PortalServices NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.PowerBI NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.PowerBIDedicated NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.PowerPlatform NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.Premonition NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.ProfessionalService NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.ProviderHub NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.Purview NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.Quantum NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.Quota Registered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.RecommendationsService NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.RecoveryServices NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.RedHatOpenShift NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.Relationships NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.Relay NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.ResourceBuilder NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.ResourceConnector NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.ResourceGraph Registered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.ResourceHealth Registered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.ResourceIntelligence Registered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.ResourceNotifications Registered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.Resources Registered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.SaaS NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.SaaSHub NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.Scom NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.SCVMM NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.Search NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.SecretSyncController NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.Security Registered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.SecurityCopilot NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.SecurityDetonation NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.SecurityInsights NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.SecurityPlatform NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.SentinelPlatformServices NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.SerialConsole Registered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.ServiceBus NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.ServiceFabric NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.ServiceFabricMesh NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.ServiceLinker NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.ServiceNetworking NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.ServicesHub NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.SignalRService NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.Singularity NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.SoftwarePlan NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.Solutions NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.Sovereign NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.Sql NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.SqlVirtualMachine NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.StandbyPool NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.Storage Registered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.StorageActions NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.StorageCache NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.StorageDiscovery NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.StorageMover NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.StorageSync NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.StorageTasks NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.StreamAnalytics NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.Subscription NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.SupercomputerInfrastructure NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 microsoft.support Registered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.SustainabilityServices NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.Synapse NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.Syntex NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.ToolchainOrchestrator NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.UpdateManager NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.UsageBilling NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.Validate NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.VerifiedId NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.VideoIndexer NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.VirtualMachineImages NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 microsoft.visualstudio NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.VMware NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.VoiceServices NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.Web NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.WeightsAndBiases NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.Windows365 NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.WindowsPushNotificationServices NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.WorkloadBuilder NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Microsoft.Workloads NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 MongoDB.Atlas NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Neon.Postgres NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 NewRelic.Observability NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 NGINX.NGINXPLUS NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Oracle.Database NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 PaloAltoNetworks.Cloudngfw NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Pinecone.VectorDb NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 PureStorage.Block NotRegistered
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Qumulo.Storage NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b ArizeAi.ObservabilityEval NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Astronomer.Astro NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Dell.Storage NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Dynatrace.Observability NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b GitHub.Network NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Informatica.DataManagement NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b LambdaTest.HyperExecute NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Liftrbasic.Samplerp NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.AAD NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.AadCustomSecurityAttributesDiagnosticSettings NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b microsoft.aadiam NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.Addons NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.ADHybridHealthService Registered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.Advisor Registered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.AgFoodPlatform NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.AgriculturePlatform NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.AlertsManagement Registered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.AnalysisServices NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.ApiCenter NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.ApiManagement NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.App NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.AppAssessment NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.AppComplianceAutomation NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.AppConfiguration NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.ApplicationMigration NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.AppLink NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.AppPlatform NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.ArcContainerStorage NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.Attestation NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.Authorization Registered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.Automanage NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.Automation Registered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.AVS NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.AwsConnector NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.AzureActiveDirectory NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.AzureArcData Registered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.AzureBusinessContinuity NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.AzureDataTransfer NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.AzureFleet NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.AzureImageTestingForLinux NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.AzureLargeInstance NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.AzurePlaywrightService NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.AzureResilienceManagement NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.AzureScan NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.AzureSphere NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.AzureStack NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.AzureStackHCI NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.AzureTerraform NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.BackupSolutions NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.BareMetal NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.BareMetalInfrastructure NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.Batch NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.Billing Registered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.BillingBenefits NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.Bing NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.BlockchainTokens NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.Blueprint NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.BotService NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.Cache NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.Capacity Registered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.Carbon NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.Cdn NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.CertificateRegistration NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.ChangeSafety Registered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.Chaos NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.ClassicCompute NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.ClassicInfrastructureMigrate NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.ClassicNetwork NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.ClassicStorage NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.ClassicSubscription Registered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.CleanRoom NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.CloudDevicePlatform NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.CloudHealth NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.CloudShell Registered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.CloudTest NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.CodeSigning NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.CognitiveServices NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.Commerce Registered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.Communication NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.Community NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.Compute NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.ComputeLimit NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.ComputeSchedule NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.ConfidentialLedger NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.Confluent NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.ConnectedCache NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.ConnectedCredentials NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b microsoft.connectedopenstack NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.ConnectedVehicle NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.ConnectedVMwarevSphere Registered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.Consumption Registered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.ContainerInstance NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.ContainerRegistry NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.ContainerService NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.CostManagement Registered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.CostManagementExports NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.CustomerLockbox NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.CustomProviders NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.D365CustomerInsights NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.Dashboard NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.DatabaseFleetManager NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.DatabaseWatcher NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.DataBox NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.DataBoxEdge NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.Databricks NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.Datadog NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.DataFactory NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.DataLakeAnalytics NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.DataLakeStore NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.DataMigration NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.DataProtection NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.DataReplication NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.DataShare NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.DBforMariaDB NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.DBforMySQL NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.DBforPostgreSQL NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.DependencyMap NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.DesktopVirtualization NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.DevCenter NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.DevelopmentWindows365 NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.DevHub NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.DeviceOnboarding NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.DeviceRegistry NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.Devices NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.DeviceUpdate NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.DevOpsInfrastructure NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.DevTestLab NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.DigitalTwins NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.Discovery NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.DocumentDB NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.DomainRegistration NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.DurableTask NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.Easm NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.Edge NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.EdgeManagement NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.EdgeMarketplace NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.EdgeOrder NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.EdgeOrderPartner NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.EdgeZones NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.Elastic NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.ElasticSan NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.EnterpriseSupport NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.EntitlementManagement NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.EntraIDGovernance NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.EntraIdGovernanceAccelerator NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.ErrorAtlas NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.EventGrid NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.EventHub NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.Experimentation NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.ExtendedLocation Registered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.Fabric NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.Features Registered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.FileShares NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.FluidRelay NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.GCPConnector NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.GraphServices NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.GuestConfiguration Registered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.HanaOnAzure NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.HardwareSecurityModules NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.HDInsight NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.HealthBot NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.HealthcareApis NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.HealthcareInterop NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.HealthDataAIServices NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.HealthModel NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.HealthPlatform NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.Help Registered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.HybridCloud NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.HybridCompute Registered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.HybridConnectivity Registered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.HybridContainerService NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.HybridNetwork NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.Impact NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b microsoft.insights Registered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.IntegrationSpaces NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.IoTCentral NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.IoTFirmwareDefense NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.IoTOperations NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.IoTOperationsDataProcessor NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.IoTSecurity NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.KeyVault Registered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.Kubernetes Registered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.KubernetesConfiguration Registered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.KubernetesRuntime NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.Kusto NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.LabServices NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.LoadTestService NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.Logic NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.MachineLearningServices NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.Maintenance Registered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.ManagedIdentity Registered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.ManagedNetworkFabric NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.ManagedServices NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.Management Registered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.Maps NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.Marketplace NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.MarketplaceOrdering Registered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.MessagingCatalog NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.MessagingConnectors NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.Migrate NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.Mission NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.Monitor NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.MySQLDiscovery NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.NetApp NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.Network Registered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.NetworkCloud NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.NetworkFunction NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.NexusIdentity NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.NotificationHubs NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.Nutanix NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.ObjectStore NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.OffAzure NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.OffAzureSpringBoot NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.OnlineExperimentation NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.OpenEnergyPlatform NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.OperationalInsights Registered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.OperationsManagement NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.OperatorVoicemail NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.OracleDiscovery NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.Orbital NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.PartnerManagedConsumerRecurrence NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.Peering NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.Pki NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.PolicyInsights Registered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.Portal Registered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.PortalServices NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.PowerBI NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.PowerBIDedicated NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.PowerPlatform NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.Premonition NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.ProfessionalService NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.ProviderHub NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.Purview NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.Quantum NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.Quota NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.RecommendationsService NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.RecoveryServices NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.RedHatOpenShift NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.Relationships NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.Relay NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.ResourceBuilder NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.ResourceConnector Registered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.ResourceGraph Registered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.ResourceHealth NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.ResourceIntelligence Registered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.ResourceNotifications Registered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.Resources Registered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.SaaS NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.SaaSHub NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.Scom NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.SCVMM NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.Search NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.SecretSyncController NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.Security Registered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.SecurityCopilot NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.SecurityDetonation NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.SecurityInsights NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.SecurityPlatform NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.SentinelPlatformServices NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.SerialConsole Registered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.ServiceBus NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.ServiceFabric NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.ServiceFabricMesh NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.ServiceLinker NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.ServiceNetworking NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.ServicesHub NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.SignalRService NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.Singularity NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.SoftwarePlan NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.Solutions NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.Sovereign NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.Sql NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.SqlVirtualMachine NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.StandbyPool NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.Storage Registered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.StorageActions NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.StorageCache NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.StorageDiscovery NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.StorageMover NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.StorageSync NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.StorageTasks NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.StreamAnalytics NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.Subscription NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.SupercomputerInfrastructure NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b microsoft.support Registered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.SustainabilityServices NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.Synapse NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.Syntex NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.ToolchainOrchestrator NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.UpdateManager NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.UsageBilling NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.Validate NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.VerifiedId NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.VideoIndexer NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.VirtualMachineImages NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b microsoft.visualstudio NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.VMware NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.VoiceServices NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.Web Registered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.WeightsAndBiases NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.Windows365 NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.WindowsPushNotificationServices NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.WorkloadBuilder NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Microsoft.Workloads NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b MongoDB.Atlas NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Neon.Postgres NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b NewRelic.Observability NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b NGINX.NGINXPLUS NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Oracle.Database NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b PaloAltoNetworks.Cloudngfw NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Pinecone.VectorDb NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b PureStorage.Block NotRegistered
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Qumulo.Storage NotRegistered

No enabled Subscriptions Features learn

Considerations before applying locks learn
Note: Detailed information on Resource Locks is provided in the *_ResourceLocks.csv
Lock scope Lock type presence
SubscriptionCannotDelete0 of 5 Subscriptions
SubscriptionReadOnly0 of 5 Subscriptions
ResourceGroupCannotDelete1 of 5 Subscriptions (total: 1)
ResourceGroupReadOnly0 of 5 Subscriptions (total: 0)
ResourceCannotDelete0 of 5 Subscriptions (total: 0)
ResourceReadOnly0 of 5 Subscriptions (total: 0)
Microsoft Defender for Cloud's enhanced security features learn
Download CSV semicolon | comma
Plan/Tier Subscription Count
AI, Free 5
Api, Free 5
AppServices, Free 5
Arm, Free 5
CloudPosture, Free 5
ContainerRegistry, Free 5
Containers, Free 5
CosmosDbs, Free 5
Discovery, Standard 5
Dns, Free 5
FoundationalCspm, Standard 5
KeyVaults, Free 5
KubernetesService, Free 5
OpenSourceRelationalDatabases, Free 5
SqlServers, Free 5
SqlServerVirtualMachines, Free 5
StorageAccounts, Free 5
VirtualMachines, Free 5
Microsoft Defender for Cloud's enhanced security features learn
Download CSV semicolon | comma
Subscription SubscriptionId Subscription MG path AI Api AppServices Arm CloudPosture ContainerRegistry Containers CosmosDbs Discovery Dns FoundationalCspm KeyVaults KubernetesService OpenSourceRelationalDatabases SqlServers SqlServerVirtualMachines StorageAccounts VirtualMachines
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 Free Free Free Free Free Free Free Free Standard Free Standard Free Free Free Free Free Free Free
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa Free Free Free Free Free Free Free Free Standard Free Standard Free Free Free Free Free Free Free
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 Free Free Free Free Free Free Free Free Standard Free Standard Free Free Free Free Free Free Free
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b Free Free Free Free Free Free Free Free Standard Free Standard Free Free Free Free Free Free Free
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 Free Free Free Free Free Free Free Free Standard Free Standard Free Free Free Free Free Free Free
Download CSV semicolon | comma
plansubscriptionIdsubscriptionNamesubscriptionMgPathfreeTrialRemainingTimepricingTier
AI edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 P30D Free
AI e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa P30D Free
AI d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 P30D Free
AI fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b P30D Free
AI 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 P30D Free
Download CSV semicolon | comma
plansubscriptionIdsubscriptionNamesubscriptionMgPathfreeTrialRemainingTimepricingTier
Api edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 P30D Free
Api e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa P30D Free
Api d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 P30D Free
Api fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b P30D Free
Api 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 P30D Free
Download CSV semicolon | comma
plansubscriptionIdsubscriptionNamesubscriptionMgPathfreeTrialRemainingTimepricingTier
AppServices edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 P30D Free
AppServices e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa P30D Free
AppServices d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 P30D Free
AppServices fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b P30D Free
AppServices 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 P30D Free
Download CSV semicolon | comma
plansubscriptionIdsubscriptionNamesubscriptionMgPathfreeTrialRemainingTimepricingTier
Arm edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 P30D Free
Arm e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa P30D Free
Arm d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 P30D Free
Arm fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b P30D Free
Arm 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 P30D Free
Download CSV semicolon | comma
plansubscriptionIdsubscriptionNamesubscriptionMgPathfreeTrialRemainingTimepricingTier
CloudPosture edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 P30D Free
CloudPosture e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa P30D Free
CloudPosture d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 P30D Free
CloudPosture fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b P30D Free
CloudPosture 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 P30D Free
Download CSV semicolon | comma
plansubscriptionIdsubscriptionNamesubscriptionMgPathdeprecatedfreeTrialRemainingTimepricingTierreplacedBy
ContainerRegistry edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 True P30D Free Containers
ContainerRegistry e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa True P30D Free Containers
ContainerRegistry d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 True P30D Free Containers
ContainerRegistry fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b True P30D Free Containers
ContainerRegistry 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 True P30D Free Containers
Download CSV semicolon | comma
plansubscriptionIdsubscriptionNamesubscriptionMgPathfreeTrialRemainingTimepricingTier
Containers edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 P30D Free
Containers e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa P30D Free
Containers d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 P30D Free
Containers fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b P30D Free
Containers 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 P30D Free
Download CSV semicolon | comma
plansubscriptionIdsubscriptionNamesubscriptionMgPathfreeTrialRemainingTimepricingTier
CosmosDbs edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 P30D Free
CosmosDbs e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa P30D Free
CosmosDbs d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 P30D Free
CosmosDbs fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b P30D Free
CosmosDbs 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 P30D Free
Download CSV semicolon | comma
plansubscriptionIdsubscriptionNamesubscriptionMgPathfreeTrialRemainingTimepricingTierresourcesCoverageStatus
Discovery edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 PT0S Standard FullyCovered
Discovery e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa PT0S Standard FullyCovered
Discovery d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 PT0S Standard FullyCovered
Discovery fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b PT0S Standard FullyCovered
Discovery 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 PT0S Standard FullyCovered
Download CSV semicolon | comma
plansubscriptionIdsubscriptionNamesubscriptionMgPathdeprecatedfreeTrialRemainingTimepricingTierreplacedBy
Dns edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 True P30D Free VirtualMachines
Dns e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa True P30D Free VirtualMachines
Dns d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 True P30D Free VirtualMachines
Dns fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b True P30D Free VirtualMachines
Dns 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 True P30D Free VirtualMachines
Download CSV semicolon | comma
plansubscriptionIdsubscriptionNamesubscriptionMgPathfreeTrialRemainingTimepricingTierresourcesCoverageStatus
FoundationalCspm edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 PT0S Standard FullyCovered
FoundationalCspm e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa PT0S Standard FullyCovered
FoundationalCspm d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 PT0S Standard FullyCovered
FoundationalCspm fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b PT0S Standard FullyCovered
FoundationalCspm 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 PT0S Standard FullyCovered
Download CSV semicolon | comma
plansubscriptionIdsubscriptionNamesubscriptionMgPathfreeTrialRemainingTimepricingTier
KeyVaults edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 P30D Free
KeyVaults e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa P30D Free
KeyVaults d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 P30D Free
KeyVaults fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b P30D Free
KeyVaults 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 P30D Free
Download CSV semicolon | comma
plansubscriptionIdsubscriptionNamesubscriptionMgPathdeprecatedfreeTrialRemainingTimepricingTierreplacedBy
KubernetesService edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 True P30D Free Containers
KubernetesService e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa True P30D Free Containers
KubernetesService d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 True P30D Free Containers
KubernetesService fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b True P30D Free Containers
KubernetesService 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 True P30D Free Containers
Download CSV semicolon | comma
plansubscriptionIdsubscriptionNamesubscriptionMgPathfreeTrialRemainingTimepricingTier
OpenSourceRelationalDatabases edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 P30D Free
OpenSourceRelationalDatabases e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa P30D Free
OpenSourceRelationalDatabases d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 P30D Free
OpenSourceRelationalDatabases fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b P30D Free
OpenSourceRelationalDatabases 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 P30D Free
Download CSV semicolon | comma
plansubscriptionIdsubscriptionNamesubscriptionMgPathfreeTrialRemainingTimepricingTier
SqlServers edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 P30D Free
SqlServers e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa P30D Free
SqlServers d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 P30D Free
SqlServers fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b P30D Free
SqlServers 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 P30D Free
Download CSV semicolon | comma
plansubscriptionIdsubscriptionNamesubscriptionMgPathfreeTrialRemainingTimepricingTier
SqlServerVirtualMachines edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 P30D Free
SqlServerVirtualMachines e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa P30D Free
SqlServerVirtualMachines d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 P30D Free
SqlServerVirtualMachines fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b P30D Free
SqlServerVirtualMachines 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 P30D Free
Download CSV semicolon | comma
plansubscriptionIdsubscriptionNamesubscriptionMgPathfreeTrialRemainingTimepricingTier
StorageAccounts edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 P30D Free
StorageAccounts e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa P30D Free
StorageAccounts d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 P30D Free
StorageAccounts fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b P30D Free
StorageAccounts 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 P30D Free
Download CSV semicolon | comma
plansubscriptionIdsubscriptionNamesubscriptionMgPathfreeTrialRemainingTimepricingTier
VirtualMachines edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-connectivity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 P30D Free
VirtualMachines e1dcabb1-2f79-4eb1-982d-e3df709c24aa mibelle-identity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa P30D Free
VirtualMachines d4493d1a-9fd5-4596-aff4-8c679eac0164 mibelle-it-automation a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 P30D Free
VirtualMachines fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-management a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b P30D Free
VirtualMachines 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 P30D Free

No UserAssigned Managed Identities assigned to Resources / vice versa - at all

PSRule for Azure - integration paused - PSRule for Azure
Check this article by Elli Shlomo (MVP) Azure Blob Container Threats & Attacks
If you enabled the parameters StorageAccountAccessAnalysisSubscriptionTags or StorageAccountAccessAnalysisStorageAccountTags these are integrated in the CSV output *_StorageAccountAccessAnalysis.csv
Download CSV semicolon | comma
StorageAccount Kind SkuName SkuTier Location Subscription Subscription MGPath ResourceGroup Allow Blob Public Access Public Network Access NetworkAcls defaultAction StaticWebsites State StaticWebsites Response Containers CanBeListed Containers Count Containers Anonymous Container Count Containers Anonymous Blob Count IpRules Count IpRules IPAddress List VirtualNetwork Rules Count ResourceAccess Rules Count ResourceAccess Rules Bypass Supports Https Traffic Only Minimum Tls Version Allow SharedKey Access Require Infrastructure Encryption Allowed Copy Scope Allow Cross Tenant Replication DNS Endpoint Type Used Capacity (GB) Cost (-DoAzureConsumption = False) Currency Cost categories
camtfstatestorage3f880 StorageV2 Standard_LRS Standard westeurope mibelle-connectivity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 trendmicro-v1-edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 False likely Enabled Allow False n/a True 1 0 0 0 0 0 AzureServices True TLS1_2 likely True True From any Storage Account False standard 0.0000524865463376045227050781
camtfstatestorage89b03 StorageV2 Standard_LRS Standard westeurope mibelle-online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 trendmicro-v1-3b2fdc69-67a4-42f2-a43e-b7fbad489b03 False likely Enabled Allow False n/a True 1 0 0 0 0 0 AzureServices True TLS1_2 likely True True From any Storage Account False standard n/a
camtfstatestoragec0164 StorageV2 Standard_LRS Standard westeurope mibelle-it-automation a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164 trendmicro-v1-d4493d1a-9fd5-4596-aff4-8c679eac0164 False likely Enabled Allow False n/a True 1 0 0 0 0 0 AzureServices True TLS1_2 likely True True From any Storage Account False standard n/a
camtfstatestoragec24aa StorageV2 Standard_LRS Standard westeurope mibelle-identity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa trendmicro-v1-e1dcabb1-2f79-4eb1-982d-e3df709c24aa False likely Enabled Allow False n/a True 1 0 0 0 0 0 AzureServices True TLS1_2 likely True True From any Storage Account False standard n/a
camtfstatestoragedcc0b StorageV2 Standard_LRS Standard westeurope mibelle-management a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b trendmicro-v1-fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b False likely Enabled Allow False n/a True 1 0 0 0 0 0 AzureServices True TLS1_2 likely True True From any Storage Account False standard n/a
csb100320049d59bf6e StorageV2 Standard_LRS Standard westeurope mibelle-management a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b cloud-shell-storage-westeurope False likely Enabled Allow False n/a True 0 0 0 0 0 0 AzureServices True TLS1_2 likely True likely False From any Storage Account False standard n/a
mibhubnetdnspeuwst01 Storage Standard_LRS Standard westeurope mibelle-connectivity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-hub-net-dns-prod-rg False likely Enabled Allow n/a n/a True 0 0 0 0 0 0 AzureServices True TLS1_0 likely True likely False From any Storage Account False standard n/a
mibhubnetdst01 StorageV2 Standard_LRS Standard westeurope mibelle-connectivity a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 mibelle-hub-net-testVm-dev-rg False Enabled Allow False n/a True 1 0 0 0 1 0 AzureServices True TLS1_2 True False From any Storage Account False Standard n/a
mibm365sfprodeuwst01 StorageV2 Standard_LRS Standard westeurope mibelle-online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mib-m365-SF-prod-rg True Enabled Allow False n/a True 2 0 2 0 0 0 AzureServices True TLS1_2 True False From any Storage Account False Standard n/a
mibm365sfprodeuwst02 StorageV2 Standard_LRS Standard westeurope mibelle-online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mib-m365-SF-prod-rg False Enabled Allow False n/a True 1 0 0 0 0 0 AzureServices True TLS1_2 True False From any Storage Account False Standard n/a
mibm365trainprodeuwst01 StorageV2 Standard_LRS Standard westeurope mibelle-online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-m365-train-prod-rg True Enabled Allow False n/a True 0 0 0 0 0 0 AzureServices True TLS1_2 True False From any Storage Account False Standard n/a
mibmgmtnetprodeunst01 StorageV2 Standard_LRS Standard northeurope mibelle-management a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-mgmt-prod-rg False Enabled Allow False n/a True 0 0 0 0 0 0 AzureServices True TLS1_2 True False From any Storage Account False Standard 0.0000003483146429061889648438
mibmgmtnetprodeuwst01 StorageV2 Standard_LRS Standard westeurope mibelle-management a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b mibelle-mgmt-prod-rg False Enabled Allow False n/a True 1 0 0 0 0 0 AzureServices True TLS1_2 True False From any Storage Account False Standard n/a
mibpkiscepmanpeuwst01 StorageV2 Standard_LRS Standard westeurope mibelle-online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-pki-prod-rg False likely Enabled Allow False n/a True 0 0 0 0 0 0 None True TLS1_2 False likely False From any Storage Account False standard n/a
mibppsfabricpeuwst01 StorageV2 Standard_LRS Standard westeurope mibelle-online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-pps-fabric-prod-rg False Enabled Allow False n/a True 1 0 0 0 0 0 AzureServices True TLS1_2 True False From any Storage Account False Standard n/a
mibsftphrprodeuwst01 StorageV2 Standard_LRS Standard westeurope mibelle-online a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03 mibelle-sftp-prod-rg False Enabled Deny False n/a False n/a 0 0 11 164.14.65.109, 164.14.65.181, 185.156.11.50, 193.5.118.98, 34.241.154.246, 34.243.95.223, 52.214.236.23, 52.48.12.212, 54.194.223.66, 54.240.53.63, 99.81.116.35 0 0 AzureServices True TLS1_2 False False From any Storage Account False Standard n/a
Download CSV semicolon | comma
Subscription Name Subscription MGPath VNet VNet Resource Group Location Address Prefixes DNS Servers Subnets Subnets with NSG Subnets with RouteTable Subnets with Delegation Private Endpoints Subnets with Private Endpoints Connected device Subnets with connected device DDoS Peerings Count
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg mibelle-hub-net-prod-euw-vnet-01 mibelle-hub-prod-rg westeurope 172.19.0.0/23 172.19.1.110, 172.22.20.110 10 3 2 0 0 0 19 10 False 3
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg mibelle-idnty-net-prod-euw-vnet-01 mibelle-idnty-net-prod-rg westeurope 172.19.6.0/24 172.19.1.110, 172.22.20.110 1 0 0 0 0 0 1 1 False 1
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg mibelle-mgmt-net-prod-euw-vnet-01 mibelle-mgmt-net-prod-rg westeurope 172.19.4.128/28 1 0 0 0 1 1 6 1 False 1
Download CSV semicolon | comma
Subscription Name Subscription MGPath VNet VNet Resource Group Location Name Id Subnet Prefix Mask Range Connected devices Free IP addresses Used IP addresses % Private Endpoint Network Policies Private Link Service Network Policies Service Endpoints count Service Endpoints Delegation NSG Route Table Nat Gateway Private Endpoints
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg mibelle-hub-net-prod-euw-vnet-01 mibelle-hub-prod-rg westeurope mibelle-hub-net-dns-prod-euw-snet-01 /subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourceGroups/mibelle-hub-prod-rg/providers/Microsoft.Network/virtualNetworks/mibelle-hub-net-prod-euw-vnet-01/subnets/mibelle-hub-net-dns-prod-euw-snet-01 172.19.1.104 29 255.255.255.248 172.19.1.104 - 172.19.1.111 1 2 33.3 % Disabled Enabled 0 /subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourceGroups/mibelle-hub-net-dns-prod-rg/providers/Microsoft.Network/networkSecurityGroups/mibelle-hub-net-dns-prod-euw-nsg-01 0
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg mibelle-hub-net-prod-euw-vnet-01 mibelle-hub-prod-rg westeurope mibelle-hub-net-dns-prod-euw-snet-02 /subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourceGroups/mibelle-hub-prod-rg/providers/Microsoft.Network/virtualNetworks/mibelle-hub-net-prod-euw-vnet-01/subnets/mibelle-hub-net-dns-prod-euw-snet-02 172.19.1.112 29 255.255.255.248 172.19.1.112 - 172.19.1.119 1 2 33.3 % Disabled Enabled 0 /subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourceGroups/mibelle-hub-net-dns-prod-rg/providers/Microsoft.Network/networkSecurityGroups/mibelle-hub-net-dns-prod-euw-nsg-01 0
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg mibelle-hub-net-prod-euw-vnet-01 mibelle-hub-prod-rg westeurope mibelle-hub-net-fw-prod-euw-snet-01 /subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourceGroups/mibelle-hub-prod-rg/providers/Microsoft.Network/virtualNetworks/mibelle-hub-net-prod-euw-vnet-01/subnets/mibelle-hub-net-fw-prod-euw-snet-01 172.19.0.128 28 255.255.255.240 172.19.0.128 - 172.19.0.143 2 9 18.2 % Disabled Enabled 0 0
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg mibelle-hub-net-prod-euw-vnet-01 mibelle-hub-prod-rg westeurope mibelle-hub-net-fw-prod-euw-snet-02 /subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourceGroups/mibelle-hub-prod-rg/providers/Microsoft.Network/virtualNetworks/mibelle-hub-net-prod-euw-vnet-01/subnets/mibelle-hub-net-fw-prod-euw-snet-02 172.19.0.144 28 255.255.255.240 172.19.0.144 - 172.19.0.159 3 8 27.3 % Disabled Enabled 0 @{id=/subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourceGroups/mibelle-hub-net-frw-prod-rg/providers/Microsoft.Network/routeTables/mibelle-net-frw-prod-euw-udr-01} 0
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg mibelle-hub-net-prod-euw-vnet-01 mibelle-hub-prod-rg westeurope mibelle-hub-net-fw-prod-euw-snet-03 /subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourceGroups/mibelle-hub-prod-rg/providers/Microsoft.Network/virtualNetworks/mibelle-hub-net-prod-euw-vnet-01/subnets/mibelle-hub-net-fw-prod-euw-snet-03 172.19.0.160 28 255.255.255.240 172.19.0.160 - 172.19.0.175 2 9 18.2 % Disabled Enabled 0 0
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg mibelle-hub-net-prod-euw-vnet-01 mibelle-hub-prod-rg westeurope mibelle-hub-net-fw-prod-euw-snet-04 /subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourceGroups/mibelle-hub-prod-rg/providers/Microsoft.Network/virtualNetworks/mibelle-hub-net-prod-euw-vnet-01/subnets/mibelle-hub-net-fw-prod-euw-snet-04 172.19.0.176 28 255.255.255.240 172.19.0.176 - 172.19.0.191 2 9 18.2 % Disabled Enabled 0 0
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg mibelle-hub-net-prod-euw-vnet-01 mibelle-hub-prod-rg westeurope mibelle-hub-net-sdwan-prod-euw-snet-01 /subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourceGroups/mibelle-hub-prod-rg/providers/Microsoft.Network/virtualNetworks/mibelle-hub-net-prod-euw-vnet-01/subnets/mibelle-hub-net-sdwan-prod-euw-snet-01 172.19.0.0 27 255.255.255.224 172.19.0.0 - 172.19.0.31 2 25 7.4 % Disabled Enabled 0 @{id=/subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourceGroups/mibelle-hub-net-sdwan-prod-rg/providers/Microsoft.Network/routeTables/mibelle-hub-net-prod-euw-udr-01} 0
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg mibelle-hub-net-prod-euw-vnet-01 mibelle-hub-prod-rg westeurope mibelle-hub-net-sdwan-prod-euw-snet-02 /subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourceGroups/mibelle-hub-prod-rg/providers/Microsoft.Network/virtualNetworks/mibelle-hub-net-prod-euw-vnet-01/subnets/mibelle-hub-net-sdwan-prod-euw-snet-02 172.19.0.32 27 255.255.255.224 172.19.0.32 - 172.19.0.63 2 25 7.4 % Disabled Enabled 0 0
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg mibelle-hub-net-prod-euw-vnet-01 mibelle-hub-prod-rg westeurope mibelle-hub-net-testVm-dev-euw-snet-01 /subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourceGroups/mibelle-hub-prod-rg/providers/Microsoft.Network/virtualNetworks/mibelle-hub-net-prod-euw-vnet-01/subnets/mibelle-hub-net-testVm-dev-euw-snet-01 172.19.0.248 29 255.255.255.248 172.19.0.248 - 172.19.0.255 1 2 33.3 % Disabled Enabled 0 /subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourceGroups/mibelle-hub-net-testVm-dev-rg/providers/Microsoft.Network/networkSecurityGroups/mibelle-hub-net-testVm-dev-nsg-01 0
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg mibelle-hub-net-prod-euw-vnet-01 mibelle-hub-prod-rg westeurope RouteServerSubnet /subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourceGroups/mibelle-hub-prod-rg/providers/Microsoft.Network/virtualNetworks/mibelle-hub-net-prod-euw-vnet-01/subnets/RouteServerSubnet 172.19.0.64 26 255.255.255.192 172.19.0.64 - 172.19.0.127 3 56 5.1 % Disabled Enabled 0 0
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg mibelle-idnty-net-prod-euw-vnet-01 mibelle-idnty-net-prod-rg westeurope mibelle-idnty-adds-prod-euw-snet-01 /subscriptions/e1dcabb1-2f79-4eb1-982d-e3df709c24aa/resourceGroups/mibelle-idnty-net-prod-rg/providers/Microsoft.Network/virtualNetworks/mibelle-idnty-net-prod-euw-vnet-01/subnets/mibelle-idnty-adds-prod-euw-snet-01 172.19.6.128 28 255.255.255.240 172.19.6.128 - 172.19.6.143 1 10 9.1 % Disabled Enabled 0 0
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg mibelle-mgmt-net-prod-euw-vnet-01 mibelle-mgmt-net-prod-rg westeurope mibelle-mgmt-arc-prod-eun-snet-01 /subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourceGroups/mibelle-mgmt-net-prod-rg/providers/Microsoft.Network/virtualNetworks/mibelle-mgmt-net-prod-euw-vnet-01/subnets/mibelle-mgmt-arc-prod-eun-snet-01 172.19.4.128 28 255.255.255.240 172.19.4.128 - 172.19.4.143 6 5 54.5 % Disabled Enabled 0 1
Download CSV semicolon | comma
Subscription Name Subscription MGPath VNet VNet Resource Group Location Address Prefixes DNS Servers Subnets Subnets with NSG Subnets with RouteTable Subnets with Delegation Private Endpoints Subnets with Private Endpoints Connected device Subnets with connected device DDoS Peerings Count Peering Cross Tenant Peering Name Peering State Peering Sync Level Allow Virtual Network Access Allow Forwarded Traffic Allow Gateway Transit Use Remote Gateways Do Not Verify Remote Gateways Peer Complete Vnets Route Service Vips Remote Peerings Count Remote Peering Name Remote Peering State Remote Peering Sync Level Remote Allow Virtual Network Access Remote Allow Forwarded Traffic Remote Allow Gateway Transit Remote Use Remote Gateways Remote Do Not Verify Remote Gateways Remote Peer Complete Vnets Remote Route Service Vips Remote Subscription Name Remote Subscription Remote MGPath Remote VNet Remote VNet State Remote VNet Resource Group Remote Location Remote Address Space Address Prefixes Remote Virtual Network AddressSpace Address Prefixes Remote DNS Servers Remote Subnets Remote Subnets with NSG Remote Subnets with RouteTable Remote Subnets with Delegation Remote Private Endpoints Remote Subnets with Private Endpoints Remote Connected devices Remote Subnets with connected devices Remote DDoS
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg mibelle-hub-net-prod-euw-vnet-01 mibelle-hub-prod-rg westeurope 172.19.0.0/23 172.19.1.110, 172.22.20.110 10 3 2 0 0 0 19 10 False 3 false mibelle-mgmt-net-prod-euw-vnet-01-peer Connected FullyInSync True False True False True True 1 mibelle-hub-net-prod-euw-vnet-01-peer Connected FullyInSync True True False True False True mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg mibelle-mgmt-net-prod-euw-vnet-01 existent mibelle-mgmt-net-prod-rg westeurope 172.19.4.128/28 172.19.4.128/28 1 0 0 0 1 1 6 1 False
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg mibelle-hub-net-prod-euw-vnet-01 mibelle-hub-prod-rg westeurope 172.19.0.0/23 172.19.1.110, 172.22.20.110 10 3 2 0 0 0 19 10 False 3 false mibelle-idnt-net-prod-euw-vnet-01-peer Connected FullyInSync True True True False True True 1 mibelle-hub-net-prod-euw-vnet-01-peer Connected FullyInSync True True False True False True mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg mibelle-idnty-net-prod-euw-vnet-01 existent mibelle-idnty-net-prod-rg westeurope 172.19.6.0/24 172.19.6.0/24 172.19.1.110, 172.22.20.110 1 0 0 0 0 0 1 1 False
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg mibelle-hub-net-prod-euw-vnet-01 mibelle-hub-prod-rg westeurope 172.19.0.0/23 172.19.1.110, 172.22.20.110 10 3 2 0 0 0 19 10 False 3 true Persan-MIB-FGT-WE-VNET-peer Connected FullyInSync True True False False False True n/a n/a n/a n/a n/a n/a n/a n/a n/a n/a n/a n/a 5a6efb59-128c-42c7-b8d0-605b8650bf85 n/a7258be9d-3f01-465a-8bc9-917dce31de72 MIB-FGT-WE-VNET n/a MIB-FGT-WE-NETWORKING n/a 172.19.24.0/24 172.19.24.0/24 n/a n/a n/a n/a n/a n/a n/a n/a n/a n/a
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg mibelle-idnty-net-prod-euw-vnet-01 mibelle-idnty-net-prod-rg westeurope 172.19.6.0/24 172.19.1.110, 172.22.20.110 1 0 0 0 0 0 1 1 False 1 false mibelle-hub-net-prod-euw-vnet-01-peer Connected FullyInSync True True False True False True 3 mibelle-idnt-net-prod-euw-vnet-01-peer Connected FullyInSync True True True False True True mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg mibelle-hub-net-prod-euw-vnet-01 existent mibelle-hub-prod-rg westeurope 172.19.0.0/23 172.19.0.0/23 172.19.1.110, 172.22.20.110 10 3 2 0 0 0 19 10 False
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg mibelle-mgmt-net-prod-euw-vnet-01 mibelle-mgmt-net-prod-rg westeurope 172.19.4.128/28 1 0 0 0 1 1 6 1 False 1 false mibelle-hub-net-prod-euw-vnet-01-peer Connected FullyInSync True True False True False True 3 mibelle-mgmt-net-prod-euw-vnet-01-peer Connected FullyInSync True False True False True True mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg mibelle-hub-net-prod-euw-vnet-01 existent mibelle-hub-prod-rg westeurope 172.19.0.0/23 172.19.0.0/23 172.19.1.110, 172.22.20.110 10 3 2 0 0 0 19 10 False
Download CSV semicolon | comma
PE Name PE Id PE Location PE Resource Group PE Subscription Name PE Subscription PE MGPath PE Type PE State Cross Subscription PE Cross Tenant PE Resource Resource Type Resource Id Target Subresource NIC Name FQDN IP addresses Resource Resource Group Resource Subscription Name Resource Subscription Id Resource MGPath Resource Cross Tenant Subnet Subnet Id VNet VNet Id VNet Location VNet Resource Group Subnet Subscription Name Subnet Subscription Id Subnet MGPath
mibelle-mgmt-arc-prod-euw-pep-01 /subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourceGroups/mibelle-mgmt-arc-prod-rg/providers/Microsoft.Network/privateEndpoints/mibelle-mgmt-arc-prod-euw-pep-01 westeurope mibelle-mgmt-arc-prod-rg mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg direct Approved False False mibelle-mgmt-arc-prod-euw-pl-01 Microsoft.HybridCompute/PrivateLinkScopes /subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourceGroups/mibelle-mgmt-arc-prod-rg/providers/Microsoft.HybridCompute/PrivateLinkScopes/mibelle-mgmt-arc-prod-euw-pl-01 hybridcompute gbl.his.arc.azure.com, weu.his.arc.azure.com, europe-ats.his.arc.azure.com, agentserviceapi.guestconfiguration.azure.com, westeurope-gas.guestconfiguration.azure.com, westeurope.dp.kubernetesconfiguration.azure.com 172.19.4.132, 172.19.4.133, 172.19.4.134, 172.19.4.135, 172.19.4.136, 172.19.4.137 mibelle-mgmt-arc-prod-rg mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg False mibelle-mgmt-arc-prod-eun-snet-01 /subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourceGroups/mibelle-mgmt-net-prod-rg/providers/Microsoft.Network/virtualNetworks/mibelle-mgmt-net-prod-euw-vnet-01/subnets/mibelle-mgmt-arc-prod-eun-snet-01 mibelle-mgmt-net-prod-euw-vnet-01 /subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourceGroups/mibelle-mgmt-net-prod-rg/providers/Microsoft.Network/virtualNetworks/mibelle-mgmt-net-prod-euw-vnet-01 westeurope mibelle-mgmt-net-prod-rg mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg

Management Groups

Management Group Diagnostic Settings - Create Or Update - REST API learn
Download CSV semicolon | comma
Management Group Name Management Group Id Diagnostic setting Inheritance Inherited from Target TargetId Administrative Policy
mibelle mibelle-mg toLa False none LA /subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 true true
Decommissioned mibelle-decommissioned-mg toLa True mibelle-mg LA /subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 true true
Decommissioned mibelle-decommissioned-mg toLa False none LA /subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 true true
Landing Zones mibelle-landingzones-mg toLa True mibelle-mg LA /subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 true true
Landing Zones mibelle-landingzones-mg toLa False none LA /subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 true true
Corp mibelle-landingzones-corp-mg toLa True mibelle-landingzones-mg LA /subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 true true
Corp mibelle-landingzones-corp-mg toLa True mibelle-mg LA /subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 true true
Corp mibelle-landingzones-corp-mg toLa False none LA /subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 true true
Online mibelle-landingzones-online-mg toLa True mibelle-landingzones-mg LA /subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 true true
Online mibelle-landingzones-online-mg toLa True mibelle-mg LA /subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 true true
Online mibelle-landingzones-online-mg toLa False none LA /subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 true true
Platform mibelle-platform-mg toLa True mibelle-mg LA /subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 true true
Platform mibelle-platform-mg toLa False none LA /subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 true true
Connectivity mibelle-platform-connectivity-mg toLa True mibelle-mg LA /subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 true true
Connectivity mibelle-platform-connectivity-mg toLa True mibelle-platform-mg LA /subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 true true
Connectivity mibelle-platform-connectivity-mg toLa False none LA /subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 true true
Identity mibelle-platform-identity-mg toLa True mibelle-mg LA /subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 true true
Identity mibelle-platform-identity-mg toLa True mibelle-platform-mg LA /subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 true true
Identity mibelle-platform-identity-mg toLa False none LA /subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 true true
Management mibelle-platform-management-mg toLa True mibelle-mg LA /subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 true true
Management mibelle-platform-management-mg toLa True mibelle-platform-mg LA /subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 true true
Management mibelle-platform-management-mg toLa False none LA /subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 true true
Sandbox mibelle-sandbox-mg toLa True mibelle-mg LA /subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 true true
Sandbox mibelle-sandbox-mg toLa False none LA /subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 true true
Management Group Diagnostic Settings - Create Or Update - REST API learn
Download CSV semicolon | comma
Management Group Name Management Group Id Management Group path
Tenant Root Group a31c3d92-e630-40f3-9c32-d0c510db197f a31c3d92-e630-40f3-9c32-d0c510db197f

Subscriptions

Create diagnostic setting learn
Download CSV semicolon | comma
Subscription SubscriptionId Path Diagnostic setting Target TargetId Administrative Alert Autoscale Policy Recommendation ResourceHealth Security ServiceHealth
mibelle-identity e1dcabb1-2f79-4eb1-982d-e3df709c24aa a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa subscriptionToLa LA /subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 true true true true true true true true
Create diagnostic setting learn
Download CSV semicolon | comma
Subscription Subscription Id Subscription Mg path
mibelle-it-automation d4493d1a-9fd5-4596-aff4-8c679eac0164 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164
mibelle-online 3b2fdc69-67a4-42f2-a43e-b7fbad489b03 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03
mibelle-connectivity edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880
mibelle-management fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b

Resources

Create Custom Policies for Azure ResourceTypes that support Diagnostics Logs and Metrics Create-AzDiagPolicy
Supported categories for Azure Resource Logs learn
Download CSV semicolon | comma
ResourceType Resource Count Diagnostics capable Metrics Logs LogCategories
microsoft.app/containerapps 1 True True False
microsoft.app/managedenvironments 1 True True True ContainerAppConsoleLogs, ContainerAppSystemLogs, AppEnvSpringAppConsoleLogs, AppEnvSessionConsoleLogs, AppEnvSessionPoolEventLogs, AppEnvSessionLifeCycleLogs
microsoft.automation/automationaccounts 1 True True True JobLogs, JobStreams, DscNodeStatus, AuditEvent
microsoft.automation/automationaccounts/runbooks 1 False False False
microsoft.azurearcdata/sqlserverinstances 40 False False False
microsoft.azurearcdata/sqlserverinstances/databases 296 False False False
microsoft.compute/availabilitysets 2 False False False
microsoft.compute/disks 10 True True False
microsoft.compute/sshpublickeys 10 False False False
microsoft.compute/virtualmachines 7 True True False
microsoft.compute/virtualmachines/extensions 6 False False False
microsoft.connectedvmwarevsphere/vcenters 1 False False False
microsoft.containerregistry/registries 1 True True True ContainerRegistryRepositoryEvents, ContainerRegistryLoginEvents
microsoft.devtestlab/schedules 1 False False False
microsoft.extendedlocation/customlocations 1 False False False
microsoft.fabric/capacities 1 False False False
microsoft.hybridcompute/machines 116 False False False
microsoft.hybridcompute/machines/extensions 266 False False False
microsoft.hybridcompute/privatelinkscopes 1 False False False
microsoft.insights/actiongroups 3 False False False
microsoft.insights/components 5 True True True AppAvailabilityResults, AppBrowserTimings, AppEvents, AppMetrics, AppDependencies, AppExceptions, AppPageViews, AppPerformanceCounters, AppRequests, AppSystemEvents, AppTraces, OTelResources
microsoft.insights/datacollectionendpoints 1 False False False
microsoft.insights/datacollectionrules 4 True True True LogErrors
microsoft.insights/scheduledqueryrules 1 False False False
microsoft.insights/workbooks 1 False False False
microsoft.keyvault/vaults 5 True True True AuditEvent, AzurePolicyEvaluationDetails
microsoft.logic/workflows 2 True True True WorkflowRuntime
microsoft.maintenance/maintenanceconfigurations 21 False False False
microsoft.managedidentity/userassignedidentities 1 False False False
microsoft.network/applicationsecuritygroups 2 False False False
microsoft.network/bastionhosts 1 True True True BastionAuditLogs
microsoft.network/dnszones 19 True True False
microsoft.network/loadbalancers 1 True True True LoadBalancerHealthEvent
microsoft.network/networkinterfaces 17 True True False
microsoft.network/networksecuritygroups 3 True False True NetworkSecurityGroupEvent, NetworkSecurityGroupRuleCounter
microsoft.network/networkwatchers 5 False False False
microsoft.network/networkwatchers/flowlogs 2 False False False
microsoft.network/privateendpoints 1 True True False
microsoft.network/publicipaddresses 4 True True True DDoSProtectionNotifications, DDoSMitigationFlowLogs, DDoSMitigationReports
microsoft.network/routetables 2 False False False
microsoft.network/virtualhubs 1 True True False
microsoft.network/virtualnetworks 3 True True True VMProtectionAlerts
microsoft.operationalinsights/querypacks 1 False False False
microsoft.operationalinsights/workspaces 6 True True True Audit, SummaryLogs, Jobs
microsoft.powerbidedicated/capacities 1 True True True Engine
microsoft.resourceconnector/appliances 1 False False False
microsoft.saas/resources 1 False False False
microsoft.storage/storageaccounts 16 True True False
microsoft.visualstudio/account 1 False False False
microsoft.web/connectiongateways 1 False False False
microsoft.web/connections 7 True True False
microsoft.web/serverfarms 6 True True False
microsoft.web/sites 7 True True True AppServiceHTTPLogs, AppServiceConsoleLogs, AppServiceAppLogs, AppServiceAuditLogs, AppServiceIPSecAuditLogs, AppServicePlatformLogs, AppServiceAuthenticationLogs
Create Custom Policies for Azure ResourceTypes that support Diagnostics Logs and Metrics Create-AzDiagPolicy
Supported categories for Azure Resource Logs learn
Priority Recommendation ResourceType Resource Count Diagnostics capable (logs) Policy Id Policy DisplayName Role definitions Target Log Categories not covered by Policy Policy assignments Policy used in PolicySet PolicySet assignments
2-Medium Create diagnostics policy for this ResourceType. To verify GA check learn microsoft.app/managedenvironments 0 yes n/a n/a n/a n/a n/a n/a n/a n/a
2-Medium Create diagnostics policy for this ResourceType. To verify GA check learn microsoft.insights/components 0 yes n/a n/a n/a n/a n/a n/a n/a n/a
2-Medium Create diagnostics policy for this ResourceType. To verify GA check learn microsoft.insights/datacollectionrules 0 yes n/a n/a n/a n/a n/a n/a n/a n/a
2-Medium Create diagnostics policy for this ResourceType. To verify GA check learn microsoft.keyvault/vaults 0 yes n/a n/a n/a n/a n/a n/a n/a n/a
2-Medium Create diagnostics policy for this ResourceType. To verify GA check learn microsoft.logic/workflows 0 yes n/a n/a n/a n/a n/a n/a n/a n/a
2-Medium Create diagnostics policy for this ResourceType. To verify GA check learn microsoft.network/publicipaddresses 0 yes n/a n/a n/a n/a n/a n/a n/a n/a
3-MediumLow no recommendation Microsoft.ContainerRegistry/registries 0 yes /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-acr [Deprecated]: Deploy Diagnostic Settings for Container Registry to Log Analytics workspace Monitoring Contributor (749f88d5-cbae-40b8-bcfc-e573ddc772fa), Log Analytics Contributor (92aaf0da-9dab-42b6-94a3-d43ce8d16293) LA all OK 0 1 [/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics ([Deprecated]: Deploy Diagnostic Settings to Azure Services)] 0
3-MediumLow no recommendation Microsoft.Network/networkSecurityGroups 0 yes /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-networksecuritygroups [Deprecated]: Deploy Diagnostic Settings for Network Security Groups to Log Analytics workspace Monitoring Contributor (749f88d5-cbae-40b8-bcfc-e573ddc772fa), Log Analytics Contributor (92aaf0da-9dab-42b6-94a3-d43ce8d16293) LA all OK 0 1 [/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics ([Deprecated]: Deploy Diagnostic Settings to Azure Services)] 0
3-MediumLow no recommendation as this resourceType seems not existing Microsoft.TimeSeriesInsights/environments 0 unknown /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-timeseriesinsights [Deprecated]: Deploy Diagnostic Settings for Time Series Insights to Log Analytics workspace Monitoring Contributor (749f88d5-cbae-40b8-bcfc-e573ddc772fa), Log Analytics Contributor (92aaf0da-9dab-42b6-94a3-d43ce8d16293) LA n/a 0 1 [/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics ([Deprecated]: Deploy Diagnostic Settings to Azure Services)] 0
4-Low no recommendation Microsoft.Automation/automationAccounts 0 yes /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-aa [Deprecated]: Deploy Diagnostic Settings for Automation to Log Analytics workspace Monitoring Contributor (749f88d5-cbae-40b8-bcfc-e573ddc772fa), Log Analytics Contributor (92aaf0da-9dab-42b6-94a3-d43ce8d16293) LA all OK 0 1 [/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics ([Deprecated]: Deploy Diagnostic Settings to Azure Services)] 0
4-Low no recommendation Microsoft.Network/bastionHosts 0 yes /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-bastion [Deprecated]: Deploy Diagnostic Settings for Azure Bastion to Log Analytics workspace Monitoring Contributor (749f88d5-cbae-40b8-bcfc-e573ddc772fa), Log Analytics Contributor (92aaf0da-9dab-42b6-94a3-d43ce8d16293) LA all OK 0 1 [/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics ([Deprecated]: Deploy Diagnostic Settings to Azure Services)] 0
4-Low no recommendation Microsoft.Network/virtualNetworks 0 yes /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-virtualnetwork [Deprecated]: Deploy Diagnostic Settings for Virtual Network to Log Analytics workspace Monitoring Contributor (749f88d5-cbae-40b8-bcfc-e573ddc772fa), Log Analytics Contributor (92aaf0da-9dab-42b6-94a3-d43ce8d16293) LA all OK 0 1 [/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics ([Deprecated]: Deploy Diagnostic Settings to Azure Services)] 0
4-Low no recommendation Microsoft.PowerBIDedicated/capacities 0 yes /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-powerbiembedded [Deprecated]: Deploy Diagnostic Settings for Power BI Embedded to Log Analytics workspace Monitoring Contributor (749f88d5-cbae-40b8-bcfc-e573ddc772fa), Log Analytics Contributor (92aaf0da-9dab-42b6-94a3-d43ce8d16293) LA all OK 0 1 [/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics ([Deprecated]: Deploy Diagnostic Settings to Azure Services)] 0
4-Low no recommendation as this resourceType seems not existing Microsoft.AnalysisServices/servers 0 unknown /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-analysisservice [Deprecated]: Deploy Diagnostic Settings for Analysis Services to Log Analytics workspace Monitoring Contributor (749f88d5-cbae-40b8-bcfc-e573ddc772fa), Log Analytics Contributor (92aaf0da-9dab-42b6-94a3-d43ce8d16293) LA n/a 0 1 [/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics ([Deprecated]: Deploy Diagnostic Settings to Azure Services)] 0
4-Low no recommendation as this resourceType seems not existing Microsoft.ApiManagement/service 0 unknown /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-apimgmt [Deprecated]: Deploy Diagnostic Settings for API Management to Log Analytics workspace Monitoring Contributor (749f88d5-cbae-40b8-bcfc-e573ddc772fa), Log Analytics Contributor (92aaf0da-9dab-42b6-94a3-d43ce8d16293) LA n/a 0 1 [/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics ([Deprecated]: Deploy Diagnostic Settings to Azure Services)] 0
4-Low no recommendation as this resourceType seems not existing Microsoft.Cdn/profiles/endpoints 0 unknown /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-cdnendpoints [Deprecated]: Deploy Diagnostic Settings for CDN Endpoint to Log Analytics workspace Monitoring Contributor (749f88d5-cbae-40b8-bcfc-e573ddc772fa), Log Analytics Contributor (92aaf0da-9dab-42b6-94a3-d43ce8d16293) LA n/a 0 1 [/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics ([Deprecated]: Deploy Diagnostic Settings to Azure Services)] 0
4-Low no recommendation as this resourceType seems not existing Microsoft.CognitiveServices/accounts 0 unknown /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-cognitiveservices [Deprecated]: Deploy Diagnostic Settings for Cognitive Services to Log Analytics workspace Monitoring Contributor (749f88d5-cbae-40b8-bcfc-e573ddc772fa), Log Analytics Contributor (92aaf0da-9dab-42b6-94a3-d43ce8d16293) LA n/a 0 1 [/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics ([Deprecated]: Deploy Diagnostic Settings to Azure Services)] 0
4-Low no recommendation as this resourceType seems not existing Microsoft.Databricks/workspaces 0 unknown /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-databricks [Deprecated]: Deploy Diagnostic Settings for Databricks to Log Analytics workspace Monitoring Contributor (749f88d5-cbae-40b8-bcfc-e573ddc772fa), Log Analytics Contributor (92aaf0da-9dab-42b6-94a3-d43ce8d16293) LA n/a 0 1 [/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics ([Deprecated]: Deploy Diagnostic Settings to Azure Services)] 0
4-Low no recommendation as this resourceType seems not existing Microsoft.DataFactory/factories 0 unknown /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-datafactory [Deprecated]: Deploy Diagnostic Settings for Data Factory to Log Analytics workspace Monitoring Contributor (749f88d5-cbae-40b8-bcfc-e573ddc772fa), Log Analytics Contributor (92aaf0da-9dab-42b6-94a3-d43ce8d16293) LA n/a 0 1 [/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics ([Deprecated]: Deploy Diagnostic Settings to Azure Services)] 0
4-Low no recommendation as this resourceType seems not existing Microsoft.DataLakeAnalytics/accounts 0 unknown /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-dlanalytics [Deprecated]: Deploy Diagnostic Settings for Data Lake Analytics to Log Analytics workspace Monitoring Contributor (749f88d5-cbae-40b8-bcfc-e573ddc772fa), Log Analytics Contributor (92aaf0da-9dab-42b6-94a3-d43ce8d16293) LA n/a 0 1 [/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics ([Deprecated]: Deploy Diagnostic Settings to Azure Services)] 0
4-Low no recommendation as this resourceType seems not existing Microsoft.DBforMariaDB/servers 0 unknown /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-mariadb [Deprecated] Diagnostic Settings for MariaDB to Log Analytics Workspace Monitoring Contributor (749f88d5-cbae-40b8-bcfc-e573ddc772fa), Log Analytics Contributor (92aaf0da-9dab-42b6-94a3-d43ce8d16293) LA n/a 0 1 [/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics ([Deprecated]: Deploy Diagnostic Settings to Azure Services)] 0
4-Low no recommendation as this resourceType seems not existing Microsoft.DBforMySQL/servers 0 unknown /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-mysql [Deprecated]: Deploy Diagnostic Settings for Database for MySQL to Log Analytics workspace Monitoring Contributor (749f88d5-cbae-40b8-bcfc-e573ddc772fa), Log Analytics Contributor (92aaf0da-9dab-42b6-94a3-d43ce8d16293) LA n/a 0 1 [/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics ([Deprecated]: Deploy Diagnostic Settings to Azure Services)] 0
4-Low no recommendation as this resourceType seems not existing Microsoft.DBforPostgreSQL/flexibleServers Microsoft.DBforPostgreSQL/servers 0 unknown /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-postgresql [Deprecated]: Deploy Diagnostic Settings for Database for PostgreSQL to Log Analytics workspace Monitoring Contributor (749f88d5-cbae-40b8-bcfc-e573ddc772fa), Log Analytics Contributor (92aaf0da-9dab-42b6-94a3-d43ce8d16293) SA n/a 0 1 [/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics ([Deprecated]: Deploy Diagnostic Settings to Azure Services)] 0
4-Low no recommendation as this resourceType seems not existing Microsoft.DesktopVirtualization/applicationGroups 0 unknown /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-wvdappgroup [Deprecated]: Deploy Diagnostic Settings for AVD Application group to Log Analytics workspace Monitoring Contributor (749f88d5-cbae-40b8-bcfc-e573ddc772fa), Log Analytics Contributor (92aaf0da-9dab-42b6-94a3-d43ce8d16293) LA n/a 0 1 [/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics ([Deprecated]: Deploy Diagnostic Settings to Azure Services)] 0
4-Low no recommendation as this resourceType seems not existing Microsoft.DesktopVirtualization/hostpools 0 unknown /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-wvdhostpools [Deprecated]: Deploy Diagnostic Settings for AVD Host Pools to Log Analytics workspace Monitoring Contributor (749f88d5-cbae-40b8-bcfc-e573ddc772fa), Log Analytics Contributor (92aaf0da-9dab-42b6-94a3-d43ce8d16293) LA n/a 0 1 [/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics ([Deprecated]: Deploy Diagnostic Settings to Azure Services)] 0
4-Low no recommendation as this resourceType seems not existing Microsoft.DesktopVirtualization/scalingplans 0 unknown /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-avdscalingplans [Deprecated]: Deploy Diagnostic Settings for AVD Scaling Plans to Log Analytics workspace Monitoring Contributor (749f88d5-cbae-40b8-bcfc-e573ddc772fa), Log Analytics Contributor (92aaf0da-9dab-42b6-94a3-d43ce8d16293) LA n/a 0 1 [/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics ([Deprecated]: Deploy Diagnostic Settings to Azure Services)] 0
4-Low no recommendation as this resourceType seems not existing Microsoft.DesktopVirtualization/workspaces 0 unknown /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-wvdworkspace [Deprecated]: Deploy Diagnostic Settings for AVD Workspace to Log Analytics workspace Monitoring Contributor (749f88d5-cbae-40b8-bcfc-e573ddc772fa), Log Analytics Contributor (92aaf0da-9dab-42b6-94a3-d43ce8d16293) LA n/a 0 1 [/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics ([Deprecated]: Deploy Diagnostic Settings to Azure Services)] 0
4-Low no recommendation as this resourceType seems not existing Microsoft.Devices/IotHubs 0 unknown /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-iothub [Deprecated]: Deploy Diagnostic Settings for IoT Hub to Log Analytics workspace Monitoring Contributor (749f88d5-cbae-40b8-bcfc-e573ddc772fa), Log Analytics Contributor (92aaf0da-9dab-42b6-94a3-d43ce8d16293) LA n/a 0 1 [/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics ([Deprecated]: Deploy Diagnostic Settings to Azure Services)] 0
4-Low no recommendation as this resourceType seems not existing Microsoft.DocumentDB/databaseAccounts 0 unknown /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-cosmosdb [Deprecated]: Deploy Diagnostic Settings for Cosmos DB to Log Analytics workspace Monitoring Contributor (749f88d5-cbae-40b8-bcfc-e573ddc772fa), Log Analytics Contributor (92aaf0da-9dab-42b6-94a3-d43ce8d16293) LA n/a 0 1 [/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics ([Deprecated]: Deploy Diagnostic Settings to Azure Services)] 0
4-Low no recommendation as this resourceType seems not existing Microsoft.EventGrid/systemTopics 0 unknown /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-eventgridsystemtopic [Deprecated]: Deploy Diagnostic Settings for Event Grid System Topic to Log Analytics workspace Monitoring Contributor (749f88d5-cbae-40b8-bcfc-e573ddc772fa), Log Analytics Contributor (92aaf0da-9dab-42b6-94a3-d43ce8d16293) LA n/a 0 1 [/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics ([Deprecated]: Deploy Diagnostic Settings to Azure Services)] 0
4-Low no recommendation as this resourceType seems not existing Microsoft.EventGrid/topics 0 unknown /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-eventgridtopic [Deprecated]: Deploy Diagnostic Settings for Event Grid Topic to Log Analytics workspace Monitoring Contributor (749f88d5-cbae-40b8-bcfc-e573ddc772fa), Log Analytics Contributor (92aaf0da-9dab-42b6-94a3-d43ce8d16293) LA n/a 0 1 [/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics ([Deprecated]: Deploy Diagnostic Settings to Azure Services)] 0
4-Low no recommendation as this resourceType seems not existing Microsoft.HealthcareApis/services 0 unknown /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-apiforfhir [Deprecated]: Deploy Diagnostic Settings for Azure API for FHIR to Log Analytics workspace Monitoring Contributor (749f88d5-cbae-40b8-bcfc-e573ddc772fa), Log Analytics Contributor (92aaf0da-9dab-42b6-94a3-d43ce8d16293) LA n/a 0 1 [/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics ([Deprecated]: Deploy Diagnostic Settings to Azure Services)] 0
4-Low no recommendation as this resourceType seems not existing Microsoft.Kusto/Clusters 0 unknown /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-dataexplorercluster [Deprecated]: Deploy Diagnostic Settings for Azure Data Explorer Cluster to Log Analytics workspace Monitoring Contributor (749f88d5-cbae-40b8-bcfc-e573ddc772fa), Log Analytics Contributor (92aaf0da-9dab-42b6-94a3-d43ce8d16293) LA n/a 0 1 [/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics ([Deprecated]: Deploy Diagnostic Settings to Azure Services)] 0
4-Low no recommendation as this resourceType seems not existing Microsoft.Logic/integrationAccounts 0 unknown /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-logicappsise [Deprecated]: Deploy Diagnostic Settings for Logic Apps integration service environment to Log Analytics workspace Monitoring Contributor (749f88d5-cbae-40b8-bcfc-e573ddc772fa), Log Analytics Contributor (92aaf0da-9dab-42b6-94a3-d43ce8d16293) LA n/a 0 1 [/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics ([Deprecated]: Deploy Diagnostic Settings to Azure Services)] 0
4-Low no recommendation as this resourceType seems not existing Microsoft.MachineLearningServices/workspaces 0 unknown /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-mlworkspace [Deprecated]: Deploy Diagnostic Settings for Machine Learning workspace to Log Analytics workspace Monitoring Contributor (749f88d5-cbae-40b8-bcfc-e573ddc772fa), Log Analytics Contributor (92aaf0da-9dab-42b6-94a3-d43ce8d16293) LA n/a 0 1 [/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics ([Deprecated]: Deploy Diagnostic Settings to Azure Services)] 0
4-Low no recommendation as this resourceType seems not existing Microsoft.Media/mediaServices 0 unknown /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-mediaservice [Deprecated]: Deploy Diagnostic Settings for Azure Media Service to Log Analytics workspace Monitoring Contributor (749f88d5-cbae-40b8-bcfc-e573ddc772fa), Log Analytics Contributor (92aaf0da-9dab-42b6-94a3-d43ce8d16293) LA n/a 0 1 [/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics ([Deprecated]: Deploy Diagnostic Settings to Azure Services)] 0
4-Low no recommendation as this resourceType seems not existing Microsoft.Network/applicationGateways 0 unknown /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-applicationgateway [Deprecated]: Deploy Diagnostic Settings for Application Gateway to Log Analytics workspace Monitoring Contributor (749f88d5-cbae-40b8-bcfc-e573ddc772fa), Log Analytics Contributor (92aaf0da-9dab-42b6-94a3-d43ce8d16293) LA n/a 0 1 [/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics ([Deprecated]: Deploy Diagnostic Settings to Azure Services)] 0
4-Low no recommendation as this resourceType seems not existing Microsoft.Network/azureFirewalls 0 unknown /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-firewall [Deprecated]: Deploy Diagnostic Settings for Firewall to Log Analytics workspace Monitoring Contributor (749f88d5-cbae-40b8-bcfc-e573ddc772fa), Log Analytics Contributor (92aaf0da-9dab-42b6-94a3-d43ce8d16293) LA n/a 0 1 [/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics ([Deprecated]: Deploy Diagnostic Settings to Azure Services)] 0
4-Low no recommendation as this resourceType seems not existing Microsoft.Network/expressRouteCircuits 0 unknown /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-expressroute [Deprecated]: Deploy Diagnostic Settings for ExpressRoute to Log Analytics workspace Monitoring Contributor (749f88d5-cbae-40b8-bcfc-e573ddc772fa), Log Analytics Contributor (92aaf0da-9dab-42b6-94a3-d43ce8d16293) LA n/a 0 1 [/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics ([Deprecated]: Deploy Diagnostic Settings to Azure Services)] 0
4-Low no recommendation as this resourceType seems not existing Microsoft.Network/frontDoors 0 unknown /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-frontdoor [Deprecated]: Deploy Diagnostic Settings for Front Door to Log Analytics workspace Monitoring Contributor (749f88d5-cbae-40b8-bcfc-e573ddc772fa), Log Analytics Contributor (92aaf0da-9dab-42b6-94a3-d43ce8d16293) LA n/a 0 1 [/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics ([Deprecated]: Deploy Diagnostic Settings to Azure Services)] 0
4-Low no recommendation as this resourceType seems not existing Microsoft.Network/trafficManagerProfiles 0 unknown /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-trafficmanager [Deprecated]: Deploy Diagnostic Settings for Traffic Manager to Log Analytics workspace Monitoring Contributor (749f88d5-cbae-40b8-bcfc-e573ddc772fa), Log Analytics Contributor (92aaf0da-9dab-42b6-94a3-d43ce8d16293) LA n/a 0 1 [/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics ([Deprecated]: Deploy Diagnostic Settings to Azure Services)] 0
4-Low no recommendation as this resourceType seems not existing Microsoft.Network/virtualNetworkGateways 0 unknown /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-vnetgw [Deprecated]: Deploy Diagnostic Settings for VPN Gateway to Log Analytics workspace Monitoring Contributor (749f88d5-cbae-40b8-bcfc-e573ddc772fa), Log Analytics Contributor (92aaf0da-9dab-42b6-94a3-d43ce8d16293) LA n/a 0 1 [/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics ([Deprecated]: Deploy Diagnostic Settings to Azure Services)] 0
4-Low no recommendation as this resourceType seems not existing Microsoft.Network/vpnGateways 0 unknown /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-vwans2svpngw [Deprecated]: Deploy Diagnostic Settings for VWAN S2S VPN Gateway to Log Analytics workspace Monitoring Contributor (749f88d5-cbae-40b8-bcfc-e573ddc772fa), Log Analytics Contributor (92aaf0da-9dab-42b6-94a3-d43ce8d16293) LA n/a 0 1 [/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics ([Deprecated]: Deploy Diagnostic Settings to Azure Services)] 0
4-Low no recommendation as this resourceType seems not existing Microsoft.Relay/namespaces 0 unknown /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-relay [Deprecated]: Deploy Diagnostic Settings for Relay to Log Analytics workspace Monitoring Contributor (749f88d5-cbae-40b8-bcfc-e573ddc772fa), Log Analytics Contributor (92aaf0da-9dab-42b6-94a3-d43ce8d16293) LA n/a 0 1 [/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics ([Deprecated]: Deploy Diagnostic Settings to Azure Services)] 0
4-Low no recommendation as this resourceType seems not existing Microsoft.SignalRService/SignalR 0 unknown /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-signalr [Deprecated]: Deploy Diagnostic Settings for SignalR to Log Analytics workspace Monitoring Contributor (749f88d5-cbae-40b8-bcfc-e573ddc772fa), Log Analytics Contributor (92aaf0da-9dab-42b6-94a3-d43ce8d16293) LA n/a 0 1 [/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics ([Deprecated]: Deploy Diagnostic Settings to Azure Services)] 0
4-Low no recommendation as this resourceType seems not existing Microsoft.Sql/managedInstances 0 unknown /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-sqlmi [Deprecated]: Deploy Diagnostic Settings for SQL Managed Instances to Log Analytics workspace Monitoring Contributor (749f88d5-cbae-40b8-bcfc-e573ddc772fa), Log Analytics Contributor (92aaf0da-9dab-42b6-94a3-d43ce8d16293) LA n/a 0 1 [/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics ([Deprecated]: Deploy Diagnostic Settings to Azure Services)] 0
4-Low review the policy and add the missing categories as required Microsoft.Network/loadBalancers 0 yes /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-loadbalancer [Deprecated]: Deploy Diagnostic Settings for Load Balancer to Log Analytics workspace Monitoring Contributor (749f88d5-cbae-40b8-bcfc-e573ddc772fa), Log Analytics Contributor (92aaf0da-9dab-42b6-94a3-d43ce8d16293) LA LoadBalancerHealthEvent 0 1 [/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics ([Deprecated]: Deploy Diagnostic Settings to Azure Services)] 0
4-Low review the policy and add the missing categories as required microsoft.operationalinsights/workspaces 0 yes /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-loganalytics [Deprecated]: Deploy Diagnostic Settings for Log Analytics to Log Analytics workspace Monitoring Contributor (749f88d5-cbae-40b8-bcfc-e573ddc772fa), Log Analytics Contributor (92aaf0da-9dab-42b6-94a3-d43ce8d16293) LA Jobs, SummaryLogs 0 1 [/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics ([Deprecated]: Deploy Diagnostic Settings to Azure Services)] 0
4-Low review the policy and add the missing categories as required Microsoft.Web/sites 0 yes /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-function [Deprecated]: Deploy Diagnostic Settings for Azure Function App to Log Analytics workspace Monitoring Contributor (749f88d5-cbae-40b8-bcfc-e573ddc772fa), Log Analytics Contributor (92aaf0da-9dab-42b6-94a3-d43ce8d16293) LA AppServiceAppLogs, AppServiceAuditLogs, AppServiceAuthenticationLogs, AppServiceConsoleLogs, AppServiceHTTPLogs, AppServiceIPSecAuditLogs, AppServicePlatformLogs 0 1 [/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics ([Deprecated]: Deploy Diagnostic Settings to Azure Services)] 0
5-Low Review the policy - the definition has key for categories, but there are none categories defined Microsoft.Web/sites 0 yes /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-website [Deprecated]: Deploy Diagnostic Settings for App Service to Log Analytics workspace Monitoring Contributor (749f88d5-cbae-40b8-bcfc-e573ddc772fa), Log Analytics Contributor (92aaf0da-9dab-42b6-94a3-d43ce8d16293) LA AppServiceAppLogs, AppServiceAuditLogs, AppServiceAuthenticationLogs, AppServiceConsoleLogs, AppServiceHTTPLogs, AppServiceIPSecAuditLogs, AppServicePlatformLogs 0 1 [/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics ([Deprecated]: Deploy Diagnostic Settings to Azure Services)] 0

Tenant

PolicySet definitions: 48/2500 learn

Custom Role definitions: 9/5000 learn

Management Groups

0 Management Groups approaching Limit (200) for PolicyAssignment learn

0 Management Groups approaching Limit (500) for Policy Scope learn

0 Management Groups approaching Limit (200) for PolicySet Scope learn

0 Management Groups approaching Limit (500) for RoleAssignment learn

Subscriptions

0 Subscriptions approaching Limit (980) for ResourceGroups learn

0 Subscriptions approaching Limit (50) for Tags learn

0 Subscriptions approaching Limit (200) for PolicyAssignment learn

0 Subscriptions approaching Limit (500) for Policy Scope learn

0 Subscriptions approaching Limit (200) for PolicySet Scope learn

0 Subscriptions approaching Limit (4000) for RoleAssignment learn

Check out AzADServicePrincipalInsights GitHub
Demystifying Service Principals - Managed Identities devBlogs
John Savill - Azure AD App Registrations, Enterprise Apps and Service Principals YouTube

No ServicePrincipals where the API returned 'Request_ResourceNotFound'

No Applications where the API returned 'Request_ResourceNotFound'

Download CSV semicolon | comma
ApplicationId DisplayName SP ObjectId Type Usage Usage info Policy assignment details Role assignments Assigned to resources Orphaned
b9113bfb-57aa-4c5d-8af4-ce17765f8e7c mibelle-aut-psu-dev-euw-app-01 1f7c7c55-02e4-4af0-8ee0-e2d5f82a9ab5 System assigned Microsoft.Web/sites isExplicit=False, /subscriptions/3b2fdc69-67a4-42f2-a43e-b7fbad489b03/resourcegroups/mibelle-aut-psu-dev-rg/providers/Microsoft.Web/sites/mibelle-aut-psu-dev-euw-app-01 n/a 1 (Key Vault Secrets User (/subscriptions/3b2fdc69-67a4-42f2-a43e-b7fbad489b03/resourcegroups/mibelle-aut-psu-dev-rg/providers/microsoft.keyvault/vaults/mibautpsudeveuwkv02/providers/microsoft.authorization/roleassignments/ecd99364-f831-42b0-a1e5-01cb2453febf))
193a2e39-f09f-4d0c-8bdf-2ae4656c0df9 Deploy-AzActivity-Log 217aa040-8eb0-451b-b81c-0b8f3d200d5a System assigned Microsoft.Authorization/policyAssignments isExplicit=False, /providers/Microsoft.Management/managementGroups/mibelle-mg/providers/Microsoft.Authorization/policyAssignments/Deploy-AzActivity-Log BuiltIn Policy: Configure Azure Activity logs to stream to specified Log Analytics workspace (2465583e-4e78-4c15-b6be-a36cbc7c8b0f) 2 (Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/82f0c3bf-808b-5863-bf9c-231cfbf9598a), Monitoring Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/dcb59c88-f014-5e17-840c-6c9aecc66286)) false
151255ac-4185-4100-a13b-75a91819b0a2 Enforce-ALZ-Decomm 449067cf-1d3a-494e-9c11-cb5b5e97fc69 System assigned Microsoft.Authorization/policyAssignments isExplicit=False, /providers/Microsoft.Management/managementGroups/mibelle-decommissioned-mg/providers/Microsoft.Authorization/policyAssignments/Enforce-ALZ-Decomm Custom PolicySet: Enforce policies in the Decommissioned Landing Zone (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-alz-decomm) 1 (Virtual Machine Contributor (/providers/microsoft.management/managementgroups/mibelle-decommissioned-mg/providers/microsoft.authorization/roleassignments/5e51d472-1e7a-5e45-8cf7-e3bb9d2323d4)) false
d495f8aa-da58-4be3-aba0-7fa6c645764d Enable-AUM-CheckUpdates 4f27b633-c16b-47a6-ab24-737bb6cdad56 System assigned Microsoft.Authorization/policyAssignments isExplicit=False, /providers/Microsoft.Management/managementGroups/mibelle-landingzones-mg/providers/Microsoft.Authorization/policyAssignments/Enable-AUM-CheckUpdates Custom PolicySet: Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-aum-checkupdates) 3 (Virtual Machine Contributor (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/571da045-f503-5cb2-b123-ede8cfe0f15a), Azure Connected Machine Resource Administrator (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/7d65b18e-df43-5353-85a4-716e68ff7c7a), Managed Identity Operator (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/b2c88903-f3a4-54ec-813c-46d650309b86)) false
47925f30-4ca6-4a49-a9e1-353506cd2a09 Deploy-Diag-Logs 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57 System assigned Microsoft.Authorization/policyAssignments isExplicit=False, /providers/Microsoft.Management/managementGroups/mibelle-mg/providers/Microsoft.Authorization/policyAssignments/Deploy-Diag-Logs BuiltIn PolicySet: Enable audit category group resource logging for supported resources to Log Analytics (f5b29bc4-feca-4cc6-a58a-772dd5e290a5) 2 (Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/9df772a7-1ce7-5439-ab6b-5d31d69925cc), Monitoring Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b922046a-7a3e-59da-a982-8a5b855791ce)) false
ad77f009-d4b8-43a0-b141-28261ed76181 52a8c671384a4b609f1d7651 6e0d029a-fce4-400f-bff3-45b8d9a8342e System assigned Microsoft.Authorization/policyAssignments isExplicit=False, /providers/Microsoft.Management/managementGroups/mibelle-landingzones-mg/providers/Microsoft.Authorization/policyAssignments/52a8c671384a4b609f1d7651 BuiltIn Policy: Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics (052c180e-287d-44c3-86ef-01aeae2d9774) 1 (Contributor (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/94dfdb33-b864-47c9-831d-366721beb989)) false
e06d15d9-361c-4736-adcc-7119baa25693 mibelle-pki-scepman-prod-euw-app-02 728ba4e5-6cd6-49e3-ba75-73eed711472e System assigned Microsoft.Web/sites isExplicit=False, /subscriptions/3b2fdc69-67a4-42f2-a43e-b7fbad489b03/resourcegroups/mibelle-pki-prod-rg/providers/Microsoft.Web/sites/mibelle-pki-scepman-prod-euw-app-02 n/a 1 (Storage Table Data Contributor (/subscriptions/3b2fdc69-67a4-42f2-a43e-b7fbad489b03/resourcegroups/mibelle-pki-prod-rg/providers/microsoft.storage/storageaccounts/mibpkiscepmanpeuwst01/providers/microsoft.authorization/roleassignments/cb8d8035-f17e-5773-b3cd-9bc205c49462))
95363045-03b9-4bc0-9496-d0be9197d1bf d33eb38085bf40bd860fe43b 78dd5b73-2109-4a10-b2e4-6463304b4b4d System assigned Microsoft.Authorization/policyAssignments isExplicit=False, /providers/Microsoft.Management/managementGroups/mibelle-platform-mg/providers/Microsoft.Authorization/policyAssignments/d33eb38085bf40bd860fe43b BuiltIn Policy: Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics (052c180e-287d-44c3-86ef-01aeae2d9774) 1 (Contributor (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/21c0b216-76ff-44ef-9430-19f801e102d5)) false
77e27f94-bd92-4e81-aa57-9ec7db1f14d8 Deploy-MDEndpointsAMA 7d365a6d-a7ae-4921-beca-5ce854a76960 System assigned Microsoft.Authorization/policyAssignments isExplicit=False, /providers/Microsoft.Management/managementGroups/mibelle-mg/providers/Microsoft.Authorization/policyAssignments/Deploy-MDEndpointsAMA BuiltIn PolicySet: Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud (77b391e3-2d5d-40c3-83bf-65c846b3c6a3) 1 (Security Admin (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/d730d560-adce-52b7-b10c-36a8ad16a6d3)) false
636331d4-955e-49db-b2a2-91bca432462a e9143c36572348c3ba0c67b1 9c3b725e-ce85-47ac-bf6f-c2fa0571c259 System assigned Microsoft.Authorization/policyAssignments isExplicit=False, /providers/Microsoft.Management/managementGroups/mibelle-landingzones-mg/providers/Microsoft.Authorization/policyAssignments/e9143c36572348c3ba0c67b1 BuiltIn Policy: Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics (052c180e-287d-44c3-86ef-01aeae2d9774) 1 (Contributor (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/3fb7bac5-2328-4e74-a5b0-0d6d2a631693)) false
01fe6391-c760-4089-8d6e-11bea7156710 mibelle-pki-scepman-prod-euw-app-01 ac50c0d4-0669-41e7-8e20-fc13dccf2ba7 System assigned Microsoft.Web/sites isExplicit=False, /subscriptions/3b2fdc69-67a4-42f2-a43e-b7fbad489b03/resourcegroups/mibelle-pki-prod-rg/providers/Microsoft.Web/sites/mibelle-pki-scepman-prod-euw-app-01 n/a 4 (Key Vault Certificates Officer (/subscriptions/3b2fdc69-67a4-42f2-a43e-b7fbad489b03/resourcegroups/mibelle-pki-prod-rg/providers/microsoft.keyvault/vaults/mibpkiscepmanprodeuwkv01/providers/microsoft.authorization/roleassignments/27eca0fc-d289-5ff3-99e6-fb6a59f13178), Key Vault Crypto Officer (/subscriptions/3b2fdc69-67a4-42f2-a43e-b7fbad489b03/resourcegroups/mibelle-pki-prod-rg/providers/microsoft.keyvault/vaults/mibpkiscepmanprodeuwkv01/providers/microsoft.authorization/roleassignments/5a500fc5-5a6b-59b2-8f9c-9e1ca3b6648b), Key Vault Secrets User (/subscriptions/3b2fdc69-67a4-42f2-a43e-b7fbad489b03/resourcegroups/mibelle-pki-prod-rg/providers/microsoft.keyvault/vaults/mibpkiscepmanprodeuwkv01/providers/microsoft.authorization/roleassignments/90685712-7a4d-5754-9c62-b7631674c16b), Storage Table Data Contributor (/subscriptions/3b2fdc69-67a4-42f2-a43e-b7fbad489b03/resourcegroups/mibelle-pki-prod-rg/providers/microsoft.storage/storageaccounts/mibpkiscepmanpeuwst01/providers/microsoft.authorization/roleassignments/ce999a25-62f1-503b-9284-ee6c1ecb8063))
404a9d2c-42b2-458a-b82a-1802071faf9a Deploy-AzSqlDb-Auditing afb169da-f80a-4dd6-abf3-b7fc08efb8ae System assigned Microsoft.Authorization/policyAssignments isExplicit=False, /providers/Microsoft.Management/managementGroups/mibelle-landingzones-mg/providers/Microsoft.Authorization/policyAssignments/Deploy-AzSqlDb-Auditing BuiltIn Policy: Configure SQL servers to have auditing enabled to Log Analytics workspace (25da7dfb-0666-4a15-a8f5-402127efd8bb) 4 (SQL Security Manager (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/2f1eab15-c92e-52cd-8b0c-a60e52f1b331), Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/488f45ec-c535-5f65-85bf-acacd1bb93e8), SQL Security Manager (/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/providers/microsoft.authorization/roleassignments/ce81334b-c425-5087-9b8d-2119e050082b), Log Analytics Contributor (/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/providers/microsoft.authorization/roleassignments/fbb2af70-7587-52bd-b3e1-54fcdbdb7ea4)) false
8d068d83-9e93-430f-aeb0-dae858bda6de 97339ff59e1744678fd92dea c2b8a553-ec19-42b8-8855-6edc985eaffb System assigned Microsoft.Authorization/policyAssignments isExplicit=False, /providers/Microsoft.Management/managementGroups/mibelle-platform-mg/providers/Microsoft.Authorization/policyAssignments/97339ff59e1744678fd92dea BuiltIn Policy: Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics (052c180e-287d-44c3-86ef-01aeae2d9774) 1 (Contributor (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/71689b0c-ca78-4285-9603-49a5497225d8)) false
cc6c30f2-6e89-4a01-a4ba-2398fd010d84 Enable-AUM-CheckUpdates ce67e461-e4a3-4514-89cb-7eb8802f8f65 System assigned Microsoft.Authorization/policyAssignments isExplicit=False, /providers/Microsoft.Management/managementGroups/mibelle-platform-mg/providers/Microsoft.Authorization/policyAssignments/Enable-AUM-CheckUpdates Custom PolicySet: Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-aum-checkupdates) 3 (Managed Identity Operator (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/1f97b9d8-3c21-5b8b-9b36-72e77d4a90e0), Virtual Machine Contributor (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/51e23aa4-bdf1-5059-8efc-453852a14d5e), Azure Connected Machine Resource Administrator (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/d72b7c0f-a23a-58ed-8e0a-40f49a5b6ab3)) false
5323e6e3-598a-4c75-be31-c396902daebb Deploy-SQL-TDE de5ed213-fd75-471c-8d32-920072d6c378 System assigned Microsoft.Authorization/policyAssignments isExplicit=False, /providers/Microsoft.Management/managementGroups/mibelle-landingzones-mg/providers/Microsoft.Authorization/policyAssignments/Deploy-SQL-TDE BuiltIn Policy: Deploy SQL DB transparent data encryption (86a912f6-9a06-4e26-b447-11b16ba8659f) 1 (SQL DB Contributor (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/af2f6b24-ac34-5f3b-9249-5a109d9d1528)) false
495a338a-5a22-4d39-8b3f-e8d84cdfbbc1 Enforce-ACSB e1f2e80c-5329-4804-824d-f0b44713985e System assigned Microsoft.Authorization/policyAssignments isExplicit=False, /providers/Microsoft.Management/managementGroups/mibelle-mg/providers/Microsoft.Authorization/policyAssignments/Enforce-ACSB Custom PolicySet: Enforce Azure Compute Security Benchmark compliance auditing (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-acsb) 1 (Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/6e26cd22-b41b-5611-aafc-e2c56b14c060)) false
Download CSV semicolon | comma
ApplicationId DisplayName Notes SP ObjectId App ObjectId Secrets Secrets expired Secrets expiry
<14d
Secrets expiry
>14d & <2y
Secrets expiry
>2y
Certs Certs expired Certs expiry
<14d
Certs expiry
>14d & <2y
Certs expiry
>2y
ede5ba39-c48f-4a63-a56c-46fbccfb8e5e Mibelle-AzGovWiz-prod 44b03901-55d2-49a8-af3a-58228a81408c aa974a20-e66d-47f7-b73c-546af6029555 1 0 0 1 0 0 0 0 0 0
1600a7ca-6149-4097-a526-0403a50b7ba0 v1-app-registration-e1dcabb1-2f79-4eb1-982d-e3df709c24aa 4518b761-8764-4f6f-aaa4-abf4aee06171 ec95430f-260b-45f5-bde8-3e1879e6ef43 0 0 0 0 0 0 0 0 0 0
3327b82c-744d-4a7d-9c2c-5388e755f1f9 v1-app-registration-fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b 46c6a007-6a92-4e2c-bd31-26bc55b525e9 9cdafa04-40d6-49cd-9dce-dc4571336d8c 0 0 0 0 0 0 0 0 0 0
08e71091-c337-4fdc-97ba-ef85b4f6c523 v1-app-registration-edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 bc9b95df-82ea-486e-a096-0142aabe35aa aec4a5e9-cc1e-44f8-a15d-9183f69b93ef 0 0 0 0 0 0 0 0 0 0
8c05d08a-04b8-4245-9ec9-c99ff2c92f6a Mibelle-DNSMigration-prod da11eb0f-75f8-40f7-9b4e-0ed2cd8924bb c2075f92-3840-43b3-90cf-6b4830cfd676 0 0 0 0 0 1 0 0 1 0
729e2bb1-9ba1-4a53-ae9e-65ed40c79671 v1-app-registration-d4493d1a-9fd5-4596-aff4-8c679eac0164 dd3e0147-c485-4150-9df1-9a09dbfdbd19 f5a8d4bf-a8ca-4b80-8b00-728b7fd640e4 0 0 0 0 0 0 0 0 0 0
308805f9-25fe-4431-a606-ac64d08652ff v1-app-registration-3b2fdc69-67a4-42f2-a43e-b7fbad489b03 edfd1a69-18da-4f39-9a1e-230cb16f6150 70f13009-02e1-4e07-ab66-ea7319c2a764 0 0 0 0 0 0 0 0 0 0

0 External (appOwnerOrganizationId) AAD ServicePrincipals type=Application

Customize your Azure environment optimizations (Cost, Reliability & more) with Azure Optimization Engine (AOE)

No information on Consumption as switch parameter -DoAzureConsumption was not applied

0 Created/Updated custom Policy definitions

0 Created/Updated custom PolicySet definitions

0 Created/Updated Policy assignments

0 Created/Updated custom Role definitions

Download CSV semicolon | comma
Scope Role Role Id Role Type Data Identity Displayname Identity SignInName Identity ObjectId Identity Type Applicability Applies through membership Group Details PIM PIM assignment type PIM start PIM end Role AssignmentId Related Policy Assignment CreatedOn CreatedBy
Mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member direct False /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/e14ef9ac-25e8-4ee7-887a-a6576bd5229d none 11/28/2025 07:57:36 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
RG [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false SGU-MIB-RES-Azure-Rsgp-MibellePpsFabricProdRg-subscriptionOwner n/a 5e90f4a0-bef5-41db-8e9c-7b8b8ef3e6c2 Group direct 2 (Usr: 2, Grp: 0, SP: 0) False /subscriptions/3b2fdc69-67a4-42f2-a43e-b7fbad489b03/resourcegroups/mibelle-pps-fabric-prod-rg/providers/microsoft.authorization/roleassignments/7a355ecd-0d09-4e01-a413-cdffcd25bcca none 11/27/2025 11:40:14 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
RG [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false CSA-Ramon.Banz csa-ramon.banz@MIBCloud.onmicrosoft.com 6bc05491-37ba-40b4-b726-f304409d466f User Member indirect SGU-MIB-RES-Azure-Rsgp-MibellePpsFabricProdRg-subscriptionOwner (5e90f4a0-bef5-41db-8e9c-7b8b8ef3e6c2) 2 (Usr: 2, Grp: 0, SP: 0) False /subscriptions/3b2fdc69-67a4-42f2-a43e-b7fbad489b03/resourcegroups/mibelle-pps-fabric-prod-rg/providers/microsoft.authorization/roleassignments/7a355ecd-0d09-4e01-a413-cdffcd25bcca none 11/27/2025 11:40:14 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
RG [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false PowerBI-MIBELLEGROUP powerbi@mibelle.net 7438f8fb-ba2c-4b7e-9986-02074ceb2148 User Member indirect SGU-MIB-RES-Azure-Rsgp-MibellePpsFabricProdRg-subscriptionOwner (5e90f4a0-bef5-41db-8e9c-7b8b8ef3e6c2) 2 (Usr: 2, Grp: 0, SP: 0) False /subscriptions/3b2fdc69-67a4-42f2-a43e-b7fbad489b03/resourcegroups/mibelle-pps-fabric-prod-rg/providers/microsoft.authorization/roleassignments/7a355ecd-0d09-4e01-a413-cdffcd25bcca none 11/27/2025 11:40:14 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
RG DNS Zone Contributor befefa01-2a29-4197-83a8-272ff33ce314 Builtin false Mibelle-DNSMigration-prod n/a da11eb0f-75f8-40f7-9b4e-0ed2cd8924bb SP APP INT direct False /subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourcegroups/mibelle-hub-net-dns-prod-rg/providers/microsoft.authorization/roleassignments/ad639b90-0c1c-4dd4-b702-8a28ee11052b none 11/24/2025 08:59:51 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Download CSV semicolon | comma
ResourceType Resource Count Created&Changed Created&Changed Subs Created Created Subs Changed Changed Subs
microsoft.azurearcdata/sqlserverinstances 32 32 1 32 1 32 1
microsoft.azurearcdata/sqlserverinstances/databases 239 239 1 239 1 239 1
microsoft.compute/virtualmachines/extensions 1 1 1 1 1 1 1
microsoft.hybridcompute/machines 86 86 1 86 1 86 1
microsoft.hybridcompute/machines/extensions 213 203 1 203 1 213 1
microsoft.insights/workbooks 1 1 1 1 1 1 1
microsoft.maintenance/maintenanceconfigurations 13 13 1 13 1 13 1
microsoft.network/applicationsecuritygroups 1 0 0 0 0 1 1
microsoft.network/dnszones 17 17 1 17 1 17 1
microsoft.network/networkinterfaces 1 0 0 0 0 1 1
microsoft.network/networksecuritygroups 1 0 0 0 0 1 1
microsoft.storage/storageaccounts 1 1 1 1 1 1 1
Download CSV semicolon | comma
Id Name Name Invalid chars DisplayName DisplayName Invalid chars
/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-aa [Deprecated]: Deploy Diagnostic Settings for Automation to Log Analytics workspace :
/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-aci [Deprecated]: Deploy Diagnostic Settings for Container Instances to Log Analytics workspace :
/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-acr [Deprecated]: Deploy Diagnostic Settings for Container Registry to Log Analytics workspace :
/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-analysisservice [Deprecated]: Deploy Diagnostic Settings for Analysis Services to Log Analytics workspace :
/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-apiforfhir [Deprecated]: Deploy Diagnostic Settings for Azure API for FHIR to Log Analytics workspace :
/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-apimgmt [Deprecated]: Deploy Diagnostic Settings for API Management to Log Analytics workspace :
/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-applicationgateway [Deprecated]: Deploy Diagnostic Settings for Application Gateway to Log Analytics workspace :
/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-avdscalingplans [Deprecated]: Deploy Diagnostic Settings for AVD Scaling Plans to Log Analytics workspace :
/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-bastion [Deprecated]: Deploy Diagnostic Settings for Azure Bastion to Log Analytics workspace :
/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-cdnendpoints [Deprecated]: Deploy Diagnostic Settings for CDN Endpoint to Log Analytics workspace :
/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-cognitiveservices [Deprecated]: Deploy Diagnostic Settings for Cognitive Services to Log Analytics workspace :
/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-cosmosdb [Deprecated]: Deploy Diagnostic Settings for Cosmos DB to Log Analytics workspace :
/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-databricks [Deprecated]: Deploy Diagnostic Settings for Databricks to Log Analytics workspace :
/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-dataexplorercluster [Deprecated]: Deploy Diagnostic Settings for Azure Data Explorer Cluster to Log Analytics workspace :
/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-datafactory [Deprecated]: Deploy Diagnostic Settings for Data Factory to Log Analytics workspace :
/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-dlanalytics [Deprecated]: Deploy Diagnostic Settings for Data Lake Analytics to Log Analytics workspace :
/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-eventgridsub [Deprecated]: Deploy Diagnostic Settings for Event Grid subscriptions to Log Analytics workspace :
/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-eventgridsystemtopic [Deprecated]: Deploy Diagnostic Settings for Event Grid System Topic to Log Analytics workspace :
/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-eventgridtopic [Deprecated]: Deploy Diagnostic Settings for Event Grid Topic to Log Analytics workspace :
/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-expressroute [Deprecated]: Deploy Diagnostic Settings for ExpressRoute to Log Analytics workspace :
/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-firewall [Deprecated]: Deploy Diagnostic Settings for Firewall to Log Analytics workspace :
/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-frontdoor [Deprecated]: Deploy Diagnostic Settings for Front Door to Log Analytics workspace :
/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-function [Deprecated]: Deploy Diagnostic Settings for Azure Function App to Log Analytics workspace :
/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-hdinsight [Deprecated]: Deploy Diagnostic Settings for HDInsight to Log Analytics workspace :
/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-iothub [Deprecated]: Deploy Diagnostic Settings for IoT Hub to Log Analytics workspace :
/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-loadbalancer [Deprecated]: Deploy Diagnostic Settings for Load Balancer to Log Analytics workspace :
/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-loganalytics [Deprecated]: Deploy Diagnostic Settings for Log Analytics to Log Analytics workspace :
/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-logicappsise [Deprecated]: Deploy Diagnostic Settings for Logic Apps integration service environment to Log Analytics workspace :
/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-mediaservice [Deprecated]: Deploy Diagnostic Settings for Azure Media Service to Log Analytics workspace :
/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-mlworkspace [Deprecated]: Deploy Diagnostic Settings for Machine Learning workspace to Log Analytics workspace :
/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-mysql [Deprecated]: Deploy Diagnostic Settings for Database for MySQL to Log Analytics workspace :
/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-networksecuritygroups [Deprecated]: Deploy Diagnostic Settings for Network Security Groups to Log Analytics workspace :
/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-nic [Deprecated]: Deploy Diagnostic Settings for Network Interfaces to Log Analytics workspace :
/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-postgresql [Deprecated]: Deploy Diagnostic Settings for Database for PostgreSQL to Log Analytics workspace :
/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-powerbiembedded [Deprecated]: Deploy Diagnostic Settings for Power BI Embedded to Log Analytics workspace :
/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-rediscache [Deprecated]: Deploy Diagnostic Settings for Redis Cache to Log Analytics workspace :
/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-relay [Deprecated]: Deploy Diagnostic Settings for Relay to Log Analytics workspace :
/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-signalr [Deprecated]: Deploy Diagnostic Settings for SignalR to Log Analytics workspace :
/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-sqlelasticpools [Deprecated]: Deploy Diagnostic Settings for SQL Elastic Pools to Log Analytics workspace :
/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-sqlmi [Deprecated]: Deploy Diagnostic Settings for SQL Managed Instances to Log Analytics workspace :
/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-timeseriesinsights [Deprecated]: Deploy Diagnostic Settings for Time Series Insights to Log Analytics workspace :
/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-trafficmanager [Deprecated]: Deploy Diagnostic Settings for Traffic Manager to Log Analytics workspace :
/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-virtualnetwork [Deprecated]: Deploy Diagnostic Settings for Virtual Network to Log Analytics workspace :
/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-vm [Deprecated]: Deploy Diagnostic Settings for Virtual Machines to Log Analytics workspace :
/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-vmss [Deprecated]: Deploy Diagnostic Settings for Virtual Machine Scale Sets to Log Analytics workspace :
/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-vnetgw [Deprecated]: Deploy Diagnostic Settings for VPN Gateway to Log Analytics workspace :
/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-vwans2svpngw [Deprecated]: Deploy Diagnostic Settings for VWAN S2S VPN Gateway to Log Analytics workspace :
/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-webserverfarm [Deprecated]: Deploy Diagnostic Settings for App Service Plan to Log Analytics workspace :
/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-website [Deprecated]: Deploy Diagnostic Settings for App Service to Log Analytics workspace :
/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-wvdappgroup [Deprecated]: Deploy Diagnostic Settings for AVD Application group to Log Analytics workspace :
/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-wvdhostpools [Deprecated]: Deploy Diagnostic Settings for AVD Host Pools to Log Analytics workspace :
/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-wvdworkspace [Deprecated]: Deploy Diagnostic Settings for AVD Workspace to Log Analytics workspace :
/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-mdfc-arc-sql-dcr-association [Deprecated]: Configure Arc-enabled SQL Servers with DCR Association to Microsoft Defender for SQL user-defined DCR :
/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-mdfc-arc-sql-defendersql-dcr [Deprecated]: Configure Arc-enabled SQL Servers to auto install Microsoft Defender for SQL and DCR with a user-defined LAW :
/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-mdfc-sql-ama [Deprecated]: Configure SQL Virtual Machines to automatically install Azure Monitor Agent :
/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-mdfc-sql-defendersql [Deprecated]: Configure SQL Virtual Machines to automatically install Microsoft Defender for SQL :
/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-mdfc-sql-defendersql-dcr [Deprecated]: Configure SQL Virtual Machines to auto install Microsoft Defender for SQL and DCR with a user-defined LAW :
/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-sql-vulnerabilityassessments [Deprecated]: Deploy SQL Database vulnerability Assessments :
/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-storage-sslenforcement Azure Storage deploy a specific min TLS version requirement and enforce SSL/HTTPS /
/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-userassignedmanagedidentity-vminsights [Deprecated]: Deploy User Assigned Managed Identity for VM Insights :
Download CSV semicolon | comma
Id Name Name Invalid chars DisplayName DisplayName Invalid chars
/providers/Microsoft.Management/managementGroups/mibelle-mg/providers/Microsoft.Authorization/policySetDefinitions/Deploy-Diagnostics-LogAnalytics [Deprecated]: Deploy Diagnostic Settings to Azure Services :
/providers/Microsoft.Management/managementGroups/mibelle-mg/providers/Microsoft.Authorization/policySetDefinitions/Deploy-MDFC-Config [Deprecated]: Deploy Microsoft Defender for Cloud configuration :
/providers/Microsoft.Management/managementGroups/mibelle-mg/providers/Microsoft.Authorization/policySetDefinitions/Deploy-MDFC-DefenderSQL-AMA [Deprecated]: Configure SQL VM and Arc-enabled SQL Servers to install Microsoft Defender for SQL and AMA with a user-defined LAW :
/providers/Microsoft.Management/managementGroups/mibelle-mg/providers/Microsoft.Authorization/policySetDefinitions/Deploy-Sql-Security [Deprecated]: Deploy SQL Database built-in SQL security configuration :
/providers/Microsoft.Management/managementGroups/mibelle-mg/providers/Microsoft.Authorization/policySetDefinitions/Enforce-Encryption-CMK [Deprecated]: Deny or Audit resources without Encryption with a customer-managed key (CMK) :
/providers/Microsoft.Management/managementGroups/mibelle-mg/providers/Microsoft.Authorization/policySetDefinitions/Enforce-EncryptTransit [Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit :
/providers/Microsoft.Management/managementGroups/mibelle-mg/providers/Microsoft.Authorization/policySetDefinitions/Enforce-EncryptTransit_20240509 [Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit :
Download CSV semicolon | comma
Id Name Name Invalid chars DisplayName DisplayName Invalid chars
/providers/Microsoft.Management/managementGroups/mibelle-landingzones-corp-mg/providers/Microsoft.Authorization/policyAssignments/Deny-HybridNetworking Deny the deployment of vWAN/ER/VPN gateway resources /

Management Group 0 Naming findings

Subscription 0 Naming findings

Download CSV semicolon | comma
Id Name Name Invalid chars
bb55c7d4-a9b2-5074-bbee-97b09074605c [mibelle-mg] Application owners (DevOps/AppOps) /

DefinitionInsights

DefinitionInsights has been saved to dedicated HTML file 'c:\AzGovViz-Output\AzGovViz_6.7.2_20251128_140856_mibelle-mg_DefinitionInsights.html' (parameter -NoDefinitionInsightsDedicatedHTML = False)
Open DefinitionInsights

ScopeInsights

Highlight Management Group in HierarchyMap

Management Group Name: mibelle

Management Group Id: mibelle-mg

Management Group Path: a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg

9 ManagementGroups below this scope
5 Subscriptions below this scope
Microsoft Defender for Cloud Secure Score: 55.55 Video , Blog , learn
   Download CSV semicolon | comma
Diagnostic setting Target Target Id Administrative Policy
toLa LA /subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 true true
No Consumption data available as switch parameter -DoAzureConsumption was not applied
   Download CSV semicolon | comma
ResourceType Location Count
microsoft.app/containerapps westeurope 1
microsoft.app/managedenvironments westeurope 1
microsoft.automation/automationaccounts westeurope 1
microsoft.automation/automationaccounts/runbooks westeurope 1
microsoft.azurearcdata/sqlserverinstances westeurope 40
microsoft.azurearcdata/sqlserverinstances/databases westeurope 296
microsoft.compute/availabilitysets westeurope 2
microsoft.compute/disks westeurope 10
microsoft.compute/sshpublickeys westeurope 10
microsoft.compute/virtualmachines westeurope 7
microsoft.compute/virtualmachines/extensions westeurope 6
microsoft.connectedvmwarevsphere/vcenters westeurope 1
microsoft.containerregistry/registries westeurope 1
microsoft.devtestlab/schedules westeurope 1
microsoft.extendedlocation/customlocations westeurope 1
microsoft.fabric/capacities westeurope 1
microsoft.hybridcompute/machines westeurope 116
microsoft.hybridcompute/machines/extensions westeurope 266
microsoft.hybridcompute/privatelinkscopes westeurope 1
microsoft.insights/actiongroups germanywestcentral 1
microsoft.insights/actiongroups global 2
microsoft.insights/components switzerlandnorth 1
microsoft.insights/components westeurope 4
microsoft.insights/datacollectionendpoints westeurope 1
microsoft.insights/datacollectionrules westeurope 4
microsoft.insights/scheduledqueryrules westeurope 1
microsoft.insights/workbooks westeurope 1
microsoft.keyvault/vaults westeurope 5
microsoft.logic/workflows westeurope 2
microsoft.maintenance/maintenanceconfigurations switzerlandnorth 7
microsoft.maintenance/maintenanceconfigurations westeurope 14
microsoft.managedidentity/userassignedidentities westeurope 1
microsoft.network/applicationsecuritygroups westeurope 2
microsoft.network/bastionhosts westeurope 1
microsoft.network/dnszones global 19
microsoft.network/loadbalancers westeurope 1
microsoft.network/networkinterfaces westeurope 17
microsoft.network/networksecuritygroups westeurope 3
microsoft.network/networkwatchers northeurope 1
microsoft.network/networkwatchers westeurope 4
microsoft.network/networkwatchers/flowlogs westeurope 2
microsoft.network/privateendpoints westeurope 1
microsoft.network/publicipaddresses westeurope 4
microsoft.network/routetables westeurope 2
microsoft.network/virtualhubs westeurope 1
microsoft.network/virtualnetworks westeurope 3
microsoft.operationalinsights/querypacks westeurope 1
microsoft.operationalinsights/workspaces switzerlandnorth 1
microsoft.operationalinsights/workspaces westeurope 5
microsoft.powerbidedicated/capacities westeurope 1
microsoft.resourceconnector/appliances westeurope 1
microsoft.saas/resources global 1
microsoft.storage/storageaccounts northeurope 1
microsoft.storage/storageaccounts westeurope 15
microsoft.visualstudio/account northeurope 1
microsoft.web/certificates westeurope 2
microsoft.web/connectiongateways westeurope 1
microsoft.web/connections westeurope 7
microsoft.web/serverfarms westeurope 6
microsoft.web/sites westeurope 7
   Download CSV semicolon | comma
ResourceType Resource Count Diagnostics capable Metrics Logs LogCategories
microsoft.app/containerapps 1 True True False
microsoft.app/managedenvironments 1 True True True ContainerAppConsoleLogs, ContainerAppSystemLogs, AppEnvSpringAppConsoleLogs, AppEnvSessionConsoleLogs, AppEnvSessionPoolEventLogs, AppEnvSessionLifeCycleLogs
microsoft.automation/automationaccounts 1 True True True JobLogs, JobStreams, DscNodeStatus, AuditEvent
microsoft.automation/automationaccounts/runbooks 1 False False False
microsoft.azurearcdata/sqlserverinstances 40 False False False
microsoft.azurearcdata/sqlserverinstances/databases 296 False False False
microsoft.compute/availabilitysets 2 False False False
microsoft.compute/disks 10 True True False
microsoft.compute/sshpublickeys 10 False False False
microsoft.compute/virtualmachines 7 True True False
microsoft.compute/virtualmachines/extensions 6 False False False
microsoft.connectedvmwarevsphere/vcenters 1 False False False
microsoft.containerregistry/registries 1 True True True ContainerRegistryRepositoryEvents, ContainerRegistryLoginEvents
microsoft.devtestlab/schedules 1 False False False
microsoft.extendedlocation/customlocations 1 False False False
microsoft.fabric/capacities 1 False False False
microsoft.hybridcompute/machines 116 False False False
microsoft.hybridcompute/machines/extensions 266 False False False
microsoft.hybridcompute/privatelinkscopes 1 False False False
microsoft.insights/actiongroups 3 False False False
microsoft.insights/components 5 True True True AppAvailabilityResults, AppBrowserTimings, AppEvents, AppMetrics, AppDependencies, AppExceptions, AppPageViews, AppPerformanceCounters, AppRequests, AppSystemEvents, AppTraces, OTelResources
microsoft.insights/datacollectionendpoints 1 False False False
microsoft.insights/datacollectionrules 4 True True True LogErrors
microsoft.insights/scheduledqueryrules 1 False False False
microsoft.insights/workbooks 1 False False False
microsoft.keyvault/vaults 5 True True True AuditEvent, AzurePolicyEvaluationDetails
microsoft.logic/workflows 2 True True True WorkflowRuntime
microsoft.maintenance/maintenanceconfigurations 21 False False False
microsoft.managedidentity/userassignedidentities 1 False False False
microsoft.network/applicationsecuritygroups 2 False False False
microsoft.network/bastionhosts 1 True True True BastionAuditLogs
microsoft.network/dnszones 19 True True False
microsoft.network/loadbalancers 1 True True True LoadBalancerHealthEvent
microsoft.network/networkinterfaces 17 True True False
microsoft.network/networksecuritygroups 3 True False True NetworkSecurityGroupEvent, NetworkSecurityGroupRuleCounter
microsoft.network/networkwatchers 5 False False False
microsoft.network/networkwatchers/flowlogs 2 False False False
microsoft.network/privateendpoints 1 True True False
microsoft.network/publicipaddresses 4 True True True DDoSProtectionNotifications, DDoSMitigationFlowLogs, DDoSMitigationReports
microsoft.network/routetables 2 False False False
microsoft.network/virtualhubs 1 True True False
microsoft.network/virtualnetworks 3 True True True VMProtectionAlerts
microsoft.operationalinsights/querypacks 1 False False False
microsoft.operationalinsights/workspaces 6 True True True Audit, SummaryLogs, Jobs
microsoft.powerbidedicated/capacities 1 True True True Engine
microsoft.resourceconnector/appliances 1 False False False
microsoft.saas/resources 1 False False False
microsoft.storage/storageaccounts 16 True True False
microsoft.visualstudio/account 1 False False False
microsoft.web/certificates 2 False
microsoft.web/connectiongateways 1 False False False
microsoft.web/connections 7 True True False
microsoft.web/serverfarms 6 True True False
microsoft.web/sites 7 True True True AppServiceHTTPLogs, AppServiceConsoleLogs, AppServiceAppLogs, AppServiceAuditLogs, AppServiceIPSecAuditLogs, AppServicePlatformLogs, AppServiceAuthenticationLogs
PSRule for Azure - integration paused - PSRule for Azure
   Download CSV semicolon | comma
  *Depending on the number of rows and your computer´s performance the table may respond with delay, download the csv for better filtering experience
Inheritance ScopeExcluded Exemption applies Policy DisplayName PolicyId Type Category ALZ Effect Parameters Enforcement NonCompliance Message Policies NonCmplnt Policies Compliant Resources NonCmplnt Resources Compliant Resources Conflicting Role/Assignment Managed Identity Assignment DisplayName AssignmentId AssignedBy CreatedOn CreatedBy UpdatedOn UpdatedBy
thisScope Mg false false Audit resource location matches resource group location /providers/microsoft.authorization/policydefinitions/0a914e76-4921-4c19-b460-a2d36003525a BuiltIn General False audit Default 1 0 8 590 0 none Audit that the resource location matches its resource group location /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-location-match n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
thisScope Mg false false Not allowed resource types /providers/microsoft.authorization/policydefinitions/6c112d4e-5bc7-47ae-a041-ea2d9dccd749 BuiltIn General False Deny effect=Deny, listOfResourceTypesNotAllowed=Microsoft.ClassicCompute/capabilities; Microsoft.ClassicCompute/checkDomainNameAvailability; Microsoft.ClassicCompute/domainNames; Microsoft.ClassicCompute/domainNames/capabilities; Microsoft.ClassicCompute/domainNames/internalLoadBalancers; Microsoft.ClassicCompute/domainNames/serviceCertificates; Microsoft.ClassicCompute/domainNames/slots; Microsoft.ClassicCompute/domainNames/slots/roles; Microsoft.ClassicCompute/domainNames/slots/roles/metricDefinitions; Microsoft.ClassicCompute/domainNames/slots/roles/metrics; Microsoft.ClassicCompute/moveSubscriptionResources; Microsoft.ClassicCompute/operatingSystemFamilies; Microsoft.ClassicCompute/operatingSystems; Microsoft.ClassicCompute/operations; Microsoft.ClassicCompute/operationStatuses; Microsoft.ClassicCompute/quotas; Microsoft.ClassicCompute/resourceTypes; Microsoft.ClassicCompute/validateSubscriptionMoveAvailability; Microsoft.ClassicCompute/virtualMachines; Microsoft.ClassicCompute/virtualMachines/diagnosticSettings; Microsoft.ClassicCompute/virtualMachines/metricDefinitions; Microsoft.ClassicCompute/virtualMachines/metrics; Microsoft.ClassicInfrastructureMigrate/classicInfrastructureResources; Microsoft.ClassicNetwork/capabilities; Microsoft.ClassicNetwork/expressRouteCrossConnections; Microsoft.ClassicNetwork/expressRouteCrossConnections/peerings; Microsoft.ClassicNetwork/gatewaySupportedDevices; Microsoft.ClassicNetwork/networkSecurityGroups; Microsoft.ClassicNetwork/operations; Microsoft.ClassicNetwork/quotas; Microsoft.ClassicNetwork/reservedIps; Microsoft.ClassicNetwork/virtualNetworks; Microsoft.ClassicNetwork/virtualNetworks/remoteVirtualNetworkPeeringProxies; Microsoft.ClassicNetwork/virtualNetworks/virtualNetworkPeerings; Microsoft.ClassicStorage/capabilities; Microsoft.ClassicStorage/checkStorageAccountAvailability; Microsoft.ClassicStorage/disks; Microsoft.ClassicStorage/images; Microsoft.ClassicStorage/operations; Microsoft.ClassicStorage/osImages; Microsoft.ClassicStorage/osPlatformImages; Microsoft.ClassicStorage/publicImages; Microsoft.ClassicStorage/quotas; Microsoft.ClassicStorage/storageAccounts; Microsoft.ClassicStorage/storageAccounts/blobServices; Microsoft.ClassicStorage/storageAccounts/fileServices; Microsoft.ClassicStorage/storageAccounts/metricDefinitions; Microsoft.ClassicStorage/storageAccounts/metrics; Microsoft.ClassicStorage/storageAccounts/queueServices; Microsoft.ClassicStorage/storageAccounts/services; Microsoft.ClassicStorage/storageAccounts/services/diagnosticSettings; Microsoft.ClassicStorage/storageAccounts/services/metricDefinitions; Microsoft.ClassicStorage/storageAccounts/services/metrics; Microsoft.ClassicStorage/storageAccounts/tableServices; Microsoft.ClassicStorage/storageAccounts/vmImages; Microsoft.ClassicStorage/vmImages; Microsoft.ClassicSubscription/operations Default 0 0 0 0 0 none Deny the deployment of classic resources /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deny-classic-resources n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
thisScope Mg false false Audit VMs that do not use managed disks /providers/microsoft.authorization/policydefinitions/06a78e20-9358-41c9-923c-fb736d382a4d BuiltIn Compute False audit Default 0 1 0 7 0 none Deny virtual machines and virtual machine scale sets that do not use managed disk /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deny-unmanageddisk n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
thisScope Mg false false Configure Azure Activity logs to stream to specified Log Analytics workspace /providers/microsoft.authorization/policydefinitions/2465583e-4e78-4c15-b6be-a36cbc7c8b0f BuiltIn Monitoring False DeployIfNotExists effect=DeployIfNotExists, logAnalytics=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 1 0 4 1 0 Monitoring Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/dcb59c88-f014-5e17-840c-6c9aecc66286), Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/82f0c3bf-808b-5863-bf9c-231cfbf9598a) Deploy-AzActivity-Log (SPObjId: 217aa040-8eb0-451b-b81c-0b8f3d200d5a) Deploy Diagnostic Settings for Activity Log to Log Analytics workspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
   Download CSV semicolon | comma
Inheritance ScopeExcluded PolicySet DisplayName PolicySetId Type Category ALZ Parameters Enforcement NonCompliance Message Policies NonCmplnt Policies Compliant Resources NonCmplnt Resources Compliant Resources Conflicting Role/Assignment Managed Identity Assignment DisplayName AssignmentId AssignedBy CreatedOn CreatedBy UpdatedOn UpdatedBy
thisScope Mg false Audit virtual machines for Trusted Launch support /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/audit-trustedlaunch Custom Trusted Launch true Default 2 0 10 7 0 none Audit virtual machines for Trusted Launch support /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-trustedlaunch n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
thisScope Mg false Unused resources driving cost should be avoided /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/audit-unusedresourcescostoptimization Custom Cost Optimization true EffectDisks=Audit, EffectPublicIpAddresses=Audit, EffectServerFarms=Audit Default 1 3 1 26 0 none Unused resources driving cost should be avoided /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-unusedresources n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
thisScope Mg false Microsoft cloud security benchmark /providers/microsoft.authorization/policysetdefinitions/1f3afdf9-d0c9-4c3d-847f-89da613e70a8 BuiltIn Security Center False Default 55 25 186 46 0 none Enable Monitoring in Microsoft Defender for Cloud /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-asc-monitoring n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
thisScope Mg false Enable audit category group resource logging for supported resources to Log Analytics /providers/microsoft.authorization/policysetdefinitions/f5b29bc4-feca-4cc6-a58a-772dd5e290a5 BuiltIn Monitoring False logAnalytics=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 1 6 1 18 0 Monitoring Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b922046a-7a3e-59da-a982-8a5b855791ce), Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/9df772a7-1ce7-5439-ab6b-5d31d69925cc) Deploy-Diag-Logs (SPObjId: 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57) Enable allLogs category group resource logging for supported resources to Log Analytics /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
thisScope Mg false Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud /providers/microsoft.authorization/policysetdefinitions/77b391e3-2d5d-40c3-83bf-65c846b3c6a3 BuiltIn Security Center False Default 0 3 0 5 0 Security Admin (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/d730d560-adce-52b7-b10c-36a8ad16a6d3) Deploy-MDEndpointsAMA (SPObjId: 7d365a6d-a7ae-4921-beca-5ce854a76960) Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-mdendpointsama n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
thisScope Mg false Enforce Azure Compute Security Benchmark compliance auditing /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-acsb Custom Guest Configuration true Default 3 2 121 0 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/6e26cd22-b41b-5611-aafc-e2c56b14c060) Enforce-ACSB (SPObjId: e1f2e80c-5329-4804-824d-f0b44713985e) Enforce Azure Compute Security Baseline compliance auditing /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/enforce-acsb n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Policy Assignment Limit: 10/200
   Download CSV semicolon | comma
Policy DisplayName PolicyId Category ALZ Policy effect Role definitions Unique assignments Used in PolicySets
[Deprecated] Azure Machine Learning should have disabled public network access /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-machinelearning-publicnetworkaccess Machine Learning true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 0
[Deprecated] Deny the creation of public IP /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-publicip Network true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 0
[Deprecated] Deploy SQL Database Transparent Data Encryption /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-sql-tde SQL true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled SQL Security Manager 0 0
[Deprecated] Deploys NSG flow logs and traffic analytics /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-nsg-flowlogs Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 0
[Deprecated] Deploys NSG flow logs and traffic analytics to Log Analytics /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-nsg-flowlogs-to-la Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Storage Account Contributor, Network Contributor, Storage Account Key Operator Service Role, Log Analytics Contributor, Contributor 0 0
[Deprecated] Diagnostic Settings for MariaDB to Log Analytics Workspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-mariadb Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics))
[Deprecated] Public network access should be disabled for MariaDB /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-publicendpoint-mariadb SQL true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 0
[Deprecated] RDP access from the Internet should be blocked /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-rdp-from-internet Network true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 0
[Deprecated] Storage Account set to minimum TLS and Secure transfer should be enabled /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-storage-mintls Storage true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 1 ([Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit))
[Deprecated]: Configure Arc-enabled SQL Servers to auto install Microsoft Defender for SQL and DCR with a user-defined LAW /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-mdfc-arc-sql-defendersql-dcr Security Center true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Contributor 0 1 ([Deprecated]: Configure SQL VM and Arc-enabled SQL Servers to install Microsoft Defender for SQL and AMA with a user-defined LAW (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-mdfc-defendersql-ama))
[Deprecated]: Configure Arc-enabled SQL Servers with DCR Association to Microsoft Defender for SQL user-defined DCR /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-mdfc-arc-sql-dcr-association Security Center true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Configure SQL VM and Arc-enabled SQL Servers to install Microsoft Defender for SQL and AMA with a user-defined LAW (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-mdfc-defendersql-ama))
[Deprecated]: Configure SQL Virtual Machines to auto install Microsoft Defender for SQL and DCR with a user-defined LAW /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-mdfc-sql-defendersql-dcr Security Center true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Contributor 0 1 ([Deprecated]: Configure SQL VM and Arc-enabled SQL Servers to install Microsoft Defender for SQL and AMA with a user-defined LAW (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-mdfc-defendersql-ama))
[Deprecated]: Configure SQL Virtual Machines to automatically install Azure Monitor Agent /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-mdfc-sql-ama Security Center true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Virtual Machine Contributor 0 1 ([Deprecated]: Configure SQL VM and Arc-enabled SQL Servers to install Microsoft Defender for SQL and AMA with a user-defined LAW (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-mdfc-defendersql-ama))
[Deprecated]: Configure SQL Virtual Machines to automatically install Microsoft Defender for SQL /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-mdfc-sql-defendersql Security Center true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Configure SQL VM and Arc-enabled SQL Servers to install Microsoft Defender for SQL and AMA with a user-defined LAW (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-mdfc-defendersql-ama))
[Deprecated]: Deploy Diagnostic Settings for Analysis Services to Log Analytics workspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-analysisservice Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics))
[Deprecated]: Deploy Diagnostic Settings for API Management to Log Analytics workspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-apimgmt Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics))
[Deprecated]: Deploy Diagnostic Settings for App Service Plan to Log Analytics workspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-webserverfarm Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics))
[Deprecated]: Deploy Diagnostic Settings for App Service to Log Analytics workspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-website Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics))
[Deprecated]: Deploy Diagnostic Settings for Application Gateway to Log Analytics workspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-applicationgateway Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics))
[Deprecated]: Deploy Diagnostic Settings for Automation to Log Analytics workspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-aa Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics))
[Deprecated]: Deploy Diagnostic Settings for AVD Application group to Log Analytics workspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-wvdappgroup Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics))
[Deprecated]: Deploy Diagnostic Settings for AVD Host Pools to Log Analytics workspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-wvdhostpools Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics))
[Deprecated]: Deploy Diagnostic Settings for AVD Scaling Plans to Log Analytics workspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-avdscalingplans Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics))
[Deprecated]: Deploy Diagnostic Settings for AVD Workspace to Log Analytics workspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-wvdworkspace Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics))
[Deprecated]: Deploy Diagnostic Settings for Azure API for FHIR to Log Analytics workspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-apiforfhir Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics))
[Deprecated]: Deploy Diagnostic Settings for Azure Bastion to Log Analytics workspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-bastion Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics))
[Deprecated]: Deploy Diagnostic Settings for Azure Data Explorer Cluster to Log Analytics workspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-dataexplorercluster Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics))
[Deprecated]: Deploy Diagnostic Settings for Azure Function App to Log Analytics workspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-function Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics))
[Deprecated]: Deploy Diagnostic Settings for Azure Media Service to Log Analytics workspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-mediaservice Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics))
[Deprecated]: Deploy Diagnostic Settings for CDN Endpoint to Log Analytics workspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-cdnendpoints Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics))
[Deprecated]: Deploy Diagnostic Settings for Cognitive Services to Log Analytics workspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-cognitiveservices Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics))
[Deprecated]: Deploy Diagnostic Settings for Container Instances to Log Analytics workspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-aci Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics))
[Deprecated]: Deploy Diagnostic Settings for Container Registry to Log Analytics workspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-acr Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics))
[Deprecated]: Deploy Diagnostic Settings for Cosmos DB to Log Analytics workspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-cosmosdb Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics))
[Deprecated]: Deploy Diagnostic Settings for Data Factory to Log Analytics workspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-datafactory Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics))
[Deprecated]: Deploy Diagnostic Settings for Data Lake Analytics to Log Analytics workspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-dlanalytics Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics))
[Deprecated]: Deploy Diagnostic Settings for Database for MySQL to Log Analytics workspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-mysql Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics))
[Deprecated]: Deploy Diagnostic Settings for Database for PostgreSQL to Log Analytics workspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-postgresql Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics))
[Deprecated]: Deploy Diagnostic Settings for Databricks to Log Analytics workspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-databricks Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics))
[Deprecated]: Deploy Diagnostic Settings for Event Grid subscriptions to Log Analytics workspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-eventgridsub Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics))
[Deprecated]: Deploy Diagnostic Settings for Event Grid System Topic to Log Analytics workspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-eventgridsystemtopic Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics))
[Deprecated]: Deploy Diagnostic Settings for Event Grid Topic to Log Analytics workspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-eventgridtopic Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics))
[Deprecated]: Deploy Diagnostic Settings for ExpressRoute to Log Analytics workspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-expressroute Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics))
[Deprecated]: Deploy Diagnostic Settings for Firewall to Log Analytics workspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-firewall Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics))
[Deprecated]: Deploy Diagnostic Settings for Front Door to Log Analytics workspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-frontdoor Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics))
[Deprecated]: Deploy Diagnostic Settings for HDInsight to Log Analytics workspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-hdinsight Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics))
[Deprecated]: Deploy Diagnostic Settings for IoT Hub to Log Analytics workspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-iothub Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics))
[Deprecated]: Deploy Diagnostic Settings for Load Balancer to Log Analytics workspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-loadbalancer Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics))
[Deprecated]: Deploy Diagnostic Settings for Log Analytics to Log Analytics workspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-loganalytics Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics))
[Deprecated]: Deploy Diagnostic Settings for Logic Apps integration service environment to Log Analytics workspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-logicappsise Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics))
[Deprecated]: Deploy Diagnostic Settings for Machine Learning workspace to Log Analytics workspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-mlworkspace Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics))
[Deprecated]: Deploy Diagnostic Settings for Network Interfaces to Log Analytics workspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-nic Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics))
[Deprecated]: Deploy Diagnostic Settings for Network Security Groups to Log Analytics workspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-networksecuritygroups Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics))
[Deprecated]: Deploy Diagnostic Settings for Power BI Embedded to Log Analytics workspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-powerbiembedded Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics))
[Deprecated]: Deploy Diagnostic Settings for Redis Cache to Log Analytics workspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-rediscache Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics))
[Deprecated]: Deploy Diagnostic Settings for Relay to Log Analytics workspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-relay Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics))
[Deprecated]: Deploy Diagnostic Settings for SignalR to Log Analytics workspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-signalr Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics))
[Deprecated]: Deploy Diagnostic Settings for SQL Elastic Pools to Log Analytics workspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-sqlelasticpools Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics))
[Deprecated]: Deploy Diagnostic Settings for SQL Managed Instances to Log Analytics workspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-sqlmi Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics))
[Deprecated]: Deploy Diagnostic Settings for Time Series Insights to Log Analytics workspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-timeseriesinsights Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics))
[Deprecated]: Deploy Diagnostic Settings for Traffic Manager to Log Analytics workspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-trafficmanager Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics))
[Deprecated]: Deploy Diagnostic Settings for Virtual Machine Scale Sets to Log Analytics workspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-vmss Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics))
[Deprecated]: Deploy Diagnostic Settings for Virtual Machines to Log Analytics workspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-vm Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics))
[Deprecated]: Deploy Diagnostic Settings for Virtual Network to Log Analytics workspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-virtualnetwork Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics))
[Deprecated]: Deploy Diagnostic Settings for VPN Gateway to Log Analytics workspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-vnetgw Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics))
[Deprecated]: Deploy Diagnostic Settings for VWAN S2S VPN Gateway to Log Analytics workspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-vwans2svpngw Monitoring true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Monitoring Contributor, Log Analytics Contributor 0 1 ([Deprecated]: Deploy Diagnostic Settings to Azure Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics))
[Deprecated]: Deploy SQL Database vulnerability Assessments /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-sql-vulnerabilityassessments SQL true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled SQL Security Manager, Storage Account Contributor, Monitoring Contributor 0 1 ([Deprecated]: Deploy SQL Database built-in SQL security configuration (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-sql-security))
[Deprecated]: Deploy User Assigned Managed Identity for VM Insights /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-userassignedmanagedidentity-vminsights Managed Identity true Default: DeployIfNotExists; Allowed: AuditIfNotExists,DeployIfNotExists,Disabled Contributor 0 0
Allowed Copy scope should be restricted for Storage Accounts /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-storage-copyscope Storage true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 1 (Enforce recommended guardrails for Storage Account (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-storage))
API App should only be accessible over HTTPS /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-appserviceapiapp-http App Service true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 3 ([Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20240509), [Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit), Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20241211))
API Management services should use TLS version 1.2 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-apim-tls API Management true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 1 (Enforce recommended guardrails for API Management (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-apim))
App Service certificates must be stored in Key Vault /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-appservice-without-byoc App Service true Default: Audit; Allowed: Audit,Deny,Disabled n/a 0 1 (Enforce recommended guardrails for App Service (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-appservices))
Application Gateway should be deployed with predefined Microsoft policy that is using TLS version 1.2 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-appgw-without-tls Network true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 1 (Enforce recommended guardrails for Network and Networking services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-network))
Application Gateway should be deployed with WAF enabled /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-appgw-without-waf Network true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 0
AppService append enable https only setting to enforce https setting. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/append-appservice-httpsonly App Service true Default: Append; Allowed: Append,Disabled n/a 0 3 ([Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20240509), [Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit), Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20241211))
AppService append sites with minimum TLS version to enforce. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/append-appservice-latesttls App Service true Default: Append; Allowed: Append,Disabled n/a 0 3 ([Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20240509), [Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit), Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20241211))
Audit AHUB for eligible VMs /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/audit-azurehybridbenefit Cost Optimization true Default: Audit; Allowed: Audit,Disabled n/a 0 1 (Unused resources driving cost should be avoided (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/audit-unusedresourcescostoptimization))
Audit for mandatory tags on resource groups /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/audit-tags-mandatory-rg Tags true Default: Audit; Allowed: Audit,Deny,Disabled n/a 0 0
Audit for mandatory tags on resources /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/audit-tags-mandatory Tags true Default: Audit; Allowed: Audit,Deny,Disabled n/a 0 0
Audit or Deny the creation of Private Link Private DNS Zones /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/audit-privatelinkdnszones Network true Default: Audit; Allowed: Audit,Deny,Disabled n/a 0 0
Azure Cache for Redis Append a specific min TLS version requirement and enforce TLS. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/append-redis-sslenforcement Cache true Default: Append; Allowed: Append,Disabled n/a 0 3 ([Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20240509), [Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit), Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20241211))
Azure Cache for Redis Append and the enforcement that enableNonSslPort is disabled. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/append-redis-disablenonsslport Cache true Default: Append; Allowed: Append,Disabled n/a 0 3 ([Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20240509), [Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit), Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20241211))
Azure Cache for Redis only secure connections should be enabled /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-redis-http Cache true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 3 ([Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20240509), [Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit), Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20241211))
Azure Database for MySQL server deploy a specific min TLS version and enforce SSL. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-mysql-sslenforcement SQL true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Contributor 0 3 ([Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20240509), [Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit), Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20241211))
Azure Database for PostgreSQL server deploy a specific min TLS version requirement and enforce SSL /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-postgresql-sslenforcement SQL true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Contributor 0 3 ([Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20240509), [Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit), Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20241211))
Azure Firewall should have a default Firewall Policy /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-azfw-without-policy Network true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 0
Azure SQL Database should have the minimal TLS version set to the highest version /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-sql-mintls SQL true Default: Audit; Allowed: Audit,Deny,Disabled n/a 0 3 ([Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20240509), [Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit), Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20241211))
Azure Storage deploy a specific min TLS version requirement and enforce SSL/HTTPS /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-storage-sslenforcement Storage true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Storage Account Contributor 0 3 ([Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20240509), [Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit), Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20241211))
Configure Logic apps to use the latest TLS version /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-logicapp-tls Logic Apps true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Website Contributor 0 2 ([Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20240509), Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20241211))
Control private endpoint connections to Azure Machine Learning /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/audit-machinelearning-privateendpointid Machine Learning true Default: Audit; Allowed: Audit,Deny,Disabled n/a 0 0
Deny AKS cluster creation in Azure Machine Learning /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-machinelearning-aks Machine Learning true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 0
Deny Databricks workspaces without Vnet injection /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-databricks-virtualnetwork Databricks true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 0
Deny non-premium Databricks sku /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-databricks-sku Databricks true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 0
Deny or Audit service endpoints on subnets /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-service-endpoints Network true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 1 (Enforce recommended guardrails for Network and Networking services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-network))
Deny public access behind vnet to Azure Machine Learning workspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-machinelearning-publicaccesswhenbehindvnet Machine Learning true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 0
Deny public access of Azure Machine Learning clusters via SSH /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-machinelearning-computecluster-remoteloginportpublicaccess Machine Learning true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 0
Deny public IPs for Databricks cluster /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-databricks-nopublicip Databricks true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 0
Deny the creation of private DNS /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-private-dns-zones Network true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 0
Deny vNet peering /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-vnet-peering Network true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 0
Deny vNet peering cross subscription. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-vnet-peer-cross-sub Network true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 1 (Enforce policies in the Sandbox Landing Zone (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-alz-sandbox))
Deny vNet peering to non-approved vNets /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-vnet-peering-to-non-approved-vnets Network true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 0
DenyAction implementation on Activity Logs /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/denyaction-activitylogs Monitoring true Fixed: denyAction n/a 0 1 (DenyAction Delete - Activity Log Settings and Diagnostic Settings (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/denyaction-deleteprotection))
DenyAction implementation on Diagnostic Logs. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/denyaction-diagnosticlogs Monitoring true Fixed: denyAction n/a 0 1 (DenyAction Delete - Activity Log Settings and Diagnostic Settings (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/denyaction-deleteprotection))
Deploy a default budget on all subscriptions under the assigned scope /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-budget Budget true Default: DeployIfNotExists; Allowed: AuditIfNotExists,DeployIfNotExists,Disabled Contributor 0 0
Deploy a route table with specific user defined routes /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-custom-route-table Network true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Network Contributor 0 0
Deploy an Azure DDoS Network Protection /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-ddosprotection Network true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Network Contributor 0 0
Deploy Azure Firewall Manager policy in the subscription /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-firewallpolicy Network true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Contributor 0 0
Deploy Microsoft Defender for Cloud Security Contacts /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-asc-securitycontacts Security Center true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Security Admin 0 2 ([Deprecated]: Deploy Microsoft Defender for Cloud configuration (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-mdfc-config), Deploy Microsoft Defender for Cloud configuration (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-mdfc-config_20240319))
Deploy SQL database auditing settings /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-sql-auditingsettings SQL true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled SQL Security Manager 0 2 ([Deprecated]: Deploy SQL Database built-in SQL security configuration (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-sql-security), Deploy SQL Database built-in SQL security configuration (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-sql-security_20240529))
Deploy SQL Database security Alert Policies configuration with email admin accounts /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-sql-securityalertpolicies SQL true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled SQL Security Manager 0 2 ([Deprecated]: Deploy SQL Database built-in SQL security configuration (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-sql-security), Deploy SQL Database built-in SQL security configuration (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-sql-security_20240529))
Deploy SQL Database Vulnerability Assessments /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-sql-vulnerabilityassessments_20230706 SQL true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled SQL Security Manager, Storage Account Contributor, Monitoring Contributor 0 1 (Deploy SQL Database built-in SQL security configuration (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-sql-security_20240529))
Deploy Virtual Machine Auto Shutdown Schedule /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-vm-autoshutdown Compute true Fixed: deployIfNotExists Virtual Machine Contributor 0 1 (Enforce policies in the Decommissioned Landing Zone (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-alz-decomm))
Deploy Virtual Network with peering to the hub /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-vnet-hubspoke Network true Fixed: deployIfNotExists Contributor 0 0
Deploy Windows Domain Join Extension with keyvault configuration /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-windows-domainjoin Guest Configuration true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Virtual Machine Contributor 0 0
Deploy-Private-DNS-Generic /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-private-dns-generic Networking true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled Network Contributor 0 0
Do not allow deletion of specified resource and resource type /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/denyaction-deleteresources General true Default: DenyAction; Allowed: DenyAction,Disabled n/a 1 (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/denyaction-deleteuamiama) 0
Encryption for storage services should be enforced for Storage Accounts /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-storage-servicesencryption Storage true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 1 (Enforce recommended guardrails for Storage Account (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-storage))
Enforce scale settings for Azure Machine Learning compute clusters /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-machinelearning-computecluster-scale Budget true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 0
Enforce specific configuration of Network Security Groups (NSG) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/modify-nsg Network true Default: Modify; Allowed: Disabled,Modify Network Contributor 0 1 (Enforce recommended guardrails for Network and Networking services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-network))
Enforce specific configuration of User-Defined Routes (UDR) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/modify-udr Network true Default: Modify; Allowed: Disabled,Modify Network Contributor 0 1 (Enforce recommended guardrails for Network and Networking services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-network))
Enforce subnet connectivity for Azure Machine Learning compute clusters and compute instances /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-machinelearning-compute-subnetid Machine Learning true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 0
Enforces high business impact Azure Machine Learning Workspaces /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-machinelearning-hbiworkspace Machine Learning true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 0
Event Hub namespaces (Premium) should use a customer-managed key for encryption /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-eh-premium-cmk Event Hub true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 2 ([Deprecated]: Deny or Audit resources without Encryption with a customer-managed key (CMK) (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encryption-cmk), Deny or Audit resources without Encryption with a customer-managed key (CMK) (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encryption-cmk_20250218))
Event Hub namespaces should use a valid TLS version /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-eh-mintls Event Hub true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 2 ([Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20240509), Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20241211))
File Services with insecure authentication methods should be denied /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-fileservices-insecureauth Storage true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 0
File Services with insecure Kerberos ticket encryption should be denied /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-fileservices-insecurekerberos Storage true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 0
File Services with insecure SMB channel encryption should be denied /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-fileservices-insecuresmbchannel Storage true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 0
File Services with insecure SMB versions should be denied /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-fileservices-insecuresmbversions Storage true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 0
Function App should only be accessible over HTTPS /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-appservicefunctionapp-http App Service true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 3 ([Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20240509), [Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit), Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20241211))
KeyVault SoftDelete should be enabled /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/append-kv-softdelete Key Vault true Fixed: append n/a 0 0
Limit allowed vm sizes for Azure Machine Learning compute clusters and compute instances /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-machinelearning-compute-vmsize Budget true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 0
Local users should be restricted for Storage Accounts /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-storage-localuser Storage true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 1 (Enforce recommended guardrails for Storage Account (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-storage))
Logic app should only be accessible over HTTPS /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-logicapps-without-https Logic Apps true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 2 ([Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20240509), Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20241211))
Logic apps should disable public network access /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-logicapp-public-network Logic Apps true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 1 (Public network access should be disabled for PaaS services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deny-publicpaasendpoints))
Management port access from the Internet should be blocked /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-mgmtports-from-internet Network true Default: Deny; Allowed: Audit,Deny,Disabled n/a 2 (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deny-mgmtports-internet, /providers/microsoft.management/managementgroups/mibelle-platform-identity-mg/providers/microsoft.authorization/policyassignments/deny-mgmtports-internet) 1 (Enforce recommended guardrails for Network and Networking services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-network))
MySQL database servers enforce SSL connections. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-mysql-http SQL true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 3 ([Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20240509), [Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit), Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20241211))
Network ACL bypass option should be restricted for Storage Accounts /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-storage-networkaclsbypass Storage true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 1 (Enforce recommended guardrails for Storage Account (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-storage))
Network ACLs should be restricted for Cognitive Services /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-cognitiveservices-networkacls Cognitive Services true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 1 (Enforce recommended guardrails for Open AI (Cognitive Service) (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-openai))
No child resources in Automation Account /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-aa-child-resources Automation true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 0
Only explicit kinds for Cognitive Services should be allowed /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-cognitiveservices-resource-kinds Cognitive Services true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 0
Outbound network access should be restricted for Cognitive Services /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-cognitiveservices-restrictoutboundnetworkaccess Cognitive Services true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 1 (Enforce recommended guardrails for Open AI (Cognitive Service) (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-openai))
PostgreSQL database servers enforce SSL connection. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-postgresql-http SQL true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 3 ([Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20240509), [Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit), Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20241211))
Resource Access Rules resource IDs should be restricted for Storage Accounts /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-storage-resourceaccessrulesresourceid Storage true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 1 (Enforce recommended guardrails for Storage Account (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-storage))
Resource Access Rules Tenants should be restricted for Storage Accounts /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-storage-resourceaccessrulestenantid Storage true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 1 (Enforce recommended guardrails for Storage Account (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-storage))
SQL Managed Instance should have the minimal TLS version set to the highest version /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-sqlmi-mintls SQL true Default: Audit; Allowed: Audit,Deny,Disabled n/a 0 3 ([Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20240509), [Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit), Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20241211))
SQL managed instances deploy a specific min TLS version requirement. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-sqlmi-mintls SQL true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled SQL Managed Instance Contributor 0 3 ([Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20240509), [Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit), Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20241211))
SQL servers deploys a specific min TLS version requirement. /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-sql-mintls SQL true Default: DeployIfNotExists; Allowed: DeployIfNotExists,Disabled SQL Server Contributor 0 3 ([Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20240509), [Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit), Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20241211))
Storage Accounts should restrict CORS rules /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-storage-corsrules Storage true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 1 (Enforce recommended guardrails for Storage Account (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-storage))
Storage Accounts should use a container delete retention policy /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-storage-containerdeleteretentionpolicy Storage true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 1 (Enforce recommended guardrails for Storage Account (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-storage))
Storage Accounts with custom domains assigned should be denied /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-storageaccount-customdomain Storage true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 0
Storage Accounts with SFTP enabled should be denied /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-storage-sftp Storage true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 1 (Enforce recommended guardrails for Storage Account (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-storage))
Subnets should have a Network Security Group /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-subnet-without-nsg Network true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 1 (Enforce recommended guardrails for Network and Networking services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-network))
Subnets should have a User Defined Route /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-subnet-without-udr Network true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 1 (Enforce recommended guardrails for Network and Networking services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-network))
Subnets without Private Endpoint Network Policies enabled should be denied /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-subnet-without-penp Network true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 0
Unused App Service plans driving cost should be avoided /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/audit-serverfarms-unusedresourcescostoptimization Cost Optimization true Default: Audit; Allowed: Audit,Disabled n/a 0 1 (Unused resources driving cost should be avoided (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/audit-unusedresourcescostoptimization))
Unused Disks driving cost should be avoided /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/audit-disks-unusedresourcescostoptimization Cost Optimization true Default: Audit; Allowed: Audit,Disabled n/a 0 1 (Unused resources driving cost should be avoided (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/audit-unusedresourcescostoptimization))
Unused Public IP addresses driving cost should be avoided /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/audit-publicipaddresses-unusedresourcescostoptimization Cost Optimization true Default: Audit; Allowed: Audit,Disabled n/a 0 1 (Unused resources driving cost should be avoided (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/audit-unusedresourcescostoptimization))
User Defined Routes with 'Next Hop Type' set to 'Internet' or 'VirtualNetworkGateway' should be denied /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-udr-with-specific-nexthop Network true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 0
Virtual network rules should be restricted for Storage Accounts /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-storage-networkaclsvirtualnetworkrules Storage true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 1 (Enforce recommended guardrails for Storage Account (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-storage))
Web Application should only be accessible over HTTPS /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-appservicewebapp-http App Service true Default: Deny; Allowed: Audit,Deny,Disabled n/a 0 3 ([Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20240509), [Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit), Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20241211))
   Download CSV semicolon | comma
PolicySet DisplayName PolicySetId Category ALZ Unique assignments Policies Used
[Deprecated]: Configure SQL VM and Arc-enabled SQL Servers to install Microsoft Defender for SQL and AMA with a user-defined LAW /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-mdfc-defendersql-ama Security Center true 0 7 (Configure Arc-enabled SQL Servers to automatically install Azure Monitor Agent (/providers/microsoft.authorization/policydefinitions/3592ff98-9787-443a-af59-4505d0fe0786), Configure Arc-enabled SQL Servers to automatically install Microsoft Defender for SQL (/providers/microsoft.authorization/policydefinitions/65503269-6a54-4553-8a28-0065a8e6d929), [Deprecated]: Configure Arc-enabled SQL Servers to auto install Microsoft Defender for SQL and DCR with a user-defined LAW (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-mdfc-arc-sql-defendersql-dcr), [Deprecated]: Configure Arc-enabled SQL Servers with DCR Association to Microsoft Defender for SQL user-defined DCR (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-mdfc-arc-sql-dcr-association), [Deprecated]: Configure SQL Virtual Machines to auto install Microsoft Defender for SQL and DCR with a user-defined LAW (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-mdfc-sql-defendersql-dcr), [Deprecated]: Configure SQL Virtual Machines to automatically install Azure Monitor Agent (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-mdfc-sql-ama), [Deprecated]: Configure SQL Virtual Machines to automatically install Microsoft Defender for SQL (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-mdfc-sql-defendersql))
[Deprecated]: Deny or Audit resources without Encryption with a customer-managed key (CMK) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encryption-cmk Encryption true 0 30 (Azure API for FHIR should use a customer-managed key to encrypt data at rest (/providers/microsoft.authorization/policydefinitions/051cba44-2429-45b9-9649-46cec11c7119), [Deprecated]: Virtual machines should encrypt temp disks, caches, and data flows between Compute and Storage resources (/providers/microsoft.authorization/policydefinitions/0961003e-5a0a-4549-abde-af6a37f2724d), SQL servers should use customer-managed keys to encrypt data at rest (/providers/microsoft.authorization/policydefinitions/0a370ff3-6cab-4e85-8995-295fd854c5b8), Azure Container Instance container group should use customer-managed key for encryption (/providers/microsoft.authorization/policydefinitions/0aa61e00-0a01-4a3c-9945-e93cffedf0e6), PostgreSQL servers should use customer-managed keys to encrypt data at rest (/providers/microsoft.authorization/policydefinitions/18adea5e-f416-4d0f-8aa8-d24321e3e274), Azure Cosmos DB accounts should use customer-managed keys to encrypt data at rest (/providers/microsoft.authorization/policydefinitions/1f905d99-2ab7-462c-a6b0-f709acca6c8f), Service Bus Premium namespaces should use a customer-managed key for encryption (/providers/microsoft.authorization/policydefinitions/295fc8b1-dc9f-4f53-9c61-3f313ceab40a), [Preview]: Azure Recovery Services vaults should use customer-managed keys for encrypting backup data (/providers/microsoft.authorization/policydefinitions/2e94d99a-8a36-4563-bc77-810d8893b671), Azure data factories should be encrypted with a customer-managed key (/providers/microsoft.authorization/policydefinitions/4ec52d6d-beb7-40c4-9a9e-fe753254690e), Bot Service should be encrypted with a customer-managed key (/providers/microsoft.authorization/policydefinitions/51522a96-0869-4791-82f3-981000c2c67f), Azure Automation accounts should use customer-managed keys to encrypt data at rest (/providers/microsoft.authorization/policydefinitions/56a5ee18-2ae6-4810-86f7-18e39ce5629b), Container registries should be encrypted with a customer-managed key (/providers/microsoft.authorization/policydefinitions/5b9159ae-1701-4a6f-9a7a-aa9c8ddd0580), Azure AI Services resources should encrypt data at rest with a customer-managed key (CMK) (/providers/microsoft.authorization/policydefinitions/67121cc7-ff39-4ab8-b7e3-95b84dab487d), Storage accounts should use customer-managed key for encryption (/providers/microsoft.authorization/policydefinitions/6fac406b-40ca-413b-bf8e-0bf964659c25), OS and data disks should be encrypted with a customer-managed key (/providers/microsoft.authorization/policydefinitions/702dd420-7fcc-42c5-afe8-4026edd20fe0), Azure AI Search services should use customer-managed keys to encrypt data at rest (/providers/microsoft.authorization/policydefinitions/76a56461-9dc0-40f0-82f5-2453283afa2f), Table Storage should use customer-managed key for encryption (/providers/microsoft.authorization/policydefinitions/7c322315-e26d-4174-a99e-f49d351b4688), Both operating systems and data disks in Azure Kubernetes Service clusters should be encrypted by customer-managed keys (/providers/microsoft.authorization/policydefinitions/7d7be79c-23ba-4033-84dd-45e2a5ccdd67), Azure Data Explorer encryption at rest should use a customer-managed key (/providers/microsoft.authorization/policydefinitions/81e74cea-30fd-40d5-802f-d72103c2aaaa), MySQL servers should use customer-managed keys to encrypt data at rest (/providers/microsoft.authorization/policydefinitions/83cef61d-dbd1-4b20-a4fc-5fbc7da10833), Azure Data Box jobs should use a customer-managed key to encrypt the device unlock password (/providers/microsoft.authorization/policydefinitions/86efb160-8de7-451d-bc08-5d475b0aadae), Azure Stream Analytics jobs should use customer-managed keys to encrypt data (/providers/microsoft.authorization/policydefinitions/87ba29ef-1ab3-4d82-b763-87fcd4f531f7), Azure Batch account should use customer-managed keys to encrypt data (/providers/microsoft.authorization/policydefinitions/99e9ccd8-3db9-4592-b0d1-14b1715a4d8a), Event Hub namespaces should use a customer-managed key for encryption (/providers/microsoft.authorization/policydefinitions/a1ad735a-e96f-45d2-a7b2-9a4932cab7ec), SQL managed instances should use customer-managed keys to encrypt data at rest (/providers/microsoft.authorization/policydefinitions/ac01ad65-10e5-46df-bdd9-6b0cad13e1d2), Storage account encryption scopes should use customer-managed keys to encrypt data at rest (/providers/microsoft.authorization/policydefinitions/b5ec538c-daa0-4006-8596-35468b9148e8), Azure Machine Learning workspaces should be encrypted with a customer-managed key (/providers/microsoft.authorization/policydefinitions/ba769a63-b8cc-4b2d-abf6-ac33c7204be8), Queue Storage should use customer-managed key for encryption (/providers/microsoft.authorization/policydefinitions/f0e5abd0-2554-4736-b7c0-4ffef23475ef), Azure Synapse workspaces should use customer-managed keys to encrypt data at rest (/providers/microsoft.authorization/policydefinitions/f7d52b2d-e161-4dfa-a82b-55e564167385), Event Hub namespaces (Premium) should use a customer-managed key for encryption (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-eh-premium-cmk))
[Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit Encryption true 0 22 (Container Apps should only be accessible over HTTPS (/providers/microsoft.authorization/policydefinitions/0e80e269-43a4-4ae9-b5bc-178126b8a5cb), Kubernetes clusters should be accessible only over HTTPS (/providers/microsoft.authorization/policydefinitions/1a5b4dca-0b6f-4cf5-907c-56316bc1bf3d), App Service apps should use the latest TLS version (/providers/microsoft.authorization/policydefinitions/f0e6e85b-9b9f-4a4b-b67b-f730d42f1b0b), Function apps should use the latest TLS version (/providers/microsoft.authorization/policydefinitions/f9d614c5-c173-4d56-95a7-b4437057d193), [Deprecated] Storage Account set to minimum TLS and Secure transfer should be enabled (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-storage-mintls), API App should only be accessible over HTTPS (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-appserviceapiapp-http), AppService append enable https only setting to enforce https setting. (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/append-appservice-httpsonly), AppService append sites with minimum TLS version to enforce. (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/append-appservice-latesttls), Azure Cache for Redis Append a specific min TLS version requirement and enforce TLS. (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/append-redis-sslenforcement), Azure Cache for Redis Append and the enforcement that enableNonSslPort is disabled. (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/append-redis-disablenonsslport), Azure Cache for Redis only secure connections should be enabled (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-redis-http), Azure Database for MySQL server deploy a specific min TLS version and enforce SSL. (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-mysql-sslenforcement), Azure Database for PostgreSQL server deploy a specific min TLS version requirement and enforce SSL (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-postgresql-sslenforcement), Azure SQL Database should have the minimal TLS version set to the highest version (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-sql-mintls), Azure Storage deploy a specific min TLS version requirement and enforce SSL/HTTPS (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-storage-sslenforcement), Function App should only be accessible over HTTPS (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-appservicefunctionapp-http), MySQL database servers enforce SSL connections. (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-mysql-http), PostgreSQL database servers enforce SSL connection. (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-postgresql-http), SQL Managed Instance should have the minimal TLS version set to the highest version (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-sqlmi-mintls), SQL managed instances deploy a specific min TLS version requirement. (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-sqlmi-mintls), SQL servers deploys a specific min TLS version requirement. (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-sql-mintls), Web Application should only be accessible over HTTPS (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-appservicewebapp-http))
[Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20240509 Encryption true 0 38 (Configure App Service app slots to use the latest TLS version (/providers/microsoft.authorization/policydefinitions/014664e7-e348-41a3-aeb9-566e4ff6a9df), Container Apps should only be accessible over HTTPS (/providers/microsoft.authorization/policydefinitions/0e80e269-43a4-4ae9-b5bc-178126b8a5cb), Container Apps should only be accessible over HTTPS (/providers/microsoft.authorization/policydefinitions/0e80e269-43a4-4ae9-b5bc-178126b8a5cb), Kubernetes clusters should be accessible only over HTTPS (/providers/microsoft.authorization/policydefinitions/1a5b4dca-0b6f-4cf5-907c-56316bc1bf3d), Configure Function apps to use the latest TLS version (/providers/microsoft.authorization/policydefinitions/1f01f1c7-539c-49b5-9ef4-d4ffa37d22e0), Azure SQL Database should be running TLS version 1.2 or newer (/providers/microsoft.authorization/policydefinitions/32e6bbec-16b6-44c2-be37-c5b672d103cf), Function app slots should only be accessible over HTTPS (/providers/microsoft.authorization/policydefinitions/5e5dbe3f-2702-4ffc-8b1e-0cae008a5c71), Function apps should only be accessible over HTTPS (/providers/microsoft.authorization/policydefinitions/6d555dd1-86f2-4f1c-8ed7-5abae7c6cbab), App Service apps should only be accessible over HTTPS (/providers/microsoft.authorization/policydefinitions/a4af4a39-4135-47fb-b175-47fbdf85311d), SQL Managed Instance should have the minimal TLS version of 1.2 (/providers/microsoft.authorization/policydefinitions/a8793640-60f7-487c-b5c3-1d37215905c4), App Service app slots should only be accessible over HTTPS (/providers/microsoft.authorization/policydefinitions/ae1b9a8c-dfce-4605-bd91-69213b4a26fc), Configure App Service apps to use the latest TLS version (/providers/microsoft.authorization/policydefinitions/ae44c1d1-0df2-4ca9-98fa-a3d3ae5b409d), Azure Synapse Workspace SQL Server should be running TLS version 1.2 or newer (/providers/microsoft.authorization/policydefinitions/cb3738a6-82a2-4a18-b87b-15217b9deff4), App Service Environment should have TLS 1.0 and 1.1 disabled (/providers/microsoft.authorization/policydefinitions/d6545c6b-dd9d-4265-91e6-0b451e2f1c50), App Service apps should use the latest TLS version (/providers/microsoft.authorization/policydefinitions/f0e6e85b-9b9f-4a4b-b67b-f730d42f1b0b), Function apps should use the latest TLS version (/providers/microsoft.authorization/policydefinitions/f9d614c5-c173-4d56-95a7-b4437057d193), Configure Function app slots to use the latest TLS version (/providers/microsoft.authorization/policydefinitions/fa3a6357-c6d6-4120-8429-855577ec0063), Storage accounts should have the specified minimum TLS version (/providers/microsoft.authorization/policydefinitions/fe83a0eb-a853-422d-aac2-1bffd182c5d0), API App should only be accessible over HTTPS (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-appserviceapiapp-http), AppService append enable https only setting to enforce https setting. (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/append-appservice-httpsonly), AppService append sites with minimum TLS version to enforce. (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/append-appservice-latesttls), Azure Cache for Redis Append a specific min TLS version requirement and enforce TLS. (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/append-redis-sslenforcement), Azure Cache for Redis Append and the enforcement that enableNonSslPort is disabled. (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/append-redis-disablenonsslport), Azure Cache for Redis only secure connections should be enabled (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-redis-http), Azure Database for MySQL server deploy a specific min TLS version and enforce SSL. (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-mysql-sslenforcement), Azure Database for PostgreSQL server deploy a specific min TLS version requirement and enforce SSL (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-postgresql-sslenforcement), Azure SQL Database should have the minimal TLS version set to the highest version (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-sql-mintls), Azure Storage deploy a specific min TLS version requirement and enforce SSL/HTTPS (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-storage-sslenforcement), Configure Logic apps to use the latest TLS version (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-logicapp-tls), Event Hub namespaces should use a valid TLS version (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-eh-mintls), Function App should only be accessible over HTTPS (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-appservicefunctionapp-http), Logic app should only be accessible over HTTPS (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-logicapps-without-https), MySQL database servers enforce SSL connections. (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-mysql-http), PostgreSQL database servers enforce SSL connection. (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-postgresql-http), SQL Managed Instance should have the minimal TLS version set to the highest version (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-sqlmi-mintls), SQL managed instances deploy a specific min TLS version requirement. (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-sqlmi-mintls), SQL servers deploys a specific min TLS version requirement. (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-sql-mintls), Web Application should only be accessible over HTTPS (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-appservicewebapp-http))
[Deprecated]: Deploy Diagnostic Settings to Azure Services /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-diagnostics-loganalytics Monitoring true 0 70 (Deploy Diagnostic Settings for Service Bus to Log Analytics workspace (/providers/microsoft.authorization/policydefinitions/04d53d87-841c-4f23-8a5b-21564380b55e), Deploy Diagnostic Settings for Search Services to Log Analytics workspace (/providers/microsoft.authorization/policydefinitions/08ba64b8-738f-4918-9686-730d2ed79c7d), Deploy Diagnostic Settings for Event Hub to Log Analytics workspace (/providers/microsoft.authorization/policydefinitions/1f6e93e8-6b31-41b1-83f6-36e449a42579), Deploy Diagnostic Settings for Stream Analytics to Log Analytics workspace (/providers/microsoft.authorization/policydefinitions/237e0f7e-b0e8-4ec4-ad46-8c12cb66d673), Configure diagnostic settings for File Services to Log Analytics workspace (/providers/microsoft.authorization/policydefinitions/25a70cc8-2bd4-47f1-90b6-1478e4662c96), Configure diagnostic settings for Table Services to Log Analytics workspace (/providers/microsoft.authorization/policydefinitions/2fb86bf3-d221-43d1-96d1-2434af34eaa0), Configure diagnostic settings for Storage Accounts to Log Analytics workspace (/providers/microsoft.authorization/policydefinitions/59759c62-9a22-4cdf-ae64-074495983fef), Deploy - Configure diagnostic settings for Azure Kubernetes Service to Log Analytics workspace (/providers/microsoft.authorization/policydefinitions/6c66c325-74c8-42fd-a286-a74b0e2939d8), Public IP addresses should have resource logs enabled for Azure DDoS Protection (/providers/microsoft.authorization/policydefinitions/752154a7-1e0f-45c6-a880-ac75a7e4f648), Configure diagnostic settings for Queue Services to Log Analytics workspace (/providers/microsoft.authorization/policydefinitions/7bd000e3-37c7-4928-9f31-86c4b77c5c45), Configure diagnostic settings for Blob Services to Log Analytics workspace (/providers/microsoft.authorization/policydefinitions/b4fe1a3b-0715-4c6c-a5ea-ffc33cf823cb), Deploy - Configure diagnostic settings for SQL Databases to Log Analytics workspace (/providers/microsoft.authorization/policydefinitions/b79fa14e-238a-4c2d-b376-442ce508fc84), Deploy Diagnostic Settings for Logic Apps to Log Analytics workspace (/providers/microsoft.authorization/policydefinitions/b889a06c-ec72-4b03-910a-cb169ee18721), Deploy Diagnostic Settings for Key Vault to Log Analytics workspace (/providers/microsoft.authorization/policydefinitions/bef3f64c-5290-43b7-85b0-9b254eef4c47), Deploy Diagnostic Settings for Recovery Services Vault to Log Analytics workspace for resource specific categories. (/providers/microsoft.authorization/policydefinitions/c717fb0c-d118-4c43-ab3d-ece30ac81fb3), Deploy Diagnostic Settings for Batch Account to Log Analytics workspace (/providers/microsoft.authorization/policydefinitions/c84e5349-db6d-4769-805e-e14037dab9b5), Deploy Diagnostic Settings for Data Lake Analytics to Log Analytics workspace (/providers/microsoft.authorization/policydefinitions/d56a5a7c-72d7-42bc-8ceb-3baf4c0eae03), [Deprecated] Diagnostic Settings for MariaDB to Log Analytics Workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-mariadb), [Deprecated]: Deploy Diagnostic Settings for Analysis Services to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-analysisservice), [Deprecated]: Deploy Diagnostic Settings for API Management to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-apimgmt), [Deprecated]: Deploy Diagnostic Settings for App Service Plan to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-webserverfarm), [Deprecated]: Deploy Diagnostic Settings for App Service to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-website), [Deprecated]: Deploy Diagnostic Settings for Application Gateway to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-applicationgateway), [Deprecated]: Deploy Diagnostic Settings for Automation to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-aa), [Deprecated]: Deploy Diagnostic Settings for AVD Application group to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-wvdappgroup), [Deprecated]: Deploy Diagnostic Settings for AVD Host Pools to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-wvdhostpools), [Deprecated]: Deploy Diagnostic Settings for AVD Scaling Plans to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-avdscalingplans), [Deprecated]: Deploy Diagnostic Settings for AVD Workspace to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-wvdworkspace), [Deprecated]: Deploy Diagnostic Settings for Azure API for FHIR to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-apiforfhir), [Deprecated]: Deploy Diagnostic Settings for Azure Bastion to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-bastion), [Deprecated]: Deploy Diagnostic Settings for Azure Data Explorer Cluster to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-dataexplorercluster), [Deprecated]: Deploy Diagnostic Settings for Azure Function App to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-function), [Deprecated]: Deploy Diagnostic Settings for Azure Media Service to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-mediaservice), [Deprecated]: Deploy Diagnostic Settings for CDN Endpoint to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-cdnendpoints), [Deprecated]: Deploy Diagnostic Settings for Cognitive Services to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-cognitiveservices), [Deprecated]: Deploy Diagnostic Settings for Container Instances to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-aci), [Deprecated]: Deploy Diagnostic Settings for Container Registry to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-acr), [Deprecated]: Deploy Diagnostic Settings for Cosmos DB to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-cosmosdb), [Deprecated]: Deploy Diagnostic Settings for Data Factory to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-datafactory), [Deprecated]: Deploy Diagnostic Settings for Data Lake Analytics to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-dlanalytics), [Deprecated]: Deploy Diagnostic Settings for Database for MySQL to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-mysql), [Deprecated]: Deploy Diagnostic Settings for Database for PostgreSQL to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-postgresql), [Deprecated]: Deploy Diagnostic Settings for Databricks to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-databricks), [Deprecated]: Deploy Diagnostic Settings for Event Grid subscriptions to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-eventgridsub), [Deprecated]: Deploy Diagnostic Settings for Event Grid System Topic to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-eventgridsystemtopic), [Deprecated]: Deploy Diagnostic Settings for Event Grid Topic to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-eventgridtopic), [Deprecated]: Deploy Diagnostic Settings for ExpressRoute to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-expressroute), [Deprecated]: Deploy Diagnostic Settings for Firewall to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-firewall), [Deprecated]: Deploy Diagnostic Settings for Front Door to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-frontdoor), [Deprecated]: Deploy Diagnostic Settings for HDInsight to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-hdinsight), [Deprecated]: Deploy Diagnostic Settings for IoT Hub to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-iothub), [Deprecated]: Deploy Diagnostic Settings for Load Balancer to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-loadbalancer), [Deprecated]: Deploy Diagnostic Settings for Log Analytics to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-loganalytics), [Deprecated]: Deploy Diagnostic Settings for Logic Apps integration service environment to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-logicappsise), [Deprecated]: Deploy Diagnostic Settings for Machine Learning workspace to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-mlworkspace), [Deprecated]: Deploy Diagnostic Settings for Network Interfaces to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-nic), [Deprecated]: Deploy Diagnostic Settings for Network Security Groups to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-networksecuritygroups), [Deprecated]: Deploy Diagnostic Settings for Power BI Embedded to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-powerbiembedded), [Deprecated]: Deploy Diagnostic Settings for Redis Cache to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-rediscache), [Deprecated]: Deploy Diagnostic Settings for Relay to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-relay), [Deprecated]: Deploy Diagnostic Settings for SignalR to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-signalr), [Deprecated]: Deploy Diagnostic Settings for SQL Elastic Pools to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-sqlelasticpools), [Deprecated]: Deploy Diagnostic Settings for SQL Managed Instances to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-sqlmi), [Deprecated]: Deploy Diagnostic Settings for Time Series Insights to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-timeseriesinsights), [Deprecated]: Deploy Diagnostic Settings for Traffic Manager to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-trafficmanager), [Deprecated]: Deploy Diagnostic Settings for Virtual Machine Scale Sets to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-vmss), [Deprecated]: Deploy Diagnostic Settings for Virtual Machines to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-vm), [Deprecated]: Deploy Diagnostic Settings for Virtual Network to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-virtualnetwork), [Deprecated]: Deploy Diagnostic Settings for VPN Gateway to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-vnetgw), [Deprecated]: Deploy Diagnostic Settings for VWAN S2S VPN Gateway to Log Analytics workspace (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-diagnostics-vwans2svpngw))
[Deprecated]: Deploy Microsoft Defender for Cloud configuration /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-mdfc-config Security Center true 0 19 (Configure machines to receive a vulnerability assessment provider (/providers/microsoft.authorization/policydefinitions/13ce0167-8ca6-4048-8e6b-f996402e3c1b), Configure Microsoft Defender for Key Vault plan (/providers/microsoft.authorization/policydefinitions/1f725891-01c0-420a-9059-4fa46cb770b7), [Deprecated]: Configure Azure Defender for DNS to be enabled (/providers/microsoft.authorization/policydefinitions/2370a3c1-4a25-4283-a91a-c9c1a145fb2f), Configure Azure Defender for open-source relational databases to be enabled (/providers/microsoft.authorization/policydefinitions/44433aa3-7ec2-4002-93ea-65c65ff0310a), Configure Azure Defender for SQL servers on machines to be enabled (/providers/microsoft.authorization/policydefinitions/50ea7265-7d8c-429e-9a7d-ca1f410191c3), Configure Azure Kubernetes Service clusters to enable Defender profile (/providers/microsoft.authorization/policydefinitions/64def556-fbad-4622-930e-72d1d5589bf5), Configure Microsoft Defender CSPM to be enabled (/providers/microsoft.authorization/policydefinitions/689f7782-ef2c-4270-a6d0-7664869076bd), Setup subscriptions to transition to an alternative vulnerability assessment solution (/providers/microsoft.authorization/policydefinitions/766e621d-ba95-4e43-a6f2-e945db3d7888), Configure Microsoft Defender for Azure Cosmos DB to be enabled (/providers/microsoft.authorization/policydefinitions/82bf5b87-728b-4a74-ba4d-6123845cf542), Configure Azure Defender for servers to be enabled (/providers/microsoft.authorization/policydefinitions/8e86a5b6-b9bd-49d1-8e21-4bb8a0862222), Deploy Azure Policy Add-on to Azure Kubernetes Service clusters (/providers/microsoft.authorization/policydefinitions/a8eff44f-8c92-45c3-a3fb-9880802d67a7), Configure Azure Defender for App Service to be enabled (/providers/microsoft.authorization/policydefinitions/b40e7bcd-a1e5-47fe-b9cf-2f534d0bfb7d), Configure Azure Defender for Resource Manager to be enabled (/providers/microsoft.authorization/policydefinitions/b7021b2b-08fd-4dc0-9de7-3c6ece09faf9), Configure Azure Defender for Azure SQL database to be enabled (/providers/microsoft.authorization/policydefinitions/b99b73e7-074b-4089-9395-b7236f094491), Configure Microsoft Defender for Containers to be enabled (/providers/microsoft.authorization/policydefinitions/c9ddb292-b203-4738-aead-18e2716e858f), Configure Microsoft Defender for Storage to be enabled (/providers/microsoft.authorization/policydefinitions/cfdc5972-75b3-4418-8ae1-7f5c36839390), [Deprecated]: Configure Microsoft Defender for APIs should be enabled (/providers/microsoft.authorization/policydefinitions/e54d2be9-5f2e-4d65-98e4-4f0e670b23d6), Deploy export to Log Analytics workspace for Microsoft Defender for Cloud data (/providers/microsoft.authorization/policydefinitions/ffb6f416-7bd2-4488-8828-56585fef2be9), Deploy Microsoft Defender for Cloud Security Contacts (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-asc-securitycontacts))
[Deprecated]: Deploy SQL Database built-in SQL security configuration /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-sql-security SQL true 0 4 (Deploy SQL DB transparent data encryption (/providers/microsoft.authorization/policydefinitions/86a912f6-9a06-4e26-b447-11b16ba8659f), [Deprecated]: Deploy SQL Database vulnerability Assessments (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-sql-vulnerabilityassessments), Deploy SQL database auditing settings (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-sql-auditingsettings), Deploy SQL Database security Alert Policies configuration with email admin accounts (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-sql-securityalertpolicies))
Audit virtual machines for Trusted Launch support /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/audit-trustedlaunch Trusted Launch true 1 (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-trustedlaunch) 2 (Disks and OS image should support TrustedLaunch (/providers/microsoft.authorization/policydefinitions/b03bb370-5249-4ea4-9fce-2552e87e45fa), Virtual Machine should have TrustedLaunch enabled (/providers/microsoft.authorization/policydefinitions/c95b54ad-0614-4633-ab29-104b01235cbf))
Configure Azure PaaS services to use private DNS zones /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-private-dns-zones Network true 0 59 (Configure a private DNS Zone ID for table groupID (/providers/microsoft.authorization/policydefinitions/028bbd88-e9b5-461f-9424-a1b63a7bee1a), Configure Azure File Sync to use private DNS zones (/providers/microsoft.authorization/policydefinitions/06695360-db88-47f6-b976-7500d4297475), Configure Azure Web PubSub Service to use private DNS zones (/providers/microsoft.authorization/policydefinitions/0b026355-49cb-467b-8ac4-f777874e175a), Configure Azure Databricks workspace to use private DNS zones (/providers/microsoft.authorization/policydefinitions/0eddd7f3-3d9b-4927-a07a-806e8ac9486c), Configure Azure Databricks workspace to use private DNS zones (/providers/microsoft.authorization/policydefinitions/0eddd7f3-3d9b-4927-a07a-806e8ac9486c), Configure Azure Synapse workspaces to use private DNS zones (/providers/microsoft.authorization/policydefinitions/1e5ed725-f16c-478b-bd4b-7bfa2f7940b9), Configure Azure Synapse workspaces to use private DNS zones (/providers/microsoft.authorization/policydefinitions/1e5ed725-f16c-478b-bd4b-7bfa2f7940b9), Configure Azure Synapse workspaces to use private DNS zones (/providers/microsoft.authorization/policydefinitions/1e5ed725-f16c-478b-bd4b-7bfa2f7940b9), Configure Azure Virtual Desktop workspace resources to use private DNS zones (/providers/microsoft.authorization/policydefinitions/34804460-d88b-4922-a7ca-537165e060ed), Configure Azure Monitor Private Link Scope to use private DNS zones (/providers/microsoft.authorization/policydefinitions/437914ee-c176-4fff-8986-7e05eb971365), Configure Azure HDInsight clusters to use private DNS zones (/providers/microsoft.authorization/policydefinitions/43d6e3bd-fc6a-4b44-8b4d-2151d8736a11), Configure Azure Managed Grafana workspaces to use private DNS zones (/providers/microsoft.authorization/policydefinitions/4c8537f8-cd1b-49ec-b704-18e82a42fd58), Deploy - Configure private DNS zones for private endpoints that connect to Batch accounts (/providers/microsoft.authorization/policydefinitions/4ec38ebc-381f-45ee-81a4-acbc4be878f8), Configure Azure Arc Private Link Scopes to use private DNS zones (/providers/microsoft.authorization/policydefinitions/55c4db33-97b0-437b-8469-c4f4498f5df9), Configure BotService resources to use private DNS zones (/providers/microsoft.authorization/policydefinitions/6a4e6f44-f2af-4082-9702-033c9e88b9f8), Configure Azure Automation accounts with private DNS zones (/providers/microsoft.authorization/policydefinitions/6dd01e4f-1be1-4e80-9d0b-d109e04cb064), Configure Azure Automation accounts with private DNS zones (/providers/microsoft.authorization/policydefinitions/6dd01e4f-1be1-4e80-9d0b-d109e04cb064), Configure a private DNS Zone ID for file groupID (/providers/microsoft.authorization/policydefinitions/6df98d03-368a-4438-8730-a93c4d7693d6), Configure Azure Migrate resources to use private DNS zones (/providers/microsoft.authorization/policydefinitions/7590a335-57cf-4c95-babd-ecbc8fafeb1f), Configure a private DNS Zone ID for blob groupID (/providers/microsoft.authorization/policydefinitions/75973700-529f-4de2-b794-fb9b6781b6b0), Configure private DNS zones for private endpoints connected to App Configuration (/providers/microsoft.authorization/policydefinitions/7a860e27-9ca2-4fc6-822d-c2d248c300df), Configure a private DNS Zone ID for dfs groupID (/providers/microsoft.authorization/policydefinitions/83c6fe0f-2316-444a-99a1-1ecd8a7872ca), Configure private DNS zones for private endpoints that connect to Azure Data Factory (/providers/microsoft.authorization/policydefinitions/86cd96e1-1745-420d-94d4-d3f2fe415aa4), Configure private DNS zones for private endpoints that connect to Azure Data Factory (/providers/microsoft.authorization/policydefinitions/86cd96e1-1745-420d-94d4-d3f2fe415aa4), Configure a private DNS Zone ID for dfs_secondary groupID (/providers/microsoft.authorization/policydefinitions/90bd4cb3-9f59-45f7-a6ca-f69db2726671), Configure Azure Virtual Desktop hostpool resources to use private DNS zones (/providers/microsoft.authorization/policydefinitions/9427df23-0f42-4e1e-bf99-a6133d841c4a), [Preview]: Configure Azure Recovery Services vaults to use private DNS zones (/providers/microsoft.authorization/policydefinitions/942bd215-1a66-44be-af65-6a1c0318dbe2), Configure a private DNS Zone ID for web groupID (/providers/microsoft.authorization/policydefinitions/9adab2a5-05ba-4fbd-831a-5bf958d04218), Configure Azure Device Update for IoT Hub accounts to use private DNS zones (/providers/microsoft.authorization/policydefinitions/a222b93a-e6c2-4c01-817f-21e092455b2a), Configure CosmosDB accounts to use private DNS zones (/providers/microsoft.authorization/policydefinitions/a63cc0bd-cda4-4178-b705-37dc439d3e0f), Configure CosmosDB accounts to use private DNS zones (/providers/microsoft.authorization/policydefinitions/a63cc0bd-cda4-4178-b705-37dc439d3e0f), Configure CosmosDB accounts to use private DNS zones (/providers/microsoft.authorization/policydefinitions/a63cc0bd-cda4-4178-b705-37dc439d3e0f), Configure CosmosDB accounts to use private DNS zones (/providers/microsoft.authorization/policydefinitions/a63cc0bd-cda4-4178-b705-37dc439d3e0f), Configure CosmosDB accounts to use private DNS zones (/providers/microsoft.authorization/policydefinitions/a63cc0bd-cda4-4178-b705-37dc439d3e0f), Configure IoT Hub device provisioning instances to use private DNS zones (/providers/microsoft.authorization/policydefinitions/aaa64d2d-2fa3-45e5-b332-0b031b9b30e8), Configure Azure Key Vaults to use private DNS zones (/providers/microsoft.authorization/policydefinitions/ac673a9a-f77d-4846-b2d8-a57f8e1c01d4), [Preview]: Configure Recovery Services vaults to use private DNS zones for backup (/providers/microsoft.authorization/policydefinitions/af783da1-4ad1-42be-800d-d19c70038820), Deploy - Configure private DNS zones for private endpoints connect to Azure SignalR Service (/providers/microsoft.authorization/policydefinitions/b0e86710-7fb7-4a6c-a064-32e9b829509e), Configure App Service apps to use private DNS zones (/providers/microsoft.authorization/policydefinitions/b318f84a-b872-429b-ac6d-a01b96814452), [Deprecated]: Configure Azure Media Services to use private DNS zones (/providers/microsoft.authorization/policydefinitions/b4a7f6c1-585e-4177-ad5b-c2c93f4bb991), [Deprecated]: Configure Azure Media Services to use private DNS zones (/providers/microsoft.authorization/policydefinitions/b4a7f6c1-585e-4177-ad5b-c2c93f4bb991), [Deprecated]: Configure Azure Media Services to use private DNS zones (/providers/microsoft.authorization/policydefinitions/b4a7f6c1-585e-4177-ad5b-c2c93f4bb991), Deploy - Configure Azure Event Grid topics to use private DNS zones (/providers/microsoft.authorization/policydefinitions/baf19753-7502-405f-8745-370519b20483), Configure disk access resources to use private DNS zones (/providers/microsoft.authorization/policydefinitions/bc05b96c-0b36-4ca9-82f0-5c53f96ce05a), Configure a private DNS Zone ID for queue groupID (/providers/microsoft.authorization/policydefinitions/bcff79fb-2b0d-47c9-97e5-3023479b00d1), Configure a private DNS Zone ID for table_secondary groupID (/providers/microsoft.authorization/policydefinitions/c1d634a5-f73d-4cdd-889f-2cc7006eb47f), Configure Cognitive Services accounts to use private DNS zones (/providers/microsoft.authorization/policydefinitions/c4bc6f10-cb41-49eb-b000-d5ab82e2a091), Deploy - Configure Azure IoT Hubs to use private DNS zones (/providers/microsoft.authorization/policydefinitions/c99ce9c1-ced7-4c3e-aca0-10e69ce0cb02), Configure a private DNS Zone ID for web_secondary groupID (/providers/microsoft.authorization/policydefinitions/d19ae5f1-b303-4b82-9ca8-7682749faf0c), Deploy - Configure Azure Event Grid domains to use private DNS zones (/providers/microsoft.authorization/policydefinitions/d389df0a-e0d7-4607-833c-75a6fdac2c2d), Deploy - Configure IoT Central to use private DNS zones (/providers/microsoft.authorization/policydefinitions/d627d7c6-ded5-481a-8f2e-7e16b1e6faf6), Configure a private DNS Zone ID for blob_secondary groupID (/providers/microsoft.authorization/policydefinitions/d847d34b-9337-4e2d-99a5-767e5ac9c582), Configure a private DNS Zone ID for queue_secondary groupID (/providers/microsoft.authorization/policydefinitions/da9b4ae8-5ddc-48c5-b9c0-25f8abf7a3d6), Configure Azure Cache for Redis to use private DNS zones (/providers/microsoft.authorization/policydefinitions/e016b22b-e0eb-436d-8fd7-160c4eaed6e2), Configure Container registries to use private DNS zones (/providers/microsoft.authorization/policydefinitions/e9585a95-5b8c-4d03-b193-dc7eb5ac4c32), Configure Event Hub namespaces to use private DNS zones (/providers/microsoft.authorization/policydefinitions/ed66d4f5-8220-45dc-ab4a-20d1749c74e6), Configure Azure Machine Learning workspace to use private DNS zones (/providers/microsoft.authorization/policydefinitions/ee40564d-486e-4f68-a5ca-7a621edae0fb), Configure Service Bus namespaces to use private DNS zones (/providers/microsoft.authorization/policydefinitions/f0fcf93c-c063-4071-9668-c47474bd3564), Configure Azure AI Search services to use private DNS zones (/providers/microsoft.authorization/policydefinitions/fbc14a67-53e4-4932-abcc-2049c6706009))
Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-aum-checkupdates Security Center true 2 (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates, /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates) 4 (Configure periodic checking for missing system updates on azure virtual machines (/providers/microsoft.authorization/policydefinitions/59efceea-0c96-497e-a4a1-4eb2290dac15), Configure periodic checking for missing system updates on azure virtual machines (/providers/microsoft.authorization/policydefinitions/59efceea-0c96-497e-a4a1-4eb2290dac15), Configure periodic checking for missing system updates on azure Arc-enabled servers (/providers/microsoft.authorization/policydefinitions/bfea026e-043f-4ff4-9d1b-bf301ca7ff46), Configure periodic checking for missing system updates on azure Arc-enabled servers (/providers/microsoft.authorization/policydefinitions/bfea026e-043f-4ff4-9d1b-bf301ca7ff46))
Deny or Audit resources without Encryption with a customer-managed key (CMK) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encryption-cmk_20250218 Encryption true 0 30 (Azure API for FHIR should use a customer-managed key to encrypt data at rest (/providers/microsoft.authorization/policydefinitions/051cba44-2429-45b9-9649-46cec11c7119), [Deprecated]: Virtual machines should encrypt temp disks, caches, and data flows between Compute and Storage resources (/providers/microsoft.authorization/policydefinitions/0961003e-5a0a-4549-abde-af6a37f2724d), SQL servers should use customer-managed keys to encrypt data at rest (/providers/microsoft.authorization/policydefinitions/0a370ff3-6cab-4e85-8995-295fd854c5b8), Azure Container Instance container group should use customer-managed key for encryption (/providers/microsoft.authorization/policydefinitions/0aa61e00-0a01-4a3c-9945-e93cffedf0e6), PostgreSQL servers should use customer-managed keys to encrypt data at rest (/providers/microsoft.authorization/policydefinitions/18adea5e-f416-4d0f-8aa8-d24321e3e274), Azure Cosmos DB accounts should use customer-managed keys to encrypt data at rest (/providers/microsoft.authorization/policydefinitions/1f905d99-2ab7-462c-a6b0-f709acca6c8f), Service Bus Premium namespaces should use a customer-managed key for encryption (/providers/microsoft.authorization/policydefinitions/295fc8b1-dc9f-4f53-9c61-3f313ceab40a), [Preview]: Azure Recovery Services vaults should use customer-managed keys for encrypting backup data (/providers/microsoft.authorization/policydefinitions/2e94d99a-8a36-4563-bc77-810d8893b671), Azure data factories should be encrypted with a customer-managed key (/providers/microsoft.authorization/policydefinitions/4ec52d6d-beb7-40c4-9a9e-fe753254690e), Bot Service should be encrypted with a customer-managed key (/providers/microsoft.authorization/policydefinitions/51522a96-0869-4791-82f3-981000c2c67f), Azure Automation accounts should use customer-managed keys to encrypt data at rest (/providers/microsoft.authorization/policydefinitions/56a5ee18-2ae6-4810-86f7-18e39ce5629b), Container registries should be encrypted with a customer-managed key (/providers/microsoft.authorization/policydefinitions/5b9159ae-1701-4a6f-9a7a-aa9c8ddd0580), Azure AI Services resources should encrypt data at rest with a customer-managed key (CMK) (/providers/microsoft.authorization/policydefinitions/67121cc7-ff39-4ab8-b7e3-95b84dab487d), Storage accounts should use customer-managed key for encryption (/providers/microsoft.authorization/policydefinitions/6fac406b-40ca-413b-bf8e-0bf964659c25), OS and data disks should be encrypted with a customer-managed key (/providers/microsoft.authorization/policydefinitions/702dd420-7fcc-42c5-afe8-4026edd20fe0), Azure AI Search services should use customer-managed keys to encrypt data at rest (/providers/microsoft.authorization/policydefinitions/76a56461-9dc0-40f0-82f5-2453283afa2f), Table Storage should use customer-managed key for encryption (/providers/microsoft.authorization/policydefinitions/7c322315-e26d-4174-a99e-f49d351b4688), Both operating systems and data disks in Azure Kubernetes Service clusters should be encrypted by customer-managed keys (/providers/microsoft.authorization/policydefinitions/7d7be79c-23ba-4033-84dd-45e2a5ccdd67), Azure Data Explorer encryption at rest should use a customer-managed key (/providers/microsoft.authorization/policydefinitions/81e74cea-30fd-40d5-802f-d72103c2aaaa), MySQL servers should use customer-managed keys to encrypt data at rest (/providers/microsoft.authorization/policydefinitions/83cef61d-dbd1-4b20-a4fc-5fbc7da10833), Azure Data Box jobs should use a customer-managed key to encrypt the device unlock password (/providers/microsoft.authorization/policydefinitions/86efb160-8de7-451d-bc08-5d475b0aadae), Azure Stream Analytics jobs should use customer-managed keys to encrypt data (/providers/microsoft.authorization/policydefinitions/87ba29ef-1ab3-4d82-b763-87fcd4f531f7), Azure Batch account should use customer-managed keys to encrypt data (/providers/microsoft.authorization/policydefinitions/99e9ccd8-3db9-4592-b0d1-14b1715a4d8a), Event Hub namespaces should use a customer-managed key for encryption (/providers/microsoft.authorization/policydefinitions/a1ad735a-e96f-45d2-a7b2-9a4932cab7ec), SQL managed instances should use customer-managed keys to encrypt data at rest (/providers/microsoft.authorization/policydefinitions/ac01ad65-10e5-46df-bdd9-6b0cad13e1d2), Storage account encryption scopes should use customer-managed keys to encrypt data at rest (/providers/microsoft.authorization/policydefinitions/b5ec538c-daa0-4006-8596-35468b9148e8), Azure Machine Learning workspaces should be encrypted with a customer-managed key (/providers/microsoft.authorization/policydefinitions/ba769a63-b8cc-4b2d-abf6-ac33c7204be8), Queue Storage should use customer-managed key for encryption (/providers/microsoft.authorization/policydefinitions/f0e5abd0-2554-4736-b7c0-4ffef23475ef), Azure Synapse workspaces should use customer-managed keys to encrypt data at rest (/providers/microsoft.authorization/policydefinitions/f7d52b2d-e161-4dfa-a82b-55e564167385), Event Hub namespaces (Premium) should use a customer-managed key for encryption (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-eh-premium-cmk))
Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-encrypttransit_20241211 Encryption true 0 37 (Configure App Service app slots to use the latest TLS version (/providers/microsoft.authorization/policydefinitions/014664e7-e348-41a3-aeb9-566e4ff6a9df), Container Apps should only be accessible over HTTPS (/providers/microsoft.authorization/policydefinitions/0e80e269-43a4-4ae9-b5bc-178126b8a5cb), Kubernetes clusters should be accessible only over HTTPS (/providers/microsoft.authorization/policydefinitions/1a5b4dca-0b6f-4cf5-907c-56316bc1bf3d), Configure Function apps to use the latest TLS version (/providers/microsoft.authorization/policydefinitions/1f01f1c7-539c-49b5-9ef4-d4ffa37d22e0), Azure SQL Database should be running TLS version 1.2 or newer (/providers/microsoft.authorization/policydefinitions/32e6bbec-16b6-44c2-be37-c5b672d103cf), Function app slots should only be accessible over HTTPS (/providers/microsoft.authorization/policydefinitions/5e5dbe3f-2702-4ffc-8b1e-0cae008a5c71), Function apps should only be accessible over HTTPS (/providers/microsoft.authorization/policydefinitions/6d555dd1-86f2-4f1c-8ed7-5abae7c6cbab), App Service apps should only be accessible over HTTPS (/providers/microsoft.authorization/policydefinitions/a4af4a39-4135-47fb-b175-47fbdf85311d), SQL Managed Instance should have the minimal TLS version of 1.2 (/providers/microsoft.authorization/policydefinitions/a8793640-60f7-487c-b5c3-1d37215905c4), App Service app slots should only be accessible over HTTPS (/providers/microsoft.authorization/policydefinitions/ae1b9a8c-dfce-4605-bd91-69213b4a26fc), Configure App Service apps to use the latest TLS version (/providers/microsoft.authorization/policydefinitions/ae44c1d1-0df2-4ca9-98fa-a3d3ae5b409d), Azure Synapse Workspace SQL Server should be running TLS version 1.2 or newer (/providers/microsoft.authorization/policydefinitions/cb3738a6-82a2-4a18-b87b-15217b9deff4), App Service Environment should have TLS 1.0 and 1.1 disabled (/providers/microsoft.authorization/policydefinitions/d6545c6b-dd9d-4265-91e6-0b451e2f1c50), App Service apps should use the latest TLS version (/providers/microsoft.authorization/policydefinitions/f0e6e85b-9b9f-4a4b-b67b-f730d42f1b0b), Function apps should use the latest TLS version (/providers/microsoft.authorization/policydefinitions/f9d614c5-c173-4d56-95a7-b4437057d193), Configure Function app slots to use the latest TLS version (/providers/microsoft.authorization/policydefinitions/fa3a6357-c6d6-4120-8429-855577ec0063), Storage accounts should have the specified minimum TLS version (/providers/microsoft.authorization/policydefinitions/fe83a0eb-a853-422d-aac2-1bffd182c5d0), API App should only be accessible over HTTPS (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-appserviceapiapp-http), AppService append enable https only setting to enforce https setting. (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/append-appservice-httpsonly), AppService append sites with minimum TLS version to enforce. (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/append-appservice-latesttls), Azure Cache for Redis Append a specific min TLS version requirement and enforce TLS. (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/append-redis-sslenforcement), Azure Cache for Redis Append and the enforcement that enableNonSslPort is disabled. (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/append-redis-disablenonsslport), Azure Cache for Redis only secure connections should be enabled (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-redis-http), Azure Database for MySQL server deploy a specific min TLS version and enforce SSL. (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-mysql-sslenforcement), Azure Database for PostgreSQL server deploy a specific min TLS version requirement and enforce SSL (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-postgresql-sslenforcement), Azure SQL Database should have the minimal TLS version set to the highest version (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-sql-mintls), Azure Storage deploy a specific min TLS version requirement and enforce SSL/HTTPS (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-storage-sslenforcement), Configure Logic apps to use the latest TLS version (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-logicapp-tls), Event Hub namespaces should use a valid TLS version (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-eh-mintls), Function App should only be accessible over HTTPS (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-appservicefunctionapp-http), Logic app should only be accessible over HTTPS (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-logicapps-without-https), MySQL database servers enforce SSL connections. (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-mysql-http), PostgreSQL database servers enforce SSL connection. (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-postgresql-http), SQL Managed Instance should have the minimal TLS version set to the highest version (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-sqlmi-mintls), SQL managed instances deploy a specific min TLS version requirement. (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-sqlmi-mintls), SQL servers deploys a specific min TLS version requirement. (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-sql-mintls), Web Application should only be accessible over HTTPS (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-appservicewebapp-http))
DenyAction Delete - Activity Log Settings and Diagnostic Settings /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/denyaction-deleteprotection Monitoring true 0 2 (DenyAction implementation on Activity Logs (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/denyaction-activitylogs), DenyAction implementation on Diagnostic Logs. (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/denyaction-diagnosticlogs))
Deploy Microsoft Defender for Cloud configuration /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-mdfc-config_20240319 Security Center true 0 17 (Configure machines to receive a vulnerability assessment provider (/providers/microsoft.authorization/policydefinitions/13ce0167-8ca6-4048-8e6b-f996402e3c1b), Configure Microsoft Defender for Key Vault plan (/providers/microsoft.authorization/policydefinitions/1f725891-01c0-420a-9059-4fa46cb770b7), Configure Azure Defender for open-source relational databases to be enabled (/providers/microsoft.authorization/policydefinitions/44433aa3-7ec2-4002-93ea-65c65ff0310a), Configure Azure Defender for SQL servers on machines to be enabled (/providers/microsoft.authorization/policydefinitions/50ea7265-7d8c-429e-9a7d-ca1f410191c3), Configure Azure Kubernetes Service clusters to enable Defender profile (/providers/microsoft.authorization/policydefinitions/64def556-fbad-4622-930e-72d1d5589bf5), Configure Microsoft Defender CSPM plan (/providers/microsoft.authorization/policydefinitions/72f8cee7-2937-403d-84a1-a4e3e57f3c21), Setup subscriptions to transition to an alternative vulnerability assessment solution (/providers/microsoft.authorization/policydefinitions/766e621d-ba95-4e43-a6f2-e945db3d7888), Configure Microsoft Defender for Azure Cosmos DB to be enabled (/providers/microsoft.authorization/policydefinitions/82bf5b87-728b-4a74-ba4d-6123845cf542), Configure Azure Defender for servers to be enabled (/providers/microsoft.authorization/policydefinitions/8e86a5b6-b9bd-49d1-8e21-4bb8a0862222), Deploy Azure Policy Add-on to Azure Kubernetes Service clusters (/providers/microsoft.authorization/policydefinitions/a8eff44f-8c92-45c3-a3fb-9880802d67a7), Configure Azure Defender for App Service to be enabled (/providers/microsoft.authorization/policydefinitions/b40e7bcd-a1e5-47fe-b9cf-2f534d0bfb7d), Configure Azure Defender for Resource Manager to be enabled (/providers/microsoft.authorization/policydefinitions/b7021b2b-08fd-4dc0-9de7-3c6ece09faf9), Configure Azure Defender for Azure SQL database to be enabled (/providers/microsoft.authorization/policydefinitions/b99b73e7-074b-4089-9395-b7236f094491), Configure Microsoft Defender for Containers to be enabled (/providers/microsoft.authorization/policydefinitions/c9ddb292-b203-4738-aead-18e2716e858f), Configure Microsoft Defender for Storage to be enabled (/providers/microsoft.authorization/policydefinitions/cfdc5972-75b3-4418-8ae1-7f5c36839390), Deploy export to Log Analytics workspace for Microsoft Defender for Cloud data (/providers/microsoft.authorization/policydefinitions/ffb6f416-7bd2-4488-8828-56585fef2be9), Deploy Microsoft Defender for Cloud Security Contacts (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-asc-securitycontacts))
Deploy SQL Database built-in SQL security configuration /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-sql-security_20240529 SQL true 0 4 (Deploy SQL DB transparent data encryption (/providers/microsoft.authorization/policydefinitions/86a912f6-9a06-4e26-b447-11b16ba8659f), Deploy SQL database auditing settings (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-sql-auditingsettings), Deploy SQL Database security Alert Policies configuration with email admin accounts (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-sql-securityalertpolicies), Deploy SQL Database Vulnerability Assessments (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-sql-vulnerabilityassessments_20230706))
Enforce additional recommended guardrails for Key Vault /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-keyvault-sup Key Vault true 0 2 ([Preview]: Configure Azure Key Vault Managed HSM to disable public network access (/providers/microsoft.authorization/policydefinitions/84d327c3-164a-4685-b453-900478614456), Configure key vaults to enable firewall (/providers/microsoft.authorization/policydefinitions/ac673a9a-f77d-4846-b2d8-a57f8e1c01dc))
Enforce Azure Compute Security Benchmark compliance auditing /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-acsb Guest Configuration true 1 (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/enforce-acsb) 5 (Deploy the Linux Guest Configuration extension to enable Guest Configuration assignments on Linux VMs (/providers/microsoft.authorization/policydefinitions/331e8ea8-378a-410f-a2e5-ae22f38bb0da), Deploy the Windows Guest Configuration extension to enable Guest Configuration assignments on Windows VMs (/providers/microsoft.authorization/policydefinitions/385f5831-96d4-41db-9a3c-cd3af78aaae6), Add system-assigned managed identity to enable Guest Configuration assignments on virtual machines with no identities (/providers/microsoft.authorization/policydefinitions/3cf2ab00-13f1-4d0c-8971-2ac904541a7e), Windows machines should meet requirements of the Azure compute security baseline (/providers/microsoft.authorization/policydefinitions/72650e9f-97bc-4b2a-ab5f-9781a9fcecbc), Linux machines should meet requirements for the Azure compute security baseline (/providers/microsoft.authorization/policydefinitions/fc9b3da7-8347-4380-8e70-0a0361d8dedd))
Enforce enhanced recovery and backup policies /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-backup Backup true 0 6 ([Preview]: Immutability must be enabled for backup vaults (/providers/microsoft.authorization/policydefinitions/2514263b-bc0d-4b06-ac3e-f262c0979018), [Preview]: Soft delete must be enabled for Recovery Services Vaults. (/providers/microsoft.authorization/policydefinitions/31b8092a-36b8-434b-9af7-5ec844364148), [Preview]: Soft delete should be enabled for Backup Vaults (/providers/microsoft.authorization/policydefinitions/9798d31d-6028-4dee-8643-46102185c016), [Preview]: Multi-User Authorization (MUA) must be enabled for Backup Vaults. (/providers/microsoft.authorization/policydefinitions/c58e083e-7982-4e24-afdc-be14d312389e), [Preview]: Multi-User Authorization (MUA) must be enabled for Recovery Services Vaults. (/providers/microsoft.authorization/policydefinitions/c7031eab-0fc0-4cd9-acd0-4497bd66d91a), [Preview]: Immutability must be enabled for Recovery Services vaults (/providers/microsoft.authorization/policydefinitions/d6f6f560-14b7-49a4-9fc8-d2c3a9807868))
Enforce policies in the Decommissioned Landing Zone /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-alz-decomm Decommissioned true 1 (/providers/microsoft.management/managementgroups/mibelle-decommissioned-mg/providers/microsoft.authorization/policyassignments/enforce-alz-decomm) 2 (Allowed resource types (/providers/microsoft.authorization/policydefinitions/a08ec900-254a-4555-9bf5-e42af04b5c5c), Deploy Virtual Machine Auto Shutdown Schedule (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deploy-vm-autoshutdown))
Enforce policies in the Sandbox Landing Zone /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-alz-sandbox Sandbox true 1 (/providers/microsoft.management/managementgroups/mibelle-sandbox-mg/providers/microsoft.authorization/policyassignments/enforce-alz-sandbox) 2 (Not allowed resource types (/providers/microsoft.authorization/policydefinitions/6c112d4e-5bc7-47ae-a041-ea2d9dccd749), Deny vNet peering cross subscription. (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-vnet-peer-cross-sub))
Enforce recommended guardrails for API Management /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-apim API Management true 0 11 (API Management subscriptions should not be scoped to all APIs (/providers/microsoft.authorization/policydefinitions/3aa03346-d8c5-4994-a5bc-7652c2a2aef1), [Deprecated]: API Management minimum API version should be set to 2019-12-01 or higher (/providers/microsoft.authorization/policydefinitions/549814b6-3212-4203-bdc8-1548d342fb67), API Management service should use a SKU that supports virtual networks (/providers/microsoft.authorization/policydefinitions/73ef9241-5d81-4cd4-b483-8443d1730fe5), Configure API Management services to disable access to API Management public service configuration endpoints (/providers/microsoft.authorization/policydefinitions/7ca8c8ac-3a6e-493d-99ba-c5fa35347ff2), API Management calls to API backends should not bypass certificate thumbprint or name validation (/providers/microsoft.authorization/policydefinitions/92bb331d-ac71-416a-8c91-02f2cb734ce4), API Management direct management endpoint should not be enabled (/providers/microsoft.authorization/policydefinitions/b741306c-968e-4b67-b916-5675e5c709f4), API Management calls to API backends should be authenticated (/providers/microsoft.authorization/policydefinitions/c15dcc82-b93c-4dcb-9332-fbf121685b54), API Management APIs should use only encrypted protocols (/providers/microsoft.authorization/policydefinitions/ee7495e7-3ba7-40b6-bfee-c29e22cc75d4), API Management services should use a virtual network (/providers/microsoft.authorization/policydefinitions/ef619a2c-cc4d-4d03-b2ba-8c94a834d85b), API Management secret named values should be stored in Azure Key Vault (/providers/microsoft.authorization/policydefinitions/f1cc7827-022c-473e-836e-5a51cae0b249), API Management services should use TLS version 1.2 (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-apim-tls))
Enforce recommended guardrails for App Service /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-appservices App Service true 0 19 (Configure Function app slots to only be accessible over HTTPS (/providers/microsoft.authorization/policydefinitions/08cf2974-d178-48a0-b26d-f6b8e555748b), Configure App Service apps to only be accessible over HTTPS (/providers/microsoft.authorization/policydefinitions/0f98368e-36bc-4716-8ac2-8f8067203b63), Configure App Service apps to disable public network access (/providers/microsoft.authorization/policydefinitions/2374605e-3e0b-492b-9046-229af202562c), Configure Function app slots to disable public network access (/providers/microsoft.authorization/policydefinitions/242222f3-4985-4e99-b5ef-086d6a6cb01c), Configure Function apps to turn off remote debugging (/providers/microsoft.authorization/policydefinitions/25a5046c-c423-4805-9235-e844ae9ef49b), Configure App Service app slots to disable local authentication for SCM sites (/providers/microsoft.authorization/policydefinitions/2c034a29-2a5f-4857-b120-f800fe5549ae), App Service apps should use a SKU that supports private link (/providers/microsoft.authorization/policydefinitions/546fe8d2-368d-4029-a418-6af48a7f61e5), Configure App Service apps to disable local authentication for FTP deployments (/providers/microsoft.authorization/policydefinitions/572e342c-c920-4ef5-be2e-1ed3c6a51dc5), App Service app slots should enable configuration routing to Azure Virtual Network (/providers/microsoft.authorization/policydefinitions/5747353b-1ca9-42c1-a4dd-b874b894f3d4), Configure App Service apps to disable local authentication for SCM sites (/providers/microsoft.authorization/policydefinitions/5e97b776-f380-4722-a9a3-e7f0be029e79), Configure Function app slots to turn off remote debugging (/providers/microsoft.authorization/policydefinitions/70adbb40-e092-42d5-a6f8-71c540a5efdb), App Service apps should enable configuration routing to Azure Virtual Network (/providers/microsoft.authorization/policydefinitions/801543d1-1953-4a90-b8b0-8cf6d41473a5), Configure App Service apps to turn off remote debugging (/providers/microsoft.authorization/policydefinitions/a5e3fe8f-f6cd-4f1d-bbf6-c749754a724b), App Service apps should enable outbound non-RFC 1918 traffic to Azure Virtual Network (/providers/microsoft.authorization/policydefinitions/a691eacb-474d-47e4-b287-b4813ca44222), Configure App Service app slots to disable public network access (/providers/microsoft.authorization/policydefinitions/c6c3e00e-d414-4ca4-914f-406699bb8eee), Configure App Service app slots to turn off remote debugging (/providers/microsoft.authorization/policydefinitions/cca5adfe-626b-4cc6-8522-f5b6ed2391bd), App Service Environment should be provisioned with latest versions (/providers/microsoft.authorization/policydefinitions/eb4d34ab-0929-491c-bbf3-61e13da19f9a), App Service app slots should enable outbound non-RFC 1918 traffic to Azure Virtual Network (/providers/microsoft.authorization/policydefinitions/f5c0bfb3-acea-47b1-b477-b0edcdf6edc1), App Service certificates must be stored in Key Vault (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-appservice-without-byoc))
Enforce recommended guardrails for Automation Account /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-automation Automation true 0 6 (Configure Azure Automation accounts to disable public network access (/providers/microsoft.authorization/policydefinitions/23b36a7c-9d26-4288-a8fd-c1d2fa284d8c), Configure Azure Automation account to disable local authentication (/providers/microsoft.authorization/policydefinitions/30d1d58e-8f96-47a5-8564-499a3f3cca81), Automation account variables should be encrypted (/providers/microsoft.authorization/policydefinitions/3657f5a0-770e-44a3-b44e-9431ba1e9735), Azure Automation account should have local authentication method disabled (/providers/microsoft.authorization/policydefinitions/48c5f1cb-14ad-4797-8e3b-f78ab3f8d700), Hotpatch should be enabled for Windows Server Azure Edition VMs (/providers/microsoft.authorization/policydefinitions/6d02d2f7-e38b-4bdc-96f3-adc0a8726abc), Automation Account should have Managed Identity (/providers/microsoft.authorization/policydefinitions/dea83a72-443c-4292-83d5-54a2f98749c0))
Enforce recommended guardrails for Azure Key Vault /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-keyvault Key Vault true 2 (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enforce-gr-keyvault, /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enforce-gr-keyvault) 29 (Certificates should have the specified maximum validity period (/providers/microsoft.authorization/policydefinitions/0a075868-4c26-42ef-914c-5bc007359560), Key vaults should have deletion protection enabled (/providers/microsoft.authorization/policydefinitions/0b60c0b2-2dc2-4e1c-b5c9-abbed971de53), Certificates should use allowed key types (/providers/microsoft.authorization/policydefinitions/1151cede-290b-4ba0-8b38-0ad145ac888f), Azure Key Vault should use RBAC permission model (/providers/microsoft.authorization/policydefinitions/12d4fa5e-1f9f-4c21-97a9-b99b3c6611b5), Certificates should have the specified lifetime action triggers (/providers/microsoft.authorization/policydefinitions/12ef42cb-9903-4e39-9c26-422d29570417), Key Vault keys should have an expiration date (/providers/microsoft.authorization/policydefinitions/152b15f7-8e1f-4c1f-ab71-8c010ba5dbc0), [Preview]: Azure Key Vault Managed HSM keys should have an expiration date (/providers/microsoft.authorization/policydefinitions/1d478a74-21ba-4b9f-9d8f-8e6fced0eec5), Key vaults should have soft delete enabled (/providers/microsoft.authorization/policydefinitions/1e66c121-a66a-4b1f-9b83-0fd99bf0fc2d), Secrets should have the specified maximum validity period (/providers/microsoft.authorization/policydefinitions/342e8053-e12e-4c44-be01-c3c2f318400f), Keys should have the specified maximum validity period (/providers/microsoft.authorization/policydefinitions/49a22571-d204-4c91-a7b6-09b1a586fbc9), Azure Key Vault should have firewall enabled or public network access disabled (/providers/microsoft.authorization/policydefinitions/55615ac9-af46-4a59-874e-391cc3dfb490), Keys should have more than the specified number of days before expiration (/providers/microsoft.authorization/policydefinitions/5ff38825-c5d8-47c5-b70e-069a21955146), Secrets should have content type set (/providers/microsoft.authorization/policydefinitions/75262d3e-ba4a-4f43-85f8-9f72c090e5e3), Keys should be the specified cryptographic type RSA or EC (/providers/microsoft.authorization/policydefinitions/75c4f823-d65c-4f29-a733-01d0077fdbcb), Keys using RSA cryptography should have a specified minimum key size (/providers/microsoft.authorization/policydefinitions/82067dbb-e53b-4e06-b631-546d197452d9), [Preview]: Azure Key Vault Managed HSM keys using RSA cryptography should have a specified minimum key size (/providers/microsoft.authorization/policydefinitions/86810a98-8e91-4a44-8386-ec66d0de5d57), Certificates should be issued by the specified integrated certificate authority (/providers/microsoft.authorization/policydefinitions/8e826246-c976-48f6-b03e-619bb92b3d82), Key Vault secrets should have an expiration date (/providers/microsoft.authorization/policydefinitions/98728c90-32c7-4049-8429-847dc0f4fe37), Certificates should be issued by the specified non-integrated certificate authority (/providers/microsoft.authorization/policydefinitions/a22f4a40-01d3-4c7d-8071-da157eeff341), [Preview]: Azure Key Vault Managed HSM Keys should have more than the specified number of days before expiration (/providers/microsoft.authorization/policydefinitions/ad27588c-0198-4c84-81ef-08efd0274653), Secrets should have more than the specified number of days before expiration (/providers/microsoft.authorization/policydefinitions/b0eb591a-5e70-4534-a8bf-04b9c489584a), Certificates using elliptic curve cryptography should have allowed curve names (/providers/microsoft.authorization/policydefinitions/bd78111f-4953-4367-9fd5-7e08808b54bf), Keys should not be active for longer than the specified number of days (/providers/microsoft.authorization/policydefinitions/c26e4b24-cf98-4c67-b48b-5a25c4c69eb9), Azure Key Vault Managed HSM should have purge protection enabled (/providers/microsoft.authorization/policydefinitions/c39ba22d-4428-4149-b981-70acb31fc383), Certificates using RSA cryptography should have the specified minimum key size (/providers/microsoft.authorization/policydefinitions/cee51871-e572-4576-855c-047c820360f0), [Preview]: Azure Key Vault Managed HSM keys using elliptic curve cryptography should have the specified curve names (/providers/microsoft.authorization/policydefinitions/e58fd0c1-feac-4d12-92db-0a7e9421f53e), Secrets should not be active for longer than the specified number of days (/providers/microsoft.authorization/policydefinitions/e8d99835-8a06-45ae-a8e0-87a91941ccfe), Certificates should not expire within the specified number of days (/providers/microsoft.authorization/policydefinitions/f772fb64-8e40-40ad-87bc-7706e1949427), Keys using elliptic curve cryptography should have the specified curve names (/providers/microsoft.authorization/policydefinitions/ff25f3c8-b739-4538-9d07-3d6d25cfb255))
Enforce recommended guardrails for Bot Service /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-botservice Bot Service true 0 4 (Bot Service should have isolated mode enabled (/providers/microsoft.authorization/policydefinitions/52152f42-0dda-40d9-976e-abb1acdd611e), Bot Service endpoint should be a valid HTTPS URI (/providers/microsoft.authorization/policydefinitions/6164527b-e1ee-4882-8673-572f425f5e0a), BotService resources should use private link (/providers/microsoft.authorization/policydefinitions/ad5621d6-a877-4407-aa93-a950b428315e), Bot Service should have local authentication methods disabled (/providers/microsoft.authorization/policydefinitions/ffea632e-4e3a-4424-bf78-10e179bb2e1a))
Enforce recommended guardrails for Cognitive Services /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-cognitiveservices Cognitive Services true 0 9 (Configure Cognitive Services accounts to disable local authentication methods (/providers/microsoft.authorization/policydefinitions/14de9e63-1b31-492e-a5a3-c3f7fd57f555), Cognitive Services accounts should use customer owned storage (/providers/microsoft.authorization/policydefinitions/46aa9b05-0e60-4eae-a88b-1e9d374fa515), Configure Cognitive Services accounts to disable public network access (/providers/microsoft.authorization/policydefinitions/47ba1dd7-28d9-4b07-a8d5-9813bed64e0c), Configure Azure AI Search services to disable local authentication (/providers/microsoft.authorization/policydefinitions/4eb216f2-9dba-4979-86e6-5d7e63ce3b75), Azure AI Search services should have local authentication methods disabled (/providers/microsoft.authorization/policydefinitions/6300012e-e9a4-4649-b41f-a85f5c43be91), Configure Azure AI Search services to disable public network access (/providers/microsoft.authorization/policydefinitions/9cee519f-d9c1-4fd9-9f79-24ec3449ed30), Azure AI Search service should use a SKU that supports private link (/providers/microsoft.authorization/policydefinitions/a049bf77-880b-470f-ba6d-9f21c530cf83), Resource logs in Search services should be enabled (/providers/microsoft.authorization/policydefinitions/b4330a05-a843-4bc8-bf9a-cacce50c67f4), Cognitive Services accounts should use a managed identity (/providers/microsoft.authorization/policydefinitions/fe3fd216-4f83-4fc1-8984-2bbec80a3418))
Enforce recommended guardrails for Compute /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-compute Compute true 0 2 (Managed disks should be double encrypted with both platform-managed and customer-managed keys (/providers/microsoft.authorization/policydefinitions/ca91455f-eace-4f96-be59-e6e2c35b4816), Virtual machines and virtual machine scale sets should have encryption at host enabled (/providers/microsoft.authorization/policydefinitions/fc4d8e41-e223-45ea-9bf5-eada37891d87))
Enforce recommended guardrails for Container Apps /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-containerapps Container Apps true 0 2 (Container App environments should use network injection (/providers/microsoft.authorization/policydefinitions/8b346db6-85af-419b-8557-92cee2c0f9bb), Managed Identity should be enabled for Container Apps (/providers/microsoft.authorization/policydefinitions/b874ab2d-72dd-47f1-8cb5-4a306478a4e7))
Enforce recommended guardrails for Container Instance /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-containerinstance Container Instances true 0 1 (Azure Container Instance container group should deploy into a virtual network (/providers/microsoft.authorization/policydefinitions/8af8f826-edcb-4178-b35f-851ea6fea615))
Enforce recommended guardrails for Container Registry /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-containerregistry Container Registry true 0 12 (Container registries should have ARM audience token authentication disabled. (/providers/microsoft.authorization/policydefinitions/42781ec6-6127-4c30-bdfa-fb423a0047d3), Container registries should have exports disabled (/providers/microsoft.authorization/policydefinitions/524b0254-c285-4903-bee6-bb8126cde579), Configure container registries to disable ARM audience token authentication. (/providers/microsoft.authorization/policydefinitions/785596ed-054f-41bc-aaec-7f3d0ba05725), Configure container registries to disable local admin account. (/providers/microsoft.authorization/policydefinitions/79fdfe03-ffcb-4e55-b4d0-b925b8241759), Container registries should have anonymous authentication disabled. (/providers/microsoft.authorization/policydefinitions/9f2dea28-e834-476c-99c5-3507b4728395), Configure Container registries to disable public network access (/providers/microsoft.authorization/policydefinitions/a3701552-92ea-433e-9d17-33b7f1208fc9), Configure container registries to disable repository scoped access token. (/providers/microsoft.authorization/policydefinitions/a9b426fe-8856-4945-8600-18c5dd1cca2a), Container registries should have SKUs that support Private Links (/providers/microsoft.authorization/policydefinitions/bd560fc0-3c69-498a-ae9f-aa8eb7de0e13), Configure container registries to disable anonymous authentication. (/providers/microsoft.authorization/policydefinitions/cced2946-b08a-44fe-9fd9-e4ed8a779897), Container registries should not allow unrestricted network access (/providers/microsoft.authorization/policydefinitions/d0793b48-0edc-4296-a390-4c75d1bdfd71), Container registries should have local admin account disabled. (/providers/microsoft.authorization/policydefinitions/dc921057-6b28-4fbe-9b83-f7bec05db6c2), Container registries should have repository scoped access token disabled. (/providers/microsoft.authorization/policydefinitions/ff05e24e-195c-447e-b322-5e90c9f9f366))
Enforce recommended guardrails for Cosmos DB /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-cosmosdb Cosmos DB true 0 6 (Azure Cosmos DB key based metadata write access should be disabled (/providers/microsoft.authorization/policydefinitions/4750c32b-89c0-46af-bfcb-2e4541a818d5), Cosmos DB database accounts should have local authentication methods disabled (/providers/microsoft.authorization/policydefinitions/5450f5bd-9c72-4390-a9c4-a7aba4edfdd2), Azure Cosmos DB accounts should have firewall rules (/providers/microsoft.authorization/policydefinitions/862e97cf-49fc-4a5c-9de4-40d4e2e7c8eb), Deploy Advanced Threat Protection for Cosmos DB Accounts (/providers/microsoft.authorization/policydefinitions/b5f04e03-92a3-4b09-9410-2cc5e5047656), Configure CosmosDB accounts to disable public network access (/providers/microsoft.authorization/policydefinitions/da69ba51-aaf1-41e5-8651-607cd0b37088), Configure Cosmos DB database accounts to disable local authentication (/providers/microsoft.authorization/policydefinitions/dc2d41d1-4ab1-4666-a3e1-3d51c43e0049))
Enforce recommended guardrails for Data Explorer /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-dataexplorer Azure Data Explorer true 0 4 (Azure Data Explorer should use a SKU that supports private link (/providers/microsoft.authorization/policydefinitions/1fec9658-933f-4b3e-bc95-913ed22d012b), Configure Azure Data Explorer to disable public network access (/providers/microsoft.authorization/policydefinitions/7b32f193-cb28-4e15-9a98-b9556db0bafa), Double encryption should be enabled on Azure Data Explorer (/providers/microsoft.authorization/policydefinitions/ec068d99-e9c7-401f-8cef-5bdde4e6ccf1), Disk encryption should be enabled on Azure Data Explorer (/providers/microsoft.authorization/policydefinitions/f4b53539-8df9-40e4-86c6-6b607703bd4e))
Enforce recommended guardrails for Data Factory /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-datafactory Data Factory true 0 5 (SQL Server Integration Services integration runtimes on Azure Data Factory should be joined to a virtual network (/providers/microsoft.authorization/policydefinitions/0088bc63-6dee-4a9c-9d29-91cfdc848952), Configure Data Factories to disable public network access (/providers/microsoft.authorization/policydefinitions/08b1442b-7789-4130-8506-4f99a97226a7), Azure Data Factory linked services should use Key Vault for storing secrets (/providers/microsoft.authorization/policydefinitions/127ef6d7-242f-43b3-9eef-947faf1725d0), Azure Data Factory should use a Git repository for source control (/providers/microsoft.authorization/policydefinitions/77d40665-3120-4348-b539-3192ec808307), Azure Data Factory linked services should use system-assigned managed identity authentication when it is supported (/providers/microsoft.authorization/policydefinitions/f78ccdb4-7bf4-4106-8647-270491d2978a))
Enforce recommended guardrails for Event Grid /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-eventgrid Event Grid true 0 8 (Configure Azure Event Grid topics to disable local authentication (/providers/microsoft.authorization/policydefinitions/1c8144d9-746a-4501-b08c-093c8d29ad04), Configure Azure Event Grid partner namespaces to disable local authentication (/providers/microsoft.authorization/policydefinitions/2dd0e8b9-4289-4bb0-b813-1883298e9924), Modify - Configure Azure Event Grid topics to disable public network access (/providers/microsoft.authorization/policydefinitions/36ea4b4b-0f7f-4a54-89fa-ab18f555a172), Azure Event Grid partner namespaces should have local authentication methods disabled (/providers/microsoft.authorization/policydefinitions/8632b003-3545-4b29-85e6-b2b96773df1e), Modify - Configure Azure Event Grid domains to disable public network access (/providers/microsoft.authorization/policydefinitions/898e9824-104c-4965-8e0e-5197588fa5d4), Configure Azure Event Grid domains to disable local authentication (/providers/microsoft.authorization/policydefinitions/8ac2748f-3bf1-4c02-a3b6-92ae68cf75b1), Azure Event Grid domains should have local authentication methods disabled (/providers/microsoft.authorization/policydefinitions/8bfadddb-ee1c-4639-8911-a38cb8e0b3bd), Azure Event Grid topics should have local authentication methods disabled (/providers/microsoft.authorization/policydefinitions/ae9fb87f-8a17-4428-94a4-8135d431055c))
Enforce recommended guardrails for Event Hub /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-eventhub Event Hub true 0 4 (Configure Azure Event Hub namespaces to disable local authentication (/providers/microsoft.authorization/policydefinitions/57f35901-8389-40bb-ac49-3ba4f86d889d), Azure Event Hub namespaces should have local authentication methods disabled (/providers/microsoft.authorization/policydefinitions/5d4e3c65-4873-47be-94f3-6f8b953a3598), Event Hub namespaces should have double encryption enabled (/providers/microsoft.authorization/policydefinitions/836cd60e-87f3-4e6a-a27c-29d687f01a4c), All authorization rules except RootManageSharedAccessKey should be removed from Event Hub namespace (/providers/microsoft.authorization/policydefinitions/b278e460-7cfc-4451-8294-cccc40a940d7))
Enforce recommended guardrails for Kubernetes /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-kubernetes Kubernetes true 0 16 (Azure Kubernetes Service Private Clusters should be enabled (/providers/microsoft.authorization/policydefinitions/040732e8-d947-40b8-95d6-854c95024bf8), Disable Command Invoke on Azure Kubernetes Service clusters (/providers/microsoft.authorization/policydefinitions/1b708b0a-3380-40e9-8b79-821f9fa224cc), Kubernetes clusters should not allow container privilege escalation (/providers/microsoft.authorization/policydefinitions/1c6e92c9-99f0-4e55-9cf2-0c234dc48f99), Kubernetes clusters should use internal load balancers (/providers/microsoft.authorization/policydefinitions/3fc4dc25-5baf-40d8-9b05-7fe74c1bc64e), Temp disks and cache for agent node pools in Azure Kubernetes Service clusters should be encrypted at host (/providers/microsoft.authorization/policydefinitions/41425d9f-d1a5-499a-9932-f8ed8453932c), Azure Kubernetes Clusters should use Azure CNI (/providers/microsoft.authorization/policydefinitions/46238e2f-3f6f-4589-9f3f-77bed4116e67), Kubernetes cluster containers should not share host namespaces (/providers/microsoft.authorization/policydefinitions/47a1ee2f-2a2a-4576-bf2a-e0e36709c2b8), Kubernetes cluster Windows containers should not run as ContainerAdministrator (/providers/microsoft.authorization/policydefinitions/5485eac0-7e8f-4964-998b-a44f4f0c1e75), Kubernetes cluster should not use naked pods (/providers/microsoft.authorization/policydefinitions/65280eef-c8b4-425e-9aec-af55e55bf581), Kubernetes cluster should not allow privileged containers (/providers/microsoft.authorization/policydefinitions/95edb821-ddaf-4404-9732-666045e056b4), Azure Kubernetes Service Clusters should have local authentication methods disabled (/providers/microsoft.authorization/policydefinitions/993c2fcd-2b29-49d2-9eb0-df2c3a730c32), Kubernetes clusters should not use the default namespace (/providers/microsoft.authorization/policydefinitions/9f061a12-e40d-4183-a00e-171812443373), Deploy Azure Policy Add-on to Azure Kubernetes Service clusters (/providers/microsoft.authorization/policydefinitions/a8eff44f-8c92-45c3-a3fb-9880802d67a7), Ensure cluster containers have readiness or liveness probes configured (/providers/microsoft.authorization/policydefinitions/b1a9997f-2883-4f12-bdff-2280f99b5915), Kubernetes cluster containers should only use allowed capabilities (/providers/microsoft.authorization/policydefinitions/c26596ff-4d70-4e6a-9a30-c2506bd2f80c), Azure Kubernetes Clusters should enable Key Management Service (KMS) (/providers/microsoft.authorization/policydefinitions/dbbdc317-9734-4dd8-9074-993b29c69008))
Enforce recommended guardrails for Machine Learning /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-machinelearning Machine Learning true 0 14 ([Preview]: Azure Machine Learning Model Registry Deployments are restricted except for the allowed Registry (/providers/microsoft.authorization/policydefinitions/19539b54-c61e-4196-9a38-67598701be90), Azure Machine Learning workspaces should use private link (/providers/microsoft.authorization/policydefinitions/45e05259-1eb5-4f70-9574-baf73e9d219b), [Preview]: Configure allowed module authors for specified Azure Machine Learning computes (/providers/microsoft.authorization/policydefinitions/53c70b02-63dd-11ea-bc55-0242ac130003), [Preview]: Configure allowed registries for specified Azure Machine Learning computes (/providers/microsoft.authorization/policydefinitions/5853517a-63de-11ea-bc55-0242ac130003), Azure Machine Learning workspaces should use user-assigned managed identity (/providers/microsoft.authorization/policydefinitions/5f0c7d88-c7de-45b8-ac49-db49e72eaa78), Azure Machine Learning Compute Instance should have idle shutdown. (/providers/microsoft.authorization/policydefinitions/679ddf89-ab8f-48a5-9029-e76054077449), [Preview]: Configure allowed Python packages for specified Azure Machine Learning computes (/providers/microsoft.authorization/policydefinitions/77eeea86-7e81-4a7d-9067-de844d096752), Azure Machine Learning Computes should be in a virtual network (/providers/microsoft.authorization/policydefinitions/7804b5c7-01dc-4723-969b-ae300cc07ff1), Configure Azure Machine Learning Workspaces to disable public network access (/providers/microsoft.authorization/policydefinitions/a10ee784-7409-4941-b091-663697637c0f), Configure Azure Machine Learning Computes to disable local authentication methods (/providers/microsoft.authorization/policydefinitions/a6f9a2d0-cff7-4855-83ad-4cd750666512), Resource logs in Azure Machine Learning Workspaces should be enabled (/providers/microsoft.authorization/policydefinitions/afe0c3be-ba3b-4544-ba52-0c99672a8ad6), Azure Machine Learning workspaces should enable V1LegacyMode to support network isolation backward compatibility (/providers/microsoft.authorization/policydefinitions/e413671a-dd10-4cc1-a943-45b598596cb7), Azure Machine Learning Computes should have local authentication methods disabled (/providers/microsoft.authorization/policydefinitions/e96a9a5f-07ca-471b-9bc5-6a0f33cbd68f), Azure Machine Learning compute instances should be recreated to get the latest software updates (/providers/microsoft.authorization/policydefinitions/f110a506-2dcb-422e-bcea-d533fc8c35e2))
Enforce recommended guardrails for MySQL /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-mysql MySQL true 0 2 (Infrastructure encryption should be enabled for Azure Database for MySQL servers (/providers/microsoft.authorization/policydefinitions/3a58212a-c829-4f13-9872-6371df2fd0b4), Configure Advanced Threat Protection to be enabled on Azure database for MySQL servers (/providers/microsoft.authorization/policydefinitions/80ed5239-4122-41ed-b54a-6f1fa7552816))
Enforce recommended guardrails for Network and Networking services /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-network Network true 0 22 (Azure Web Application Firewall should be enabled for Azure Front Door entry-points (/providers/microsoft.authorization/policydefinitions/055aa869-bc98-4af8-bafc-23f1ab6ffe2c), Web Application Firewall (WAF) should use the specified mode for Application Gateway (/providers/microsoft.authorization/policydefinitions/12430be1-6cc8-4527-a9a8-e3d38f250096), VPN gateways should use only Azure Active Directory (Azure AD) authentication for point-to-site users (/providers/microsoft.authorization/policydefinitions/21a6bc25-125e-4d13-b82d-2e19b7208ab7), Gateway subnets should not be configured with a network security group (/providers/microsoft.authorization/policydefinitions/35f9c03a-cc27-418e-9c0c-539ff999d010), Web Application Firewall (WAF) should use the specified mode for Azure Front Door Service (/providers/microsoft.authorization/policydefinitions/425bea59-a659-4cbb-8d31-34499bd030b8), Web Application Firewall (WAF) should be enabled for Application Gateway (/providers/microsoft.authorization/policydefinitions/564feb30-bf6a-4854-b4bb-0d2d2d1e6c66), [Deprecated]: Firewall Policy Premium should enable all IDPS signature rules to monitor all inbound and outbound traffic flows (/providers/microsoft.authorization/policydefinitions/610b6183-5f00-4d68-86d2-4ab4cb3a67a5), [Deprecated]: Web Application Firewall (WAF) should enable all firewall rules for Application Gateway (/providers/microsoft.authorization/policydefinitions/632d3993-e2c0-44ea-a7db-2eca131f356d), [Deprecated]: Firewall Policy Premium should enable the Intrusion Detection and Prevention System (IDPS) (/providers/microsoft.authorization/policydefinitions/6484db87-a62d-4327-9f07-80a2cbdf333a), [Deprecated]: Azure Firewall Premium should configure a valid intermediate certificate to enable TLS inspection (/providers/microsoft.authorization/policydefinitions/711c24bb-7f18-4578-b192-81a6161e1f17), Network interfaces should not have public IPs (/providers/microsoft.authorization/policydefinitions/83a86a26-fd1f-447c-b59d-e51f44264114), Network interfaces should disable IP forwarding (/providers/microsoft.authorization/policydefinitions/88c0b9da-ce96-4b03-9635-f29a937e2900), Virtual networks should be protected by Azure DDoS Protection (/providers/microsoft.authorization/policydefinitions/94de2ad3-e0c1-4caf-ad78-5d47bbc83d3d), [Deprecated]: Azure firewall policy should enable TLS inspection within application rules (/providers/microsoft.authorization/policydefinitions/a58ac66d-92cb-409c-94b8-8e48d7a96596), [Deprecated]: Bypass list of Intrusion Detection and Prevention System (IDPS) should be empty in Firewall Policy Premium (/providers/microsoft.authorization/policydefinitions/f516dc7a-4543-4d40-aad6-98f76a706b50), Application Gateway should be deployed with predefined Microsoft policy that is using TLS version 1.2 (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-appgw-without-tls), Deny or Audit service endpoints on subnets (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-service-endpoints), Enforce specific configuration of Network Security Groups (NSG) (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/modify-nsg), Enforce specific configuration of User-Defined Routes (UDR) (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/modify-udr), Management port access from the Internet should be blocked (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-mgmtports-from-internet), Subnets should have a Network Security Group (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-subnet-without-nsg), Subnets should have a User Defined Route (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-subnet-without-udr))
Enforce recommended guardrails for Open AI (Cognitive Service) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-openai Cognitive Services true 0 11 (Azure AI Services resources should restrict network access (/providers/microsoft.authorization/policydefinitions/037eea7a-bd0a-46c5-9a66-03aea78705d3), Configure Cognitive Services accounts to disable local authentication methods (/providers/microsoft.authorization/policydefinitions/14de9e63-1b31-492e-a5a3-c3f7fd57f555), Diagnostic logs in Azure AI services resources should be enabled (/providers/microsoft.authorization/policydefinitions/1b4d1c4e-934c-4703-944c-27c82c06bebb), Cognitive Services accounts should use customer owned storage (/providers/microsoft.authorization/policydefinitions/46aa9b05-0e60-4eae-a88b-1e9d374fa515), Configure Azure AI Services resources to disable local key access (disable local authentication) (/providers/microsoft.authorization/policydefinitions/55eff01b-f2bd-4c32-9203-db285f709d30), Azure AI Services resources should have key access disabled (disable local authentication) (/providers/microsoft.authorization/policydefinitions/71ef260a-8f18-47b7-abcb-62d0673d94dc), Configure Azure AI Services resources to disable local key access (disable local authentication) (/providers/microsoft.authorization/policydefinitions/d45520cb-31ca-44ba-8da2-fcf914608544), Azure AI Services resources should use Azure Private Link (/providers/microsoft.authorization/policydefinitions/d6759c02-b87f-42b7-892e-71b3f471d782), Cognitive Services accounts should use a managed identity (/providers/microsoft.authorization/policydefinitions/fe3fd216-4f83-4fc1-8984-2bbec80a3418), Network ACLs should be restricted for Cognitive Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-cognitiveservices-networkacls), Outbound network access should be restricted for Cognitive Services (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-cognitiveservices-restrictoutboundnetworkaccess))
Enforce recommended guardrails for PostgreSQL /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-postgresql PostgreSQL true 0 1 (Configure Advanced Threat Protection to be enabled on Azure database for PostgreSQL servers (/providers/microsoft.authorization/policydefinitions/db048e65-913c-49f9-bb5f-1084184671d3))
Enforce recommended guardrails for Service Bus /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-servicebus Service Bus true 0 4 (Configure Azure Service Bus namespaces to disable local authentication (/providers/microsoft.authorization/policydefinitions/910711a6-8aa2-4f15-ae62-1e5b2ed3ef9e), All authorization rules except RootManageSharedAccessKey should be removed from Service Bus namespace (/providers/microsoft.authorization/policydefinitions/a1817ec0-a368-432a-8057-8371e17ac6ee), Azure Service Bus namespaces should have local authentication methods disabled (/providers/microsoft.authorization/policydefinitions/cfb11c26-f069-4c14-8e36-56c394dae5af), Service Bus namespaces should have double encryption enabled (/providers/microsoft.authorization/policydefinitions/ebaf4f25-a4e8-415f-86a8-42d9155bef0b))
Enforce recommended guardrails for SQL and SQL Managed Instance /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-sql SQL true 0 5 (Configure Azure SQL Server to disable public network access (/providers/microsoft.authorization/policydefinitions/28b0b1e5-17ba-4963-a7a4-5a1ab4400a0b), Deploy Advanced Data Security on SQL servers (/providers/microsoft.authorization/policydefinitions/6134c3db-786f-471e-87bc-8f479dc890f6), Azure SQL Managed Instances should have Microsoft Entra-only authentication enabled during creation (/providers/microsoft.authorization/policydefinitions/78215662-041e-49ed-a9dd-5385911b3a1f), Azure SQL Database should have Microsoft Entra-only authentication enabled during creation (/providers/microsoft.authorization/policydefinitions/abda6d70-9778-44e7-84a8-06713e6db027), Configure Azure Defender to be enabled on SQL managed instances (/providers/microsoft.authorization/policydefinitions/c5a62eb0-c65a-4220-8a4d-f70dd4ca95dd))
Enforce recommended guardrails for Storage Account /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-storage Storage true 0 22 (Storage account keys should not be expired (/providers/microsoft.authorization/policydefinitions/044985bb-afe1-42cd-8a36-9d5d42424537), Modify - Configure Azure File Sync to disable public network access (/providers/microsoft.authorization/policydefinitions/0e07b2e9-6cd9-4c40-9ccb-52817b95133b), Configure your Storage account public access to be disallowed (/providers/microsoft.authorization/policydefinitions/13502221-8df0-4414-9937-de9c5c4e396b), Storage accounts should restrict network access using virtual network rules (/providers/microsoft.authorization/policydefinitions/2a1a9cdf-e04d-429a-8416-3bfb72a1b26f), Storage accounts should restrict network access (/providers/microsoft.authorization/policydefinitions/34c877ad-507e-4c82-993e-3452a6e0ad3c), [Deprecated]: Deploy Defender for Storage (Classic) on storage accounts (/providers/microsoft.authorization/policydefinitions/361c2074-3595-4e5d-8cab-4f21dffc835c), Storage accounts should be migrated to new Azure Resource Manager resources (/providers/microsoft.authorization/policydefinitions/37e0d2fe-28a5-43d6-a273-67d37d1f5606), Storage accounts should have infrastructure encryption (/providers/microsoft.authorization/policydefinitions/4733ea7b-a883-42fe-8cac-97454c2a9e4a), Storage accounts should prevent shared key access (/providers/microsoft.authorization/policydefinitions/8c6a50c6-9ffd-4ae7-986f-5fa6111f9a54), Storage accounts should prevent cross tenant object replication (/providers/microsoft.authorization/policydefinitions/92a89a79-6c52-4a7e-a03f-61306fc49312), Configure storage accounts to disable public network access (/providers/microsoft.authorization/policydefinitions/a06d0189-92e8-4dba-b0c4-08d7669fce7d), Storage account encryption scopes should use double encryption for data at rest (/providers/microsoft.authorization/policydefinitions/bfecdea6-31c4-4045-ad42-71b9dc87247d), Allowed Copy scope should be restricted for Storage Accounts (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-storage-copyscope), Encryption for storage services should be enforced for Storage Accounts (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-storage-servicesencryption), Local users should be restricted for Storage Accounts (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-storage-localuser), Network ACL bypass option should be restricted for Storage Accounts (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-storage-networkaclsbypass), Resource Access Rules resource IDs should be restricted for Storage Accounts (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-storage-resourceaccessrulesresourceid), Resource Access Rules Tenants should be restricted for Storage Accounts (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-storage-resourceaccessrulestenantid), Storage Accounts should restrict CORS rules (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-storage-corsrules), Storage Accounts should use a container delete retention policy (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-storage-containerdeleteretentionpolicy), Storage Accounts with SFTP enabled should be denied (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-storage-sftp), Virtual network rules should be restricted for Storage Accounts (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-storage-networkaclsvirtualnetworkrules))
Enforce recommended guardrails for Synapse workspaces /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-synapse Synapse true 0 9 (Synapse Workspaces should use only Microsoft Entra identities for authentication during workspace creation (/providers/microsoft.authorization/policydefinitions/2158ddbe-fefa-408e-b43f-d4faef8ff3b8), Managed workspace virtual network on Azure Synapse workspaces should be enabled (/providers/microsoft.authorization/policydefinitions/2d9dbfa3-927b-4cf0-9d0f-08747f971650), Azure Synapse workspaces should allow outbound data traffic only to approved targets (/providers/microsoft.authorization/policydefinitions/3484ce98-c0c5-4c83-994b-c5ac24785218), Synapse managed private endpoints should only connect to resources in approved Azure Active Directory tenants (/providers/microsoft.authorization/policydefinitions/3a003702-13d2-4679-941b-937e58c443f0), IP firewall rules on Azure Synapse workspaces should be removed (/providers/microsoft.authorization/policydefinitions/56fd377d-098c-4f02-8406-81eb055902b8), Configure Azure Synapse workspaces to disable public network access (/providers/microsoft.authorization/policydefinitions/5c8cad01-ef30-4891-b230-652dadb4876a), Configure Azure Synapse Workspace Dedicated SQL minimum TLS version (/providers/microsoft.authorization/policydefinitions/8b5c654c-fb07-471b-aa8f-15fea733f140), Configure Microsoft Defender for SQL to be enabled on Synapse workspaces (/providers/microsoft.authorization/policydefinitions/951c1558-50a5-4ca3-abb6-a93e3e2367a6), Configure Synapse Workspaces to use only Microsoft Entra identities for authentication during workspace creation (/providers/microsoft.authorization/policydefinitions/c3624673-d2ff-48e0-b28c-5de1c6767c3c))
Enforce recommended guardrails for Virtual Desktop /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-virtualdesktop Desktop Virtualization true 0 2 (Configure Azure Virtual Desktop hostpools to disable public network access (/providers/microsoft.authorization/policydefinitions/2a0913ff-51e7-47b8-97bb-ea17127f7c8d), Configure Azure Virtual Desktop workspaces to disable public network access (/providers/microsoft.authorization/policydefinitions/ce6ebf1d-0b94-4df9-9257-d8cacc238b4f))
Public network access should be disabled for PaaS services /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deny-publicpaasendpoints Network true 1 (/providers/microsoft.management/managementgroups/mibelle-landingzones-corp-mg/providers/microsoft.authorization/policyassignments/deny-public-endpoints) 45 (Azure AI Services resources should restrict network access (/providers/microsoft.authorization/policydefinitions/037eea7a-bd0a-46c5-9a66-03aea78705d3), Azure Kubernetes Service Private Clusters should be enabled (/providers/microsoft.authorization/policydefinitions/040732e8-d947-40b8-95d6-854c95024bf8), Event Hub Namespaces should disable public network access (/providers/microsoft.authorization/policydefinitions/0602787f-9896-402a-a6e1-39ee63ee435e), [Deprecated]: Cognitive Services accounts should disable public network access (/providers/microsoft.authorization/policydefinitions/0725b4dd-7e76-479c-a735-68e7ee23d5ca), Public network access should be disabled for Container registries (/providers/microsoft.authorization/policydefinitions/0fdf0491-d080-4575-b627-ad0e843cba0f), Function app slots should disable public network access (/providers/microsoft.authorization/policydefinitions/11c82d0c-db9f-4d7b-97c5-f3f9aa957da2), [Preview]: Azure Key Vault Managed HSM should disable public network access (/providers/microsoft.authorization/policydefinitions/19ea9d63-adee-4431-a95e-1913c6c1c75f), Azure Event Grid topics should disable public network access (/providers/microsoft.authorization/policydefinitions/1adadefe-5f21-44f7-b931-a59b54ccdb45), App Service apps should disable public network access (/providers/microsoft.authorization/policydefinitions/1b5ef780-c53c-4a64-87f3-bb9c8c8094ba), Public network access on Azure SQL Database should be disabled (/providers/microsoft.authorization/policydefinitions/1b8ca024-1d5c-4dec-8995-b1a932b41780), Public network access on Azure Data Factory should be disabled (/providers/microsoft.authorization/policydefinitions/1cf164be-6819-4a50-b8fa-4bcaa4f98fb6), Public network access should be disabled for Azure File Sync (/providers/microsoft.authorization/policydefinitions/21a8cd35-125e-4d13-b82d-2e19b7208bb7), App Service Environment apps should not be reachable over public internet (/providers/microsoft.authorization/policydefinitions/2d048aca-6479-4923-88f5-e2ac295d9af3), Azure Synapse workspaces should disable public network access (/providers/microsoft.authorization/policydefinitions/38d8df46-cf4e-4073-8e03-48c24b29de0d), App Configuration should disable public network access (/providers/microsoft.authorization/policydefinitions/3d9f5e4c-9947-4579-9539-2a7695fbc187), Azure Key Vault should disable public network access (/providers/microsoft.authorization/policydefinitions/405c5871-3e91-4644-8a63-58e19d68ff5b), Azure Machine Learning Workspaces should disable public network access (/providers/microsoft.authorization/policydefinitions/438c38d2-3772-465a-a9cc-7a6666a275ce), Public network access on Azure Data Explorer should be disabled (/providers/microsoft.authorization/policydefinitions/43bc7be6-5e69-4b0d-a2bb-e815557ca673), Azure Cache for Redis should disable public network access (/providers/microsoft.authorization/policydefinitions/470baccb-7e51-4549-8b1a-3e5be069f663), Storage account public access should be disallowed (/providers/microsoft.authorization/policydefinitions/4fa4b6c0-31ca-4c0d-b10d-24b96f62a751), Public network access should be disabled for PostgreSQL flexible servers (/providers/microsoft.authorization/policydefinitions/5e1de0e3-42cb-4ebc-a86d-61d0c619ca48), Bot Service should have public network access disabled (/providers/microsoft.authorization/policydefinitions/5e8168db-69e3-4beb-9822-57cb59202a9d), App Service app slots should disable public network access (/providers/microsoft.authorization/policydefinitions/701a595d-38fb-4a66-ae6d-fb3735217622), Public network access should be disabled for Batch accounts (/providers/microsoft.authorization/policydefinitions/74c5a0ae-5e48-4738-b093-65e23a060488), Container Apps should disable external network access (/providers/microsoft.authorization/policydefinitions/783ea2a8-b8fd-46be-896a-9ae79643a0b1), Azure Cosmos DB should disable public network access (/providers/microsoft.authorization/policydefinitions/797b37f7-06b8-444c-b1ad-fc62867f335a), Managed disks should disable public network access (/providers/microsoft.authorization/policydefinitions/8405fdab-1faf-48aa-b702-999c9c172094), Azure Virtual Desktop workspaces should disable public network access (/providers/microsoft.authorization/policydefinitions/87ac3038-c07a-4b92-860d-29e270a4f3cd), Automation accounts should disable public network access (/providers/microsoft.authorization/policydefinitions/955a914f-bf86-4f0e-acd5-e0766b0efcb6), Function apps should disable public network access (/providers/microsoft.authorization/policydefinitions/969ac98b-88a8-449f-883c-2e9adb123127), Azure SQL Managed Instances should disable public network access (/providers/microsoft.authorization/policydefinitions/9dfea752-dd46-4766-aed1-c355fa93fb91), [Preview]: Azure Recovery Services vaults should disable public network access (/providers/microsoft.authorization/policydefinitions/9ebbbba3-4d65-4da9-bb67-b22cfaaff090), Storage accounts should disable public network access (/providers/microsoft.authorization/policydefinitions/b2982f36-99f2-4db5-8eff-283140c09693), Public network access should be disabled for PostgreSQL servers (/providers/microsoft.authorization/policydefinitions/b52376f7-9612-48a1-81cd-1ffe4b61032c), Azure Virtual Desktop hostpools should disable public network access (/providers/microsoft.authorization/policydefinitions/c25dcf31-878f-4eba-98eb-0818fdc6a334), Public network access should be disabled for MySQL flexible servers (/providers/microsoft.authorization/policydefinitions/c9299215-ae47-4f50-9c54-8a392f68a052), Service Bus Namespaces should disable public network access (/providers/microsoft.authorization/policydefinitions/cbd11fd3-3002-4907-b6c8-579f0e700e13), Container Apps environment should disable public network access (/providers/microsoft.authorization/policydefinitions/d074ddf8-01a5-4b5e-a2b8-964aed452c0a), Public network access should be disabled for MySQL servers (/providers/microsoft.authorization/policydefinitions/d9844e8a-1437-4aeb-a32c-0c992f056095), API Management should disable public network access to the service configuration endpoints (/providers/microsoft.authorization/policydefinitions/df73bd95-24da-4a4f-96b9-4e8b94b402bd), Azure Managed Grafana workspaces should disable public network access (/providers/microsoft.authorization/policydefinitions/e8775d5a-73b7-4977-a39b-833ef0114628), Azure AI Search services should disable public network access (/providers/microsoft.authorization/policydefinitions/ee980b6d-0eca-4501-8d54-f6290fd512c3), Azure Event Grid domains should disable public network access (/providers/microsoft.authorization/policydefinitions/f8f774be-6aee-492a-9e29-486ef81f3a68), Public network access should be disabled for MariaDB servers (/providers/microsoft.authorization/policydefinitions/fdccbe47-f3e3-4213-ad5d-ea459b2fa077), Logic apps should disable public network access (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-logicapp-public-network))
Unused resources driving cost should be avoided /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/audit-unusedresourcescostoptimization Cost Optimization true 1 (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-unusedresources) 4 (Audit AHUB for eligible VMs (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/audit-azurehybridbenefit), Unused App Service plans driving cost should be avoided (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/audit-serverfarms-unusedresourcescostoptimization), Unused Disks driving cost should be avoided (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/audit-disks-unusedresourcescostoptimization), Unused Public IP addresses driving cost should be avoided (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/audit-publicipaddresses-unusedresourcescostoptimization))
0 Blueprints scoped
   Download CSV semicolon | comma
  *Depending on the number of rows and your computer´s performance the table may respond with delay, download the csv for better filtering experience
Scope Role RoleId Role Type Data Can do Role assignment Identity Displayname Identity SignInName Identity ObjectId Identity Type Applicability Applies through membership Group Details Role AssignmentId Related Policy Assignment CreatedOn CreatedBy
inherited Tenant User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false True CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member direct /providers/microsoft.authorization/roleassignments/3f958da1-722a-4c03-8398-aab60735ecd3 none 05/07/2025 18:14:55 ObjectType: User Member, ObjectDisplayName: CSA-Jan.Stutz, ObjectSignInName: CSA-Jan.Stutz@MIBCloud.onmicrosoft.com, ObjectId: 43b3e278-6551-4566-83a8-c19abe643e64
thisScope MG [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/e14ef9ac-25e8-4ee7-887a-a6576bd5229d none 11/28/2025 07:57:36 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
thisScope MG Monitoring Contributor 749f88d5-cbae-40b8-bcfc-e573ddc772fa Builtin false False Deploy-AzActivity-Log n/a 217aa040-8eb0-451b-b81c-0b8f3d200d5a SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/dcb59c88-f014-5e17-840c-6c9aecc66286 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log (Configure Azure Activity logs to stream to specified Log Analytics workspace) 06/12/2025 17:56:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
thisScope MG Monitoring Contributor 749f88d5-cbae-40b8-bcfc-e573ddc772fa Builtin false False Deploy-Diag-Logs n/a 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b922046a-7a3e-59da-a982-8a5b855791ce /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs (Enable audit category group resource logging for supported resources to Log Analytics) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
thisScope MG Log Analytics Contributor 92aaf0da-9dab-42b6-94a3-d43ce8d16293 Builtin false False Deploy-AzActivity-Log n/a 217aa040-8eb0-451b-b81c-0b8f3d200d5a SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/82f0c3bf-808b-5863-bf9c-231cfbf9598a /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log (Configure Azure Activity logs to stream to specified Log Analytics workspace) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
thisScope MG Log Analytics Contributor 92aaf0da-9dab-42b6-94a3-d43ce8d16293 Builtin false False Deploy-Diag-Logs n/a 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/9df772a7-1ce7-5439-ab6b-5d31d69925cc /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs (Enable audit category group resource logging for supported resources to Log Analytics) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
thisScope MG Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Meier, Heinz-MIBELLEGROUP heinz.meier@mibelle.net 06addc33-6298-4f01-9f6b-709193f099cc User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
thisScope MG Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Subs-MibelleOnline-SubscriptionOwner n/a 1bdf326c-8c66-4ba9-8c2d-83312a1ddc02 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
thisScope MG Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-Reader n/a 1c529912-c479-41a1-8a03-e57256720fa4 Group direct 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
thisScope MG Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser n/a 1f3ede05-4301-42b1-8c95-2be94290e93c Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
thisScope MG Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
thisScope MG Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
thisScope MG Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Hasanow, Kilian-MIBELLEGROUP kilian.hasanow@mibelle.net 4270eb01-73cf-4e17-925e-47461737b40e User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
thisScope MG Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
thisScope MG Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Mibelle-AzGovWiz-prod n/a 44b03901-55d2-49a8-af3a-58228a81408c SP APP INT indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
thisScope MG Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-michael.peter csa-michael.peter@MIBCloud.mail.onmicrosoft.com 460bad8a-cc4d-41dc-9ddd-f24ba491e2a6 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
thisScope MG Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
thisScope MG Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner n/a 52364002-4a8b-4808-b4fc-864ed5f7d50d Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
thisScope MG Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Matej Paunovski CSA-matej.paunovski@MIBCloud.onmicrosoft.com 54f81d33-50db-475c-b686-4ef70aa0b4fe User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
thisScope MG Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Ouaouane, Taoufik-MIBELLEGROUP taoufik.ouaouane@mibelle.net 7100d1ce-5bd7-449d-abdd-52a7218922b3 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
thisScope MG Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-NetOps n/a 87e9d07b-5340-455c-b297-8bffe3b86f78 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
thisScope MG Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner n/a 9b120856-d4b2-4862-95df-bedf8d5fe1c3 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
thisScope MG Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-Baswaraj Marotrao Ramshette csa-baswarajmarotrao.ramshette@MIBCloud.onmicrosoft.com 9d8d246b-a1f9-4d9a-a54f-f7ae9f3af2ae User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
thisScope MG Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-SecOps n/a abf39027-4cb4-4298-8951-f984eaf9cb8e Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
thisScope MG Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Baumann, Jürg-MIBELLEGROUP juerg.baumann_mibellegroup.com#EXT#@MIBCloud.onmicrosoft.com bb2279b2-06ab-459a-b981-579701601f8a User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
thisScope MG Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin n/a cb058f58-c629-445f-9a10-75f9fcab694e Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
thisScope MG Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
thisScope MG Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Philipp.Schmidt CSA-Philipp.Schmidt@MIBCloud.onmicrosoft.com e40a73c8-6655-434d-8c8b-fdc4d9213499 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
thisScope MG Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Taoufik.Ouaouane csa-Taoufik.Ouaouane@mibelle.net e58ba28f-09ed-49c3-8f5e-31b05c258cde User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
thisScope MG Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Adrian.Bombelka CSA-Adrian.Bombelka@MIBCloud.onmicrosoft.com e86b38a8-e5d4-4888-b09d-390dcf9a2017 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
thisScope MG Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False Enforce-ACSB n/a e1f2e80c-5329-4804-824d-f0b44713985e SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/6e26cd22-b41b-5611-aafc-e2c56b14c060 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/enforce-acsb (Enforce Azure Compute Security Benchmark compliance auditing) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
thisScope MG Security Admin fb1c8493-542b-48eb-b624-b4c8fea62acd Builtin false False Deploy-MDEndpointsAMA n/a 7d365a6d-a7ae-4921-beca-5ce854a76960 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/d730d560-adce-52b7-b10c-36a8ad16a6d3 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-mdendpointsama (Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
thisScope MG [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78)
thisScope MG [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78)
thisScope MG [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78)
thisScope MG [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78)
thisScope MG [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False SGU-MIB-RES-Azure-Magr-Mibelle-NetOps 87e9d07b-5340-455c-b297-8bffe3b86f78 Group direct
thisScope MG [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78)
thisScope MG [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e)
thisScope MG [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e)
thisScope MG [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e)
thisScope MG [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False SGU-MIB-RES-Azure-Magr-Mibelle-SecOps abf39027-4cb4-4298-8951-f984eaf9cb8e Group direct
thisScope MG Reservation Purchaser f7b75c60-3036-4b75-91c3-6b41c27c1689 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser 1f3ede05-4301-42b1-8c95-2be94290e93c Group direct
thisScope MG Reservation Purchaser f7b75c60-3036-4b75-91c3-6b41c27c1689 Builtin false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser (1f3ede05-4301-42b1-8c95-2be94290e93c)
thisScope MG User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e)
thisScope MG User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e)
thisScope MG User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e)
thisScope MG User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin cb058f58-c629-445f-9a10-75f9fcab694e Group direct
thisScope MG User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e)
0 Subscriptions linked
Highlight Management Group in HierarchyMap

Management Group Name: Decommissioned

Management Group Id: mibelle-decommissioned-mg

Management Group Path: a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-decommissioned-mg

0 ManagementGroups below this scope
0 Subscriptions below this scope
Microsoft Defender for Cloud Secure Score: n/a Video , Blog , learn
   Download CSV semicolon | comma
Diagnostic setting Target Target Id Administrative Policy
toLa LA /subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 true true
No Consumption data available as switch parameter -DoAzureConsumption was not applied 0 ResourceTypes (all Subscriptions below this scope)
0 ResourceTypes (1st party) Diagnostics capable (all Subscriptions below this scope)
PSRule for Azure - integration paused - PSRule for Azure
   Download CSV semicolon | comma
  *Depending on the number of rows and your computer´s performance the table may respond with delay, download the csv for better filtering experience
Inheritance ScopeExcluded Exemption applies Policy DisplayName PolicyId Type Category ALZ Effect Parameters Enforcement NonCompliance Message Policies NonCmplnt Policies Compliant Resources NonCmplnt Resources Compliant Resources Conflicting Role/Assignment Managed Identity Assignment DisplayName AssignmentId AssignedBy CreatedOn CreatedBy UpdatedOn UpdatedBy
inherited mibelle-mg false false Audit resource location matches resource group location /providers/microsoft.authorization/policydefinitions/0a914e76-4921-4c19-b460-a2d36003525a BuiltIn General False audit Default 0 0 0 0 0 none Audit that the resource location matches its resource group location /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-location-match n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false false Not allowed resource types /providers/microsoft.authorization/policydefinitions/6c112d4e-5bc7-47ae-a041-ea2d9dccd749 BuiltIn General False Deny effect=Deny, listOfResourceTypesNotAllowed=Microsoft.ClassicCompute/capabilities; Microsoft.ClassicCompute/checkDomainNameAvailability; Microsoft.ClassicCompute/domainNames; Microsoft.ClassicCompute/domainNames/capabilities; Microsoft.ClassicCompute/domainNames/internalLoadBalancers; Microsoft.ClassicCompute/domainNames/serviceCertificates; Microsoft.ClassicCompute/domainNames/slots; Microsoft.ClassicCompute/domainNames/slots/roles; Microsoft.ClassicCompute/domainNames/slots/roles/metricDefinitions; Microsoft.ClassicCompute/domainNames/slots/roles/metrics; Microsoft.ClassicCompute/moveSubscriptionResources; Microsoft.ClassicCompute/operatingSystemFamilies; Microsoft.ClassicCompute/operatingSystems; Microsoft.ClassicCompute/operations; Microsoft.ClassicCompute/operationStatuses; Microsoft.ClassicCompute/quotas; Microsoft.ClassicCompute/resourceTypes; Microsoft.ClassicCompute/validateSubscriptionMoveAvailability; Microsoft.ClassicCompute/virtualMachines; Microsoft.ClassicCompute/virtualMachines/diagnosticSettings; Microsoft.ClassicCompute/virtualMachines/metricDefinitions; Microsoft.ClassicCompute/virtualMachines/metrics; Microsoft.ClassicInfrastructureMigrate/classicInfrastructureResources; Microsoft.ClassicNetwork/capabilities; Microsoft.ClassicNetwork/expressRouteCrossConnections; Microsoft.ClassicNetwork/expressRouteCrossConnections/peerings; Microsoft.ClassicNetwork/gatewaySupportedDevices; Microsoft.ClassicNetwork/networkSecurityGroups; Microsoft.ClassicNetwork/operations; Microsoft.ClassicNetwork/quotas; Microsoft.ClassicNetwork/reservedIps; Microsoft.ClassicNetwork/virtualNetworks; Microsoft.ClassicNetwork/virtualNetworks/remoteVirtualNetworkPeeringProxies; Microsoft.ClassicNetwork/virtualNetworks/virtualNetworkPeerings; Microsoft.ClassicStorage/capabilities; Microsoft.ClassicStorage/checkStorageAccountAvailability; Microsoft.ClassicStorage/disks; Microsoft.ClassicStorage/images; Microsoft.ClassicStorage/operations; Microsoft.ClassicStorage/osImages; Microsoft.ClassicStorage/osPlatformImages; Microsoft.ClassicStorage/publicImages; Microsoft.ClassicStorage/quotas; Microsoft.ClassicStorage/storageAccounts; Microsoft.ClassicStorage/storageAccounts/blobServices; Microsoft.ClassicStorage/storageAccounts/fileServices; Microsoft.ClassicStorage/storageAccounts/metricDefinitions; Microsoft.ClassicStorage/storageAccounts/metrics; Microsoft.ClassicStorage/storageAccounts/queueServices; Microsoft.ClassicStorage/storageAccounts/services; Microsoft.ClassicStorage/storageAccounts/services/diagnosticSettings; Microsoft.ClassicStorage/storageAccounts/services/metricDefinitions; Microsoft.ClassicStorage/storageAccounts/services/metrics; Microsoft.ClassicStorage/storageAccounts/tableServices; Microsoft.ClassicStorage/storageAccounts/vmImages; Microsoft.ClassicStorage/vmImages; Microsoft.ClassicSubscription/operations Default 0 0 0 0 0 none Deny the deployment of classic resources /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deny-classic-resources n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false false Audit VMs that do not use managed disks /providers/microsoft.authorization/policydefinitions/06a78e20-9358-41c9-923c-fb736d382a4d BuiltIn Compute False audit Default 0 0 0 0 0 none Deny virtual machines and virtual machine scale sets that do not use managed disk /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deny-unmanageddisk n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false false Configure Azure Activity logs to stream to specified Log Analytics workspace /providers/microsoft.authorization/policydefinitions/2465583e-4e78-4c15-b6be-a36cbc7c8b0f BuiltIn Monitoring False DeployIfNotExists effect=DeployIfNotExists, logAnalytics=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 0 0 0 0 Monitoring Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/dcb59c88-f014-5e17-840c-6c9aecc66286), Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/82f0c3bf-808b-5863-bf9c-231cfbf9598a) Deploy-AzActivity-Log (SPObjId: 217aa040-8eb0-451b-b81c-0b8f3d200d5a) Deploy Diagnostic Settings for Activity Log to Log Analytics workspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
   Download CSV semicolon | comma
Inheritance ScopeExcluded PolicySet DisplayName PolicySetId Type Category ALZ Parameters Enforcement NonCompliance Message Policies NonCmplnt Policies Compliant Resources NonCmplnt Resources Compliant Resources Conflicting Role/Assignment Managed Identity Assignment DisplayName AssignmentId AssignedBy CreatedOn CreatedBy UpdatedOn UpdatedBy
thisScope Mg false Enforce policies in the Decommissioned Landing Zone /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-alz-decomm Custom Decommissioned true listOfResourceTypesAllowed=microsoft.consumption/tags; microsoft.authorization/roleassignments; microsoft.authorization/roledefinitions; microsoft.authorization/policyassignments; microsoft.authorization/locks; microsoft.authorization/policydefinitions; microsoft.authorization/policysetdefinitions; microsoft.resources/tags; microsoft.authorization/roleeligibilityschedules; microsoft.authorization/roleeligibilityscheduleinstances; microsoft.authorization/roleassignmentschedules; microsoft.authorization/roleassignmentscheduleinstances Default 0 0 0 0 0 Virtual Machine Contributor (/providers/microsoft.management/managementgroups/mibelle-decommissioned-mg/providers/microsoft.authorization/roleassignments/5e51d472-1e7a-5e45-8cf7-e3bb9d2323d4) Enforce-ALZ-Decomm (SPObjId: 449067cf-1d3a-494e-9c11-cb5b5e97fc69) Enforce ALZ Decommissioned Guardrails /providers/microsoft.management/managementgroups/mibelle-decommissioned-mg/providers/microsoft.authorization/policyassignments/enforce-alz-decomm n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Audit virtual machines for Trusted Launch support /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/audit-trustedlaunch Custom Trusted Launch true Default 0 0 0 0 0 none Audit virtual machines for Trusted Launch support /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-trustedlaunch n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Unused resources driving cost should be avoided /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/audit-unusedresourcescostoptimization Custom Cost Optimization true EffectDisks=Audit, EffectPublicIpAddresses=Audit, EffectServerFarms=Audit Default 0 0 0 0 0 none Unused resources driving cost should be avoided /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-unusedresources n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Microsoft cloud security benchmark /providers/microsoft.authorization/policysetdefinitions/1f3afdf9-d0c9-4c3d-847f-89da613e70a8 BuiltIn Security Center False Default 0 0 0 0 0 none Enable Monitoring in Microsoft Defender for Cloud /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-asc-monitoring n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Enable audit category group resource logging for supported resources to Log Analytics /providers/microsoft.authorization/policysetdefinitions/f5b29bc4-feca-4cc6-a58a-772dd5e290a5 BuiltIn Monitoring False logAnalytics=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 0 0 0 0 Monitoring Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b922046a-7a3e-59da-a982-8a5b855791ce), Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/9df772a7-1ce7-5439-ab6b-5d31d69925cc) Deploy-Diag-Logs (SPObjId: 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57) Enable allLogs category group resource logging for supported resources to Log Analytics /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud /providers/microsoft.authorization/policysetdefinitions/77b391e3-2d5d-40c3-83bf-65c846b3c6a3 BuiltIn Security Center False Default 0 0 0 0 0 Security Admin (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/d730d560-adce-52b7-b10c-36a8ad16a6d3) Deploy-MDEndpointsAMA (SPObjId: 7d365a6d-a7ae-4921-beca-5ce854a76960) Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-mdendpointsama n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Enforce Azure Compute Security Benchmark compliance auditing /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-acsb Custom Guest Configuration true Default 0 0 0 0 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/6e26cd22-b41b-5611-aafc-e2c56b14c060) Enforce-ACSB (SPObjId: e1f2e80c-5329-4804-824d-f0b44713985e) Enforce Azure Compute Security Baseline compliance auditing /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/enforce-acsb n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Policy Assignment Limit: 1/200
0 Custom Policy definitions scoped
0 Custom PolicySet definitions scoped
0 Blueprints scoped
   Download CSV semicolon | comma
  *Depending on the number of rows and your computer´s performance the table may respond with delay, download the csv for better filtering experience
Scope Role RoleId Role Type Data Can do Role assignment Identity Displayname Identity SignInName Identity ObjectId Identity Type Applicability Applies through membership Group Details Role AssignmentId Related Policy Assignment CreatedOn CreatedBy
inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/e14ef9ac-25e8-4ee7-887a-a6576bd5229d none 11/28/2025 07:57:36 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Monitoring Contributor 749f88d5-cbae-40b8-bcfc-e573ddc772fa Builtin false False Deploy-AzActivity-Log n/a 217aa040-8eb0-451b-b81c-0b8f3d200d5a SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/dcb59c88-f014-5e17-840c-6c9aecc66286 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log (Configure Azure Activity logs to stream to specified Log Analytics workspace) 06/12/2025 17:56:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Monitoring Contributor 749f88d5-cbae-40b8-bcfc-e573ddc772fa Builtin false False Deploy-Diag-Logs n/a 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b922046a-7a3e-59da-a982-8a5b855791ce /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs (Enable audit category group resource logging for supported resources to Log Analytics) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Log Analytics Contributor 92aaf0da-9dab-42b6-94a3-d43ce8d16293 Builtin false False Deploy-AzActivity-Log n/a 217aa040-8eb0-451b-b81c-0b8f3d200d5a SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/82f0c3bf-808b-5863-bf9c-231cfbf9598a /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log (Configure Azure Activity logs to stream to specified Log Analytics workspace) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Log Analytics Contributor 92aaf0da-9dab-42b6-94a3-d43ce8d16293 Builtin false False Deploy-Diag-Logs n/a 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/9df772a7-1ce7-5439-ab6b-5d31d69925cc /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs (Enable audit category group resource logging for supported resources to Log Analytics) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Meier, Heinz-MIBELLEGROUP heinz.meier@mibelle.net 06addc33-6298-4f01-9f6b-709193f099cc User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Subs-MibelleOnline-SubscriptionOwner n/a 1bdf326c-8c66-4ba9-8c2d-83312a1ddc02 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-Reader n/a 1c529912-c479-41a1-8a03-e57256720fa4 Group direct 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser n/a 1f3ede05-4301-42b1-8c95-2be94290e93c Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Hasanow, Kilian-MIBELLEGROUP kilian.hasanow@mibelle.net 4270eb01-73cf-4e17-925e-47461737b40e User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Mibelle-AzGovWiz-prod n/a 44b03901-55d2-49a8-af3a-58228a81408c SP APP INT indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-michael.peter csa-michael.peter@MIBCloud.mail.onmicrosoft.com 460bad8a-cc4d-41dc-9ddd-f24ba491e2a6 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner n/a 52364002-4a8b-4808-b4fc-864ed5f7d50d Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Matej Paunovski CSA-matej.paunovski@MIBCloud.onmicrosoft.com 54f81d33-50db-475c-b686-4ef70aa0b4fe User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Ouaouane, Taoufik-MIBELLEGROUP taoufik.ouaouane@mibelle.net 7100d1ce-5bd7-449d-abdd-52a7218922b3 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-NetOps n/a 87e9d07b-5340-455c-b297-8bffe3b86f78 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner n/a 9b120856-d4b2-4862-95df-bedf8d5fe1c3 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-Baswaraj Marotrao Ramshette csa-baswarajmarotrao.ramshette@MIBCloud.onmicrosoft.com 9d8d246b-a1f9-4d9a-a54f-f7ae9f3af2ae User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-SecOps n/a abf39027-4cb4-4298-8951-f984eaf9cb8e Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Baumann, Jürg-MIBELLEGROUP juerg.baumann_mibellegroup.com#EXT#@MIBCloud.onmicrosoft.com bb2279b2-06ab-459a-b981-579701601f8a User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin n/a cb058f58-c629-445f-9a10-75f9fcab694e Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Philipp.Schmidt CSA-Philipp.Schmidt@MIBCloud.onmicrosoft.com e40a73c8-6655-434d-8c8b-fdc4d9213499 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Taoufik.Ouaouane csa-Taoufik.Ouaouane@mibelle.net e58ba28f-09ed-49c3-8f5e-31b05c258cde User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Adrian.Bombelka CSA-Adrian.Bombelka@MIBCloud.onmicrosoft.com e86b38a8-e5d4-4888-b09d-390dcf9a2017 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False Enforce-ACSB n/a e1f2e80c-5329-4804-824d-f0b44713985e SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/6e26cd22-b41b-5611-aafc-e2c56b14c060 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/enforce-acsb (Enforce Azure Compute Security Benchmark compliance auditing) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Security Admin fb1c8493-542b-48eb-b624-b4c8fea62acd Builtin false False Deploy-MDEndpointsAMA n/a 7d365a6d-a7ae-4921-beca-5ce854a76960 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/d730d560-adce-52b7-b10c-36a8ad16a6d3 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-mdendpointsama (Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited Tenant User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false True CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member direct /providers/microsoft.authorization/roleassignments/3f958da1-722a-4c03-8398-aab60735ecd3 none 05/07/2025 18:14:55 ObjectType: User Member, ObjectDisplayName: CSA-Jan.Stutz, ObjectSignInName: CSA-Jan.Stutz@MIBCloud.onmicrosoft.com, ObjectId: 43b3e278-6551-4566-83a8-c19abe643e64
thisScope MG Virtual Machine Contributor 9980e02c-c2be-4d73-94e8-173b1dc7cf3c Builtin false False Enforce-ALZ-Decomm n/a 449067cf-1d3a-494e-9c11-cb5b5e97fc69 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-decommissioned-mg/providers/microsoft.authorization/roleassignments/5e51d472-1e7a-5e45-8cf7-e3bb9d2323d4 /providers/microsoft.management/managementgroups/mibelle-decommissioned-mg/providers/microsoft.authorization/policyassignments/enforce-alz-decomm (Enforce policies in the Decommissioned Landing Zone) 06/12/2025 17:56:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
0 Subscriptions linked
Highlight Management Group in HierarchyMap

Management Group Name: Landing Zones

Management Group Id: mibelle-landingzones-mg

Management Group Path: a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg

2 ManagementGroups below this scope
2 Subscriptions below this scope
Microsoft Defender for Cloud Secure Score: 82.5 Video , Blog , learn
   Download CSV semicolon | comma
Diagnostic setting Target Target Id Administrative Policy
toLa LA /subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 true true
No Consumption data available as switch parameter -DoAzureConsumption was not applied
   Download CSV semicolon | comma
ResourceType Location Count
microsoft.app/containerapps westeurope 1
microsoft.app/managedenvironments westeurope 1
microsoft.compute/sshpublickeys westeurope 9
microsoft.containerregistry/registries westeurope 1
microsoft.fabric/capacities westeurope 1
microsoft.insights/actiongroups global 2
microsoft.insights/components switzerlandnorth 1
microsoft.insights/components westeurope 4
microsoft.keyvault/vaults westeurope 3
microsoft.logic/workflows westeurope 2
microsoft.network/networkwatchers westeurope 1
microsoft.operationalinsights/workspaces switzerlandnorth 1
microsoft.operationalinsights/workspaces westeurope 4
microsoft.powerbidedicated/capacities westeurope 1
microsoft.saas/resources global 1
microsoft.storage/storageaccounts westeurope 8
microsoft.visualstudio/account northeurope 1
microsoft.web/certificates westeurope 1
microsoft.web/connectiongateways westeurope 1
microsoft.web/connections westeurope 7
microsoft.web/serverfarms westeurope 5
microsoft.web/sites westeurope 6
   Download CSV semicolon | comma
ResourceType Resource Count Diagnostics capable Metrics Logs LogCategories
microsoft.app/containerapps 1 True True False
microsoft.app/managedenvironments 1 True True True ContainerAppConsoleLogs, ContainerAppSystemLogs, AppEnvSpringAppConsoleLogs, AppEnvSessionConsoleLogs, AppEnvSessionPoolEventLogs, AppEnvSessionLifeCycleLogs
microsoft.compute/sshpublickeys 9 False False False
microsoft.containerregistry/registries 1 True True True ContainerRegistryRepositoryEvents, ContainerRegistryLoginEvents
microsoft.fabric/capacities 1 False False False
microsoft.insights/actiongroups 2 False False False
microsoft.insights/components 5 True True True AppAvailabilityResults, AppBrowserTimings, AppEvents, AppMetrics, AppDependencies, AppExceptions, AppPageViews, AppPerformanceCounters, AppRequests, AppSystemEvents, AppTraces, OTelResources
microsoft.keyvault/vaults 3 True True True AuditEvent, AzurePolicyEvaluationDetails
microsoft.logic/workflows 2 True True True WorkflowRuntime
microsoft.network/networkwatchers 1 False False False
microsoft.operationalinsights/workspaces 5 True True True Audit, SummaryLogs, Jobs
microsoft.powerbidedicated/capacities 1 True True True Engine
microsoft.saas/resources 1 False False False
microsoft.storage/storageaccounts 8 True True False
microsoft.visualstudio/account 1 False False False
microsoft.web/certificates 1 False
microsoft.web/connectiongateways 1 False False False
microsoft.web/connections 7 True True False
microsoft.web/serverfarms 5 True True False
microsoft.web/sites 6 True True True AppServiceHTTPLogs, AppServiceConsoleLogs, AppServiceAppLogs, AppServiceAuditLogs, AppServiceIPSecAuditLogs, AppServicePlatformLogs, AppServiceAuthenticationLogs
PSRule for Azure - integration paused - PSRule for Azure
   Download CSV semicolon | comma
  *Depending on the number of rows and your computer´s performance the table may respond with delay, download the csv for better filtering experience
Inheritance ScopeExcluded Exemption applies Policy DisplayName PolicyId Type Category ALZ Effect Parameters Enforcement NonCompliance Message Policies NonCmplnt Policies Compliant Resources NonCmplnt Resources Compliant Resources Conflicting Role/Assignment Managed Identity Assignment DisplayName AssignmentId AssignedBy CreatedOn CreatedBy UpdatedOn UpdatedBy
thisScope Mg false false Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics /providers/microsoft.authorization/policydefinitions/052c180e-287d-44c3-86ef-01aeae2d9774 BuiltIn Network False DeployIfNotExists networkWatcherName=/subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourcegroups/networkwatcherrg/providers/microsoft.network/networkwatchers/networkwatcher_westeurope, networkWatcherRG=networkwatcherrg, retentionDays=1, storageId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.storage/storageaccounts/mibmgmtnetprodeuwst01, vnetRegion=westeurope, workspaceRegion=westeurope, workspaceResourceId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 0 0 0 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/94dfdb33-b864-47c9-831d-366721beb989) 52a8c671384a4b609f1d7651 (SPObjId: 6e0d029a-fce4-400f-bff3-45b8d9a8342e) Deploy-TrafficAnalytics-WestEurope /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/52a8c671384a4b609f1d7651 n/a 09/04/2025 06:12:52 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 09/04/2025 07:23:12 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
thisScope Mg false false Web Application Firewall (WAF) should be enabled for Application Gateway /providers/microsoft.authorization/policydefinitions/564feb30-bf6a-4854-b4bb-0d2d2d1e6c66 BuiltIn Network False Audit effect=Audit Default 0 0 0 0 0 none Web Application Firewall (WAF) should be enabled for Application Gateway /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/audit-appgw-waf n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
thisScope Mg false false Network interfaces should disable IP forwarding /providers/microsoft.authorization/policydefinitions/88c0b9da-ce96-4b03-9635-f29a937e2900 BuiltIn Network False deny Default 0 0 0 0 0 none Network interfaces should disable IP forwarding /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deny-ip-forwarding n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
thisScope Mg false false Management port access from the Internet should be blocked /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-mgmtports-from-internet Custom Network true Deny effect=Deny Default 0 0 0 0 0 none Management port access from the Internet should be blocked /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deny-mgmtports-internet n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
thisScope Mg false false Kubernetes cluster should not allow privileged containers /providers/microsoft.authorization/policydefinitions/95edb821-ddaf-4404-9732-666045e056b4 BuiltIn Kubernetes False deny effect=deny Default 0 0 0 0 0 none Kubernetes cluster should not allow privileged containers /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deny-priv-containers-aks n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
thisScope Mg false false Kubernetes clusters should not allow container privilege escalation /providers/microsoft.authorization/policydefinitions/1c6e92c9-99f0-4e55-9cf2-0c234dc48f99 BuiltIn Kubernetes False deny effect=deny Default 0 0 0 0 0 none Kubernetes clusters should not allow container privilege escalation /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deny-priv-escalation-aks n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
thisScope Mg false false Secure transfer to storage accounts should be enabled /providers/microsoft.authorization/policydefinitions/404c3081-a854-4457-ae30-26a93ef643f9 BuiltIn Storage False Deny effect=Deny Default 0 1 0 8 0 none Secure transfer to storage accounts should be enabled /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deny-storage-http n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
thisScope Mg false false Configure SQL servers to have auditing enabled to Log Analytics workspace /providers/microsoft.authorization/policydefinitions/25da7dfb-0666-4a15-a8f5-402127efd8bb BuiltIn SQL False DeployIfNotExists effect=DeployIfNotExists, logAnalyticsWorkspaceId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 0 0 0 0 SQL Security Manager (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/2f1eab15-c92e-52cd-8b0c-a60e52f1b331), SQL Security Manager (/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/providers/microsoft.authorization/roleassignments/ce81334b-c425-5087-9b8d-2119e050082b), Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/488f45ec-c535-5f65-85bf-acacd1bb93e8), Log Analytics Contributor (/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/providers/microsoft.authorization/roleassignments/fbb2af70-7587-52bd-b3e1-54fcdbdb7ea4) Deploy-AzSqlDb-Auditing (SPObjId: afb169da-f80a-4dd6-abf3-b7fc08efb8ae) Configure SQL servers to have auditing enabled to Log Analytics workspace /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deploy-azsqldb-auditing n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
thisScope Mg false false Deploy SQL DB transparent data encryption /providers/microsoft.authorization/policydefinitions/86a912f6-9a06-4e26-b447-11b16ba8659f BuiltIn SQL False DeployIfNotExists Default 0 0 0 0 0 SQL DB Contributor (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/af2f6b24-ac34-5f3b-9249-5a109d9d1528) Deploy-SQL-TDE (SPObjId: de5ed213-fd75-471c-8d32-920072d6c378) Deploy TDE on SQL servers /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deploy-sql-tde n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
thisScope Mg false false Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics /providers/microsoft.authorization/policydefinitions/052c180e-287d-44c3-86ef-01aeae2d9774 BuiltIn Network False DeployIfNotExists networkWatcherName=/subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourcegroups/networkwatcherrg/providers/microsoft.network/networkwatchers/networkwatcher_northeurope, networkWatcherRG=networkwatcherrg, retentionDays=1, storageId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.storage/storageaccounts/mibmgmtnetprodeunst01, vnetRegion=northeurope, workspaceRegion=westeurope, workspaceResourceId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 0 0 0 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/3fb7bac5-2328-4e74-a5b0-0d6d2a631693) e9143c36572348c3ba0c67b1 (SPObjId: 9c3b725e-ce85-47ac-bf6f-c2fa0571c259) Deploy-TrafficAnalytics-NorthEurope /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/e9143c36572348c3ba0c67b1 n/a 09/04/2025 07:17:59 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 09/04/2025 07:33:42 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
thisScope Mg false false Kubernetes clusters should be accessible only over HTTPS /providers/microsoft.authorization/policydefinitions/1a5b4dca-0b6f-4cf5-907c-56316bc1bf3d BuiltIn Kubernetes False deny effect=deny Default 0 0 0 0 0 none Kubernetes clusters should be accessible only over HTTPS /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enforce-aks-https n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
thisScope Mg false false Subnets should be private /providers/microsoft.authorization/policydefinitions/7bca8353-aa3b-429b-904a-9229c4385837 BuiltIn Network False Audit Default 0 0 0 0 0 none Subnets should be private /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enforce-subnet-private n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false false Audit resource location matches resource group location /providers/microsoft.authorization/policydefinitions/0a914e76-4921-4c19-b460-a2d36003525a BuiltIn General False audit Default 1 0 5 56 0 none Audit that the resource location matches its resource group location /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-location-match n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false false Not allowed resource types /providers/microsoft.authorization/policydefinitions/6c112d4e-5bc7-47ae-a041-ea2d9dccd749 BuiltIn General False Deny effect=Deny, listOfResourceTypesNotAllowed=Microsoft.ClassicCompute/capabilities; Microsoft.ClassicCompute/checkDomainNameAvailability; Microsoft.ClassicCompute/domainNames; Microsoft.ClassicCompute/domainNames/capabilities; Microsoft.ClassicCompute/domainNames/internalLoadBalancers; Microsoft.ClassicCompute/domainNames/serviceCertificates; Microsoft.ClassicCompute/domainNames/slots; Microsoft.ClassicCompute/domainNames/slots/roles; Microsoft.ClassicCompute/domainNames/slots/roles/metricDefinitions; Microsoft.ClassicCompute/domainNames/slots/roles/metrics; Microsoft.ClassicCompute/moveSubscriptionResources; Microsoft.ClassicCompute/operatingSystemFamilies; Microsoft.ClassicCompute/operatingSystems; Microsoft.ClassicCompute/operations; Microsoft.ClassicCompute/operationStatuses; Microsoft.ClassicCompute/quotas; Microsoft.ClassicCompute/resourceTypes; Microsoft.ClassicCompute/validateSubscriptionMoveAvailability; Microsoft.ClassicCompute/virtualMachines; Microsoft.ClassicCompute/virtualMachines/diagnosticSettings; Microsoft.ClassicCompute/virtualMachines/metricDefinitions; Microsoft.ClassicCompute/virtualMachines/metrics; Microsoft.ClassicInfrastructureMigrate/classicInfrastructureResources; Microsoft.ClassicNetwork/capabilities; Microsoft.ClassicNetwork/expressRouteCrossConnections; Microsoft.ClassicNetwork/expressRouteCrossConnections/peerings; Microsoft.ClassicNetwork/gatewaySupportedDevices; Microsoft.ClassicNetwork/networkSecurityGroups; Microsoft.ClassicNetwork/operations; Microsoft.ClassicNetwork/quotas; Microsoft.ClassicNetwork/reservedIps; Microsoft.ClassicNetwork/virtualNetworks; Microsoft.ClassicNetwork/virtualNetworks/remoteVirtualNetworkPeeringProxies; Microsoft.ClassicNetwork/virtualNetworks/virtualNetworkPeerings; Microsoft.ClassicStorage/capabilities; Microsoft.ClassicStorage/checkStorageAccountAvailability; Microsoft.ClassicStorage/disks; Microsoft.ClassicStorage/images; Microsoft.ClassicStorage/operations; Microsoft.ClassicStorage/osImages; Microsoft.ClassicStorage/osPlatformImages; Microsoft.ClassicStorage/publicImages; Microsoft.ClassicStorage/quotas; Microsoft.ClassicStorage/storageAccounts; Microsoft.ClassicStorage/storageAccounts/blobServices; Microsoft.ClassicStorage/storageAccounts/fileServices; Microsoft.ClassicStorage/storageAccounts/metricDefinitions; Microsoft.ClassicStorage/storageAccounts/metrics; Microsoft.ClassicStorage/storageAccounts/queueServices; Microsoft.ClassicStorage/storageAccounts/services; Microsoft.ClassicStorage/storageAccounts/services/diagnosticSettings; Microsoft.ClassicStorage/storageAccounts/services/metricDefinitions; Microsoft.ClassicStorage/storageAccounts/services/metrics; Microsoft.ClassicStorage/storageAccounts/tableServices; Microsoft.ClassicStorage/storageAccounts/vmImages; Microsoft.ClassicStorage/vmImages; Microsoft.ClassicSubscription/operations Default 0 0 0 0 0 none Deny the deployment of classic resources /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deny-classic-resources n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false false Audit VMs that do not use managed disks /providers/microsoft.authorization/policydefinitions/06a78e20-9358-41c9-923c-fb736d382a4d BuiltIn Compute False audit Default 0 0 0 0 0 none Deny virtual machines and virtual machine scale sets that do not use managed disk /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deny-unmanageddisk n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false false Configure Azure Activity logs to stream to specified Log Analytics workspace /providers/microsoft.authorization/policydefinitions/2465583e-4e78-4c15-b6be-a36cbc7c8b0f BuiltIn Monitoring False DeployIfNotExists effect=DeployIfNotExists, logAnalytics=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 1 0 2 0 0 Monitoring Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/dcb59c88-f014-5e17-840c-6c9aecc66286), Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/82f0c3bf-808b-5863-bf9c-231cfbf9598a) Deploy-AzActivity-Log (SPObjId: 217aa040-8eb0-451b-b81c-0b8f3d200d5a) Deploy Diagnostic Settings for Activity Log to Log Analytics workspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
   Download CSV semicolon | comma
Inheritance ScopeExcluded PolicySet DisplayName PolicySetId Type Category ALZ Parameters Enforcement NonCompliance Message Policies NonCmplnt Policies Compliant Resources NonCmplnt Resources Compliant Resources Conflicting Role/Assignment Managed Identity Assignment DisplayName AssignmentId AssignedBy CreatedOn CreatedBy UpdatedOn UpdatedBy
thisScope Mg false Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-aum-checkupdates Custom Security Center true assessmentMode=AutomaticByPlatform Default 0 0 0 0 0 Virtual Machine Contributor (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/571da045-f503-5cb2-b123-ede8cfe0f15a), Azure Connected Machine Resource Administrator (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/7d65b18e-df43-5353-85a4-716e68ff7c7a), Managed Identity Operator (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/b2c88903-f3a4-54ec-813c-46d650309b86) Enable-AUM-CheckUpdates (SPObjId: 4f27b633-c16b-47a6-ab24-737bb6cdad56) Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines. /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
thisScope Mg false Enforce recommended guardrails for Azure Key Vault /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-keyvault Custom Key Vault true Default 2 8 2 1 0 none Enforce recommended guardrails for Azure Key Vault /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enforce-gr-keyvault n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Audit virtual machines for Trusted Launch support /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/audit-trustedlaunch Custom Trusted Launch true Default 0 0 0 0 0 none Audit virtual machines for Trusted Launch support /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-trustedlaunch n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Unused resources driving cost should be avoided /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/audit-unusedresourcescostoptimization Custom Cost Optimization true EffectDisks=Audit, EffectPublicIpAddresses=Audit, EffectServerFarms=Audit Default 0 1 0 5 0 none Unused resources driving cost should be avoided /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-unusedresources n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Microsoft cloud security benchmark /providers/microsoft.authorization/policysetdefinitions/1f3afdf9-d0c9-4c3d-847f-89da613e70a8 BuiltIn Security Center False Default 35 14 32 0 0 none Enable Monitoring in Microsoft Defender for Cloud /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-asc-monitoring n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Enable audit category group resource logging for supported resources to Log Analytics /providers/microsoft.authorization/policysetdefinitions/f5b29bc4-feca-4cc6-a58a-772dd5e290a5 BuiltIn Monitoring False logAnalytics=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 4 0 10 0 Monitoring Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b922046a-7a3e-59da-a982-8a5b855791ce), Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/9df772a7-1ce7-5439-ab6b-5d31d69925cc) Deploy-Diag-Logs (SPObjId: 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57) Enable allLogs category group resource logging for supported resources to Log Analytics /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud /providers/microsoft.authorization/policysetdefinitions/77b391e3-2d5d-40c3-83bf-65c846b3c6a3 BuiltIn Security Center False Default 0 3 0 2 0 Security Admin (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/d730d560-adce-52b7-b10c-36a8ad16a6d3) Deploy-MDEndpointsAMA (SPObjId: 7d365a6d-a7ae-4921-beca-5ce854a76960) Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-mdendpointsama n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Enforce Azure Compute Security Benchmark compliance auditing /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-acsb Custom Guest Configuration true Default 0 0 0 0 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/6e26cd22-b41b-5611-aafc-e2c56b14c060) Enforce-ACSB (SPObjId: e1f2e80c-5329-4804-824d-f0b44713985e) Enforce Azure Compute Security Baseline compliance auditing /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/enforce-acsb n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Policy Assignment Limit: 14/200
0 Custom Policy definitions scoped
0 Custom PolicySet definitions scoped
0 Blueprints scoped
   Download CSV semicolon | comma
  *Depending on the number of rows and your computer´s performance the table may respond with delay, download the csv for better filtering experience
Scope Role RoleId Role Type Data Can do Role assignment Identity Displayname Identity SignInName Identity ObjectId Identity Type Applicability Applies through membership Group Details Role AssignmentId Related Policy Assignment CreatedOn CreatedBy
inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/e14ef9ac-25e8-4ee7-887a-a6576bd5229d none 11/28/2025 07:57:36 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Monitoring Contributor 749f88d5-cbae-40b8-bcfc-e573ddc772fa Builtin false False Deploy-AzActivity-Log n/a 217aa040-8eb0-451b-b81c-0b8f3d200d5a SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/dcb59c88-f014-5e17-840c-6c9aecc66286 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log (Configure Azure Activity logs to stream to specified Log Analytics workspace) 06/12/2025 17:56:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Monitoring Contributor 749f88d5-cbae-40b8-bcfc-e573ddc772fa Builtin false False Deploy-Diag-Logs n/a 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b922046a-7a3e-59da-a982-8a5b855791ce /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs (Enable audit category group resource logging for supported resources to Log Analytics) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Log Analytics Contributor 92aaf0da-9dab-42b6-94a3-d43ce8d16293 Builtin false False Deploy-AzActivity-Log n/a 217aa040-8eb0-451b-b81c-0b8f3d200d5a SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/82f0c3bf-808b-5863-bf9c-231cfbf9598a /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log (Configure Azure Activity logs to stream to specified Log Analytics workspace) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Log Analytics Contributor 92aaf0da-9dab-42b6-94a3-d43ce8d16293 Builtin false False Deploy-Diag-Logs n/a 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/9df772a7-1ce7-5439-ab6b-5d31d69925cc /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs (Enable audit category group resource logging for supported resources to Log Analytics) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Meier, Heinz-MIBELLEGROUP heinz.meier@mibelle.net 06addc33-6298-4f01-9f6b-709193f099cc User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Subs-MibelleOnline-SubscriptionOwner n/a 1bdf326c-8c66-4ba9-8c2d-83312a1ddc02 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-Reader n/a 1c529912-c479-41a1-8a03-e57256720fa4 Group direct 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser n/a 1f3ede05-4301-42b1-8c95-2be94290e93c Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Hasanow, Kilian-MIBELLEGROUP kilian.hasanow@mibelle.net 4270eb01-73cf-4e17-925e-47461737b40e User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Mibelle-AzGovWiz-prod n/a 44b03901-55d2-49a8-af3a-58228a81408c SP APP INT indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-michael.peter csa-michael.peter@MIBCloud.mail.onmicrosoft.com 460bad8a-cc4d-41dc-9ddd-f24ba491e2a6 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner n/a 52364002-4a8b-4808-b4fc-864ed5f7d50d Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Matej Paunovski CSA-matej.paunovski@MIBCloud.onmicrosoft.com 54f81d33-50db-475c-b686-4ef70aa0b4fe User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Ouaouane, Taoufik-MIBELLEGROUP taoufik.ouaouane@mibelle.net 7100d1ce-5bd7-449d-abdd-52a7218922b3 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-NetOps n/a 87e9d07b-5340-455c-b297-8bffe3b86f78 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner n/a 9b120856-d4b2-4862-95df-bedf8d5fe1c3 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-Baswaraj Marotrao Ramshette csa-baswarajmarotrao.ramshette@MIBCloud.onmicrosoft.com 9d8d246b-a1f9-4d9a-a54f-f7ae9f3af2ae User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-SecOps n/a abf39027-4cb4-4298-8951-f984eaf9cb8e Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Baumann, Jürg-MIBELLEGROUP juerg.baumann_mibellegroup.com#EXT#@MIBCloud.onmicrosoft.com bb2279b2-06ab-459a-b981-579701601f8a User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin n/a cb058f58-c629-445f-9a10-75f9fcab694e Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Philipp.Schmidt CSA-Philipp.Schmidt@MIBCloud.onmicrosoft.com e40a73c8-6655-434d-8c8b-fdc4d9213499 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Taoufik.Ouaouane csa-Taoufik.Ouaouane@mibelle.net e58ba28f-09ed-49c3-8f5e-31b05c258cde User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Adrian.Bombelka CSA-Adrian.Bombelka@MIBCloud.onmicrosoft.com e86b38a8-e5d4-4888-b09d-390dcf9a2017 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False Enforce-ACSB n/a e1f2e80c-5329-4804-824d-f0b44713985e SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/6e26cd22-b41b-5611-aafc-e2c56b14c060 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/enforce-acsb (Enforce Azure Compute Security Benchmark compliance auditing) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Security Admin fb1c8493-542b-48eb-b624-b4c8fea62acd Builtin false False Deploy-MDEndpointsAMA n/a 7d365a6d-a7ae-4921-beca-5ce854a76960 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/d730d560-adce-52b7-b10c-36a8ad16a6d3 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-mdendpointsama (Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited Tenant User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false True CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member direct /providers/microsoft.authorization/roleassignments/3f958da1-722a-4c03-8398-aab60735ecd3 none 05/07/2025 18:14:55 ObjectType: User Member, ObjectDisplayName: CSA-Jan.Stutz, ObjectSignInName: CSA-Jan.Stutz@MIBCloud.onmicrosoft.com, ObjectId: 43b3e278-6551-4566-83a8-c19abe643e64
thisScope MG SQL Security Manager 056cd41c-7e88-42e1-933e-88ba6a50c9c3 Builtin false False Deploy-AzSqlDb-Auditing n/a afb169da-f80a-4dd6-abf3-b7fc08efb8ae SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/2f1eab15-c92e-52cd-8b0c-a60e52f1b331 /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deploy-azsqldb-auditing (Configure SQL servers to have auditing enabled to Log Analytics workspace) 06/12/2025 17:56:41 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
thisScope MG Log Analytics Contributor 92aaf0da-9dab-42b6-94a3-d43ce8d16293 Builtin false False Deploy-AzSqlDb-Auditing n/a afb169da-f80a-4dd6-abf3-b7fc08efb8ae SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/488f45ec-c535-5f65-85bf-acacd1bb93e8 /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deploy-azsqldb-auditing (Configure SQL servers to have auditing enabled to Log Analytics workspace) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
thisScope MG Virtual Machine Contributor 9980e02c-c2be-4d73-94e8-173b1dc7cf3c Builtin false False Enable-AUM-CheckUpdates n/a 4f27b633-c16b-47a6-ab24-737bb6cdad56 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/571da045-f503-5cb2-b123-ede8cfe0f15a /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates (Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines) 06/12/2025 17:56:38 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
thisScope MG SQL DB Contributor 9b7fa17d-e63e-47b0-bb0a-15c516ac86ec Builtin false False Deploy-SQL-TDE n/a de5ed213-fd75-471c-8d32-920072d6c378 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/af2f6b24-ac34-5f3b-9249-5a109d9d1528 /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deploy-sql-tde (Deploy SQL DB transparent data encryption) 06/12/2025 17:56:38 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
thisScope MG Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False 52a8c671384a4b609f1d7651 n/a 6e0d029a-fce4-400f-bff3-45b8d9a8342e SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/94dfdb33-b864-47c9-831d-366721beb989 /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/52a8c671384a4b609f1d7651 (Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics) 09/04/2025 06:12:52 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
thisScope MG Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False e9143c36572348c3ba0c67b1 n/a 9c3b725e-ce85-47ac-bf6f-c2fa0571c259 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/3fb7bac5-2328-4e74-a5b0-0d6d2a631693 /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/e9143c36572348c3ba0c67b1 (Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics) 09/04/2025 07:18:00 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
thisScope MG Azure Connected Machine Resource Administrator cd570a14-e51a-42ad-bac8-bafd67325302 Builtin false False Enable-AUM-CheckUpdates n/a 4f27b633-c16b-47a6-ab24-737bb6cdad56 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/7d65b18e-df43-5353-85a4-716e68ff7c7a /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates (Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
thisScope MG Managed Identity Operator f1a07417-d97a-45cb-824c-7a7467783830 Builtin false False Enable-AUM-CheckUpdates n/a 4f27b633-c16b-47a6-ab24-737bb6cdad56 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/b2c88903-f3a4-54ec-813c-46d650309b86 /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates (Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78)
inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78)
inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78)
inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78)
inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False SGU-MIB-RES-Azure-Magr-Mibelle-NetOps 87e9d07b-5340-455c-b297-8bffe3b86f78 Group direct
inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78)
inherited mibelle-mg [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e)
inherited mibelle-mg [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e)
inherited mibelle-mg [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e)
inherited mibelle-mg [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False SGU-MIB-RES-Azure-Magr-Mibelle-SecOps abf39027-4cb4-4298-8951-f984eaf9cb8e Group direct
inherited mibelle-mg Reservation Purchaser f7b75c60-3036-4b75-91c3-6b41c27c1689 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser 1f3ede05-4301-42b1-8c95-2be94290e93c Group direct
inherited mibelle-mg Reservation Purchaser f7b75c60-3036-4b75-91c3-6b41c27c1689 Builtin false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser (1f3ede05-4301-42b1-8c95-2be94290e93c)
inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e)
inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e)
inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e)
inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin cb058f58-c629-445f-9a10-75f9fcab694e Group direct
inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e)
thisScope MG [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner (52364002-4a8b-4808-b4fc-864ed5f7d50d)
thisScope MG [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member nested SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner (52364002-4a8b-4808-b4fc-864ed5f7d50d)
thisScope MG [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False csa-michael.peter csa-michael.peter@MIBCloud.mail.onmicrosoft.com 460bad8a-cc4d-41dc-9ddd-f24ba491e2a6 User Member nested SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner (52364002-4a8b-4808-b4fc-864ed5f7d50d)
thisScope MG [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner (52364002-4a8b-4808-b4fc-864ed5f7d50d)
thisScope MG [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner 52364002-4a8b-4808-b4fc-864ed5f7d50d Group direct
thisScope MG [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member nested SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner (52364002-4a8b-4808-b4fc-864ed5f7d50d)
thisScope MG Key Vault Administrator 00482a5a-887f-4fb3-b363-3b7fe8e74483 Builtin false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member nested SGU-MIB-RES-Azure-Magr-MibelleLandingZone-KeyVaultAdmin (dc72503d-d80a-4f41-969b-59a0818f358c)
thisScope MG Key Vault Administrator 00482a5a-887f-4fb3-b363-3b7fe8e74483 Builtin false False csa-michael.peter csa-michael.peter@MIBCloud.mail.onmicrosoft.com 460bad8a-cc4d-41dc-9ddd-f24ba491e2a6 User Member nested SGU-MIB-RES-Azure-Magr-MibelleLandingZone-KeyVaultAdmin (dc72503d-d80a-4f41-969b-59a0818f358c)
thisScope MG Key Vault Administrator 00482a5a-887f-4fb3-b363-3b7fe8e74483 Builtin false False SGU-MIB-RES-Azure-Magr-MibelleLandingZone-KeyVaultAdmin dc72503d-d80a-4f41-969b-59a0818f358c Group direct
thisScope MG User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False SGU-MIB-RES-Azure-Magr-MibelleLandingZone-UserAccessAdmin 45d94cc4-a927-422c-a9a3-a0cfa1684fd7 Group direct
thisScope MG User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False csa-michael.peter csa-michael.peter@MIBCloud.mail.onmicrosoft.com 460bad8a-cc4d-41dc-9ddd-f24ba491e2a6 User Member nested SGU-MIB-RES-Azure-Magr-MibelleLandingZone-UserAccessAdmin (45d94cc4-a927-422c-a9a3-a0cfa1684fd7)
0 Subscriptions linked
Highlight Management Group in HierarchyMap

Management Group Name: Corp

Management Group Id: mibelle-landingzones-corp-mg

Management Group Path: a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg

0 ManagementGroups below this scope
1 Subscriptions below this scope
Microsoft Defender for Cloud Secure Score: 84.62 Video , Blog , learn
   Download CSV semicolon | comma
Diagnostic setting Target Target Id Administrative Policy
toLa LA /subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 true true
No Consumption data available as switch parameter -DoAzureConsumption was not applied
   Download CSV semicolon | comma
ResourceType Location Count
microsoft.insights/actiongroups global 1
microsoft.insights/components westeurope 1
microsoft.keyvault/vaults westeurope 1
microsoft.operationalinsights/workspaces westeurope 1
microsoft.storage/storageaccounts westeurope 1
microsoft.web/serverfarms westeurope 1
microsoft.web/sites westeurope 1
   Download CSV semicolon | comma
ResourceType Resource Count Diagnostics capable Metrics Logs LogCategories
microsoft.insights/actiongroups 1 False False False
microsoft.insights/components 1 True True True AppAvailabilityResults, AppBrowserTimings, AppEvents, AppMetrics, AppDependencies, AppExceptions, AppPageViews, AppPerformanceCounters, AppRequests, AppSystemEvents, AppTraces, OTelResources
microsoft.keyvault/vaults 1 True True True AuditEvent, AzurePolicyEvaluationDetails
microsoft.operationalinsights/workspaces 1 True True True Audit, SummaryLogs, Jobs
microsoft.storage/storageaccounts 1 True True False
microsoft.web/serverfarms 1 True True False
microsoft.web/sites 1 True True True AppServiceHTTPLogs, AppServiceConsoleLogs, AppServiceAppLogs, AppServiceAuditLogs, AppServiceIPSecAuditLogs, AppServicePlatformLogs, AppServiceAuthenticationLogs
PSRule for Azure - integration paused - PSRule for Azure
   Download CSV semicolon | comma
  *Depending on the number of rows and your computer´s performance the table may respond with delay, download the csv for better filtering experience
Inheritance ScopeExcluded Exemption applies Policy DisplayName PolicyId Type Category ALZ Effect Parameters Enforcement NonCompliance Message Policies NonCmplnt Policies Compliant Resources NonCmplnt Resources Compliant Resources Conflicting Role/Assignment Managed Identity Assignment DisplayName AssignmentId AssignedBy CreatedOn CreatedBy UpdatedOn UpdatedBy
thisScope Mg false false Not allowed resource types /providers/microsoft.authorization/policydefinitions/6c112d4e-5bc7-47ae-a041-ea2d9dccd749 BuiltIn General False Deny effect=Deny, listOfResourceTypesNotAllowed=microsoft.network/expressroutecircuits; microsoft.network/expressroutegateways; microsoft.network/expressrouteports; microsoft.network/virtualwans; microsoft.network/vpngateways; microsoft.network/p2svpngateways; microsoft.network/vpnsites; microsoft.network/virtualnetworkgateways Default 0 0 0 0 0 none Deny the deployment of vWAN/ER/VPN gateway resources /providers/microsoft.management/managementgroups/mibelle-landingzones-corp-mg/providers/microsoft.authorization/policyassignments/deny-hybridnetworking n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
thisScope Mg false false Network interfaces should not have public IPs /providers/microsoft.authorization/policydefinitions/83a86a26-fd1f-447c-b59d-e51f44264114 BuiltIn Network False deny Default 0 0 0 0 0 none Deny network interfaces having a public IP associated /providers/microsoft.management/managementgroups/mibelle-landingzones-corp-mg/providers/microsoft.authorization/policyassignments/deny-public-ip-on-nic n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg false false Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics /providers/microsoft.authorization/policydefinitions/052c180e-287d-44c3-86ef-01aeae2d9774 BuiltIn Network False DeployIfNotExists networkWatcherName=/subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourcegroups/networkwatcherrg/providers/microsoft.network/networkwatchers/networkwatcher_westeurope, networkWatcherRG=networkwatcherrg, retentionDays=1, storageId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.storage/storageaccounts/mibmgmtnetprodeuwst01, vnetRegion=westeurope, workspaceRegion=westeurope, workspaceResourceId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 0 0 0 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/94dfdb33-b864-47c9-831d-366721beb989) 52a8c671384a4b609f1d7651 (SPObjId: 6e0d029a-fce4-400f-bff3-45b8d9a8342e) Deploy-TrafficAnalytics-WestEurope /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/52a8c671384a4b609f1d7651 n/a 09/04/2025 06:12:52 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 09/04/2025 07:23:12 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg false false Web Application Firewall (WAF) should be enabled for Application Gateway /providers/microsoft.authorization/policydefinitions/564feb30-bf6a-4854-b4bb-0d2d2d1e6c66 BuiltIn Network False Audit effect=Audit Default 0 0 0 0 0 none Web Application Firewall (WAF) should be enabled for Application Gateway /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/audit-appgw-waf n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg false false Network interfaces should disable IP forwarding /providers/microsoft.authorization/policydefinitions/88c0b9da-ce96-4b03-9635-f29a937e2900 BuiltIn Network False deny Default 0 0 0 0 0 none Network interfaces should disable IP forwarding /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deny-ip-forwarding n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg false false Management port access from the Internet should be blocked /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-mgmtports-from-internet Custom Network true Deny effect=Deny Default 0 0 0 0 0 none Management port access from the Internet should be blocked /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deny-mgmtports-internet n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg false false Kubernetes cluster should not allow privileged containers /providers/microsoft.authorization/policydefinitions/95edb821-ddaf-4404-9732-666045e056b4 BuiltIn Kubernetes False deny effect=deny Default 0 0 0 0 0 none Kubernetes cluster should not allow privileged containers /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deny-priv-containers-aks n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg false false Kubernetes clusters should not allow container privilege escalation /providers/microsoft.authorization/policydefinitions/1c6e92c9-99f0-4e55-9cf2-0c234dc48f99 BuiltIn Kubernetes False deny effect=deny Default 0 0 0 0 0 none Kubernetes clusters should not allow container privilege escalation /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deny-priv-escalation-aks n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg false false Secure transfer to storage accounts should be enabled /providers/microsoft.authorization/policydefinitions/404c3081-a854-4457-ae30-26a93ef643f9 BuiltIn Storage False Deny effect=Deny Default 0 1 0 1 0 none Secure transfer to storage accounts should be enabled /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deny-storage-http n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg false false Configure SQL servers to have auditing enabled to Log Analytics workspace /providers/microsoft.authorization/policydefinitions/25da7dfb-0666-4a15-a8f5-402127efd8bb BuiltIn SQL False DeployIfNotExists effect=DeployIfNotExists, logAnalyticsWorkspaceId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 0 0 0 0 SQL Security Manager (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/2f1eab15-c92e-52cd-8b0c-a60e52f1b331), SQL Security Manager (/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/providers/microsoft.authorization/roleassignments/ce81334b-c425-5087-9b8d-2119e050082b), Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/488f45ec-c535-5f65-85bf-acacd1bb93e8), Log Analytics Contributor (/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/providers/microsoft.authorization/roleassignments/fbb2af70-7587-52bd-b3e1-54fcdbdb7ea4) Deploy-AzSqlDb-Auditing (SPObjId: afb169da-f80a-4dd6-abf3-b7fc08efb8ae) Configure SQL servers to have auditing enabled to Log Analytics workspace /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deploy-azsqldb-auditing n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg false false Deploy SQL DB transparent data encryption /providers/microsoft.authorization/policydefinitions/86a912f6-9a06-4e26-b447-11b16ba8659f BuiltIn SQL False DeployIfNotExists Default 0 0 0 0 0 SQL DB Contributor (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/af2f6b24-ac34-5f3b-9249-5a109d9d1528) Deploy-SQL-TDE (SPObjId: de5ed213-fd75-471c-8d32-920072d6c378) Deploy TDE on SQL servers /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deploy-sql-tde n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg false false Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics /providers/microsoft.authorization/policydefinitions/052c180e-287d-44c3-86ef-01aeae2d9774 BuiltIn Network False DeployIfNotExists networkWatcherName=/subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourcegroups/networkwatcherrg/providers/microsoft.network/networkwatchers/networkwatcher_northeurope, networkWatcherRG=networkwatcherrg, retentionDays=1, storageId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.storage/storageaccounts/mibmgmtnetprodeunst01, vnetRegion=northeurope, workspaceRegion=westeurope, workspaceResourceId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 0 0 0 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/3fb7bac5-2328-4e74-a5b0-0d6d2a631693) e9143c36572348c3ba0c67b1 (SPObjId: 9c3b725e-ce85-47ac-bf6f-c2fa0571c259) Deploy-TrafficAnalytics-NorthEurope /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/e9143c36572348c3ba0c67b1 n/a 09/04/2025 07:17:59 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 09/04/2025 07:33:42 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg false false Kubernetes clusters should be accessible only over HTTPS /providers/microsoft.authorization/policydefinitions/1a5b4dca-0b6f-4cf5-907c-56316bc1bf3d BuiltIn Kubernetes False deny effect=deny Default 0 0 0 0 0 none Kubernetes clusters should be accessible only over HTTPS /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enforce-aks-https n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg false false Subnets should be private /providers/microsoft.authorization/policydefinitions/7bca8353-aa3b-429b-904a-9229c4385837 BuiltIn Network False Audit Default 0 0 0 0 0 none Subnets should be private /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enforce-subnet-private n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false false Audit resource location matches resource group location /providers/microsoft.authorization/policydefinitions/0a914e76-4921-4c19-b460-a2d36003525a BuiltIn General False audit Default 0 1 0 7 0 none Audit that the resource location matches its resource group location /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-location-match n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false false Not allowed resource types /providers/microsoft.authorization/policydefinitions/6c112d4e-5bc7-47ae-a041-ea2d9dccd749 BuiltIn General False Deny effect=Deny, listOfResourceTypesNotAllowed=Microsoft.ClassicCompute/capabilities; Microsoft.ClassicCompute/checkDomainNameAvailability; Microsoft.ClassicCompute/domainNames; Microsoft.ClassicCompute/domainNames/capabilities; Microsoft.ClassicCompute/domainNames/internalLoadBalancers; Microsoft.ClassicCompute/domainNames/serviceCertificates; Microsoft.ClassicCompute/domainNames/slots; Microsoft.ClassicCompute/domainNames/slots/roles; Microsoft.ClassicCompute/domainNames/slots/roles/metricDefinitions; Microsoft.ClassicCompute/domainNames/slots/roles/metrics; Microsoft.ClassicCompute/moveSubscriptionResources; Microsoft.ClassicCompute/operatingSystemFamilies; Microsoft.ClassicCompute/operatingSystems; Microsoft.ClassicCompute/operations; Microsoft.ClassicCompute/operationStatuses; Microsoft.ClassicCompute/quotas; Microsoft.ClassicCompute/resourceTypes; Microsoft.ClassicCompute/validateSubscriptionMoveAvailability; Microsoft.ClassicCompute/virtualMachines; Microsoft.ClassicCompute/virtualMachines/diagnosticSettings; Microsoft.ClassicCompute/virtualMachines/metricDefinitions; Microsoft.ClassicCompute/virtualMachines/metrics; Microsoft.ClassicInfrastructureMigrate/classicInfrastructureResources; Microsoft.ClassicNetwork/capabilities; Microsoft.ClassicNetwork/expressRouteCrossConnections; Microsoft.ClassicNetwork/expressRouteCrossConnections/peerings; Microsoft.ClassicNetwork/gatewaySupportedDevices; Microsoft.ClassicNetwork/networkSecurityGroups; Microsoft.ClassicNetwork/operations; Microsoft.ClassicNetwork/quotas; Microsoft.ClassicNetwork/reservedIps; Microsoft.ClassicNetwork/virtualNetworks; Microsoft.ClassicNetwork/virtualNetworks/remoteVirtualNetworkPeeringProxies; Microsoft.ClassicNetwork/virtualNetworks/virtualNetworkPeerings; Microsoft.ClassicStorage/capabilities; Microsoft.ClassicStorage/checkStorageAccountAvailability; Microsoft.ClassicStorage/disks; Microsoft.ClassicStorage/images; Microsoft.ClassicStorage/operations; Microsoft.ClassicStorage/osImages; Microsoft.ClassicStorage/osPlatformImages; Microsoft.ClassicStorage/publicImages; Microsoft.ClassicStorage/quotas; Microsoft.ClassicStorage/storageAccounts; Microsoft.ClassicStorage/storageAccounts/blobServices; Microsoft.ClassicStorage/storageAccounts/fileServices; Microsoft.ClassicStorage/storageAccounts/metricDefinitions; Microsoft.ClassicStorage/storageAccounts/metrics; Microsoft.ClassicStorage/storageAccounts/queueServices; Microsoft.ClassicStorage/storageAccounts/services; Microsoft.ClassicStorage/storageAccounts/services/diagnosticSettings; Microsoft.ClassicStorage/storageAccounts/services/metricDefinitions; Microsoft.ClassicStorage/storageAccounts/services/metrics; Microsoft.ClassicStorage/storageAccounts/tableServices; Microsoft.ClassicStorage/storageAccounts/vmImages; Microsoft.ClassicStorage/vmImages; Microsoft.ClassicSubscription/operations Default 0 0 0 0 0 none Deny the deployment of classic resources /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deny-classic-resources n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false false Audit VMs that do not use managed disks /providers/microsoft.authorization/policydefinitions/06a78e20-9358-41c9-923c-fb736d382a4d BuiltIn Compute False audit Default 0 0 0 0 0 none Deny virtual machines and virtual machine scale sets that do not use managed disk /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deny-unmanageddisk n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false false Configure Azure Activity logs to stream to specified Log Analytics workspace /providers/microsoft.authorization/policydefinitions/2465583e-4e78-4c15-b6be-a36cbc7c8b0f BuiltIn Monitoring False DeployIfNotExists effect=DeployIfNotExists, logAnalytics=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 1 0 1 0 0 Monitoring Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/dcb59c88-f014-5e17-840c-6c9aecc66286), Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/82f0c3bf-808b-5863-bf9c-231cfbf9598a) Deploy-AzActivity-Log (SPObjId: 217aa040-8eb0-451b-b81c-0b8f3d200d5a) Deploy Diagnostic Settings for Activity Log to Log Analytics workspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
   Download CSV semicolon | comma
Inheritance ScopeExcluded PolicySet DisplayName PolicySetId Type Category ALZ Parameters Enforcement NonCompliance Message Policies NonCmplnt Policies Compliant Resources NonCmplnt Resources Compliant Resources Conflicting Role/Assignment Managed Identity Assignment DisplayName AssignmentId AssignedBy CreatedOn CreatedBy UpdatedOn UpdatedBy
thisScope Mg false Public network access should be disabled for PaaS services /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deny-publicpaasendpoints Custom Network true Default 0 2 0 2 0 none Public network access should be disabled for PaaS services /providers/microsoft.management/managementgroups/mibelle-landingzones-corp-mg/providers/microsoft.authorization/policyassignments/deny-public-endpoints n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg false Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-aum-checkupdates Custom Security Center true assessmentMode=AutomaticByPlatform Default 0 0 0 0 0 Virtual Machine Contributor (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/571da045-f503-5cb2-b123-ede8cfe0f15a), Azure Connected Machine Resource Administrator (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/7d65b18e-df43-5353-85a4-716e68ff7c7a), Managed Identity Operator (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/b2c88903-f3a4-54ec-813c-46d650309b86) Enable-AUM-CheckUpdates (SPObjId: 4f27b633-c16b-47a6-ab24-737bb6cdad56) Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines. /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg false Enforce recommended guardrails for Azure Key Vault /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-keyvault Custom Key Vault true Default 0 4 0 1 0 none Enforce recommended guardrails for Azure Key Vault /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enforce-gr-keyvault n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Audit virtual machines for Trusted Launch support /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/audit-trustedlaunch Custom Trusted Launch true Default 0 0 0 0 0 none Audit virtual machines for Trusted Launch support /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-trustedlaunch n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Unused resources driving cost should be avoided /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/audit-unusedresourcescostoptimization Custom Cost Optimization true EffectDisks=Audit, EffectPublicIpAddresses=Audit, EffectServerFarms=Audit Default 0 1 0 1 0 none Unused resources driving cost should be avoided /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-unusedresources n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Microsoft cloud security benchmark /providers/microsoft.authorization/policysetdefinitions/1f3afdf9-d0c9-4c3d-847f-89da613e70a8 BuiltIn Security Center False Default 27 18 9 0 0 none Enable Monitoring in Microsoft Defender for Cloud /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-asc-monitoring n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Enable audit category group resource logging for supported resources to Log Analytics /providers/microsoft.authorization/policysetdefinitions/f5b29bc4-feca-4cc6-a58a-772dd5e290a5 BuiltIn Monitoring False logAnalytics=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 2 0 2 0 Monitoring Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b922046a-7a3e-59da-a982-8a5b855791ce), Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/9df772a7-1ce7-5439-ab6b-5d31d69925cc) Deploy-Diag-Logs (SPObjId: 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57) Enable allLogs category group resource logging for supported resources to Log Analytics /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud /providers/microsoft.authorization/policysetdefinitions/77b391e3-2d5d-40c3-83bf-65c846b3c6a3 BuiltIn Security Center False Default 0 3 0 1 0 Security Admin (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/d730d560-adce-52b7-b10c-36a8ad16a6d3) Deploy-MDEndpointsAMA (SPObjId: 7d365a6d-a7ae-4921-beca-5ce854a76960) Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-mdendpointsama n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Enforce Azure Compute Security Benchmark compliance auditing /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-acsb Custom Guest Configuration true Default 0 0 0 0 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/6e26cd22-b41b-5611-aafc-e2c56b14c060) Enforce-ACSB (SPObjId: e1f2e80c-5329-4804-824d-f0b44713985e) Enforce Azure Compute Security Baseline compliance auditing /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/enforce-acsb n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Policy Assignment Limit: 3/200
0 Custom Policy definitions scoped
0 Custom PolicySet definitions scoped
0 Blueprints scoped
   Download CSV semicolon | comma
  *Depending on the number of rows and your computer´s performance the table may respond with delay, download the csv for better filtering experience
Scope Role RoleId Role Type Data Can do Role assignment Identity Displayname Identity SignInName Identity ObjectId Identity Type Applicability Applies through membership Group Details Role AssignmentId Related Policy Assignment CreatedOn CreatedBy
inherited mibelle-landingzones-mg SQL Security Manager 056cd41c-7e88-42e1-933e-88ba6a50c9c3 Builtin false False Deploy-AzSqlDb-Auditing n/a afb169da-f80a-4dd6-abf3-b7fc08efb8ae SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/2f1eab15-c92e-52cd-8b0c-a60e52f1b331 /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deploy-azsqldb-auditing (Configure SQL servers to have auditing enabled to Log Analytics workspace) 06/12/2025 17:56:41 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg Log Analytics Contributor 92aaf0da-9dab-42b6-94a3-d43ce8d16293 Builtin false False Deploy-AzSqlDb-Auditing n/a afb169da-f80a-4dd6-abf3-b7fc08efb8ae SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/488f45ec-c535-5f65-85bf-acacd1bb93e8 /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deploy-azsqldb-auditing (Configure SQL servers to have auditing enabled to Log Analytics workspace) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg Virtual Machine Contributor 9980e02c-c2be-4d73-94e8-173b1dc7cf3c Builtin false False Enable-AUM-CheckUpdates n/a 4f27b633-c16b-47a6-ab24-737bb6cdad56 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/571da045-f503-5cb2-b123-ede8cfe0f15a /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates (Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines) 06/12/2025 17:56:38 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg SQL DB Contributor 9b7fa17d-e63e-47b0-bb0a-15c516ac86ec Builtin false False Deploy-SQL-TDE n/a de5ed213-fd75-471c-8d32-920072d6c378 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/af2f6b24-ac34-5f3b-9249-5a109d9d1528 /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deploy-sql-tde (Deploy SQL DB transparent data encryption) 06/12/2025 17:56:38 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False 52a8c671384a4b609f1d7651 n/a 6e0d029a-fce4-400f-bff3-45b8d9a8342e SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/94dfdb33-b864-47c9-831d-366721beb989 /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/52a8c671384a4b609f1d7651 (Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics) 09/04/2025 06:12:52 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False e9143c36572348c3ba0c67b1 n/a 9c3b725e-ce85-47ac-bf6f-c2fa0571c259 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/3fb7bac5-2328-4e74-a5b0-0d6d2a631693 /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/e9143c36572348c3ba0c67b1 (Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics) 09/04/2025 07:18:00 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg Azure Connected Machine Resource Administrator cd570a14-e51a-42ad-bac8-bafd67325302 Builtin false False Enable-AUM-CheckUpdates n/a 4f27b633-c16b-47a6-ab24-737bb6cdad56 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/7d65b18e-df43-5353-85a4-716e68ff7c7a /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates (Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg Managed Identity Operator f1a07417-d97a-45cb-824c-7a7467783830 Builtin false False Enable-AUM-CheckUpdates n/a 4f27b633-c16b-47a6-ab24-737bb6cdad56 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/b2c88903-f3a4-54ec-813c-46d650309b86 /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates (Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/e14ef9ac-25e8-4ee7-887a-a6576bd5229d none 11/28/2025 07:57:36 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Monitoring Contributor 749f88d5-cbae-40b8-bcfc-e573ddc772fa Builtin false False Deploy-AzActivity-Log n/a 217aa040-8eb0-451b-b81c-0b8f3d200d5a SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/dcb59c88-f014-5e17-840c-6c9aecc66286 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log (Configure Azure Activity logs to stream to specified Log Analytics workspace) 06/12/2025 17:56:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Monitoring Contributor 749f88d5-cbae-40b8-bcfc-e573ddc772fa Builtin false False Deploy-Diag-Logs n/a 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b922046a-7a3e-59da-a982-8a5b855791ce /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs (Enable audit category group resource logging for supported resources to Log Analytics) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Log Analytics Contributor 92aaf0da-9dab-42b6-94a3-d43ce8d16293 Builtin false False Deploy-AzActivity-Log n/a 217aa040-8eb0-451b-b81c-0b8f3d200d5a SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/82f0c3bf-808b-5863-bf9c-231cfbf9598a /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log (Configure Azure Activity logs to stream to specified Log Analytics workspace) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Log Analytics Contributor 92aaf0da-9dab-42b6-94a3-d43ce8d16293 Builtin false False Deploy-Diag-Logs n/a 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/9df772a7-1ce7-5439-ab6b-5d31d69925cc /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs (Enable audit category group resource logging for supported resources to Log Analytics) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Meier, Heinz-MIBELLEGROUP heinz.meier@mibelle.net 06addc33-6298-4f01-9f6b-709193f099cc User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Subs-MibelleOnline-SubscriptionOwner n/a 1bdf326c-8c66-4ba9-8c2d-83312a1ddc02 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-Reader n/a 1c529912-c479-41a1-8a03-e57256720fa4 Group direct 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser n/a 1f3ede05-4301-42b1-8c95-2be94290e93c Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Hasanow, Kilian-MIBELLEGROUP kilian.hasanow@mibelle.net 4270eb01-73cf-4e17-925e-47461737b40e User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Mibelle-AzGovWiz-prod n/a 44b03901-55d2-49a8-af3a-58228a81408c SP APP INT indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-michael.peter csa-michael.peter@MIBCloud.mail.onmicrosoft.com 460bad8a-cc4d-41dc-9ddd-f24ba491e2a6 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner n/a 52364002-4a8b-4808-b4fc-864ed5f7d50d Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Matej Paunovski CSA-matej.paunovski@MIBCloud.onmicrosoft.com 54f81d33-50db-475c-b686-4ef70aa0b4fe User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Ouaouane, Taoufik-MIBELLEGROUP taoufik.ouaouane@mibelle.net 7100d1ce-5bd7-449d-abdd-52a7218922b3 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-NetOps n/a 87e9d07b-5340-455c-b297-8bffe3b86f78 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner n/a 9b120856-d4b2-4862-95df-bedf8d5fe1c3 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-Baswaraj Marotrao Ramshette csa-baswarajmarotrao.ramshette@MIBCloud.onmicrosoft.com 9d8d246b-a1f9-4d9a-a54f-f7ae9f3af2ae User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-SecOps n/a abf39027-4cb4-4298-8951-f984eaf9cb8e Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Baumann, Jürg-MIBELLEGROUP juerg.baumann_mibellegroup.com#EXT#@MIBCloud.onmicrosoft.com bb2279b2-06ab-459a-b981-579701601f8a User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin n/a cb058f58-c629-445f-9a10-75f9fcab694e Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Philipp.Schmidt CSA-Philipp.Schmidt@MIBCloud.onmicrosoft.com e40a73c8-6655-434d-8c8b-fdc4d9213499 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Taoufik.Ouaouane csa-Taoufik.Ouaouane@mibelle.net e58ba28f-09ed-49c3-8f5e-31b05c258cde User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Adrian.Bombelka CSA-Adrian.Bombelka@MIBCloud.onmicrosoft.com e86b38a8-e5d4-4888-b09d-390dcf9a2017 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False Enforce-ACSB n/a e1f2e80c-5329-4804-824d-f0b44713985e SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/6e26cd22-b41b-5611-aafc-e2c56b14c060 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/enforce-acsb (Enforce Azure Compute Security Benchmark compliance auditing) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Security Admin fb1c8493-542b-48eb-b624-b4c8fea62acd Builtin false False Deploy-MDEndpointsAMA n/a 7d365a6d-a7ae-4921-beca-5ce854a76960 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/d730d560-adce-52b7-b10c-36a8ad16a6d3 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-mdendpointsama (Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited Tenant User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false True CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member direct /providers/microsoft.authorization/roleassignments/3f958da1-722a-4c03-8398-aab60735ecd3 none 05/07/2025 18:14:55 ObjectType: User Member, ObjectDisplayName: CSA-Jan.Stutz, ObjectSignInName: CSA-Jan.Stutz@MIBCloud.onmicrosoft.com, ObjectId: 43b3e278-6551-4566-83a8-c19abe643e64
mibelle-it-automation (d4493d1a-9fd5-4596-aff4-8c679eac0164)
Highlight Subscription in HierarchyMap
Subscription Name: mibelle-it-automation
Subscription Id: d4493d1a-9fd5-4596-aff4-8c679eac0164
Subscription Path: a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-corp-mg/d4493d1a-9fd5-4596-aff4-8c679eac0164
State: Enabled
QuotaId: PayAsYouGo_2014-09-01
Microsoft Defender for Cloud Secure Score: 84.62% (11 of 13 points) Video , Blog , learn
Microsoft Defender for Cloud 'Email notifications' state: n/a
Microsoft Defender for Cloud 'Email notifications' severity: n/a
Microsoft Defender for Cloud 'Email notifications' roles: n/a
Microsoft Defender for Cloud 'Email notifications' emails: n/a
   Download CSV semicolon | comma
Plan Tier
AI Free
Api Free
AppServices Free
Arm Free
CloudPosture Free
ContainerRegistry Free
Containers Free
CosmosDbs Free
Discovery Standard
Dns Free
FoundationalCspm Standard
KeyVaults Free
KubernetesService Free
OpenSourceRelationalDatabases Free
SqlServers Free
SqlServerVirtualMachines Free
StorageAccounts Free
VirtualMachines Free
No Subscription Diagnostic settings learn
0 Subscription Tags
   Resource naming and tagging decision guide learn
   Download CSV semicolon | comma
Scope TagName Count
Resource hidden-link: /app-insights-resource-id 1
No Consumption data available as switch parameter -DoAzureConsumption was not applied
3 Resource Groups | Limit: (3/980)
   Download CSV semicolon | comma
Provider State
Microsoft.OperationalInsights Registered
microsoft.insights Registered
Microsoft.Storage Registered
Microsoft.GuestConfiguration Registered
Microsoft.PolicyInsights Registered
Microsoft.Security Registered
Microsoft.ManagedIdentity Registered
Microsoft.Capacity Registered
Microsoft.Web Registered
Microsoft.Advisor Registered
Microsoft.KeyVault Registered
ArizeAi.ObservabilityEval NotRegistered
Astronomer.Astro NotRegistered
Dell.Storage NotRegistered
Dynatrace.Observability NotRegistered
GitHub.Network NotRegistered
Informatica.DataManagement NotRegistered
LambdaTest.HyperExecute NotRegistered
Liftrbasic.Samplerp NotRegistered
Microsoft.AAD NotRegistered
Microsoft.AadCustomSecurityAttributesDiagnosticSettings NotRegistered
microsoft.aadiam NotRegistered
Microsoft.Addons NotRegistered
Microsoft.ADHybridHealthService Registered
Microsoft.AgFoodPlatform NotRegistered
Microsoft.AgriculturePlatform NotRegistered
Microsoft.AlertsManagement NotRegistered
Microsoft.AnalysisServices NotRegistered
Microsoft.ApiCenter NotRegistered
Microsoft.ApiManagement NotRegistered
Microsoft.App NotRegistered
Microsoft.AppAssessment NotRegistered
Microsoft.AppComplianceAutomation NotRegistered
Microsoft.AppConfiguration NotRegistered
Microsoft.ApplicationMigration NotRegistered
Microsoft.AppLink NotRegistered
Microsoft.AppPlatform NotRegistered
Microsoft.ArcContainerStorage NotRegistered
Microsoft.Attestation NotRegistered
Microsoft.Authorization Registered
Microsoft.Automanage NotRegistered
Microsoft.Automation NotRegistered
Microsoft.AVS NotRegistered
Microsoft.AwsConnector NotRegistered
Microsoft.AzureActiveDirectory NotRegistered
Microsoft.AzureArcData NotRegistered
Microsoft.AzureBusinessContinuity NotRegistered
Microsoft.AzureDataTransfer NotRegistered
Microsoft.AzureFleet NotRegistered
Microsoft.AzureImageTestingForLinux NotRegistered
Microsoft.AzureLargeInstance NotRegistered
Microsoft.AzurePlaywrightService NotRegistered
Microsoft.AzureResilienceManagement NotRegistered
Microsoft.AzureScan NotRegistered
Microsoft.AzureSphere NotRegistered
Microsoft.AzureStack NotRegistered
Microsoft.AzureStackHCI NotRegistered
Microsoft.AzureTerraform NotRegistered
Microsoft.BackupSolutions NotRegistered
Microsoft.BareMetal NotRegistered
Microsoft.BareMetalInfrastructure NotRegistered
Microsoft.Batch NotRegistered
Microsoft.Billing Registered
Microsoft.BillingBenefits NotRegistered
Microsoft.Bing NotRegistered
Microsoft.BlockchainTokens NotRegistered
Microsoft.Blueprint NotRegistered
Microsoft.BotService NotRegistered
Microsoft.Cache NotRegistered
Microsoft.Carbon NotRegistered
Microsoft.Cdn NotRegistered
Microsoft.CertificateRegistration NotRegistered
Microsoft.ChangeSafety Registered
Microsoft.Chaos NotRegistered
Microsoft.ClassicCompute NotRegistered
Microsoft.ClassicInfrastructureMigrate NotRegistered
Microsoft.ClassicNetwork NotRegistered
Microsoft.ClassicStorage NotRegistered
Microsoft.ClassicSubscription Registered
Microsoft.CleanRoom NotRegistered
Microsoft.CloudDevicePlatform NotRegistered
Microsoft.CloudHealth NotRegistered
Microsoft.CloudShell NotRegistered
Microsoft.CloudTest NotRegistered
Microsoft.CodeSigning NotRegistered
Microsoft.CognitiveServices NotRegistered
Microsoft.Commerce Registered
Microsoft.Communication NotRegistered
Microsoft.Community NotRegistered
Microsoft.Compute NotRegistered
Microsoft.ComputeLimit NotRegistered
Microsoft.ComputeSchedule NotRegistered
Microsoft.ConfidentialLedger NotRegistered
Microsoft.Confluent NotRegistered
Microsoft.ConnectedCache NotRegistered
Microsoft.ConnectedCredentials NotRegistered
microsoft.connectedopenstack NotRegistered
Microsoft.ConnectedVehicle NotRegistered
Microsoft.ConnectedVMwarevSphere NotRegistered
Microsoft.Consumption Registered
Microsoft.ContainerInstance NotRegistered
Microsoft.ContainerRegistry NotRegistered
Microsoft.ContainerService NotRegistered
Microsoft.CostManagement Registered
Microsoft.CostManagementExports NotRegistered
Microsoft.CustomerLockbox NotRegistered
Microsoft.CustomProviders NotRegistered
Microsoft.D365CustomerInsights NotRegistered
Microsoft.Dashboard NotRegistered
Microsoft.DatabaseFleetManager NotRegistered
Microsoft.DatabaseWatcher NotRegistered
Microsoft.DataBox NotRegistered
Microsoft.DataBoxEdge NotRegistered
Microsoft.Databricks NotRegistered
Microsoft.Datadog NotRegistered
Microsoft.DataFactory NotRegistered
Microsoft.DataLakeAnalytics NotRegistered
Microsoft.DataLakeStore NotRegistered
Microsoft.DataMigration NotRegistered
Microsoft.DataProtection NotRegistered
Microsoft.DataReplication NotRegistered
Microsoft.DataShare NotRegistered
Microsoft.DBforMariaDB NotRegistered
Microsoft.DBforMySQL NotRegistered
Microsoft.DBforPostgreSQL NotRegistered
Microsoft.DependencyMap NotRegistered
Microsoft.DesktopVirtualization NotRegistered
Microsoft.DevCenter NotRegistered
Microsoft.DevelopmentWindows365 NotRegistered
Microsoft.DevHub NotRegistered
Microsoft.DeviceOnboarding NotRegistered
Microsoft.DeviceRegistry NotRegistered
Microsoft.Devices NotRegistered
Microsoft.DeviceUpdate NotRegistered
Microsoft.DevOpsInfrastructure NotRegistered
Microsoft.DevTestLab NotRegistered
Microsoft.DigitalTwins NotRegistered
Microsoft.Discovery NotRegistered
Microsoft.DocumentDB NotRegistered
Microsoft.DomainRegistration NotRegistered
Microsoft.DurableTask NotRegistered
Microsoft.Easm NotRegistered
Microsoft.Edge NotRegistered
Microsoft.EdgeManagement NotRegistered
Microsoft.EdgeMarketplace NotRegistered
Microsoft.EdgeOrder NotRegistered
Microsoft.EdgeOrderPartner NotRegistered
Microsoft.EdgeZones NotRegistered
Microsoft.Elastic NotRegistered
Microsoft.ElasticSan NotRegistered
Microsoft.EnterpriseSupport NotRegistered
Microsoft.EntitlementManagement NotRegistered
Microsoft.EntraIDGovernance NotRegistered
Microsoft.EntraIdGovernanceAccelerator NotRegistered
Microsoft.ErrorAtlas NotRegistered
Microsoft.EventGrid NotRegistered
Microsoft.EventHub NotRegistered
Microsoft.Experimentation NotRegistered
Microsoft.ExtendedLocation NotRegistered
Microsoft.Fabric NotRegistered
Microsoft.Features Registered
Microsoft.FileShares NotRegistered
Microsoft.FluidRelay NotRegistered
Microsoft.GCPConnector NotRegistered
Microsoft.GraphServices NotRegistered
Microsoft.HanaOnAzure NotRegistered
Microsoft.HardwareSecurityModules NotRegistered
Microsoft.HDInsight NotRegistered
Microsoft.HealthBot NotRegistered
Microsoft.HealthcareApis NotRegistered
Microsoft.HealthcareInterop NotRegistered
Microsoft.HealthDataAIServices NotRegistered
Microsoft.HealthModel NotRegistered
Microsoft.HealthPlatform NotRegistered
Microsoft.Help NotRegistered
Microsoft.HybridCloud NotRegistered
Microsoft.HybridCompute NotRegistered
Microsoft.HybridConnectivity NotRegistered
Microsoft.HybridContainerService NotRegistered
Microsoft.HybridNetwork NotRegistered
Microsoft.Impact NotRegistered
Microsoft.IntegrationSpaces NotRegistered
Microsoft.IoTCentral NotRegistered
Microsoft.IoTFirmwareDefense NotRegistered
Microsoft.IoTOperations NotRegistered
Microsoft.IoTOperationsDataProcessor NotRegistered
Microsoft.IoTSecurity NotRegistered
Microsoft.Kubernetes NotRegistered
Microsoft.KubernetesConfiguration NotRegistered
Microsoft.KubernetesRuntime NotRegistered
Microsoft.Kusto NotRegistered
Microsoft.LabServices NotRegistered
Microsoft.LoadTestService NotRegistered
Microsoft.Logic NotRegistered
Microsoft.MachineLearningServices NotRegistered
Microsoft.Maintenance NotRegistered
Microsoft.ManagedNetworkFabric NotRegistered
Microsoft.ManagedServices NotRegistered
Microsoft.Management NotRegistered
Microsoft.Maps NotRegistered
Microsoft.Marketplace NotRegistered
Microsoft.MarketplaceOrdering Registered
Microsoft.MessagingCatalog NotRegistered
Microsoft.MessagingConnectors NotRegistered
Microsoft.Migrate NotRegistered
Microsoft.Mission NotRegistered
Microsoft.Monitor NotRegistered
Microsoft.MySQLDiscovery NotRegistered
Microsoft.NetApp NotRegistered
Microsoft.Network NotRegistered
Microsoft.NetworkCloud NotRegistered
Microsoft.NetworkFunction NotRegistered
Microsoft.NexusIdentity NotRegistered
Microsoft.NotificationHubs NotRegistered
Microsoft.Nutanix NotRegistered
Microsoft.ObjectStore NotRegistered
Microsoft.OffAzure NotRegistered
Microsoft.OffAzureSpringBoot NotRegistered
Microsoft.OnlineExperimentation NotRegistered
Microsoft.OpenEnergyPlatform NotRegistered
Microsoft.OperationsManagement NotRegistered
Microsoft.OperatorVoicemail NotRegistered
Microsoft.OracleDiscovery NotRegistered
Microsoft.Orbital NotRegistered
Microsoft.PartnerManagedConsumerRecurrence NotRegistered
Microsoft.Peering NotRegistered
Microsoft.Pki NotRegistered
Microsoft.Portal Registered
Microsoft.PortalServices NotRegistered
Microsoft.PowerBI NotRegistered
Microsoft.PowerBIDedicated NotRegistered
Microsoft.PowerPlatform NotRegistered
Microsoft.Premonition NotRegistered
Microsoft.ProfessionalService NotRegistered
Microsoft.ProviderHub NotRegistered
Microsoft.Purview NotRegistered
Microsoft.Quantum NotRegistered
Microsoft.Quota NotRegistered
Microsoft.RecommendationsService NotRegistered
Microsoft.RecoveryServices NotRegistered
Microsoft.RedHatOpenShift NotRegistered
Microsoft.Relationships NotRegistered
Microsoft.Relay NotRegistered
Microsoft.ResourceBuilder NotRegistered
Microsoft.ResourceConnector NotRegistered
Microsoft.ResourceGraph Registered
Microsoft.ResourceHealth NotRegistered
Microsoft.ResourceIntelligence Registered
Microsoft.ResourceNotifications Registered
Microsoft.Resources Registered
Microsoft.SaaS NotRegistered
Microsoft.SaaSHub NotRegistered
Microsoft.Scom NotRegistered
Microsoft.SCVMM NotRegistered
Microsoft.Search NotRegistered
Microsoft.SecretSyncController NotRegistered
Microsoft.SecurityCopilot NotRegistered
Microsoft.SecurityDetonation NotRegistered
Microsoft.SecurityInsights NotRegistered
Microsoft.SecurityPlatform NotRegistered
Microsoft.SentinelPlatformServices NotRegistered
Microsoft.SerialConsole Registered
Microsoft.ServiceBus NotRegistered
Microsoft.ServiceFabric NotRegistered
Microsoft.ServiceFabricMesh NotRegistered
Microsoft.ServiceLinker NotRegistered
Microsoft.ServiceNetworking NotRegistered
Microsoft.ServicesHub NotRegistered
Microsoft.SignalRService NotRegistered
Microsoft.Singularity NotRegistered
Microsoft.SoftwarePlan NotRegistered
Microsoft.Solutions NotRegistered
Microsoft.Sovereign NotRegistered
Microsoft.Sql NotRegistered
Microsoft.SqlVirtualMachine NotRegistered
Microsoft.StandbyPool NotRegistered
Microsoft.StorageActions NotRegistered
Microsoft.StorageCache NotRegistered
Microsoft.StorageDiscovery NotRegistered
Microsoft.StorageMover NotRegistered
Microsoft.StorageSync NotRegistered
Microsoft.StorageTasks NotRegistered
Microsoft.StreamAnalytics NotRegistered
Microsoft.Subscription NotRegistered
Microsoft.SupercomputerInfrastructure NotRegistered
microsoft.support Registered
Microsoft.SustainabilityServices NotRegistered
Microsoft.Synapse NotRegistered
Microsoft.Syntex NotRegistered
Microsoft.ToolchainOrchestrator NotRegistered
Microsoft.UpdateManager NotRegistered
Microsoft.UsageBilling NotRegistered
Microsoft.Validate NotRegistered
Microsoft.VerifiedId NotRegistered
Microsoft.VideoIndexer NotRegistered
Microsoft.VirtualMachineImages NotRegistered
microsoft.visualstudio NotRegistered
Microsoft.VMware NotRegistered
Microsoft.VoiceServices NotRegistered
Microsoft.WeightsAndBiases NotRegistered
Microsoft.Windows365 NotRegistered
Microsoft.WindowsPushNotificationServices NotRegistered
Microsoft.WorkloadBuilder NotRegistered
Microsoft.Workloads NotRegistered
MongoDB.Atlas NotRegistered
Neon.Postgres NotRegistered
NewRelic.Observability NotRegistered
NGINX.NGINXPLUS NotRegistered
Oracle.Database NotRegistered
PaloAltoNetworks.Cloudngfw NotRegistered
Pinecone.VectorDb NotRegistered
PureStorage.Block NotRegistered
Qumulo.Storage NotRegistered
0 enabled Subscription Features learn
0 Resource Locks learn
   Download CSV semicolon | comma
ResourceType Location Count
microsoft.insights/actiongroups global 1
microsoft.insights/components westeurope 1
microsoft.keyvault/vaults westeurope 1
microsoft.operationalinsights/workspaces westeurope 1
microsoft.storage/storageaccounts westeurope 1
microsoft.web/serverfarms westeurope 1
microsoft.web/sites westeurope 1
   CAF - Recommended abbreviations for Azure resource types learn
   Resource details can be found in the CSV output *_ResourcesAll.csv
   Download CSV semicolon | comma
ResourceType Recommendation ResourceFriendlyName passed failed passed percentage
microsoft.insights/actiongroups ag- Azure Monitor action group 0 1 0%
microsoft.insights/components appi- Application Insights 0 1 0%
microsoft.keyvault/vaults kv- Key vault 0 1 0%
microsoft.operationalinsights/workspaces log- Log Analytics workspace 0 1 0%
microsoft.storage/storageaccounts st, stvm Storage account, VM storage account 0 1 0%
microsoft.web/serverfarms plan- App Service plan 0 1 0%
microsoft.web/sites app-, func-, ase- Web app, Function app, App Service environment 0 1 0%
No cost optimization & cleanup
   Download CSV semicolon | comma
ResourceType Resource Count Diagnostics capable Metrics Logs LogCategories
microsoft.insights/actiongroups 1 False False False
microsoft.insights/components 1 True True True AppAvailabilityResults, AppBrowserTimings, AppEvents, AppMetrics, AppDependencies, AppExceptions, AppPageViews, AppPerformanceCounters, AppRequests, AppSystemEvents, AppTraces, OTelResources
microsoft.keyvault/vaults 1 True True True AuditEvent, AzurePolicyEvaluationDetails
microsoft.operationalinsights/workspaces 1 True True True Audit, SummaryLogs, Jobs
microsoft.storage/storageaccounts 1 True True False
microsoft.web/serverfarms 1 True True False
microsoft.web/sites 1 True True True AppServiceHTTPLogs, AppServiceConsoleLogs, AppServiceAppLogs, AppServiceAuditLogs, AppServiceIPSecAuditLogs, AppServicePlatformLogs, AppServiceAuthenticationLogs
No UserAssigned Managed Identities assigned to Resources / vice versa - at all
PSRule for Azure - integration paused - PSRule for Azure
   Download CSV semicolon | comma
  *Depending on the number of rows and your computer´s performance the table may respond with delay, download the csv for better filtering experience
Inheritance ScopeExcluded Exemption applies Policy DisplayName PolicyId Type Category ALZ Effect Parameters Enforcement NonCompliance Message Policies NonCmplnt Policies Compliant Resources NonCmplnt Resources Compliant Resources Conflicting Role/Assignment Managed Identity Assignment DisplayName AssignmentId AssignedBy CreatedOn CreatedBy UpdatedOn UpdatedBy
inherited mibelle-landingzones-corp-mg false false Not allowed resource types /providers/microsoft.authorization/policydefinitions/6c112d4e-5bc7-47ae-a041-ea2d9dccd749 BuiltIn General False Deny effect=Deny, listOfResourceTypesNotAllowed=microsoft.network/expressroutecircuits; microsoft.network/expressroutegateways; microsoft.network/expressrouteports; microsoft.network/virtualwans; microsoft.network/vpngateways; microsoft.network/p2svpngateways; microsoft.network/vpnsites; microsoft.network/virtualnetworkgateways Default 0 0 0 0 0 none Deny the deployment of vWAN/ER/VPN gateway resources /providers/microsoft.management/managementgroups/mibelle-landingzones-corp-mg/providers/microsoft.authorization/policyassignments/deny-hybridnetworking n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-corp-mg false false Network interfaces should not have public IPs /providers/microsoft.authorization/policydefinitions/83a86a26-fd1f-447c-b59d-e51f44264114 BuiltIn Network False deny Default 0 0 0 0 0 none Deny network interfaces having a public IP associated /providers/microsoft.management/managementgroups/mibelle-landingzones-corp-mg/providers/microsoft.authorization/policyassignments/deny-public-ip-on-nic n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg false false Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics /providers/microsoft.authorization/policydefinitions/052c180e-287d-44c3-86ef-01aeae2d9774 BuiltIn Network False DeployIfNotExists networkWatcherName=/subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourcegroups/networkwatcherrg/providers/microsoft.network/networkwatchers/networkwatcher_westeurope, networkWatcherRG=networkwatcherrg, retentionDays=1, storageId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.storage/storageaccounts/mibmgmtnetprodeuwst01, vnetRegion=westeurope, workspaceRegion=westeurope, workspaceResourceId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 0 0 0 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/94dfdb33-b864-47c9-831d-366721beb989) 52a8c671384a4b609f1d7651 (SPObjId: 6e0d029a-fce4-400f-bff3-45b8d9a8342e) Deploy-TrafficAnalytics-WestEurope /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/52a8c671384a4b609f1d7651 n/a 09/04/2025 06:12:52 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 09/04/2025 07:23:12 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg false false Web Application Firewall (WAF) should be enabled for Application Gateway /providers/microsoft.authorization/policydefinitions/564feb30-bf6a-4854-b4bb-0d2d2d1e6c66 BuiltIn Network False Audit effect=Audit Default 0 0 0 0 0 none Web Application Firewall (WAF) should be enabled for Application Gateway /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/audit-appgw-waf n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg false false Network interfaces should disable IP forwarding /providers/microsoft.authorization/policydefinitions/88c0b9da-ce96-4b03-9635-f29a937e2900 BuiltIn Network False deny Default 0 0 0 0 0 none Network interfaces should disable IP forwarding /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deny-ip-forwarding n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg false false Management port access from the Internet should be blocked /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-mgmtports-from-internet Custom Network true Deny effect=Deny Default 0 0 0 0 0 none Management port access from the Internet should be blocked /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deny-mgmtports-internet n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg false false Kubernetes cluster should not allow privileged containers /providers/microsoft.authorization/policydefinitions/95edb821-ddaf-4404-9732-666045e056b4 BuiltIn Kubernetes False deny effect=deny Default 0 0 0 0 0 none Kubernetes cluster should not allow privileged containers /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deny-priv-containers-aks n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg false false Kubernetes clusters should not allow container privilege escalation /providers/microsoft.authorization/policydefinitions/1c6e92c9-99f0-4e55-9cf2-0c234dc48f99 BuiltIn Kubernetes False deny effect=deny Default 0 0 0 0 0 none Kubernetes clusters should not allow container privilege escalation /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deny-priv-escalation-aks n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg false false Secure transfer to storage accounts should be enabled /providers/microsoft.authorization/policydefinitions/404c3081-a854-4457-ae30-26a93ef643f9 BuiltIn Storage False Deny effect=Deny Default 0 1 0 1 0 none Secure transfer to storage accounts should be enabled /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deny-storage-http n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg false false Configure SQL servers to have auditing enabled to Log Analytics workspace /providers/microsoft.authorization/policydefinitions/25da7dfb-0666-4a15-a8f5-402127efd8bb BuiltIn SQL False DeployIfNotExists effect=DeployIfNotExists, logAnalyticsWorkspaceId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 0 0 0 0 SQL Security Manager (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/2f1eab15-c92e-52cd-8b0c-a60e52f1b331), SQL Security Manager (/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/providers/microsoft.authorization/roleassignments/ce81334b-c425-5087-9b8d-2119e050082b), Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/488f45ec-c535-5f65-85bf-acacd1bb93e8), Log Analytics Contributor (/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/providers/microsoft.authorization/roleassignments/fbb2af70-7587-52bd-b3e1-54fcdbdb7ea4) Deploy-AzSqlDb-Auditing (SPObjId: afb169da-f80a-4dd6-abf3-b7fc08efb8ae) Configure SQL servers to have auditing enabled to Log Analytics workspace /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deploy-azsqldb-auditing n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg false false Deploy SQL DB transparent data encryption /providers/microsoft.authorization/policydefinitions/86a912f6-9a06-4e26-b447-11b16ba8659f BuiltIn SQL False DeployIfNotExists Default 0 0 0 0 0 SQL DB Contributor (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/af2f6b24-ac34-5f3b-9249-5a109d9d1528) Deploy-SQL-TDE (SPObjId: de5ed213-fd75-471c-8d32-920072d6c378) Deploy TDE on SQL servers /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deploy-sql-tde n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg false false Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics /providers/microsoft.authorization/policydefinitions/052c180e-287d-44c3-86ef-01aeae2d9774 BuiltIn Network False DeployIfNotExists networkWatcherName=/subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourcegroups/networkwatcherrg/providers/microsoft.network/networkwatchers/networkwatcher_northeurope, networkWatcherRG=networkwatcherrg, retentionDays=1, storageId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.storage/storageaccounts/mibmgmtnetprodeunst01, vnetRegion=northeurope, workspaceRegion=westeurope, workspaceResourceId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 0 0 0 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/3fb7bac5-2328-4e74-a5b0-0d6d2a631693) e9143c36572348c3ba0c67b1 (SPObjId: 9c3b725e-ce85-47ac-bf6f-c2fa0571c259) Deploy-TrafficAnalytics-NorthEurope /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/e9143c36572348c3ba0c67b1 n/a 09/04/2025 07:17:59 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 09/04/2025 07:33:42 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg false false Kubernetes clusters should be accessible only over HTTPS /providers/microsoft.authorization/policydefinitions/1a5b4dca-0b6f-4cf5-907c-56316bc1bf3d BuiltIn Kubernetes False deny effect=deny Default 0 0 0 0 0 none Kubernetes clusters should be accessible only over HTTPS /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enforce-aks-https n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg false false Subnets should be private /providers/microsoft.authorization/policydefinitions/7bca8353-aa3b-429b-904a-9229c4385837 BuiltIn Network False Audit Default 0 0 0 0 0 none Subnets should be private /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enforce-subnet-private n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false false Audit resource location matches resource group location /providers/microsoft.authorization/policydefinitions/0a914e76-4921-4c19-b460-a2d36003525a BuiltIn General False audit Default 0 1 0 7 0 none Audit that the resource location matches its resource group location /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-location-match n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false false Not allowed resource types /providers/microsoft.authorization/policydefinitions/6c112d4e-5bc7-47ae-a041-ea2d9dccd749 BuiltIn General False Deny effect=Deny, listOfResourceTypesNotAllowed=Microsoft.ClassicCompute/capabilities; Microsoft.ClassicCompute/checkDomainNameAvailability; Microsoft.ClassicCompute/domainNames; Microsoft.ClassicCompute/domainNames/capabilities; Microsoft.ClassicCompute/domainNames/internalLoadBalancers; Microsoft.ClassicCompute/domainNames/serviceCertificates; Microsoft.ClassicCompute/domainNames/slots; Microsoft.ClassicCompute/domainNames/slots/roles; Microsoft.ClassicCompute/domainNames/slots/roles/metricDefinitions; Microsoft.ClassicCompute/domainNames/slots/roles/metrics; Microsoft.ClassicCompute/moveSubscriptionResources; Microsoft.ClassicCompute/operatingSystemFamilies; Microsoft.ClassicCompute/operatingSystems; Microsoft.ClassicCompute/operations; Microsoft.ClassicCompute/operationStatuses; Microsoft.ClassicCompute/quotas; Microsoft.ClassicCompute/resourceTypes; Microsoft.ClassicCompute/validateSubscriptionMoveAvailability; Microsoft.ClassicCompute/virtualMachines; Microsoft.ClassicCompute/virtualMachines/diagnosticSettings; Microsoft.ClassicCompute/virtualMachines/metricDefinitions; Microsoft.ClassicCompute/virtualMachines/metrics; Microsoft.ClassicInfrastructureMigrate/classicInfrastructureResources; Microsoft.ClassicNetwork/capabilities; Microsoft.ClassicNetwork/expressRouteCrossConnections; Microsoft.ClassicNetwork/expressRouteCrossConnections/peerings; Microsoft.ClassicNetwork/gatewaySupportedDevices; Microsoft.ClassicNetwork/networkSecurityGroups; Microsoft.ClassicNetwork/operations; Microsoft.ClassicNetwork/quotas; Microsoft.ClassicNetwork/reservedIps; Microsoft.ClassicNetwork/virtualNetworks; Microsoft.ClassicNetwork/virtualNetworks/remoteVirtualNetworkPeeringProxies; Microsoft.ClassicNetwork/virtualNetworks/virtualNetworkPeerings; Microsoft.ClassicStorage/capabilities; Microsoft.ClassicStorage/checkStorageAccountAvailability; Microsoft.ClassicStorage/disks; Microsoft.ClassicStorage/images; Microsoft.ClassicStorage/operations; Microsoft.ClassicStorage/osImages; Microsoft.ClassicStorage/osPlatformImages; Microsoft.ClassicStorage/publicImages; Microsoft.ClassicStorage/quotas; Microsoft.ClassicStorage/storageAccounts; Microsoft.ClassicStorage/storageAccounts/blobServices; Microsoft.ClassicStorage/storageAccounts/fileServices; Microsoft.ClassicStorage/storageAccounts/metricDefinitions; Microsoft.ClassicStorage/storageAccounts/metrics; Microsoft.ClassicStorage/storageAccounts/queueServices; Microsoft.ClassicStorage/storageAccounts/services; Microsoft.ClassicStorage/storageAccounts/services/diagnosticSettings; Microsoft.ClassicStorage/storageAccounts/services/metricDefinitions; Microsoft.ClassicStorage/storageAccounts/services/metrics; Microsoft.ClassicStorage/storageAccounts/tableServices; Microsoft.ClassicStorage/storageAccounts/vmImages; Microsoft.ClassicStorage/vmImages; Microsoft.ClassicSubscription/operations Default 0 0 0 0 0 none Deny the deployment of classic resources /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deny-classic-resources n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false false Audit VMs that do not use managed disks /providers/microsoft.authorization/policydefinitions/06a78e20-9358-41c9-923c-fb736d382a4d BuiltIn Compute False audit Default 0 0 0 0 0 none Deny virtual machines and virtual machine scale sets that do not use managed disk /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deny-unmanageddisk n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false false Configure Azure Activity logs to stream to specified Log Analytics workspace /providers/microsoft.authorization/policydefinitions/2465583e-4e78-4c15-b6be-a36cbc7c8b0f BuiltIn Monitoring False DeployIfNotExists effect=DeployIfNotExists, logAnalytics=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 1 0 1 0 0 Monitoring Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/dcb59c88-f014-5e17-840c-6c9aecc66286), Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/82f0c3bf-808b-5863-bf9c-231cfbf9598a) Deploy-AzActivity-Log (SPObjId: 217aa040-8eb0-451b-b81c-0b8f3d200d5a) Deploy Diagnostic Settings for Activity Log to Log Analytics workspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
   Download CSV semicolon | comma
Inheritance ScopeExcluded PolicySet DisplayName PolicySetId Type Category ALZ Parameters Enforcement NonCompliance Message Policies NonCmplnt Policies Compliant Resources NonCmplnt Resources Compliant Resources Conflicting Role/Assignment Managed Identity Assignment DisplayName AssignmentId AssignedBy CreatedOn CreatedBy UpdatedOn UpdatedBy
inherited mibelle-landingzones-corp-mg false Public network access should be disabled for PaaS services /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deny-publicpaasendpoints Custom Network true Default 0 2 0 2 0 none Public network access should be disabled for PaaS services /providers/microsoft.management/managementgroups/mibelle-landingzones-corp-mg/providers/microsoft.authorization/policyassignments/deny-public-endpoints n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg false Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-aum-checkupdates Custom Security Center true assessmentMode=AutomaticByPlatform Default 0 0 0 0 0 Virtual Machine Contributor (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/571da045-f503-5cb2-b123-ede8cfe0f15a), Azure Connected Machine Resource Administrator (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/7d65b18e-df43-5353-85a4-716e68ff7c7a), Managed Identity Operator (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/b2c88903-f3a4-54ec-813c-46d650309b86) Enable-AUM-CheckUpdates (SPObjId: 4f27b633-c16b-47a6-ab24-737bb6cdad56) Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines. /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg false Enforce recommended guardrails for Azure Key Vault /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-keyvault Custom Key Vault true Default 0 4 0 1 0 none Enforce recommended guardrails for Azure Key Vault /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enforce-gr-keyvault n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Audit virtual machines for Trusted Launch support /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/audit-trustedlaunch Custom Trusted Launch true Default 0 0 0 0 0 none Audit virtual machines for Trusted Launch support /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-trustedlaunch n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Unused resources driving cost should be avoided /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/audit-unusedresourcescostoptimization Custom Cost Optimization true EffectDisks=Audit, EffectPublicIpAddresses=Audit, EffectServerFarms=Audit Default 0 1 0 1 0 none Unused resources driving cost should be avoided /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-unusedresources n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Microsoft cloud security benchmark /providers/microsoft.authorization/policysetdefinitions/1f3afdf9-d0c9-4c3d-847f-89da613e70a8 BuiltIn Security Center False Default 27 18 9 0 0 none Enable Monitoring in Microsoft Defender for Cloud /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-asc-monitoring n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Enable audit category group resource logging for supported resources to Log Analytics /providers/microsoft.authorization/policysetdefinitions/f5b29bc4-feca-4cc6-a58a-772dd5e290a5 BuiltIn Monitoring False logAnalytics=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 2 0 2 0 Monitoring Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b922046a-7a3e-59da-a982-8a5b855791ce), Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/9df772a7-1ce7-5439-ab6b-5d31d69925cc) Deploy-Diag-Logs (SPObjId: 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57) Enable allLogs category group resource logging for supported resources to Log Analytics /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud /providers/microsoft.authorization/policysetdefinitions/77b391e3-2d5d-40c3-83bf-65c846b3c6a3 BuiltIn Security Center False Default 0 3 0 1 0 Security Admin (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/d730d560-adce-52b7-b10c-36a8ad16a6d3) Deploy-MDEndpointsAMA (SPObjId: 7d365a6d-a7ae-4921-beca-5ce854a76960) Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-mdendpointsama n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Enforce Azure Compute Security Benchmark compliance auditing /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-acsb Custom Guest Configuration true Default 0 0 0 0 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/6e26cd22-b41b-5611-aafc-e2c56b14c060) Enforce-ACSB (SPObjId: e1f2e80c-5329-4804-824d-f0b44713985e) Enforce Azure Compute Security Baseline compliance auditing /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/enforce-acsb n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Policy Assignment Limit: 0/200
0 Custom Policy definitions scoped
0 Custom PolicySet definitions scoped
0 Blueprints assigned
0 Blueprints scoped
No Classic Administrators
   Download CSV semicolon | comma
  *Depending on the number of rows and your computer´s performance the table may respond with delay, download the csv for better filtering experience
Scope Role RoleId Role Type Data Can do Role assignment Identity Displayname Identity SignInName Identity ObjectId Identity Type Applicability Applies through membership Group Details Role AssignmentId Related Policy Assignment CreatedOn CreatedBy
inherited mibelle-landingzones-mg SQL Security Manager 056cd41c-7e88-42e1-933e-88ba6a50c9c3 Builtin false False Deploy-AzSqlDb-Auditing n/a afb169da-f80a-4dd6-abf3-b7fc08efb8ae SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/2f1eab15-c92e-52cd-8b0c-a60e52f1b331 /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deploy-azsqldb-auditing (Configure SQL servers to have auditing enabled to Log Analytics workspace) 06/12/2025 17:56:41 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg Log Analytics Contributor 92aaf0da-9dab-42b6-94a3-d43ce8d16293 Builtin false False Deploy-AzSqlDb-Auditing n/a afb169da-f80a-4dd6-abf3-b7fc08efb8ae SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/488f45ec-c535-5f65-85bf-acacd1bb93e8 /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deploy-azsqldb-auditing (Configure SQL servers to have auditing enabled to Log Analytics workspace) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg Virtual Machine Contributor 9980e02c-c2be-4d73-94e8-173b1dc7cf3c Builtin false False Enable-AUM-CheckUpdates n/a 4f27b633-c16b-47a6-ab24-737bb6cdad56 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/571da045-f503-5cb2-b123-ede8cfe0f15a /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates (Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines) 06/12/2025 17:56:38 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg SQL DB Contributor 9b7fa17d-e63e-47b0-bb0a-15c516ac86ec Builtin false False Deploy-SQL-TDE n/a de5ed213-fd75-471c-8d32-920072d6c378 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/af2f6b24-ac34-5f3b-9249-5a109d9d1528 /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deploy-sql-tde (Deploy SQL DB transparent data encryption) 06/12/2025 17:56:38 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False 52a8c671384a4b609f1d7651 n/a 6e0d029a-fce4-400f-bff3-45b8d9a8342e SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/94dfdb33-b864-47c9-831d-366721beb989 /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/52a8c671384a4b609f1d7651 (Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics) 09/04/2025 06:12:52 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False e9143c36572348c3ba0c67b1 n/a 9c3b725e-ce85-47ac-bf6f-c2fa0571c259 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/3fb7bac5-2328-4e74-a5b0-0d6d2a631693 /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/e9143c36572348c3ba0c67b1 (Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics) 09/04/2025 07:18:00 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg Azure Connected Machine Resource Administrator cd570a14-e51a-42ad-bac8-bafd67325302 Builtin false False Enable-AUM-CheckUpdates n/a 4f27b633-c16b-47a6-ab24-737bb6cdad56 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/7d65b18e-df43-5353-85a4-716e68ff7c7a /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates (Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg Managed Identity Operator f1a07417-d97a-45cb-824c-7a7467783830 Builtin false False Enable-AUM-CheckUpdates n/a 4f27b633-c16b-47a6-ab24-737bb6cdad56 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/b2c88903-f3a4-54ec-813c-46d650309b86 /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates (Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/e14ef9ac-25e8-4ee7-887a-a6576bd5229d none 11/28/2025 07:57:36 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Monitoring Contributor 749f88d5-cbae-40b8-bcfc-e573ddc772fa Builtin false False Deploy-AzActivity-Log n/a 217aa040-8eb0-451b-b81c-0b8f3d200d5a SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/dcb59c88-f014-5e17-840c-6c9aecc66286 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log (Configure Azure Activity logs to stream to specified Log Analytics workspace) 06/12/2025 17:56:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Monitoring Contributor 749f88d5-cbae-40b8-bcfc-e573ddc772fa Builtin false False Deploy-Diag-Logs n/a 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b922046a-7a3e-59da-a982-8a5b855791ce /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs (Enable audit category group resource logging for supported resources to Log Analytics) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Log Analytics Contributor 92aaf0da-9dab-42b6-94a3-d43ce8d16293 Builtin false False Deploy-AzActivity-Log n/a 217aa040-8eb0-451b-b81c-0b8f3d200d5a SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/82f0c3bf-808b-5863-bf9c-231cfbf9598a /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log (Configure Azure Activity logs to stream to specified Log Analytics workspace) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Log Analytics Contributor 92aaf0da-9dab-42b6-94a3-d43ce8d16293 Builtin false False Deploy-Diag-Logs n/a 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/9df772a7-1ce7-5439-ab6b-5d31d69925cc /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs (Enable audit category group resource logging for supported resources to Log Analytics) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Meier, Heinz-MIBELLEGROUP heinz.meier@mibelle.net 06addc33-6298-4f01-9f6b-709193f099cc User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Subs-MibelleOnline-SubscriptionOwner n/a 1bdf326c-8c66-4ba9-8c2d-83312a1ddc02 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-Reader n/a 1c529912-c479-41a1-8a03-e57256720fa4 Group direct 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser n/a 1f3ede05-4301-42b1-8c95-2be94290e93c Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Hasanow, Kilian-MIBELLEGROUP kilian.hasanow@mibelle.net 4270eb01-73cf-4e17-925e-47461737b40e User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Mibelle-AzGovWiz-prod n/a 44b03901-55d2-49a8-af3a-58228a81408c SP APP INT indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-michael.peter csa-michael.peter@MIBCloud.mail.onmicrosoft.com 460bad8a-cc4d-41dc-9ddd-f24ba491e2a6 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner n/a 52364002-4a8b-4808-b4fc-864ed5f7d50d Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Matej Paunovski CSA-matej.paunovski@MIBCloud.onmicrosoft.com 54f81d33-50db-475c-b686-4ef70aa0b4fe User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Ouaouane, Taoufik-MIBELLEGROUP taoufik.ouaouane@mibelle.net 7100d1ce-5bd7-449d-abdd-52a7218922b3 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-NetOps n/a 87e9d07b-5340-455c-b297-8bffe3b86f78 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner n/a 9b120856-d4b2-4862-95df-bedf8d5fe1c3 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-Baswaraj Marotrao Ramshette csa-baswarajmarotrao.ramshette@MIBCloud.onmicrosoft.com 9d8d246b-a1f9-4d9a-a54f-f7ae9f3af2ae User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-SecOps n/a abf39027-4cb4-4298-8951-f984eaf9cb8e Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Baumann, Jürg-MIBELLEGROUP juerg.baumann_mibellegroup.com#EXT#@MIBCloud.onmicrosoft.com bb2279b2-06ab-459a-b981-579701601f8a User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin n/a cb058f58-c629-445f-9a10-75f9fcab694e Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Philipp.Schmidt CSA-Philipp.Schmidt@MIBCloud.onmicrosoft.com e40a73c8-6655-434d-8c8b-fdc4d9213499 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Taoufik.Ouaouane csa-Taoufik.Ouaouane@mibelle.net e58ba28f-09ed-49c3-8f5e-31b05c258cde User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Adrian.Bombelka CSA-Adrian.Bombelka@MIBCloud.onmicrosoft.com e86b38a8-e5d4-4888-b09d-390dcf9a2017 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False Enforce-ACSB n/a e1f2e80c-5329-4804-824d-f0b44713985e SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/6e26cd22-b41b-5611-aafc-e2c56b14c060 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/enforce-acsb (Enforce Azure Compute Security Benchmark compliance auditing) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Security Admin fb1c8493-542b-48eb-b624-b4c8fea62acd Builtin false False Deploy-MDEndpointsAMA n/a 7d365a6d-a7ae-4921-beca-5ce854a76960 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/d730d560-adce-52b7-b10c-36a8ad16a6d3 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-mdendpointsama (Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited Tenant User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false True CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member direct /providers/microsoft.authorization/roleassignments/3f958da1-722a-4c03-8398-aab60735ecd3 none 05/07/2025 18:14:55 ObjectType: User Member, ObjectDisplayName: CSA-Jan.Stutz, ObjectSignInName: CSA-Jan.Stutz@MIBCloud.onmicrosoft.com, ObjectId: 43b3e278-6551-4566-83a8-c19abe643e64
thisScope Sub Owner 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 Builtin false True CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member direct /subscriptions/d4493d1a-9fd5-4596-aff4-8c679eac0164/providers/microsoft.authorization/roleassignments/b605fdb3-4802-48ac-b896-815366e2941b none 08/29/2025 13:48:56 IsNullOrEmpty
thisScope Sub v1-custom-role-d4493d1a-9fd5-4596-aff4-8c679eac0164 fa3940f3-4060-ef1b-997b-69b9fcbea8c1 Custom true False v1-app-registration-d4493d1a-9fd5-4596-aff4-8c679eac0164 n/a dd3e0147-c485-4150-9df1-9a09dbfdbd19 SP APP INT direct /subscriptions/d4493d1a-9fd5-4596-aff4-8c679eac0164/providers/microsoft.authorization/roleassignments/334047f4-4177-1a7a-b9c3-2794108b911d none 10/16/2025 08:21:28 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Highlight Management Group in HierarchyMap

Management Group Name: Online

Management Group Id: mibelle-landingzones-online-mg

Management Group Path: a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg

0 ManagementGroups below this scope
1 Subscriptions below this scope
Microsoft Defender for Cloud Secure Score: 82.08 Video , Blog , learn
   Download CSV semicolon | comma
Diagnostic setting Target Target Id Administrative Policy
toLa LA /subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 true true
No Consumption data available as switch parameter -DoAzureConsumption was not applied
   Download CSV semicolon | comma
ResourceType Location Count
microsoft.app/containerapps westeurope 1
microsoft.app/managedenvironments westeurope 1
microsoft.compute/sshpublickeys westeurope 9
microsoft.containerregistry/registries westeurope 1
microsoft.fabric/capacities westeurope 1
microsoft.insights/actiongroups global 1
microsoft.insights/components switzerlandnorth 1
microsoft.insights/components westeurope 3
microsoft.keyvault/vaults westeurope 2
microsoft.logic/workflows westeurope 2
microsoft.network/networkwatchers westeurope 1
microsoft.operationalinsights/workspaces switzerlandnorth 1
microsoft.operationalinsights/workspaces westeurope 3
microsoft.powerbidedicated/capacities westeurope 1
microsoft.saas/resources global 1
microsoft.storage/storageaccounts westeurope 7
microsoft.visualstudio/account northeurope 1
microsoft.web/certificates westeurope 1
microsoft.web/connectiongateways westeurope 1
microsoft.web/connections westeurope 7
microsoft.web/serverfarms westeurope 4
microsoft.web/sites westeurope 5
   Download CSV semicolon | comma
ResourceType Resource Count Diagnostics capable Metrics Logs LogCategories
microsoft.app/containerapps 1 True True False
microsoft.app/managedenvironments 1 True True True ContainerAppConsoleLogs, ContainerAppSystemLogs, AppEnvSpringAppConsoleLogs, AppEnvSessionConsoleLogs, AppEnvSessionPoolEventLogs, AppEnvSessionLifeCycleLogs
microsoft.compute/sshpublickeys 9 False False False
microsoft.containerregistry/registries 1 True True True ContainerRegistryRepositoryEvents, ContainerRegistryLoginEvents
microsoft.fabric/capacities 1 False False False
microsoft.insights/actiongroups 1 False False False
microsoft.insights/components 4 True True True AppAvailabilityResults, AppBrowserTimings, AppEvents, AppMetrics, AppDependencies, AppExceptions, AppPageViews, AppPerformanceCounters, AppRequests, AppSystemEvents, AppTraces, OTelResources
microsoft.keyvault/vaults 2 True True True AuditEvent, AzurePolicyEvaluationDetails
microsoft.logic/workflows 2 True True True WorkflowRuntime
microsoft.network/networkwatchers 1 False False False
microsoft.operationalinsights/workspaces 4 True True True Audit, SummaryLogs, Jobs
microsoft.powerbidedicated/capacities 1 True True True Engine
microsoft.saas/resources 1 False False False
microsoft.storage/storageaccounts 7 True True False
microsoft.visualstudio/account 1 False False False
microsoft.web/certificates 1 False
microsoft.web/connectiongateways 1 False False False
microsoft.web/connections 7 True True False
microsoft.web/serverfarms 4 True True False
microsoft.web/sites 5 True True True AppServiceHTTPLogs, AppServiceConsoleLogs, AppServiceAppLogs, AppServiceAuditLogs, AppServiceIPSecAuditLogs, AppServicePlatformLogs, AppServiceAuthenticationLogs
PSRule for Azure - integration paused - PSRule for Azure
   Download CSV semicolon | comma
  *Depending on the number of rows and your computer´s performance the table may respond with delay, download the csv for better filtering experience
Inheritance ScopeExcluded Exemption applies Policy DisplayName PolicyId Type Category ALZ Effect Parameters Enforcement NonCompliance Message Policies NonCmplnt Policies Compliant Resources NonCmplnt Resources Compliant Resources Conflicting Role/Assignment Managed Identity Assignment DisplayName AssignmentId AssignedBy CreatedOn CreatedBy UpdatedOn UpdatedBy
inherited mibelle-landingzones-mg false false Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics /providers/microsoft.authorization/policydefinitions/052c180e-287d-44c3-86ef-01aeae2d9774 BuiltIn Network False DeployIfNotExists networkWatcherName=/subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourcegroups/networkwatcherrg/providers/microsoft.network/networkwatchers/networkwatcher_westeurope, networkWatcherRG=networkwatcherrg, retentionDays=1, storageId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.storage/storageaccounts/mibmgmtnetprodeuwst01, vnetRegion=westeurope, workspaceRegion=westeurope, workspaceResourceId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 0 0 0 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/94dfdb33-b864-47c9-831d-366721beb989) 52a8c671384a4b609f1d7651 (SPObjId: 6e0d029a-fce4-400f-bff3-45b8d9a8342e) Deploy-TrafficAnalytics-WestEurope /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/52a8c671384a4b609f1d7651 n/a 09/04/2025 06:12:52 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 09/04/2025 07:23:12 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg false false Web Application Firewall (WAF) should be enabled for Application Gateway /providers/microsoft.authorization/policydefinitions/564feb30-bf6a-4854-b4bb-0d2d2d1e6c66 BuiltIn Network False Audit effect=Audit Default 0 0 0 0 0 none Web Application Firewall (WAF) should be enabled for Application Gateway /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/audit-appgw-waf n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg false false Network interfaces should disable IP forwarding /providers/microsoft.authorization/policydefinitions/88c0b9da-ce96-4b03-9635-f29a937e2900 BuiltIn Network False deny Default 0 0 0 0 0 none Network interfaces should disable IP forwarding /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deny-ip-forwarding n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg false false Management port access from the Internet should be blocked /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-mgmtports-from-internet Custom Network true Deny effect=Deny Default 0 0 0 0 0 none Management port access from the Internet should be blocked /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deny-mgmtports-internet n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg false false Kubernetes cluster should not allow privileged containers /providers/microsoft.authorization/policydefinitions/95edb821-ddaf-4404-9732-666045e056b4 BuiltIn Kubernetes False deny effect=deny Default 0 0 0 0 0 none Kubernetes cluster should not allow privileged containers /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deny-priv-containers-aks n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg false false Kubernetes clusters should not allow container privilege escalation /providers/microsoft.authorization/policydefinitions/1c6e92c9-99f0-4e55-9cf2-0c234dc48f99 BuiltIn Kubernetes False deny effect=deny Default 0 0 0 0 0 none Kubernetes clusters should not allow container privilege escalation /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deny-priv-escalation-aks n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg false false Secure transfer to storage accounts should be enabled /providers/microsoft.authorization/policydefinitions/404c3081-a854-4457-ae30-26a93ef643f9 BuiltIn Storage False Deny effect=Deny Default 0 1 0 7 0 none Secure transfer to storage accounts should be enabled /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deny-storage-http n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg false false Configure SQL servers to have auditing enabled to Log Analytics workspace /providers/microsoft.authorization/policydefinitions/25da7dfb-0666-4a15-a8f5-402127efd8bb BuiltIn SQL False DeployIfNotExists effect=DeployIfNotExists, logAnalyticsWorkspaceId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 0 0 0 0 SQL Security Manager (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/2f1eab15-c92e-52cd-8b0c-a60e52f1b331), SQL Security Manager (/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/providers/microsoft.authorization/roleassignments/ce81334b-c425-5087-9b8d-2119e050082b), Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/488f45ec-c535-5f65-85bf-acacd1bb93e8), Log Analytics Contributor (/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/providers/microsoft.authorization/roleassignments/fbb2af70-7587-52bd-b3e1-54fcdbdb7ea4) Deploy-AzSqlDb-Auditing (SPObjId: afb169da-f80a-4dd6-abf3-b7fc08efb8ae) Configure SQL servers to have auditing enabled to Log Analytics workspace /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deploy-azsqldb-auditing n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg false false Deploy SQL DB transparent data encryption /providers/microsoft.authorization/policydefinitions/86a912f6-9a06-4e26-b447-11b16ba8659f BuiltIn SQL False DeployIfNotExists Default 0 0 0 0 0 SQL DB Contributor (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/af2f6b24-ac34-5f3b-9249-5a109d9d1528) Deploy-SQL-TDE (SPObjId: de5ed213-fd75-471c-8d32-920072d6c378) Deploy TDE on SQL servers /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deploy-sql-tde n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg false false Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics /providers/microsoft.authorization/policydefinitions/052c180e-287d-44c3-86ef-01aeae2d9774 BuiltIn Network False DeployIfNotExists networkWatcherName=/subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourcegroups/networkwatcherrg/providers/microsoft.network/networkwatchers/networkwatcher_northeurope, networkWatcherRG=networkwatcherrg, retentionDays=1, storageId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.storage/storageaccounts/mibmgmtnetprodeunst01, vnetRegion=northeurope, workspaceRegion=westeurope, workspaceResourceId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 0 0 0 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/3fb7bac5-2328-4e74-a5b0-0d6d2a631693) e9143c36572348c3ba0c67b1 (SPObjId: 9c3b725e-ce85-47ac-bf6f-c2fa0571c259) Deploy-TrafficAnalytics-NorthEurope /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/e9143c36572348c3ba0c67b1 n/a 09/04/2025 07:17:59 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 09/04/2025 07:33:42 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg false false Kubernetes clusters should be accessible only over HTTPS /providers/microsoft.authorization/policydefinitions/1a5b4dca-0b6f-4cf5-907c-56316bc1bf3d BuiltIn Kubernetes False deny effect=deny Default 0 0 0 0 0 none Kubernetes clusters should be accessible only over HTTPS /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enforce-aks-https n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg false false Subnets should be private /providers/microsoft.authorization/policydefinitions/7bca8353-aa3b-429b-904a-9229c4385837 BuiltIn Network False Audit Default 0 0 0 0 0 none Subnets should be private /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enforce-subnet-private n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false false Audit resource location matches resource group location /providers/microsoft.authorization/policydefinitions/0a914e76-4921-4c19-b460-a2d36003525a BuiltIn General False audit Default 1 0 5 49 0 none Audit that the resource location matches its resource group location /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-location-match n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false false Not allowed resource types /providers/microsoft.authorization/policydefinitions/6c112d4e-5bc7-47ae-a041-ea2d9dccd749 BuiltIn General False Deny effect=Deny, listOfResourceTypesNotAllowed=Microsoft.ClassicCompute/capabilities; Microsoft.ClassicCompute/checkDomainNameAvailability; Microsoft.ClassicCompute/domainNames; Microsoft.ClassicCompute/domainNames/capabilities; Microsoft.ClassicCompute/domainNames/internalLoadBalancers; Microsoft.ClassicCompute/domainNames/serviceCertificates; Microsoft.ClassicCompute/domainNames/slots; Microsoft.ClassicCompute/domainNames/slots/roles; Microsoft.ClassicCompute/domainNames/slots/roles/metricDefinitions; Microsoft.ClassicCompute/domainNames/slots/roles/metrics; Microsoft.ClassicCompute/moveSubscriptionResources; Microsoft.ClassicCompute/operatingSystemFamilies; Microsoft.ClassicCompute/operatingSystems; Microsoft.ClassicCompute/operations; Microsoft.ClassicCompute/operationStatuses; Microsoft.ClassicCompute/quotas; Microsoft.ClassicCompute/resourceTypes; Microsoft.ClassicCompute/validateSubscriptionMoveAvailability; Microsoft.ClassicCompute/virtualMachines; Microsoft.ClassicCompute/virtualMachines/diagnosticSettings; Microsoft.ClassicCompute/virtualMachines/metricDefinitions; Microsoft.ClassicCompute/virtualMachines/metrics; Microsoft.ClassicInfrastructureMigrate/classicInfrastructureResources; Microsoft.ClassicNetwork/capabilities; Microsoft.ClassicNetwork/expressRouteCrossConnections; Microsoft.ClassicNetwork/expressRouteCrossConnections/peerings; Microsoft.ClassicNetwork/gatewaySupportedDevices; Microsoft.ClassicNetwork/networkSecurityGroups; Microsoft.ClassicNetwork/operations; Microsoft.ClassicNetwork/quotas; Microsoft.ClassicNetwork/reservedIps; Microsoft.ClassicNetwork/virtualNetworks; Microsoft.ClassicNetwork/virtualNetworks/remoteVirtualNetworkPeeringProxies; Microsoft.ClassicNetwork/virtualNetworks/virtualNetworkPeerings; Microsoft.ClassicStorage/capabilities; Microsoft.ClassicStorage/checkStorageAccountAvailability; Microsoft.ClassicStorage/disks; Microsoft.ClassicStorage/images; Microsoft.ClassicStorage/operations; Microsoft.ClassicStorage/osImages; Microsoft.ClassicStorage/osPlatformImages; Microsoft.ClassicStorage/publicImages; Microsoft.ClassicStorage/quotas; Microsoft.ClassicStorage/storageAccounts; Microsoft.ClassicStorage/storageAccounts/blobServices; Microsoft.ClassicStorage/storageAccounts/fileServices; Microsoft.ClassicStorage/storageAccounts/metricDefinitions; Microsoft.ClassicStorage/storageAccounts/metrics; Microsoft.ClassicStorage/storageAccounts/queueServices; Microsoft.ClassicStorage/storageAccounts/services; Microsoft.ClassicStorage/storageAccounts/services/diagnosticSettings; Microsoft.ClassicStorage/storageAccounts/services/metricDefinitions; Microsoft.ClassicStorage/storageAccounts/services/metrics; Microsoft.ClassicStorage/storageAccounts/tableServices; Microsoft.ClassicStorage/storageAccounts/vmImages; Microsoft.ClassicStorage/vmImages; Microsoft.ClassicSubscription/operations Default 0 0 0 0 0 none Deny the deployment of classic resources /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deny-classic-resources n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false false Audit VMs that do not use managed disks /providers/microsoft.authorization/policydefinitions/06a78e20-9358-41c9-923c-fb736d382a4d BuiltIn Compute False audit Default 0 0 0 0 0 none Deny virtual machines and virtual machine scale sets that do not use managed disk /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deny-unmanageddisk n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false false Configure Azure Activity logs to stream to specified Log Analytics workspace /providers/microsoft.authorization/policydefinitions/2465583e-4e78-4c15-b6be-a36cbc7c8b0f BuiltIn Monitoring False DeployIfNotExists effect=DeployIfNotExists, logAnalytics=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 1 0 1 0 0 Monitoring Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/dcb59c88-f014-5e17-840c-6c9aecc66286), Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/82f0c3bf-808b-5863-bf9c-231cfbf9598a) Deploy-AzActivity-Log (SPObjId: 217aa040-8eb0-451b-b81c-0b8f3d200d5a) Deploy Diagnostic Settings for Activity Log to Log Analytics workspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
   Download CSV semicolon | comma
Inheritance ScopeExcluded PolicySet DisplayName PolicySetId Type Category ALZ Parameters Enforcement NonCompliance Message Policies NonCmplnt Policies Compliant Resources NonCmplnt Resources Compliant Resources Conflicting Role/Assignment Managed Identity Assignment DisplayName AssignmentId AssignedBy CreatedOn CreatedBy UpdatedOn UpdatedBy
inherited mibelle-landingzones-mg false Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-aum-checkupdates Custom Security Center true assessmentMode=AutomaticByPlatform Default 0 0 0 0 0 Virtual Machine Contributor (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/571da045-f503-5cb2-b123-ede8cfe0f15a), Azure Connected Machine Resource Administrator (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/7d65b18e-df43-5353-85a4-716e68ff7c7a), Managed Identity Operator (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/b2c88903-f3a4-54ec-813c-46d650309b86) Enable-AUM-CheckUpdates (SPObjId: 4f27b633-c16b-47a6-ab24-737bb6cdad56) Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines. /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg false Enforce recommended guardrails for Azure Key Vault /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-keyvault Custom Key Vault true Default 2 8 2 0 0 none Enforce recommended guardrails for Azure Key Vault /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enforce-gr-keyvault n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Audit virtual machines for Trusted Launch support /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/audit-trustedlaunch Custom Trusted Launch true Default 0 0 0 0 0 none Audit virtual machines for Trusted Launch support /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-trustedlaunch n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Unused resources driving cost should be avoided /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/audit-unusedresourcescostoptimization Custom Cost Optimization true EffectDisks=Audit, EffectPublicIpAddresses=Audit, EffectServerFarms=Audit Default 0 1 0 4 0 none Unused resources driving cost should be avoided /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-unusedresources n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Microsoft cloud security benchmark /providers/microsoft.authorization/policysetdefinitions/1f3afdf9-d0c9-4c3d-847f-89da613e70a8 BuiltIn Security Center False Default 34 15 23 0 0 none Enable Monitoring in Microsoft Defender for Cloud /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-asc-monitoring n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Enable audit category group resource logging for supported resources to Log Analytics /providers/microsoft.authorization/policysetdefinitions/f5b29bc4-feca-4cc6-a58a-772dd5e290a5 BuiltIn Monitoring False logAnalytics=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 4 0 8 0 Monitoring Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b922046a-7a3e-59da-a982-8a5b855791ce), Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/9df772a7-1ce7-5439-ab6b-5d31d69925cc) Deploy-Diag-Logs (SPObjId: 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57) Enable allLogs category group resource logging for supported resources to Log Analytics /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud /providers/microsoft.authorization/policysetdefinitions/77b391e3-2d5d-40c3-83bf-65c846b3c6a3 BuiltIn Security Center False Default 0 3 0 1 0 Security Admin (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/d730d560-adce-52b7-b10c-36a8ad16a6d3) Deploy-MDEndpointsAMA (SPObjId: 7d365a6d-a7ae-4921-beca-5ce854a76960) Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-mdendpointsama n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Enforce Azure Compute Security Benchmark compliance auditing /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-acsb Custom Guest Configuration true Default 0 0 0 0 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/6e26cd22-b41b-5611-aafc-e2c56b14c060) Enforce-ACSB (SPObjId: e1f2e80c-5329-4804-824d-f0b44713985e) Enforce Azure Compute Security Baseline compliance auditing /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/enforce-acsb n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Policy Assignment Limit: 0/200
0 Custom Policy definitions scoped
0 Custom PolicySet definitions scoped
0 Blueprints scoped
   Download CSV semicolon | comma
  *Depending on the number of rows and your computer´s performance the table may respond with delay, download the csv for better filtering experience
Scope Role RoleId Role Type Data Can do Role assignment Identity Displayname Identity SignInName Identity ObjectId Identity Type Applicability Applies through membership Group Details Role AssignmentId Related Policy Assignment CreatedOn CreatedBy
inherited mibelle-landingzones-mg SQL Security Manager 056cd41c-7e88-42e1-933e-88ba6a50c9c3 Builtin false False Deploy-AzSqlDb-Auditing n/a afb169da-f80a-4dd6-abf3-b7fc08efb8ae SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/2f1eab15-c92e-52cd-8b0c-a60e52f1b331 /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deploy-azsqldb-auditing (Configure SQL servers to have auditing enabled to Log Analytics workspace) 06/12/2025 17:56:41 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg Log Analytics Contributor 92aaf0da-9dab-42b6-94a3-d43ce8d16293 Builtin false False Deploy-AzSqlDb-Auditing n/a afb169da-f80a-4dd6-abf3-b7fc08efb8ae SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/488f45ec-c535-5f65-85bf-acacd1bb93e8 /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deploy-azsqldb-auditing (Configure SQL servers to have auditing enabled to Log Analytics workspace) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg Virtual Machine Contributor 9980e02c-c2be-4d73-94e8-173b1dc7cf3c Builtin false False Enable-AUM-CheckUpdates n/a 4f27b633-c16b-47a6-ab24-737bb6cdad56 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/571da045-f503-5cb2-b123-ede8cfe0f15a /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates (Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines) 06/12/2025 17:56:38 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg SQL DB Contributor 9b7fa17d-e63e-47b0-bb0a-15c516ac86ec Builtin false False Deploy-SQL-TDE n/a de5ed213-fd75-471c-8d32-920072d6c378 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/af2f6b24-ac34-5f3b-9249-5a109d9d1528 /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deploy-sql-tde (Deploy SQL DB transparent data encryption) 06/12/2025 17:56:38 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False 52a8c671384a4b609f1d7651 n/a 6e0d029a-fce4-400f-bff3-45b8d9a8342e SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/94dfdb33-b864-47c9-831d-366721beb989 /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/52a8c671384a4b609f1d7651 (Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics) 09/04/2025 06:12:52 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False e9143c36572348c3ba0c67b1 n/a 9c3b725e-ce85-47ac-bf6f-c2fa0571c259 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/3fb7bac5-2328-4e74-a5b0-0d6d2a631693 /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/e9143c36572348c3ba0c67b1 (Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics) 09/04/2025 07:18:00 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg Azure Connected Machine Resource Administrator cd570a14-e51a-42ad-bac8-bafd67325302 Builtin false False Enable-AUM-CheckUpdates n/a 4f27b633-c16b-47a6-ab24-737bb6cdad56 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/7d65b18e-df43-5353-85a4-716e68ff7c7a /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates (Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg Managed Identity Operator f1a07417-d97a-45cb-824c-7a7467783830 Builtin false False Enable-AUM-CheckUpdates n/a 4f27b633-c16b-47a6-ab24-737bb6cdad56 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/b2c88903-f3a4-54ec-813c-46d650309b86 /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates (Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/e14ef9ac-25e8-4ee7-887a-a6576bd5229d none 11/28/2025 07:57:36 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Monitoring Contributor 749f88d5-cbae-40b8-bcfc-e573ddc772fa Builtin false False Deploy-AzActivity-Log n/a 217aa040-8eb0-451b-b81c-0b8f3d200d5a SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/dcb59c88-f014-5e17-840c-6c9aecc66286 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log (Configure Azure Activity logs to stream to specified Log Analytics workspace) 06/12/2025 17:56:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Monitoring Contributor 749f88d5-cbae-40b8-bcfc-e573ddc772fa Builtin false False Deploy-Diag-Logs n/a 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b922046a-7a3e-59da-a982-8a5b855791ce /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs (Enable audit category group resource logging for supported resources to Log Analytics) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Log Analytics Contributor 92aaf0da-9dab-42b6-94a3-d43ce8d16293 Builtin false False Deploy-AzActivity-Log n/a 217aa040-8eb0-451b-b81c-0b8f3d200d5a SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/82f0c3bf-808b-5863-bf9c-231cfbf9598a /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log (Configure Azure Activity logs to stream to specified Log Analytics workspace) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Log Analytics Contributor 92aaf0da-9dab-42b6-94a3-d43ce8d16293 Builtin false False Deploy-Diag-Logs n/a 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/9df772a7-1ce7-5439-ab6b-5d31d69925cc /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs (Enable audit category group resource logging for supported resources to Log Analytics) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Meier, Heinz-MIBELLEGROUP heinz.meier@mibelle.net 06addc33-6298-4f01-9f6b-709193f099cc User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Subs-MibelleOnline-SubscriptionOwner n/a 1bdf326c-8c66-4ba9-8c2d-83312a1ddc02 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-Reader n/a 1c529912-c479-41a1-8a03-e57256720fa4 Group direct 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser n/a 1f3ede05-4301-42b1-8c95-2be94290e93c Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Hasanow, Kilian-MIBELLEGROUP kilian.hasanow@mibelle.net 4270eb01-73cf-4e17-925e-47461737b40e User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Mibelle-AzGovWiz-prod n/a 44b03901-55d2-49a8-af3a-58228a81408c SP APP INT indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-michael.peter csa-michael.peter@MIBCloud.mail.onmicrosoft.com 460bad8a-cc4d-41dc-9ddd-f24ba491e2a6 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner n/a 52364002-4a8b-4808-b4fc-864ed5f7d50d Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Matej Paunovski CSA-matej.paunovski@MIBCloud.onmicrosoft.com 54f81d33-50db-475c-b686-4ef70aa0b4fe User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Ouaouane, Taoufik-MIBELLEGROUP taoufik.ouaouane@mibelle.net 7100d1ce-5bd7-449d-abdd-52a7218922b3 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-NetOps n/a 87e9d07b-5340-455c-b297-8bffe3b86f78 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner n/a 9b120856-d4b2-4862-95df-bedf8d5fe1c3 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-Baswaraj Marotrao Ramshette csa-baswarajmarotrao.ramshette@MIBCloud.onmicrosoft.com 9d8d246b-a1f9-4d9a-a54f-f7ae9f3af2ae User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-SecOps n/a abf39027-4cb4-4298-8951-f984eaf9cb8e Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Baumann, Jürg-MIBELLEGROUP juerg.baumann_mibellegroup.com#EXT#@MIBCloud.onmicrosoft.com bb2279b2-06ab-459a-b981-579701601f8a User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin n/a cb058f58-c629-445f-9a10-75f9fcab694e Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Philipp.Schmidt CSA-Philipp.Schmidt@MIBCloud.onmicrosoft.com e40a73c8-6655-434d-8c8b-fdc4d9213499 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Taoufik.Ouaouane csa-Taoufik.Ouaouane@mibelle.net e58ba28f-09ed-49c3-8f5e-31b05c258cde User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Adrian.Bombelka CSA-Adrian.Bombelka@MIBCloud.onmicrosoft.com e86b38a8-e5d4-4888-b09d-390dcf9a2017 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False Enforce-ACSB n/a e1f2e80c-5329-4804-824d-f0b44713985e SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/6e26cd22-b41b-5611-aafc-e2c56b14c060 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/enforce-acsb (Enforce Azure Compute Security Benchmark compliance auditing) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Security Admin fb1c8493-542b-48eb-b624-b4c8fea62acd Builtin false False Deploy-MDEndpointsAMA n/a 7d365a6d-a7ae-4921-beca-5ce854a76960 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/d730d560-adce-52b7-b10c-36a8ad16a6d3 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-mdendpointsama (Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited Tenant User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false True CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member direct /providers/microsoft.authorization/roleassignments/3f958da1-722a-4c03-8398-aab60735ecd3 none 05/07/2025 18:14:55 ObjectType: User Member, ObjectDisplayName: CSA-Jan.Stutz, ObjectSignInName: CSA-Jan.Stutz@MIBCloud.onmicrosoft.com, ObjectId: 43b3e278-6551-4566-83a8-c19abe643e64
inherited mibelle-landingzones-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner (52364002-4a8b-4808-b4fc-864ed5f7d50d)
inherited mibelle-landingzones-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member nested SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner (52364002-4a8b-4808-b4fc-864ed5f7d50d)
inherited mibelle-landingzones-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False csa-michael.peter csa-michael.peter@MIBCloud.mail.onmicrosoft.com 460bad8a-cc4d-41dc-9ddd-f24ba491e2a6 User Member nested SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner (52364002-4a8b-4808-b4fc-864ed5f7d50d)
inherited mibelle-landingzones-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner (52364002-4a8b-4808-b4fc-864ed5f7d50d)
inherited mibelle-landingzones-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner 52364002-4a8b-4808-b4fc-864ed5f7d50d Group direct
inherited mibelle-landingzones-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member nested SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner (52364002-4a8b-4808-b4fc-864ed5f7d50d)
inherited mibelle-landingzones-mg Key Vault Administrator 00482a5a-887f-4fb3-b363-3b7fe8e74483 Builtin false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member nested SGU-MIB-RES-Azure-Magr-MibelleLandingZone-KeyVaultAdmin (dc72503d-d80a-4f41-969b-59a0818f358c)
inherited mibelle-landingzones-mg Key Vault Administrator 00482a5a-887f-4fb3-b363-3b7fe8e74483 Builtin false False csa-michael.peter csa-michael.peter@MIBCloud.mail.onmicrosoft.com 460bad8a-cc4d-41dc-9ddd-f24ba491e2a6 User Member nested SGU-MIB-RES-Azure-Magr-MibelleLandingZone-KeyVaultAdmin (dc72503d-d80a-4f41-969b-59a0818f358c)
inherited mibelle-landingzones-mg Key Vault Administrator 00482a5a-887f-4fb3-b363-3b7fe8e74483 Builtin false False SGU-MIB-RES-Azure-Magr-MibelleLandingZone-KeyVaultAdmin dc72503d-d80a-4f41-969b-59a0818f358c Group direct
inherited mibelle-landingzones-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False SGU-MIB-RES-Azure-Magr-MibelleLandingZone-UserAccessAdmin 45d94cc4-a927-422c-a9a3-a0cfa1684fd7 Group direct
inherited mibelle-landingzones-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False csa-michael.peter csa-michael.peter@MIBCloud.mail.onmicrosoft.com 460bad8a-cc4d-41dc-9ddd-f24ba491e2a6 User Member nested SGU-MIB-RES-Azure-Magr-MibelleLandingZone-UserAccessAdmin (45d94cc4-a927-422c-a9a3-a0cfa1684fd7)
inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78)
inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78)
inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78)
inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78)
inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False SGU-MIB-RES-Azure-Magr-Mibelle-NetOps 87e9d07b-5340-455c-b297-8bffe3b86f78 Group direct
inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78)
inherited mibelle-mg [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e)
inherited mibelle-mg [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e)
inherited mibelle-mg [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e)
inherited mibelle-mg [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False SGU-MIB-RES-Azure-Magr-Mibelle-SecOps abf39027-4cb4-4298-8951-f984eaf9cb8e Group direct
inherited mibelle-mg Reservation Purchaser f7b75c60-3036-4b75-91c3-6b41c27c1689 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser 1f3ede05-4301-42b1-8c95-2be94290e93c Group direct
inherited mibelle-mg Reservation Purchaser f7b75c60-3036-4b75-91c3-6b41c27c1689 Builtin false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser (1f3ede05-4301-42b1-8c95-2be94290e93c)
inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e)
inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e)
inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e)
inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin cb058f58-c629-445f-9a10-75f9fcab694e Group direct
inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e)
mibelle-online (3b2fdc69-67a4-42f2-a43e-b7fbad489b03)
Highlight Subscription in HierarchyMap
Subscription Name: mibelle-online
Subscription Id: 3b2fdc69-67a4-42f2-a43e-b7fbad489b03
Subscription Path: a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-landingzones-mg/mibelle-landingzones-online-mg/3b2fdc69-67a4-42f2-a43e-b7fbad489b03
State: Enabled
QuotaId: PayAsYouGo_2014-09-01
Microsoft Defender for Cloud Secure Score: 82.08% (10.67 of 13 points) Video , Blog , learn
Microsoft Defender for Cloud 'Email notifications' state: n/a
Microsoft Defender for Cloud 'Email notifications' severity: n/a
Microsoft Defender for Cloud 'Email notifications' roles: n/a
Microsoft Defender for Cloud 'Email notifications' emails: n/a
   Download CSV semicolon | comma
Plan Tier
AI Free
Api Free
AppServices Free
Arm Free
CloudPosture Free
ContainerRegistry Free
Containers Free
CosmosDbs Free
Discovery Standard
Dns Free
FoundationalCspm Standard
KeyVaults Free
KubernetesService Free
OpenSourceRelationalDatabases Free
SqlServers Free
SqlServerVirtualMachines Free
StorageAccounts Free
VirtualMachines Free
No Subscription Diagnostic settings learn
0 Subscription Tags
   Resource naming and tagging decision guide learn
   Download CSV semicolon | comma
Scope TagName Count
Resource hidden-link: /app-insights-resource-id 1
No Consumption data available as switch parameter -DoAzureConsumption was not applied
12 Resource Groups | Limit: (12/980)
   Download CSV semicolon | comma
Provider State
Microsoft.Storage Registered
Microsoft.OperationalInsights Registered
microsoft.insights Registered
Microsoft.ManagedIdentity Registered
Microsoft.Advisor Registered
Microsoft.Communication Registered
Microsoft.Web Registered
Microsoft.Logic Registered
Microsoft.Network Registered
Microsoft.SaaS Registered
Microsoft.KeyVault Registered
Microsoft.DomainRegistration Registered
Microsoft.ContainerRegistry Registered
Microsoft.App Registered
Microsoft.Management Registered
microsoft.visualstudio Registered
Microsoft.PolicyInsights Registered
Microsoft.GuestConfiguration Registered
Microsoft.Fabric Registered
Microsoft.Compute Registered
Microsoft.Security Registered
Microsoft.Capacity Registered
Microsoft.PowerBIDedicated Registered
ArizeAi.ObservabilityEval NotRegistered
Astronomer.Astro NotRegistered
Dell.Storage NotRegistered
Dynatrace.Observability NotRegistered
GitHub.Network NotRegistered
Informatica.DataManagement NotRegistered
LambdaTest.HyperExecute NotRegistered
Liftrbasic.Samplerp NotRegistered
Microsoft.AAD NotRegistered
Microsoft.AadCustomSecurityAttributesDiagnosticSettings NotRegistered
microsoft.aadiam NotRegistered
Microsoft.Addons NotRegistered
Microsoft.ADHybridHealthService Registered
Microsoft.AgFoodPlatform NotRegistered
Microsoft.AgriculturePlatform NotRegistered
Microsoft.AlertsManagement NotRegistered
Microsoft.AnalysisServices NotRegistered
Microsoft.ApiCenter NotRegistered
Microsoft.ApiManagement NotRegistered
Microsoft.AppAssessment NotRegistered
Microsoft.AppComplianceAutomation NotRegistered
Microsoft.AppConfiguration NotRegistered
Microsoft.ApplicationMigration NotRegistered
Microsoft.AppLink NotRegistered
Microsoft.AppPlatform NotRegistered
Microsoft.ArcContainerStorage NotRegistered
Microsoft.Attestation NotRegistered
Microsoft.Authorization Registered
Microsoft.Automanage NotRegistered
Microsoft.Automation NotRegistered
Microsoft.AVS NotRegistered
Microsoft.AwsConnector NotRegistered
Microsoft.AzureActiveDirectory NotRegistered
Microsoft.AzureArcData NotRegistered
Microsoft.AzureBusinessContinuity NotRegistered
Microsoft.AzureDataTransfer NotRegistered
Microsoft.AzureFleet NotRegistered
Microsoft.AzureImageTestingForLinux NotRegistered
Microsoft.AzureLargeInstance NotRegistered
Microsoft.AzurePlaywrightService NotRegistered
Microsoft.AzureResilienceManagement NotRegistered
Microsoft.AzureScan NotRegistered
Microsoft.AzureSphere NotRegistered
Microsoft.AzureStack NotRegistered
Microsoft.AzureStackHCI NotRegistered
Microsoft.AzureTerraform NotRegistered
Microsoft.BackupSolutions NotRegistered
Microsoft.BareMetal NotRegistered
Microsoft.BareMetalInfrastructure NotRegistered
Microsoft.Batch NotRegistered
Microsoft.Billing Registered
Microsoft.BillingBenefits NotRegistered
Microsoft.Bing NotRegistered
Microsoft.BlockchainTokens NotRegistered
Microsoft.Blueprint NotRegistered
Microsoft.BotService NotRegistered
Microsoft.Cache NotRegistered
Microsoft.Carbon NotRegistered
Microsoft.Cdn NotRegistered
Microsoft.CertificateRegistration NotRegistered
Microsoft.ChangeSafety Registered
Microsoft.Chaos NotRegistered
Microsoft.ClassicCompute NotRegistered
Microsoft.ClassicInfrastructureMigrate NotRegistered
Microsoft.ClassicNetwork NotRegistered
Microsoft.ClassicStorage NotRegistered
Microsoft.ClassicSubscription Registered
Microsoft.CleanRoom NotRegistered
Microsoft.CloudDevicePlatform NotRegistered
Microsoft.CloudHealth NotRegistered
Microsoft.CloudShell NotRegistered
Microsoft.CloudTest NotRegistered
Microsoft.CodeSigning NotRegistered
Microsoft.CognitiveServices NotRegistered
Microsoft.Commerce Registered
Microsoft.Community NotRegistered
Microsoft.ComputeLimit NotRegistered
Microsoft.ComputeSchedule NotRegistered
Microsoft.ConfidentialLedger NotRegistered
Microsoft.Confluent NotRegistered
Microsoft.ConnectedCache NotRegistered
Microsoft.ConnectedCredentials NotRegistered
microsoft.connectedopenstack NotRegistered
Microsoft.ConnectedVehicle NotRegistered
Microsoft.ConnectedVMwarevSphere NotRegistered
Microsoft.Consumption Registered
Microsoft.ContainerInstance NotRegistered
Microsoft.ContainerService NotRegistered
Microsoft.CostManagement Registered
Microsoft.CostManagementExports NotRegistered
Microsoft.CustomerLockbox NotRegistered
Microsoft.CustomProviders NotRegistered
Microsoft.D365CustomerInsights NotRegistered
Microsoft.Dashboard NotRegistered
Microsoft.DatabaseFleetManager NotRegistered
Microsoft.DatabaseWatcher NotRegistered
Microsoft.DataBox NotRegistered
Microsoft.DataBoxEdge NotRegistered
Microsoft.Databricks NotRegistered
Microsoft.Datadog NotRegistered
Microsoft.DataFactory NotRegistered
Microsoft.DataLakeAnalytics NotRegistered
Microsoft.DataLakeStore NotRegistered
Microsoft.DataMigration NotRegistered
Microsoft.DataProtection NotRegistered
Microsoft.DataReplication NotRegistered
Microsoft.DataShare NotRegistered
Microsoft.DBforMariaDB NotRegistered
Microsoft.DBforMySQL NotRegistered
Microsoft.DBforPostgreSQL NotRegistered
Microsoft.DependencyMap NotRegistered
Microsoft.DesktopVirtualization NotRegistered
Microsoft.DevCenter NotRegistered
Microsoft.DevelopmentWindows365 NotRegistered
Microsoft.DevHub NotRegistered
Microsoft.DeviceOnboarding NotRegistered
Microsoft.DeviceRegistry NotRegistered
Microsoft.Devices NotRegistered
Microsoft.DeviceUpdate NotRegistered
Microsoft.DevOpsInfrastructure NotRegistered
Microsoft.DevTestLab NotRegistered
Microsoft.DigitalTwins NotRegistered
Microsoft.Discovery NotRegistered
Microsoft.DocumentDB NotRegistered
Microsoft.DurableTask NotRegistered
Microsoft.Easm NotRegistered
Microsoft.Edge NotRegistered
Microsoft.EdgeManagement NotRegistered
Microsoft.EdgeMarketplace NotRegistered
Microsoft.EdgeOrder NotRegistered
Microsoft.EdgeOrderPartner NotRegistered
Microsoft.EdgeZones NotRegistered
Microsoft.Elastic NotRegistered
Microsoft.ElasticSan NotRegistered
Microsoft.EnterpriseSupport NotRegistered
Microsoft.EntitlementManagement NotRegistered
Microsoft.EntraIDGovernance NotRegistered
Microsoft.EntraIdGovernanceAccelerator NotRegistered
Microsoft.ErrorAtlas NotRegistered
Microsoft.EventGrid NotRegistered
Microsoft.EventHub NotRegistered
Microsoft.Experimentation NotRegistered
Microsoft.ExtendedLocation NotRegistered
Microsoft.Features Registered
Microsoft.FileShares NotRegistered
Microsoft.FluidRelay NotRegistered
Microsoft.GCPConnector NotRegistered
Microsoft.GraphServices NotRegistered
Microsoft.HanaOnAzure NotRegistered
Microsoft.HardwareSecurityModules NotRegistered
Microsoft.HDInsight NotRegistered
Microsoft.HealthBot NotRegistered
Microsoft.HealthcareApis NotRegistered
Microsoft.HealthcareInterop NotRegistered
Microsoft.HealthDataAIServices NotRegistered
Microsoft.HealthModel NotRegistered
Microsoft.HealthPlatform NotRegistered
Microsoft.Help NotRegistered
Microsoft.HybridCloud NotRegistered
Microsoft.HybridCompute NotRegistered
Microsoft.HybridConnectivity NotRegistered
Microsoft.HybridContainerService NotRegistered
Microsoft.HybridNetwork NotRegistered
Microsoft.Impact NotRegistered
Microsoft.IntegrationSpaces NotRegistered
Microsoft.IoTCentral NotRegistered
Microsoft.IoTFirmwareDefense NotRegistered
Microsoft.IoTOperations NotRegistered
Microsoft.IoTOperationsDataProcessor NotRegistered
Microsoft.IoTSecurity NotRegistered
Microsoft.Kubernetes NotRegistered
Microsoft.KubernetesConfiguration NotRegistered
Microsoft.KubernetesRuntime NotRegistered
Microsoft.Kusto NotRegistered
Microsoft.LabServices NotRegistered
Microsoft.LoadTestService NotRegistered
Microsoft.MachineLearningServices NotRegistered
Microsoft.Maintenance NotRegistered
Microsoft.ManagedNetworkFabric NotRegistered
Microsoft.ManagedServices NotRegistered
Microsoft.Maps NotRegistered
Microsoft.Marketplace NotRegistered
Microsoft.MarketplaceOrdering Registered
Microsoft.MessagingCatalog NotRegistered
Microsoft.MessagingConnectors NotRegistered
Microsoft.Migrate NotRegistered
Microsoft.Mission NotRegistered
Microsoft.Monitor NotRegistered
Microsoft.MySQLDiscovery NotRegistered
Microsoft.NetApp NotRegistered
Microsoft.NetworkCloud NotRegistered
Microsoft.NetworkFunction NotRegistered
Microsoft.NexusIdentity NotRegistered
Microsoft.NotificationHubs NotRegistered
Microsoft.Nutanix NotRegistered
Microsoft.ObjectStore NotRegistered
Microsoft.OffAzure NotRegistered
Microsoft.OffAzureSpringBoot NotRegistered
Microsoft.OnlineExperimentation NotRegistered
Microsoft.OpenEnergyPlatform NotRegistered
Microsoft.OperationsManagement NotRegistered
Microsoft.OperatorVoicemail NotRegistered
Microsoft.OracleDiscovery NotRegistered
Microsoft.Orbital NotRegistered
Microsoft.PartnerManagedConsumerRecurrence NotRegistered
Microsoft.Peering NotRegistered
Microsoft.Pki NotRegistered
Microsoft.Portal Registered
Microsoft.PortalServices NotRegistered
Microsoft.PowerBI NotRegistered
Microsoft.PowerPlatform NotRegistered
Microsoft.Premonition NotRegistered
Microsoft.ProfessionalService NotRegistered
Microsoft.ProviderHub NotRegistered
Microsoft.Purview NotRegistered
Microsoft.Quantum NotRegistered
Microsoft.Quota NotRegistered
Microsoft.RecommendationsService NotRegistered
Microsoft.RecoveryServices NotRegistered
Microsoft.RedHatOpenShift NotRegistered
Microsoft.Relationships NotRegistered
Microsoft.Relay NotRegistered
Microsoft.ResourceBuilder NotRegistered
Microsoft.ResourceConnector NotRegistered
Microsoft.ResourceGraph Registered
Microsoft.ResourceHealth NotRegistered
Microsoft.ResourceIntelligence Registered
Microsoft.ResourceNotifications Registered
Microsoft.Resources Registered
Microsoft.SaaSHub NotRegistered
Microsoft.Scom NotRegistered
Microsoft.SCVMM NotRegistered
Microsoft.Search NotRegistered
Microsoft.SecretSyncController NotRegistered
Microsoft.SecurityCopilot NotRegistered
Microsoft.SecurityDetonation NotRegistered
Microsoft.SecurityInsights NotRegistered
Microsoft.SecurityPlatform NotRegistered
Microsoft.SentinelPlatformServices NotRegistered
Microsoft.SerialConsole Registered
Microsoft.ServiceBus NotRegistered
Microsoft.ServiceFabric NotRegistered
Microsoft.ServiceFabricMesh NotRegistered
Microsoft.ServiceLinker NotRegistered
Microsoft.ServiceNetworking NotRegistered
Microsoft.ServicesHub NotRegistered
Microsoft.SignalRService NotRegistered
Microsoft.Singularity NotRegistered
Microsoft.SoftwarePlan NotRegistered
Microsoft.Solutions NotRegistered
Microsoft.Sovereign NotRegistered
Microsoft.Sql NotRegistered
Microsoft.SqlVirtualMachine NotRegistered
Microsoft.StandbyPool NotRegistered
Microsoft.StorageActions NotRegistered
Microsoft.StorageCache NotRegistered
Microsoft.StorageDiscovery NotRegistered
Microsoft.StorageMover NotRegistered
Microsoft.StorageSync NotRegistered
Microsoft.StorageTasks NotRegistered
Microsoft.StreamAnalytics NotRegistered
Microsoft.Subscription NotRegistered
Microsoft.SupercomputerInfrastructure NotRegistered
microsoft.support Registered
Microsoft.SustainabilityServices NotRegistered
Microsoft.Synapse NotRegistered
Microsoft.Syntex NotRegistered
Microsoft.ToolchainOrchestrator NotRegistered
Microsoft.UpdateManager NotRegistered
Microsoft.UsageBilling NotRegistered
Microsoft.Validate NotRegistered
Microsoft.VerifiedId NotRegistered
Microsoft.VideoIndexer NotRegistered
Microsoft.VirtualMachineImages NotRegistered
Microsoft.VMware NotRegistered
Microsoft.VoiceServices NotRegistered
Microsoft.WeightsAndBiases NotRegistered
Microsoft.Windows365 NotRegistered
Microsoft.WindowsPushNotificationServices NotRegistered
Microsoft.WorkloadBuilder NotRegistered
Microsoft.Workloads NotRegistered
MongoDB.Atlas NotRegistered
Neon.Postgres NotRegistered
NewRelic.Observability NotRegistered
NGINX.NGINXPLUS NotRegistered
Oracle.Database NotRegistered
PaloAltoNetworks.Cloudngfw NotRegistered
Pinecone.VectorDb NotRegistered
PureStorage.Block NotRegistered
Qumulo.Storage NotRegistered
0 enabled Subscription Features learn
0 Resource Locks learn
   Download CSV semicolon | comma
ResourceType Location Count
microsoft.app/containerapps westeurope 1
microsoft.app/managedenvironments westeurope 1
microsoft.compute/sshpublickeys westeurope 9
microsoft.containerregistry/registries westeurope 1
microsoft.fabric/capacities westeurope 1
microsoft.insights/actiongroups global 1
microsoft.insights/components switzerlandnorth 1
microsoft.insights/components westeurope 3
microsoft.keyvault/vaults westeurope 2
microsoft.logic/workflows westeurope 2
microsoft.network/networkwatchers westeurope 1
microsoft.operationalinsights/workspaces switzerlandnorth 1
microsoft.operationalinsights/workspaces westeurope 3
microsoft.powerbidedicated/capacities westeurope 1
microsoft.saas/resources global 1
microsoft.storage/storageaccounts westeurope 7
microsoft.visualstudio/account northeurope 1
microsoft.web/certificates westeurope 1
microsoft.web/connectiongateways westeurope 1
microsoft.web/connections westeurope 7
microsoft.web/serverfarms westeurope 4
microsoft.web/sites westeurope 5
   CAF - Recommended abbreviations for Azure resource types learn
   Resource details can be found in the CSV output *_ResourcesAll.csv
   Download CSV semicolon | comma
ResourceType Recommendation ResourceFriendlyName passed failed passed percentage
microsoft.containerregistry/registries cr Container registry 0 1 0%
microsoft.insights/actiongroups ag- Azure Monitor action group 0 1 0%
microsoft.insights/components appi- Application Insights 0 4 0%
microsoft.keyvault/vaults kv- Key vault 0 2 0%
microsoft.logic/workflows logic- Logic apps 0 2 0%
microsoft.network/networkwatchers nw- Network Watcher 0 1 0%
microsoft.operationalinsights/workspaces log- Log Analytics workspace 0 4 0%
microsoft.powerbidedicated/capacities pbi- Power BI Embedded 0 1 0%
microsoft.storage/storageaccounts st, stvm Storage account, VM storage account 0 7 0%
microsoft.web/serverfarms plan- App Service plan 0 4 0%
microsoft.web/sites app-, func-, ase- Web app, Function app, App Service environment 0 5 0%
   'Azure Orphan Resources' ARG queries and workbooks GitHub
   Resource details can be found in the CSV output *_ResourcesCostOptimizationAndCleanup.csv
   Download CSV semicolon | comma
ResourceType Resource count Intent Cost Currency
microsoft.web/connections 5 misconfiguration
   Download CSV semicolon | comma
ResourceType Resource Count Diagnostics capable Metrics Logs LogCategories
microsoft.app/containerapps 1 True True False
microsoft.app/managedenvironments 1 True True True ContainerAppConsoleLogs, ContainerAppSystemLogs, AppEnvSpringAppConsoleLogs, AppEnvSessionConsoleLogs, AppEnvSessionPoolEventLogs, AppEnvSessionLifeCycleLogs
microsoft.compute/sshpublickeys 9 False False False
microsoft.containerregistry/registries 1 True True True ContainerRegistryRepositoryEvents, ContainerRegistryLoginEvents
microsoft.fabric/capacities 1 False False False
microsoft.insights/actiongroups 1 False False False
microsoft.insights/components 4 True True True AppAvailabilityResults, AppBrowserTimings, AppEvents, AppMetrics, AppDependencies, AppExceptions, AppPageViews, AppPerformanceCounters, AppRequests, AppSystemEvents, AppTraces, OTelResources
microsoft.keyvault/vaults 2 True True True AuditEvent, AzurePolicyEvaluationDetails
microsoft.logic/workflows 2 True True True WorkflowRuntime
microsoft.network/networkwatchers 1 False False False
microsoft.operationalinsights/workspaces 4 True True True Audit, SummaryLogs, Jobs
microsoft.powerbidedicated/capacities 1 True True True Engine
microsoft.saas/resources 1 False False False
microsoft.storage/storageaccounts 7 True True False
microsoft.visualstudio/account 1 False False False
microsoft.web/certificates 1 False
microsoft.web/connectiongateways 1 False False False
microsoft.web/connections 7 True True False
microsoft.web/serverfarms 4 True True False
microsoft.web/sites 5 True True True AppServiceHTTPLogs, AppServiceConsoleLogs, AppServiceAppLogs, AppServiceAuditLogs, AppServiceIPSecAuditLogs, AppServicePlatformLogs, AppServiceAuthenticationLogs
No UserAssigned Managed Identities assigned to Resources / vice versa - at all
PSRule for Azure - integration paused - PSRule for Azure
   Download CSV semicolon | comma
  *Depending on the number of rows and your computer´s performance the table may respond with delay, download the csv for better filtering experience
Inheritance ScopeExcluded Exemption applies Policy DisplayName PolicyId Type Category ALZ Effect Parameters Enforcement NonCompliance Message Policies NonCmplnt Policies Compliant Resources NonCmplnt Resources Compliant Resources Conflicting Role/Assignment Managed Identity Assignment DisplayName AssignmentId AssignedBy CreatedOn CreatedBy UpdatedOn UpdatedBy
inherited mibelle-landingzones-mg false false Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics /providers/microsoft.authorization/policydefinitions/052c180e-287d-44c3-86ef-01aeae2d9774 BuiltIn Network False DeployIfNotExists networkWatcherName=/subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourcegroups/networkwatcherrg/providers/microsoft.network/networkwatchers/networkwatcher_westeurope, networkWatcherRG=networkwatcherrg, retentionDays=1, storageId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.storage/storageaccounts/mibmgmtnetprodeuwst01, vnetRegion=westeurope, workspaceRegion=westeurope, workspaceResourceId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 0 0 0 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/94dfdb33-b864-47c9-831d-366721beb989) 52a8c671384a4b609f1d7651 (SPObjId: 6e0d029a-fce4-400f-bff3-45b8d9a8342e) Deploy-TrafficAnalytics-WestEurope /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/52a8c671384a4b609f1d7651 n/a 09/04/2025 06:12:52 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 09/04/2025 07:23:12 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg false false Web Application Firewall (WAF) should be enabled for Application Gateway /providers/microsoft.authorization/policydefinitions/564feb30-bf6a-4854-b4bb-0d2d2d1e6c66 BuiltIn Network False Audit effect=Audit Default 0 0 0 0 0 none Web Application Firewall (WAF) should be enabled for Application Gateway /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/audit-appgw-waf n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg false false Network interfaces should disable IP forwarding /providers/microsoft.authorization/policydefinitions/88c0b9da-ce96-4b03-9635-f29a937e2900 BuiltIn Network False deny Default 0 0 0 0 0 none Network interfaces should disable IP forwarding /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deny-ip-forwarding n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg false false Management port access from the Internet should be blocked /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-mgmtports-from-internet Custom Network true Deny effect=Deny Default 0 0 0 0 0 none Management port access from the Internet should be blocked /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deny-mgmtports-internet n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg false false Kubernetes cluster should not allow privileged containers /providers/microsoft.authorization/policydefinitions/95edb821-ddaf-4404-9732-666045e056b4 BuiltIn Kubernetes False deny effect=deny Default 0 0 0 0 0 none Kubernetes cluster should not allow privileged containers /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deny-priv-containers-aks n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg false false Kubernetes clusters should not allow container privilege escalation /providers/microsoft.authorization/policydefinitions/1c6e92c9-99f0-4e55-9cf2-0c234dc48f99 BuiltIn Kubernetes False deny effect=deny Default 0 0 0 0 0 none Kubernetes clusters should not allow container privilege escalation /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deny-priv-escalation-aks n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg false false Secure transfer to storage accounts should be enabled /providers/microsoft.authorization/policydefinitions/404c3081-a854-4457-ae30-26a93ef643f9 BuiltIn Storage False Deny effect=Deny Default 0 1 0 7 0 none Secure transfer to storage accounts should be enabled /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deny-storage-http n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg false false Configure SQL servers to have auditing enabled to Log Analytics workspace /providers/microsoft.authorization/policydefinitions/25da7dfb-0666-4a15-a8f5-402127efd8bb BuiltIn SQL False DeployIfNotExists effect=DeployIfNotExists, logAnalyticsWorkspaceId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 0 0 0 0 SQL Security Manager (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/2f1eab15-c92e-52cd-8b0c-a60e52f1b331), SQL Security Manager (/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/providers/microsoft.authorization/roleassignments/ce81334b-c425-5087-9b8d-2119e050082b), Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/488f45ec-c535-5f65-85bf-acacd1bb93e8), Log Analytics Contributor (/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/providers/microsoft.authorization/roleassignments/fbb2af70-7587-52bd-b3e1-54fcdbdb7ea4) Deploy-AzSqlDb-Auditing (SPObjId: afb169da-f80a-4dd6-abf3-b7fc08efb8ae) Configure SQL servers to have auditing enabled to Log Analytics workspace /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deploy-azsqldb-auditing n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg false false Deploy SQL DB transparent data encryption /providers/microsoft.authorization/policydefinitions/86a912f6-9a06-4e26-b447-11b16ba8659f BuiltIn SQL False DeployIfNotExists Default 0 0 0 0 0 SQL DB Contributor (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/af2f6b24-ac34-5f3b-9249-5a109d9d1528) Deploy-SQL-TDE (SPObjId: de5ed213-fd75-471c-8d32-920072d6c378) Deploy TDE on SQL servers /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deploy-sql-tde n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg false false Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics /providers/microsoft.authorization/policydefinitions/052c180e-287d-44c3-86ef-01aeae2d9774 BuiltIn Network False DeployIfNotExists networkWatcherName=/subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourcegroups/networkwatcherrg/providers/microsoft.network/networkwatchers/networkwatcher_northeurope, networkWatcherRG=networkwatcherrg, retentionDays=1, storageId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.storage/storageaccounts/mibmgmtnetprodeunst01, vnetRegion=northeurope, workspaceRegion=westeurope, workspaceResourceId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 0 0 0 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/3fb7bac5-2328-4e74-a5b0-0d6d2a631693) e9143c36572348c3ba0c67b1 (SPObjId: 9c3b725e-ce85-47ac-bf6f-c2fa0571c259) Deploy-TrafficAnalytics-NorthEurope /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/e9143c36572348c3ba0c67b1 n/a 09/04/2025 07:17:59 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 09/04/2025 07:33:42 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg false false Kubernetes clusters should be accessible only over HTTPS /providers/microsoft.authorization/policydefinitions/1a5b4dca-0b6f-4cf5-907c-56316bc1bf3d BuiltIn Kubernetes False deny effect=deny Default 0 0 0 0 0 none Kubernetes clusters should be accessible only over HTTPS /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enforce-aks-https n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg false false Subnets should be private /providers/microsoft.authorization/policydefinitions/7bca8353-aa3b-429b-904a-9229c4385837 BuiltIn Network False Audit Default 0 0 0 0 0 none Subnets should be private /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enforce-subnet-private n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false false Audit resource location matches resource group location /providers/microsoft.authorization/policydefinitions/0a914e76-4921-4c19-b460-a2d36003525a BuiltIn General False audit Default 1 0 5 49 0 none Audit that the resource location matches its resource group location /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-location-match n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false false Not allowed resource types /providers/microsoft.authorization/policydefinitions/6c112d4e-5bc7-47ae-a041-ea2d9dccd749 BuiltIn General False Deny effect=Deny, listOfResourceTypesNotAllowed=Microsoft.ClassicCompute/capabilities; Microsoft.ClassicCompute/checkDomainNameAvailability; Microsoft.ClassicCompute/domainNames; Microsoft.ClassicCompute/domainNames/capabilities; Microsoft.ClassicCompute/domainNames/internalLoadBalancers; Microsoft.ClassicCompute/domainNames/serviceCertificates; Microsoft.ClassicCompute/domainNames/slots; Microsoft.ClassicCompute/domainNames/slots/roles; Microsoft.ClassicCompute/domainNames/slots/roles/metricDefinitions; Microsoft.ClassicCompute/domainNames/slots/roles/metrics; Microsoft.ClassicCompute/moveSubscriptionResources; Microsoft.ClassicCompute/operatingSystemFamilies; Microsoft.ClassicCompute/operatingSystems; Microsoft.ClassicCompute/operations; Microsoft.ClassicCompute/operationStatuses; Microsoft.ClassicCompute/quotas; Microsoft.ClassicCompute/resourceTypes; Microsoft.ClassicCompute/validateSubscriptionMoveAvailability; Microsoft.ClassicCompute/virtualMachines; Microsoft.ClassicCompute/virtualMachines/diagnosticSettings; Microsoft.ClassicCompute/virtualMachines/metricDefinitions; Microsoft.ClassicCompute/virtualMachines/metrics; Microsoft.ClassicInfrastructureMigrate/classicInfrastructureResources; Microsoft.ClassicNetwork/capabilities; Microsoft.ClassicNetwork/expressRouteCrossConnections; Microsoft.ClassicNetwork/expressRouteCrossConnections/peerings; Microsoft.ClassicNetwork/gatewaySupportedDevices; Microsoft.ClassicNetwork/networkSecurityGroups; Microsoft.ClassicNetwork/operations; Microsoft.ClassicNetwork/quotas; Microsoft.ClassicNetwork/reservedIps; Microsoft.ClassicNetwork/virtualNetworks; Microsoft.ClassicNetwork/virtualNetworks/remoteVirtualNetworkPeeringProxies; Microsoft.ClassicNetwork/virtualNetworks/virtualNetworkPeerings; Microsoft.ClassicStorage/capabilities; Microsoft.ClassicStorage/checkStorageAccountAvailability; Microsoft.ClassicStorage/disks; Microsoft.ClassicStorage/images; Microsoft.ClassicStorage/operations; Microsoft.ClassicStorage/osImages; Microsoft.ClassicStorage/osPlatformImages; Microsoft.ClassicStorage/publicImages; Microsoft.ClassicStorage/quotas; Microsoft.ClassicStorage/storageAccounts; Microsoft.ClassicStorage/storageAccounts/blobServices; Microsoft.ClassicStorage/storageAccounts/fileServices; Microsoft.ClassicStorage/storageAccounts/metricDefinitions; Microsoft.ClassicStorage/storageAccounts/metrics; Microsoft.ClassicStorage/storageAccounts/queueServices; Microsoft.ClassicStorage/storageAccounts/services; Microsoft.ClassicStorage/storageAccounts/services/diagnosticSettings; Microsoft.ClassicStorage/storageAccounts/services/metricDefinitions; Microsoft.ClassicStorage/storageAccounts/services/metrics; Microsoft.ClassicStorage/storageAccounts/tableServices; Microsoft.ClassicStorage/storageAccounts/vmImages; Microsoft.ClassicStorage/vmImages; Microsoft.ClassicSubscription/operations Default 0 0 0 0 0 none Deny the deployment of classic resources /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deny-classic-resources n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false false Audit VMs that do not use managed disks /providers/microsoft.authorization/policydefinitions/06a78e20-9358-41c9-923c-fb736d382a4d BuiltIn Compute False audit Default 0 0 0 0 0 none Deny virtual machines and virtual machine scale sets that do not use managed disk /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deny-unmanageddisk n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false false Configure Azure Activity logs to stream to specified Log Analytics workspace /providers/microsoft.authorization/policydefinitions/2465583e-4e78-4c15-b6be-a36cbc7c8b0f BuiltIn Monitoring False DeployIfNotExists effect=DeployIfNotExists, logAnalytics=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 1 0 1 0 0 Monitoring Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/dcb59c88-f014-5e17-840c-6c9aecc66286), Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/82f0c3bf-808b-5863-bf9c-231cfbf9598a) Deploy-AzActivity-Log (SPObjId: 217aa040-8eb0-451b-b81c-0b8f3d200d5a) Deploy Diagnostic Settings for Activity Log to Log Analytics workspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
   Download CSV semicolon | comma
Inheritance ScopeExcluded PolicySet DisplayName PolicySetId Type Category ALZ Parameters Enforcement NonCompliance Message Policies NonCmplnt Policies Compliant Resources NonCmplnt Resources Compliant Resources Conflicting Role/Assignment Managed Identity Assignment DisplayName AssignmentId AssignedBy CreatedOn CreatedBy UpdatedOn UpdatedBy
inherited mibelle-landingzones-mg false Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-aum-checkupdates Custom Security Center true assessmentMode=AutomaticByPlatform Default 0 0 0 0 0 Virtual Machine Contributor (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/571da045-f503-5cb2-b123-ede8cfe0f15a), Azure Connected Machine Resource Administrator (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/7d65b18e-df43-5353-85a4-716e68ff7c7a), Managed Identity Operator (/providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/b2c88903-f3a4-54ec-813c-46d650309b86) Enable-AUM-CheckUpdates (SPObjId: 4f27b633-c16b-47a6-ab24-737bb6cdad56) Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines. /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg false Enforce recommended guardrails for Azure Key Vault /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-keyvault Custom Key Vault true Default 2 8 2 0 0 none Enforce recommended guardrails for Azure Key Vault /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enforce-gr-keyvault n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Audit virtual machines for Trusted Launch support /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/audit-trustedlaunch Custom Trusted Launch true Default 0 0 0 0 0 none Audit virtual machines for Trusted Launch support /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-trustedlaunch n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Unused resources driving cost should be avoided /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/audit-unusedresourcescostoptimization Custom Cost Optimization true EffectDisks=Audit, EffectPublicIpAddresses=Audit, EffectServerFarms=Audit Default 0 1 0 4 0 none Unused resources driving cost should be avoided /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-unusedresources n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Microsoft cloud security benchmark /providers/microsoft.authorization/policysetdefinitions/1f3afdf9-d0c9-4c3d-847f-89da613e70a8 BuiltIn Security Center False Default 34 15 23 0 0 none Enable Monitoring in Microsoft Defender for Cloud /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-asc-monitoring n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Enable audit category group resource logging for supported resources to Log Analytics /providers/microsoft.authorization/policysetdefinitions/f5b29bc4-feca-4cc6-a58a-772dd5e290a5 BuiltIn Monitoring False logAnalytics=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 4 0 8 0 Monitoring Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b922046a-7a3e-59da-a982-8a5b855791ce), Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/9df772a7-1ce7-5439-ab6b-5d31d69925cc) Deploy-Diag-Logs (SPObjId: 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57) Enable allLogs category group resource logging for supported resources to Log Analytics /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud /providers/microsoft.authorization/policysetdefinitions/77b391e3-2d5d-40c3-83bf-65c846b3c6a3 BuiltIn Security Center False Default 0 3 0 1 0 Security Admin (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/d730d560-adce-52b7-b10c-36a8ad16a6d3) Deploy-MDEndpointsAMA (SPObjId: 7d365a6d-a7ae-4921-beca-5ce854a76960) Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-mdendpointsama n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Enforce Azure Compute Security Benchmark compliance auditing /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-acsb Custom Guest Configuration true Default 0 0 0 0 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/6e26cd22-b41b-5611-aafc-e2c56b14c060) Enforce-ACSB (SPObjId: e1f2e80c-5329-4804-824d-f0b44713985e) Enforce Azure Compute Security Baseline compliance auditing /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/enforce-acsb n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Policy Assignment Limit: 0/200
0 Custom Policy definitions scoped
0 Custom PolicySet definitions scoped
0 Blueprints assigned
0 Blueprints scoped
No Classic Administrators
   Download CSV semicolon | comma
  *Depending on the number of rows and your computer´s performance the table may respond with delay, download the csv for better filtering experience
Scope Role RoleId Role Type Data Can do Role assignment Identity Displayname Identity SignInName Identity ObjectId Identity Type Applicability Applies through membership Group Details Role AssignmentId Related Policy Assignment CreatedOn CreatedBy
inherited mibelle-landingzones-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner (52364002-4a8b-4808-b4fc-864ed5f7d50d)
inherited mibelle-landingzones-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member nested SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner (52364002-4a8b-4808-b4fc-864ed5f7d50d)
inherited mibelle-landingzones-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False csa-michael.peter csa-michael.peter@MIBCloud.mail.onmicrosoft.com 460bad8a-cc4d-41dc-9ddd-f24ba491e2a6 User Member nested SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner (52364002-4a8b-4808-b4fc-864ed5f7d50d)
inherited mibelle-landingzones-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner (52364002-4a8b-4808-b4fc-864ed5f7d50d)
inherited mibelle-landingzones-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner 52364002-4a8b-4808-b4fc-864ed5f7d50d Group direct
inherited mibelle-landingzones-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member nested SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner (52364002-4a8b-4808-b4fc-864ed5f7d50d)
inherited mibelle-landingzones-mg SQL Security Manager 056cd41c-7e88-42e1-933e-88ba6a50c9c3 Builtin false False Deploy-AzSqlDb-Auditing n/a afb169da-f80a-4dd6-abf3-b7fc08efb8ae SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/2f1eab15-c92e-52cd-8b0c-a60e52f1b331 /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deploy-azsqldb-auditing (Configure SQL servers to have auditing enabled to Log Analytics workspace) 06/12/2025 17:56:41 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg Log Analytics Contributor 92aaf0da-9dab-42b6-94a3-d43ce8d16293 Builtin false False Deploy-AzSqlDb-Auditing n/a afb169da-f80a-4dd6-abf3-b7fc08efb8ae SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/488f45ec-c535-5f65-85bf-acacd1bb93e8 /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deploy-azsqldb-auditing (Configure SQL servers to have auditing enabled to Log Analytics workspace) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg Virtual Machine Contributor 9980e02c-c2be-4d73-94e8-173b1dc7cf3c Builtin false False Enable-AUM-CheckUpdates n/a 4f27b633-c16b-47a6-ab24-737bb6cdad56 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/571da045-f503-5cb2-b123-ede8cfe0f15a /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates (Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines) 06/12/2025 17:56:38 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg SQL DB Contributor 9b7fa17d-e63e-47b0-bb0a-15c516ac86ec Builtin false False Deploy-SQL-TDE n/a de5ed213-fd75-471c-8d32-920072d6c378 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/af2f6b24-ac34-5f3b-9249-5a109d9d1528 /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deploy-sql-tde (Deploy SQL DB transparent data encryption) 06/12/2025 17:56:38 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False 52a8c671384a4b609f1d7651 n/a 6e0d029a-fce4-400f-bff3-45b8d9a8342e SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/94dfdb33-b864-47c9-831d-366721beb989 /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/52a8c671384a4b609f1d7651 (Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics) 09/04/2025 06:12:52 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False e9143c36572348c3ba0c67b1 n/a 9c3b725e-ce85-47ac-bf6f-c2fa0571c259 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/3fb7bac5-2328-4e74-a5b0-0d6d2a631693 /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/e9143c36572348c3ba0c67b1 (Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics) 09/04/2025 07:18:00 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg Azure Connected Machine Resource Administrator cd570a14-e51a-42ad-bac8-bafd67325302 Builtin false False Enable-AUM-CheckUpdates n/a 4f27b633-c16b-47a6-ab24-737bb6cdad56 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/7d65b18e-df43-5353-85a4-716e68ff7c7a /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates (Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg Managed Identity Operator f1a07417-d97a-45cb-824c-7a7467783830 Builtin false False Enable-AUM-CheckUpdates n/a 4f27b633-c16b-47a6-ab24-737bb6cdad56 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/roleassignments/b2c88903-f3a4-54ec-813c-46d650309b86 /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates (Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-landingzones-mg Key Vault Administrator 00482a5a-887f-4fb3-b363-3b7fe8e74483 Builtin false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member nested SGU-MIB-RES-Azure-Magr-MibelleLandingZone-KeyVaultAdmin (dc72503d-d80a-4f41-969b-59a0818f358c)
inherited mibelle-landingzones-mg Key Vault Administrator 00482a5a-887f-4fb3-b363-3b7fe8e74483 Builtin false False csa-michael.peter csa-michael.peter@MIBCloud.mail.onmicrosoft.com 460bad8a-cc4d-41dc-9ddd-f24ba491e2a6 User Member nested SGU-MIB-RES-Azure-Magr-MibelleLandingZone-KeyVaultAdmin (dc72503d-d80a-4f41-969b-59a0818f358c)
inherited mibelle-landingzones-mg Key Vault Administrator 00482a5a-887f-4fb3-b363-3b7fe8e74483 Builtin false False SGU-MIB-RES-Azure-Magr-MibelleLandingZone-KeyVaultAdmin dc72503d-d80a-4f41-969b-59a0818f358c Group direct
inherited mibelle-landingzones-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False SGU-MIB-RES-Azure-Magr-MibelleLandingZone-UserAccessAdmin 45d94cc4-a927-422c-a9a3-a0cfa1684fd7 Group direct
inherited mibelle-landingzones-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False csa-michael.peter csa-michael.peter@MIBCloud.mail.onmicrosoft.com 460bad8a-cc4d-41dc-9ddd-f24ba491e2a6 User Member nested SGU-MIB-RES-Azure-Magr-MibelleLandingZone-UserAccessAdmin (45d94cc4-a927-422c-a9a3-a0cfa1684fd7)
inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78)
inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/e14ef9ac-25e8-4ee7-887a-a6576bd5229d none 11/28/2025 07:57:36 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78)
inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78)
inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78)
inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False SGU-MIB-RES-Azure-Magr-Mibelle-NetOps 87e9d07b-5340-455c-b297-8bffe3b86f78 Group direct
inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78)
inherited mibelle-mg [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e)
inherited mibelle-mg [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e)
inherited mibelle-mg [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e)
inherited mibelle-mg [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False SGU-MIB-RES-Azure-Magr-Mibelle-SecOps abf39027-4cb4-4298-8951-f984eaf9cb8e Group direct
inherited mibelle-mg Monitoring Contributor 749f88d5-cbae-40b8-bcfc-e573ddc772fa Builtin false False Deploy-AzActivity-Log n/a 217aa040-8eb0-451b-b81c-0b8f3d200d5a SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/dcb59c88-f014-5e17-840c-6c9aecc66286 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log (Configure Azure Activity logs to stream to specified Log Analytics workspace) 06/12/2025 17:56:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Monitoring Contributor 749f88d5-cbae-40b8-bcfc-e573ddc772fa Builtin false False Deploy-Diag-Logs n/a 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b922046a-7a3e-59da-a982-8a5b855791ce /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs (Enable audit category group resource logging for supported resources to Log Analytics) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Log Analytics Contributor 92aaf0da-9dab-42b6-94a3-d43ce8d16293 Builtin false False Deploy-AzActivity-Log n/a 217aa040-8eb0-451b-b81c-0b8f3d200d5a SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/82f0c3bf-808b-5863-bf9c-231cfbf9598a /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log (Configure Azure Activity logs to stream to specified Log Analytics workspace) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Log Analytics Contributor 92aaf0da-9dab-42b6-94a3-d43ce8d16293 Builtin false False Deploy-Diag-Logs n/a 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/9df772a7-1ce7-5439-ab6b-5d31d69925cc /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs (Enable audit category group resource logging for supported resources to Log Analytics) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Meier, Heinz-MIBELLEGROUP heinz.meier@mibelle.net 06addc33-6298-4f01-9f6b-709193f099cc User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Subs-MibelleOnline-SubscriptionOwner n/a 1bdf326c-8c66-4ba9-8c2d-83312a1ddc02 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-Reader n/a 1c529912-c479-41a1-8a03-e57256720fa4 Group direct 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser n/a 1f3ede05-4301-42b1-8c95-2be94290e93c Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Hasanow, Kilian-MIBELLEGROUP kilian.hasanow@mibelle.net 4270eb01-73cf-4e17-925e-47461737b40e User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Mibelle-AzGovWiz-prod n/a 44b03901-55d2-49a8-af3a-58228a81408c SP APP INT indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-michael.peter csa-michael.peter@MIBCloud.mail.onmicrosoft.com 460bad8a-cc4d-41dc-9ddd-f24ba491e2a6 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner n/a 52364002-4a8b-4808-b4fc-864ed5f7d50d Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Matej Paunovski CSA-matej.paunovski@MIBCloud.onmicrosoft.com 54f81d33-50db-475c-b686-4ef70aa0b4fe User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Ouaouane, Taoufik-MIBELLEGROUP taoufik.ouaouane@mibelle.net 7100d1ce-5bd7-449d-abdd-52a7218922b3 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-NetOps n/a 87e9d07b-5340-455c-b297-8bffe3b86f78 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner n/a 9b120856-d4b2-4862-95df-bedf8d5fe1c3 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-Baswaraj Marotrao Ramshette csa-baswarajmarotrao.ramshette@MIBCloud.onmicrosoft.com 9d8d246b-a1f9-4d9a-a54f-f7ae9f3af2ae User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-SecOps n/a abf39027-4cb4-4298-8951-f984eaf9cb8e Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Baumann, Jürg-MIBELLEGROUP juerg.baumann_mibellegroup.com#EXT#@MIBCloud.onmicrosoft.com bb2279b2-06ab-459a-b981-579701601f8a User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin n/a cb058f58-c629-445f-9a10-75f9fcab694e Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Philipp.Schmidt CSA-Philipp.Schmidt@MIBCloud.onmicrosoft.com e40a73c8-6655-434d-8c8b-fdc4d9213499 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Taoufik.Ouaouane csa-Taoufik.Ouaouane@mibelle.net e58ba28f-09ed-49c3-8f5e-31b05c258cde User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Adrian.Bombelka CSA-Adrian.Bombelka@MIBCloud.onmicrosoft.com e86b38a8-e5d4-4888-b09d-390dcf9a2017 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False Enforce-ACSB n/a e1f2e80c-5329-4804-824d-f0b44713985e SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/6e26cd22-b41b-5611-aafc-e2c56b14c060 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/enforce-acsb (Enforce Azure Compute Security Benchmark compliance auditing) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Security Admin fb1c8493-542b-48eb-b624-b4c8fea62acd Builtin false False Deploy-MDEndpointsAMA n/a 7d365a6d-a7ae-4921-beca-5ce854a76960 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/d730d560-adce-52b7-b10c-36a8ad16a6d3 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-mdendpointsama (Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Reservation Purchaser f7b75c60-3036-4b75-91c3-6b41c27c1689 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser 1f3ede05-4301-42b1-8c95-2be94290e93c Group direct
inherited mibelle-mg Reservation Purchaser f7b75c60-3036-4b75-91c3-6b41c27c1689 Builtin false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser (1f3ede05-4301-42b1-8c95-2be94290e93c)
inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e)
inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e)
inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e)
inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin cb058f58-c629-445f-9a10-75f9fcab694e Group direct
inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e)
inherited Tenant User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false True CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member direct /providers/microsoft.authorization/roleassignments/3f958da1-722a-4c03-8398-aab60735ecd3 none 05/07/2025 18:14:55 ObjectType: User Member, ObjectDisplayName: CSA-Jan.Stutz, ObjectSignInName: CSA-Jan.Stutz@MIBCloud.onmicrosoft.com, ObjectId: 43b3e278-6551-4566-83a8-c19abe643e64
thisScope Sub [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False SGU-MIB-RES-Azure-Subs-MibelleOnline-SubscriptionOwner 1bdf326c-8c66-4ba9-8c2d-83312a1ddc02 Group direct
thisScope Sub [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False CSA-Matej Paunovski CSA-matej.paunovski@MIBCloud.onmicrosoft.com 54f81d33-50db-475c-b686-4ef70aa0b4fe User Member nested SGU-MIB-RES-Azure-Subs-MibelleOnline-SubscriptionOwner (1bdf326c-8c66-4ba9-8c2d-83312a1ddc02)
thisScope Sub [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False Ouaouane, Taoufik-MIBELLEGROUP taoufik.ouaouane@mibelle.net 7100d1ce-5bd7-449d-abdd-52a7218922b3 User Member nested SGU-MIB-RES-Azure-Subs-MibelleOnline-SubscriptionOwner (1bdf326c-8c66-4ba9-8c2d-83312a1ddc02)
thisScope Sub [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False Baumann, Jürg-MIBELLEGROUP juerg.baumann_mibellegroup.com#EXT#@MIBCloud.onmicrosoft.com bb2279b2-06ab-459a-b981-579701601f8a User Member nested SGU-MIB-RES-Azure-Subs-MibelleOnline-SubscriptionOwner (1bdf326c-8c66-4ba9-8c2d-83312a1ddc02)
thisScope Sub [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False CSA-Taoufik.Ouaouane csa-Taoufik.Ouaouane@mibelle.net e58ba28f-09ed-49c3-8f5e-31b05c258cde User Member nested SGU-MIB-RES-Azure-Subs-MibelleOnline-SubscriptionOwner (1bdf326c-8c66-4ba9-8c2d-83312a1ddc02)
thisScope Sub Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False SGU-MIB-RES-Azure-Subs-MibelleOnline-SubscriptionOwner 1bdf326c-8c66-4ba9-8c2d-83312a1ddc02 Group direct
thisScope Sub Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False CSA-Matej Paunovski CSA-matej.paunovski@MIBCloud.onmicrosoft.com 54f81d33-50db-475c-b686-4ef70aa0b4fe User Member nested SGU-MIB-RES-Azure-Subs-MibelleOnline-SubscriptionOwner (1bdf326c-8c66-4ba9-8c2d-83312a1ddc02)
thisScope Sub Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False Ouaouane, Taoufik-MIBELLEGROUP taoufik.ouaouane@mibelle.net 7100d1ce-5bd7-449d-abdd-52a7218922b3 User Member nested SGU-MIB-RES-Azure-Subs-MibelleOnline-SubscriptionOwner (1bdf326c-8c66-4ba9-8c2d-83312a1ddc02)
thisScope Sub Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False Baumann, Jürg-MIBELLEGROUP juerg.baumann_mibellegroup.com#EXT#@MIBCloud.onmicrosoft.com bb2279b2-06ab-459a-b981-579701601f8a User Member nested SGU-MIB-RES-Azure-Subs-MibelleOnline-SubscriptionOwner (1bdf326c-8c66-4ba9-8c2d-83312a1ddc02)
thisScope Sub Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False CSA-Taoufik.Ouaouane csa-Taoufik.Ouaouane@mibelle.net e58ba28f-09ed-49c3-8f5e-31b05c258cde User Member nested SGU-MIB-RES-Azure-Subs-MibelleOnline-SubscriptionOwner (1bdf326c-8c66-4ba9-8c2d-83312a1ddc02)
thisScope Sub v1-custom-role-3b2fdc69-67a4-42f2-a43e-b7fbad489b03 eac9e3ff-ee3d-0ea4-b91b-4b1cde3da152 Custom true False v1-app-registration-3b2fdc69-67a4-42f2-a43e-b7fbad489b03 n/a edfd1a69-18da-4f39-9a1e-230cb16f6150 SP APP INT direct /subscriptions/3b2fdc69-67a4-42f2-a43e-b7fbad489b03/providers/microsoft.authorization/roleassignments/9b0f48a6-860b-62b0-7aac-a130722bfac4 none 10/16/2025 07:09:17 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
thisScope Sub RG [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False SGU-MIB-RES-Azure-Rsgp-MibellePpsFabricProdRg-subscriptionOwner n/a 5e90f4a0-bef5-41db-8e9c-7b8b8ef3e6c2 Group direct 2 (Usr: 2, Grp: 0, SP: 0) /subscriptions/3b2fdc69-67a4-42f2-a43e-b7fbad489b03/resourcegroups/mibelle-pps-fabric-prod-rg/providers/microsoft.authorization/roleassignments/7a355ecd-0d09-4e01-a413-cdffcd25bcca none 11/27/2025 11:40:14 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
thisScope Sub RG [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False CSA-Ramon.Banz csa-ramon.banz@MIBCloud.onmicrosoft.com 6bc05491-37ba-40b4-b726-f304409d466f User Member indirect SGU-MIB-RES-Azure-Rsgp-MibellePpsFabricProdRg-subscriptionOwner (5e90f4a0-bef5-41db-8e9c-7b8b8ef3e6c2) 2 (Usr: 2, Grp: 0, SP: 0) /subscriptions/3b2fdc69-67a4-42f2-a43e-b7fbad489b03/resourcegroups/mibelle-pps-fabric-prod-rg/providers/microsoft.authorization/roleassignments/7a355ecd-0d09-4e01-a413-cdffcd25bcca none 11/27/2025 11:40:14 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
thisScope Sub RG [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False PowerBI-MIBELLEGROUP powerbi@mibelle.net 7438f8fb-ba2c-4b7e-9986-02074ceb2148 User Member indirect SGU-MIB-RES-Azure-Rsgp-MibellePpsFabricProdRg-subscriptionOwner (5e90f4a0-bef5-41db-8e9c-7b8b8ef3e6c2) 2 (Usr: 2, Grp: 0, SP: 0) /subscriptions/3b2fdc69-67a4-42f2-a43e-b7fbad489b03/resourcegroups/mibelle-pps-fabric-prod-rg/providers/microsoft.authorization/roleassignments/7a355ecd-0d09-4e01-a413-cdffcd25bcca none 11/27/2025 11:40:14 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
thisScope Sub RG Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False PowerBI-MIBELLEGROUP powerbi@mibelle.net 7438f8fb-ba2c-4b7e-9986-02074ceb2148 User Member direct /subscriptions/3b2fdc69-67a4-42f2-a43e-b7fbad489b03/resourcegroups/mibelle-pps-fabric-prod-rg/providers/microsoft.authorization/roleassignments/a44c7b97-c33e-44bc-aaf0-58e77139f2c0 none 07/08/2025 05:47:42 ObjectType: User Member, ObjectDisplayName: CSA-Jan.Stutz, ObjectSignInName: CSA-Jan.Stutz@MIBCloud.onmicrosoft.com, ObjectId: 43b3e278-6551-4566-83a8-c19abe643e64
thisScope Sub RG Res Key Vault Administrator 00482a5a-887f-4fb3-b363-3b7fe8e74483 Builtin true False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member direct /subscriptions/3b2fdc69-67a4-42f2-a43e-b7fbad489b03/resourcegroups/mibelle-pki-prod-rg/providers/microsoft.keyvault/vaults/mibpkiscepmanprodeuwkv01/providers/microsoft.authorization/roleassignments/3d1e6154-69b8-48e6-b175-836b3f889e52 none 08/14/2025 15:50:00 ObjectType: User Member, ObjectDisplayName: csa-silvan.buehler, ObjectSignInName: csa-silvan.buehler@MIBCloud.onmicrosoft.com, ObjectId: 3bdc8531-5824-4ddc-82b1-dc494b4a1022
thisScope Sub RG Res Storage Table Data Contributor 0a9a7e1f-b9d0-4cc4-a60d-0319b160aaa3 Builtin true False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member direct /subscriptions/3b2fdc69-67a4-42f2-a43e-b7fbad489b03/resourcegroups/mibelle-pki-prod-rg/providers/microsoft.storage/storageaccounts/mibpkiscepmanpeuwst01/providers/microsoft.authorization/roleassignments/2cee37e3-7f5b-4e1f-a1c5-31b64a5256cf none 08/14/2025 15:49:39 ObjectType: User Member, ObjectDisplayName: csa-silvan.buehler, ObjectSignInName: csa-silvan.buehler@MIBCloud.onmicrosoft.com, ObjectId: 3bdc8531-5824-4ddc-82b1-dc494b4a1022
thisScope Sub RG Res Storage Table Data Contributor 0a9a7e1f-b9d0-4cc4-a60d-0319b160aaa3 Builtin true False mibelle-pki-scepman-prod-euw-app-02 n/a 728ba4e5-6cd6-49e3-ba75-73eed711472e SP MI Sys direct /subscriptions/3b2fdc69-67a4-42f2-a43e-b7fbad489b03/resourcegroups/mibelle-pki-prod-rg/providers/microsoft.storage/storageaccounts/mibpkiscepmanpeuwst01/providers/microsoft.authorization/roleassignments/cb8d8035-f17e-5773-b3cd-9bc205c49462 none 08/13/2025 09:25:14 ObjectType: User Member, ObjectDisplayName: csa-silvan.buehler, ObjectSignInName: csa-silvan.buehler@MIBCloud.onmicrosoft.com, ObjectId: 3bdc8531-5824-4ddc-82b1-dc494b4a1022
thisScope Sub RG Res Storage Table Data Contributor 0a9a7e1f-b9d0-4cc4-a60d-0319b160aaa3 Builtin true False mibelle-pki-scepman-prod-euw-app-01 n/a ac50c0d4-0669-41e7-8e20-fc13dccf2ba7 SP MI Sys direct /subscriptions/3b2fdc69-67a4-42f2-a43e-b7fbad489b03/resourcegroups/mibelle-pki-prod-rg/providers/microsoft.storage/storageaccounts/mibpkiscepmanpeuwst01/providers/microsoft.authorization/roleassignments/ce999a25-62f1-503b-9284-ee6c1ecb8063 none 08/13/2025 09:25:14 ObjectType: User Member, ObjectDisplayName: csa-silvan.buehler, ObjectSignInName: csa-silvan.buehler@MIBCloud.onmicrosoft.com, ObjectId: 3bdc8531-5824-4ddc-82b1-dc494b4a1022
thisScope Sub RG Res Key Vault Crypto Officer 14b46e9e-c2b7-41b4-b07b-48a6ebf60603 Builtin true False mibelle-pki-scepman-prod-euw-app-01 n/a ac50c0d4-0669-41e7-8e20-fc13dccf2ba7 SP MI Sys direct /subscriptions/3b2fdc69-67a4-42f2-a43e-b7fbad489b03/resourcegroups/mibelle-pki-prod-rg/providers/microsoft.keyvault/vaults/mibpkiscepmanprodeuwkv01/providers/microsoft.authorization/roleassignments/5a500fc5-5a6b-59b2-8f9c-9e1ca3b6648b none 08/13/2025 09:26:50 ObjectType: User Member, ObjectDisplayName: csa-silvan.buehler, ObjectSignInName: csa-silvan.buehler@MIBCloud.onmicrosoft.com, ObjectId: 3bdc8531-5824-4ddc-82b1-dc494b4a1022
thisScope Sub RG Res Key Vault Secrets User 4633458b-17de-408a-b874-0445c86b69e6 Builtin true False mibelle-aut-psu-dev-euw-app-01 n/a 1f7c7c55-02e4-4af0-8ee0-e2d5f82a9ab5 SP MI Sys direct /subscriptions/3b2fdc69-67a4-42f2-a43e-b7fbad489b03/resourcegroups/mibelle-aut-psu-dev-rg/providers/microsoft.keyvault/vaults/mibautpsudeveuwkv02/providers/microsoft.authorization/roleassignments/ecd99364-f831-42b0-a1e5-01cb2453febf none 09/25/2025 11:19:03 ObjectType: User Member, ObjectDisplayName: csa-michael.peter, ObjectSignInName: csa-michael.peter@MIBCloud.mail.onmicrosoft.com, ObjectId: 460bad8a-cc4d-41dc-9ddd-f24ba491e2a6
thisScope Sub RG Res Key Vault Secrets User 4633458b-17de-408a-b874-0445c86b69e6 Builtin true False n/a n/a 4ef8a0ea-f2d8-46a5-a42f-0c27aab2e547 Unknown direct /subscriptions/3b2fdc69-67a4-42f2-a43e-b7fbad489b03/resourcegroups/mibelle-aut-psu-dev-rg/providers/microsoft.keyvault/vaults/mibautpsudeveuwkv02/providers/microsoft.authorization/roleassignments/7955be54-b468-4122-9493-9ec643a6c0d0 none 09/25/2025 09:49:21 ObjectType: User Member, ObjectDisplayName: csa-michael.peter, ObjectSignInName: csa-michael.peter@MIBCloud.mail.onmicrosoft.com, ObjectId: 460bad8a-cc4d-41dc-9ddd-f24ba491e2a6
thisScope Sub RG Res Key Vault Secrets User 4633458b-17de-408a-b874-0445c86b69e6 Builtin true False mibelle-pki-scepman-prod-euw-app-01 n/a ac50c0d4-0669-41e7-8e20-fc13dccf2ba7 SP MI Sys direct /subscriptions/3b2fdc69-67a4-42f2-a43e-b7fbad489b03/resourcegroups/mibelle-pki-prod-rg/providers/microsoft.keyvault/vaults/mibpkiscepmanprodeuwkv01/providers/microsoft.authorization/roleassignments/90685712-7a4d-5754-9c62-b7631674c16b none 08/13/2025 09:26:50 ObjectType: User Member, ObjectDisplayName: csa-silvan.buehler, ObjectSignInName: csa-silvan.buehler@MIBCloud.onmicrosoft.com, ObjectId: 3bdc8531-5824-4ddc-82b1-dc494b4a1022
thisScope Sub RG Res Key Vault Certificates Officer a4417e6f-fecd-4de8-b567-7b0420556985 Builtin true False mibelle-pki-scepman-prod-euw-app-01 n/a ac50c0d4-0669-41e7-8e20-fc13dccf2ba7 SP MI Sys direct /subscriptions/3b2fdc69-67a4-42f2-a43e-b7fbad489b03/resourcegroups/mibelle-pki-prod-rg/providers/microsoft.keyvault/vaults/mibpkiscepmanprodeuwkv01/providers/microsoft.authorization/roleassignments/27eca0fc-d289-5ff3-99e6-fb6a59f13178 none 08/13/2025 09:26:50 ObjectType: User Member, ObjectDisplayName: csa-silvan.buehler, ObjectSignInName: csa-silvan.buehler@MIBCloud.onmicrosoft.com, ObjectId: 3bdc8531-5824-4ddc-82b1-dc494b4a1022
thisScope Sub RG Res Storage Blob Data Owner b7e6dc6d-f1e8-4753-8033-0f276bb0955b Builtin true False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member direct /subscriptions/3b2fdc69-67a4-42f2-a43e-b7fbad489b03/resourcegroups/mibelle-sftp-prod-rg/providers/microsoft.storage/storageaccounts/mibsftphrprodeuwst01/providers/microsoft.authorization/roleassignments/63bc8011-dbf5-4379-b542-022cb723e773 none 10/29/2025 06:31:04 ObjectType: User Member, ObjectDisplayName: csa-silvan.buehler, ObjectSignInName: csa-silvan.buehler@MIBCloud.onmicrosoft.com, ObjectId: 3bdc8531-5824-4ddc-82b1-dc494b4a1022
Highlight Management Group in HierarchyMap

Management Group Name: Platform

Management Group Id: mibelle-platform-mg

Management Group Path: a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg

3 ManagementGroups below this scope
3 Subscriptions below this scope
Microsoft Defender for Cloud Secure Score: 53.49 Video , Blog , learn
   Download CSV semicolon | comma
Diagnostic setting Target Target Id Administrative Policy
toLa LA /subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 true true
No Consumption data available as switch parameter -DoAzureConsumption was not applied
   Download CSV semicolon | comma
ResourceType Location Count
microsoft.automation/automationaccounts westeurope 1
microsoft.automation/automationaccounts/runbooks westeurope 1
microsoft.azurearcdata/sqlserverinstances westeurope 40
microsoft.azurearcdata/sqlserverinstances/databases westeurope 296
microsoft.compute/availabilitysets westeurope 2
microsoft.compute/disks westeurope 10
microsoft.compute/sshpublickeys westeurope 1
microsoft.compute/virtualmachines westeurope 7
microsoft.compute/virtualmachines/extensions westeurope 6
microsoft.connectedvmwarevsphere/vcenters westeurope 1
microsoft.devtestlab/schedules westeurope 1
microsoft.extendedlocation/customlocations westeurope 1
microsoft.hybridcompute/machines westeurope 116
microsoft.hybridcompute/machines/extensions westeurope 266
microsoft.hybridcompute/privatelinkscopes westeurope 1
microsoft.insights/actiongroups germanywestcentral 1
microsoft.insights/datacollectionendpoints westeurope 1
microsoft.insights/datacollectionrules westeurope 4
microsoft.insights/scheduledqueryrules westeurope 1
microsoft.insights/workbooks westeurope 1
microsoft.keyvault/vaults westeurope 2
microsoft.maintenance/maintenanceconfigurations switzerlandnorth 7
microsoft.maintenance/maintenanceconfigurations westeurope 14
microsoft.managedidentity/userassignedidentities westeurope 1
microsoft.network/applicationsecuritygroups westeurope 2
microsoft.network/bastionhosts westeurope 1
microsoft.network/dnszones global 19
microsoft.network/loadbalancers westeurope 1
microsoft.network/networkinterfaces westeurope 17
microsoft.network/networksecuritygroups westeurope 3
microsoft.network/networkwatchers northeurope 1
microsoft.network/networkwatchers westeurope 3
microsoft.network/networkwatchers/flowlogs westeurope 2
microsoft.network/privateendpoints westeurope 1
microsoft.network/publicipaddresses westeurope 4
microsoft.network/routetables westeurope 2
microsoft.network/virtualhubs westeurope 1
microsoft.network/virtualnetworks westeurope 3
microsoft.operationalinsights/querypacks westeurope 1
microsoft.operationalinsights/workspaces westeurope 1
microsoft.resourceconnector/appliances westeurope 1
microsoft.storage/storageaccounts northeurope 1
microsoft.storage/storageaccounts westeurope 7
microsoft.web/certificates westeurope 1
microsoft.web/serverfarms westeurope 1
microsoft.web/sites westeurope 1
   Download CSV semicolon | comma
ResourceType Resource Count Diagnostics capable Metrics Logs LogCategories
microsoft.automation/automationaccounts 1 True True True JobLogs, JobStreams, DscNodeStatus, AuditEvent
microsoft.automation/automationaccounts/runbooks 1 False False False
microsoft.azurearcdata/sqlserverinstances 40 False False False
microsoft.azurearcdata/sqlserverinstances/databases 296 False False False
microsoft.compute/availabilitysets 2 False False False
microsoft.compute/disks 10 True True False
microsoft.compute/sshpublickeys 1 False False False
microsoft.compute/virtualmachines 7 True True False
microsoft.compute/virtualmachines/extensions 6 False False False
microsoft.connectedvmwarevsphere/vcenters 1 False False False
microsoft.devtestlab/schedules 1 False False False
microsoft.extendedlocation/customlocations 1 False False False
microsoft.hybridcompute/machines 116 False False False
microsoft.hybridcompute/machines/extensions 266 False False False
microsoft.hybridcompute/privatelinkscopes 1 False False False
microsoft.insights/actiongroups 1 False False False
microsoft.insights/datacollectionendpoints 1 False False False
microsoft.insights/datacollectionrules 4 True True True LogErrors
microsoft.insights/scheduledqueryrules 1 False False False
microsoft.insights/workbooks 1 False False False
microsoft.keyvault/vaults 2 True True True AuditEvent, AzurePolicyEvaluationDetails
microsoft.maintenance/maintenanceconfigurations 21 False False False
microsoft.managedidentity/userassignedidentities 1 False False False
microsoft.network/applicationsecuritygroups 2 False False False
microsoft.network/bastionhosts 1 True True True BastionAuditLogs
microsoft.network/dnszones 19 True True False
microsoft.network/loadbalancers 1 True True True LoadBalancerHealthEvent
microsoft.network/networkinterfaces 17 True True False
microsoft.network/networksecuritygroups 3 True False True NetworkSecurityGroupEvent, NetworkSecurityGroupRuleCounter
microsoft.network/networkwatchers 4 False False False
microsoft.network/networkwatchers/flowlogs 2 False False False
microsoft.network/privateendpoints 1 True True False
microsoft.network/publicipaddresses 4 True True True DDoSProtectionNotifications, DDoSMitigationFlowLogs, DDoSMitigationReports
microsoft.network/routetables 2 False False False
microsoft.network/virtualhubs 1 True True False
microsoft.network/virtualnetworks 3 True True True VMProtectionAlerts
microsoft.operationalinsights/querypacks 1 False False False
microsoft.operationalinsights/workspaces 1 True True True Audit, SummaryLogs, Jobs
microsoft.resourceconnector/appliances 1 False False False
microsoft.storage/storageaccounts 8 True True False
microsoft.web/certificates 1 False
microsoft.web/serverfarms 1 True True False
microsoft.web/sites 1 True True True AppServiceHTTPLogs, AppServiceConsoleLogs, AppServiceAppLogs, AppServiceAuditLogs, AppServiceIPSecAuditLogs, AppServicePlatformLogs, AppServiceAuthenticationLogs
PSRule for Azure - integration paused - PSRule for Azure
   Download CSV semicolon | comma
  *Depending on the number of rows and your computer´s performance the table may respond with delay, download the csv for better filtering experience
Inheritance ScopeExcluded Exemption applies Policy DisplayName PolicyId Type Category ALZ Effect Parameters Enforcement NonCompliance Message Policies NonCmplnt Policies Compliant Resources NonCmplnt Resources Compliant Resources Conflicting Role/Assignment Managed Identity Assignment DisplayName AssignmentId AssignedBy CreatedOn CreatedBy UpdatedOn UpdatedBy
inherited mibelle-mg false false Audit resource location matches resource group location /providers/microsoft.authorization/policydefinitions/0a914e76-4921-4c19-b460-a2d36003525a BuiltIn General False audit Default 1 0 3 534 0 none Audit that the resource location matches its resource group location /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-location-match n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false false Not allowed resource types /providers/microsoft.authorization/policydefinitions/6c112d4e-5bc7-47ae-a041-ea2d9dccd749 BuiltIn General False Deny effect=Deny, listOfResourceTypesNotAllowed=Microsoft.ClassicCompute/capabilities; Microsoft.ClassicCompute/checkDomainNameAvailability; Microsoft.ClassicCompute/domainNames; Microsoft.ClassicCompute/domainNames/capabilities; Microsoft.ClassicCompute/domainNames/internalLoadBalancers; Microsoft.ClassicCompute/domainNames/serviceCertificates; Microsoft.ClassicCompute/domainNames/slots; Microsoft.ClassicCompute/domainNames/slots/roles; Microsoft.ClassicCompute/domainNames/slots/roles/metricDefinitions; Microsoft.ClassicCompute/domainNames/slots/roles/metrics; Microsoft.ClassicCompute/moveSubscriptionResources; Microsoft.ClassicCompute/operatingSystemFamilies; Microsoft.ClassicCompute/operatingSystems; Microsoft.ClassicCompute/operations; Microsoft.ClassicCompute/operationStatuses; Microsoft.ClassicCompute/quotas; Microsoft.ClassicCompute/resourceTypes; Microsoft.ClassicCompute/validateSubscriptionMoveAvailability; Microsoft.ClassicCompute/virtualMachines; Microsoft.ClassicCompute/virtualMachines/diagnosticSettings; Microsoft.ClassicCompute/virtualMachines/metricDefinitions; Microsoft.ClassicCompute/virtualMachines/metrics; Microsoft.ClassicInfrastructureMigrate/classicInfrastructureResources; Microsoft.ClassicNetwork/capabilities; Microsoft.ClassicNetwork/expressRouteCrossConnections; Microsoft.ClassicNetwork/expressRouteCrossConnections/peerings; Microsoft.ClassicNetwork/gatewaySupportedDevices; Microsoft.ClassicNetwork/networkSecurityGroups; Microsoft.ClassicNetwork/operations; Microsoft.ClassicNetwork/quotas; Microsoft.ClassicNetwork/reservedIps; Microsoft.ClassicNetwork/virtualNetworks; Microsoft.ClassicNetwork/virtualNetworks/remoteVirtualNetworkPeeringProxies; Microsoft.ClassicNetwork/virtualNetworks/virtualNetworkPeerings; Microsoft.ClassicStorage/capabilities; Microsoft.ClassicStorage/checkStorageAccountAvailability; Microsoft.ClassicStorage/disks; Microsoft.ClassicStorage/images; Microsoft.ClassicStorage/operations; Microsoft.ClassicStorage/osImages; Microsoft.ClassicStorage/osPlatformImages; Microsoft.ClassicStorage/publicImages; Microsoft.ClassicStorage/quotas; Microsoft.ClassicStorage/storageAccounts; Microsoft.ClassicStorage/storageAccounts/blobServices; Microsoft.ClassicStorage/storageAccounts/fileServices; Microsoft.ClassicStorage/storageAccounts/metricDefinitions; Microsoft.ClassicStorage/storageAccounts/metrics; Microsoft.ClassicStorage/storageAccounts/queueServices; Microsoft.ClassicStorage/storageAccounts/services; Microsoft.ClassicStorage/storageAccounts/services/diagnosticSettings; Microsoft.ClassicStorage/storageAccounts/services/metricDefinitions; Microsoft.ClassicStorage/storageAccounts/services/metrics; Microsoft.ClassicStorage/storageAccounts/tableServices; Microsoft.ClassicStorage/storageAccounts/vmImages; Microsoft.ClassicStorage/vmImages; Microsoft.ClassicSubscription/operations Default 0 0 0 0 0 none Deny the deployment of classic resources /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deny-classic-resources n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false false Audit VMs that do not use managed disks /providers/microsoft.authorization/policydefinitions/06a78e20-9358-41c9-923c-fb736d382a4d BuiltIn Compute False audit Default 0 1 0 7 0 none Deny virtual machines and virtual machine scale sets that do not use managed disk /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deny-unmanageddisk n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false false Configure Azure Activity logs to stream to specified Log Analytics workspace /providers/microsoft.authorization/policydefinitions/2465583e-4e78-4c15-b6be-a36cbc7c8b0f BuiltIn Monitoring False DeployIfNotExists effect=DeployIfNotExists, logAnalytics=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 1 0 2 1 0 Monitoring Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/dcb59c88-f014-5e17-840c-6c9aecc66286), Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/82f0c3bf-808b-5863-bf9c-231cfbf9598a) Deploy-AzActivity-Log (SPObjId: 217aa040-8eb0-451b-b81c-0b8f3d200d5a) Deploy Diagnostic Settings for Activity Log to Log Analytics workspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
thisScope Mg false false Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics /providers/microsoft.authorization/policydefinitions/052c180e-287d-44c3-86ef-01aeae2d9774 BuiltIn Network False DeployIfNotExists networkWatcherName=/subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourcegroups/networkwatcherrg/providers/microsoft.network/networkwatchers/networkwatcher_northeurope, networkWatcherRG=networkwatcherrg, retentionDays=1, storageId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.storage/storageaccounts/mibmgmtnetprodeunst01, vnetRegion=northeurope, workspaceRegion=westeurope, workspaceResourceId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 0 0 0 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/71689b0c-ca78-4285-9603-49a5497225d8) 97339ff59e1744678fd92dea (SPObjId: c2b8a553-ec19-42b8-8855-6edc985eaffb) Deploy-TrafficAnalytics-NorthEurope /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/97339ff59e1744678fd92dea n/a 09/04/2025 07:21:45 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 09/04/2025 07:34:08 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
thisScope Mg false false Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics /providers/microsoft.authorization/policydefinitions/052c180e-287d-44c3-86ef-01aeae2d9774 BuiltIn Network False DeployIfNotExists networkWatcherName=/subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourcegroups/networkwatcherrg/providers/microsoft.network/networkwatchers/networkwatcher_westeurope, networkWatcherRG=networkwatcherrg, retentionDays=1, storageId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.storage/storageaccounts/mibmgmtnetprodeuwst01, vnetRegion=westeurope, workspaceRegion=westeurope, workspaceResourceId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 1 0 1 2 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/21c0b216-76ff-44ef-9430-19f801e102d5) d33eb38085bf40bd860fe43b (SPObjId: 78dd5b73-2109-4a10-b2e4-6463304b4b4d) Deploy-TrafficAnalytics-WestEurope /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/d33eb38085bf40bd860fe43b n/a 06/12/2025 18:15:24 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 09/04/2025 07:24:28 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
thisScope Mg false false Do not allow deletion of specified resource and resource type /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/denyaction-deleteresources Custom General true DenyAction effect=DenyAction, resourceName=mibelle-mgmt-log-prod-euw-id-01, resourceType=Microsoft.ManagedIdentity/userAssignedIdentities Default 0 0 0 0 0 none Do not allow deletion of the User Assigned Managed Identity used by AMA /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/denyaction-deleteuamiama n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
thisScope Mg false false Subnets should be private /providers/microsoft.authorization/policydefinitions/7bca8353-aa3b-429b-904a-9229c4385837 BuiltIn Network False Audit Default 1 0 15 0 0 none Subnets should be private /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enforce-subnet-private n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
   Download CSV semicolon | comma
Inheritance ScopeExcluded PolicySet DisplayName PolicySetId Type Category ALZ Parameters Enforcement NonCompliance Message Policies NonCmplnt Policies Compliant Resources NonCmplnt Resources Compliant Resources Conflicting Role/Assignment Managed Identity Assignment DisplayName AssignmentId AssignedBy CreatedOn CreatedBy UpdatedOn UpdatedBy
inherited mibelle-mg false Audit virtual machines for Trusted Launch support /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/audit-trustedlaunch Custom Trusted Launch true Default 2 0 10 7 0 none Audit virtual machines for Trusted Launch support /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-trustedlaunch n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Unused resources driving cost should be avoided /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/audit-unusedresourcescostoptimization Custom Cost Optimization true EffectDisks=Audit, EffectPublicIpAddresses=Audit, EffectServerFarms=Audit Default 1 3 1 21 0 none Unused resources driving cost should be avoided /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-unusedresources n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Microsoft cloud security benchmark /providers/microsoft.authorization/policysetdefinitions/1f3afdf9-d0c9-4c3d-847f-89da613e70a8 BuiltIn Security Center False Default 49 27 154 46 0 none Enable Monitoring in Microsoft Defender for Cloud /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-asc-monitoring n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Enable audit category group resource logging for supported resources to Log Analytics /providers/microsoft.authorization/policysetdefinitions/f5b29bc4-feca-4cc6-a58a-772dd5e290a5 BuiltIn Monitoring False logAnalytics=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 1 4 1 8 0 Monitoring Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b922046a-7a3e-59da-a982-8a5b855791ce), Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/9df772a7-1ce7-5439-ab6b-5d31d69925cc) Deploy-Diag-Logs (SPObjId: 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57) Enable allLogs category group resource logging for supported resources to Log Analytics /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud /providers/microsoft.authorization/policysetdefinitions/77b391e3-2d5d-40c3-83bf-65c846b3c6a3 BuiltIn Security Center False Default 0 3 0 3 0 Security Admin (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/d730d560-adce-52b7-b10c-36a8ad16a6d3) Deploy-MDEndpointsAMA (SPObjId: 7d365a6d-a7ae-4921-beca-5ce854a76960) Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-mdendpointsama n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Enforce Azure Compute Security Benchmark compliance auditing /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-acsb Custom Guest Configuration true Default 3 2 121 0 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/6e26cd22-b41b-5611-aafc-e2c56b14c060) Enforce-ACSB (SPObjId: e1f2e80c-5329-4804-824d-f0b44713985e) Enforce Azure Compute Security Baseline compliance auditing /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/enforce-acsb n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
thisScope Mg false Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-aum-checkupdates Custom Security Center true assessmentMode=AutomaticByPlatform Default 0 4 0 123 0 Virtual Machine Contributor (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/51e23aa4-bdf1-5059-8efc-453852a14d5e), Azure Connected Machine Resource Administrator (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/d72b7c0f-a23a-58ed-8e0a-40f49a5b6ab3), Managed Identity Operator (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/1f97b9d8-3c21-5b8b-9b36-72e77d4a90e0) Enable-AUM-CheckUpdates (SPObjId: ce67e461-e4a3-4514-89cb-7eb8802f8f65) Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines. /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates n/a 06/12/2025 17:56:38 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
thisScope Mg false Enforce recommended guardrails for Azure Key Vault /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-keyvault Custom Key Vault true Default 3 5 1 0 0 none Enforce recommended guardrails for Azure Key Vault /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enforce-gr-keyvault n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Policy Assignment Limit: 6/200
0 Custom Policy definitions scoped
0 Custom PolicySet definitions scoped
0 Blueprints scoped
   Download CSV semicolon | comma
  *Depending on the number of rows and your computer´s performance the table may respond with delay, download the csv for better filtering experience
Scope Role RoleId Role Type Data Can do Role assignment Identity Displayname Identity SignInName Identity ObjectId Identity Type Applicability Applies through membership Group Details Role AssignmentId Related Policy Assignment CreatedOn CreatedBy
inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/e14ef9ac-25e8-4ee7-887a-a6576bd5229d none 11/28/2025 07:57:36 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Monitoring Contributor 749f88d5-cbae-40b8-bcfc-e573ddc772fa Builtin false False Deploy-AzActivity-Log n/a 217aa040-8eb0-451b-b81c-0b8f3d200d5a SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/dcb59c88-f014-5e17-840c-6c9aecc66286 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log (Configure Azure Activity logs to stream to specified Log Analytics workspace) 06/12/2025 17:56:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Monitoring Contributor 749f88d5-cbae-40b8-bcfc-e573ddc772fa Builtin false False Deploy-Diag-Logs n/a 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b922046a-7a3e-59da-a982-8a5b855791ce /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs (Enable audit category group resource logging for supported resources to Log Analytics) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Log Analytics Contributor 92aaf0da-9dab-42b6-94a3-d43ce8d16293 Builtin false False Deploy-AzActivity-Log n/a 217aa040-8eb0-451b-b81c-0b8f3d200d5a SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/82f0c3bf-808b-5863-bf9c-231cfbf9598a /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log (Configure Azure Activity logs to stream to specified Log Analytics workspace) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Log Analytics Contributor 92aaf0da-9dab-42b6-94a3-d43ce8d16293 Builtin false False Deploy-Diag-Logs n/a 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/9df772a7-1ce7-5439-ab6b-5d31d69925cc /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs (Enable audit category group resource logging for supported resources to Log Analytics) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Meier, Heinz-MIBELLEGROUP heinz.meier@mibelle.net 06addc33-6298-4f01-9f6b-709193f099cc User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Subs-MibelleOnline-SubscriptionOwner n/a 1bdf326c-8c66-4ba9-8c2d-83312a1ddc02 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-Reader n/a 1c529912-c479-41a1-8a03-e57256720fa4 Group direct 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser n/a 1f3ede05-4301-42b1-8c95-2be94290e93c Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Hasanow, Kilian-MIBELLEGROUP kilian.hasanow@mibelle.net 4270eb01-73cf-4e17-925e-47461737b40e User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Mibelle-AzGovWiz-prod n/a 44b03901-55d2-49a8-af3a-58228a81408c SP APP INT indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-michael.peter csa-michael.peter@MIBCloud.mail.onmicrosoft.com 460bad8a-cc4d-41dc-9ddd-f24ba491e2a6 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner n/a 52364002-4a8b-4808-b4fc-864ed5f7d50d Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Matej Paunovski CSA-matej.paunovski@MIBCloud.onmicrosoft.com 54f81d33-50db-475c-b686-4ef70aa0b4fe User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Ouaouane, Taoufik-MIBELLEGROUP taoufik.ouaouane@mibelle.net 7100d1ce-5bd7-449d-abdd-52a7218922b3 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-NetOps n/a 87e9d07b-5340-455c-b297-8bffe3b86f78 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner n/a 9b120856-d4b2-4862-95df-bedf8d5fe1c3 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-Baswaraj Marotrao Ramshette csa-baswarajmarotrao.ramshette@MIBCloud.onmicrosoft.com 9d8d246b-a1f9-4d9a-a54f-f7ae9f3af2ae User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-SecOps n/a abf39027-4cb4-4298-8951-f984eaf9cb8e Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Baumann, Jürg-MIBELLEGROUP juerg.baumann_mibellegroup.com#EXT#@MIBCloud.onmicrosoft.com bb2279b2-06ab-459a-b981-579701601f8a User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin n/a cb058f58-c629-445f-9a10-75f9fcab694e Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Philipp.Schmidt CSA-Philipp.Schmidt@MIBCloud.onmicrosoft.com e40a73c8-6655-434d-8c8b-fdc4d9213499 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Taoufik.Ouaouane csa-Taoufik.Ouaouane@mibelle.net e58ba28f-09ed-49c3-8f5e-31b05c258cde User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Adrian.Bombelka CSA-Adrian.Bombelka@MIBCloud.onmicrosoft.com e86b38a8-e5d4-4888-b09d-390dcf9a2017 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False Enforce-ACSB n/a e1f2e80c-5329-4804-824d-f0b44713985e SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/6e26cd22-b41b-5611-aafc-e2c56b14c060 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/enforce-acsb (Enforce Azure Compute Security Benchmark compliance auditing) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Security Admin fb1c8493-542b-48eb-b624-b4c8fea62acd Builtin false False Deploy-MDEndpointsAMA n/a 7d365a6d-a7ae-4921-beca-5ce854a76960 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/d730d560-adce-52b7-b10c-36a8ad16a6d3 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-mdendpointsama (Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited Tenant User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false True CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member direct /providers/microsoft.authorization/roleassignments/3f958da1-722a-4c03-8398-aab60735ecd3 none 05/07/2025 18:14:55 ObjectType: User Member, ObjectDisplayName: CSA-Jan.Stutz, ObjectSignInName: CSA-Jan.Stutz@MIBCloud.onmicrosoft.com, ObjectId: 43b3e278-6551-4566-83a8-c19abe643e64
thisScope MG Virtual Machine Contributor 9980e02c-c2be-4d73-94e8-173b1dc7cf3c Builtin false False Enable-AUM-CheckUpdates n/a ce67e461-e4a3-4514-89cb-7eb8802f8f65 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/51e23aa4-bdf1-5059-8efc-453852a14d5e /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates (Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines) 06/12/2025 17:56:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
thisScope MG Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False d33eb38085bf40bd860fe43b n/a 78dd5b73-2109-4a10-b2e4-6463304b4b4d SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/21c0b216-76ff-44ef-9430-19f801e102d5 /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/d33eb38085bf40bd860fe43b (Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics) 06/12/2025 18:15:25 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
thisScope MG Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False 97339ff59e1744678fd92dea n/a c2b8a553-ec19-42b8-8855-6edc985eaffb SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/71689b0c-ca78-4285-9603-49a5497225d8 /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/97339ff59e1744678fd92dea (Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics) 09/04/2025 07:21:46 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
thisScope MG Azure Connected Machine Resource Administrator cd570a14-e51a-42ad-bac8-bafd67325302 Builtin false False Enable-AUM-CheckUpdates n/a ce67e461-e4a3-4514-89cb-7eb8802f8f65 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/d72b7c0f-a23a-58ed-8e0a-40f49a5b6ab3 /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates (Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines) 06/12/2025 17:56:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
thisScope MG Managed Identity Operator f1a07417-d97a-45cb-824c-7a7467783830 Builtin false False Enable-AUM-CheckUpdates n/a ce67e461-e4a3-4514-89cb-7eb8802f8f65 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/1f97b9d8-3c21-5b8b-9b36-72e77d4a90e0 /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates (Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines) 06/12/2025 17:56:41 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78)
inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78)
inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78)
inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78)
inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False SGU-MIB-RES-Azure-Magr-Mibelle-NetOps 87e9d07b-5340-455c-b297-8bffe3b86f78 Group direct
inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78)
inherited mibelle-mg [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e)
inherited mibelle-mg [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e)
inherited mibelle-mg [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e)
inherited mibelle-mg [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False SGU-MIB-RES-Azure-Magr-Mibelle-SecOps abf39027-4cb4-4298-8951-f984eaf9cb8e Group direct
inherited mibelle-mg Reservation Purchaser f7b75c60-3036-4b75-91c3-6b41c27c1689 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser 1f3ede05-4301-42b1-8c95-2be94290e93c Group direct
inherited mibelle-mg Reservation Purchaser f7b75c60-3036-4b75-91c3-6b41c27c1689 Builtin false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser (1f3ede05-4301-42b1-8c95-2be94290e93c)
inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e)
inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e)
inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e)
inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin cb058f58-c629-445f-9a10-75f9fcab694e Group direct
inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e)
thisScope MG [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3)
thisScope MG [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3)
thisScope MG [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3)
thisScope MG [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3)
thisScope MG [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner 9b120856-d4b2-4862-95df-bedf8d5fe1c3 Group direct
thisScope MG [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3)
thisScope MG [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False CSA-Philipp.Schmidt CSA-Philipp.Schmidt@MIBCloud.onmicrosoft.com e40a73c8-6655-434d-8c8b-fdc4d9213499 User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3)
0 Subscriptions linked
Highlight Management Group in HierarchyMap

Management Group Name: Connectivity

Management Group Id: mibelle-platform-connectivity-mg

Management Group Path: a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg

0 ManagementGroups below this scope
1 Subscriptions below this scope
Microsoft Defender for Cloud Secure Score: 39.38 Video , Blog , learn
   Download CSV semicolon | comma
Diagnostic setting Target Target Id Administrative Policy
toLa LA /subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 true true
No Consumption data available as switch parameter -DoAzureConsumption was not applied
   Download CSV semicolon | comma
ResourceType Location Count
microsoft.compute/availabilitysets westeurope 2
microsoft.compute/disks westeurope 8
microsoft.compute/sshpublickeys westeurope 1
microsoft.compute/virtualmachines westeurope 6
microsoft.compute/virtualmachines/extensions westeurope 5
microsoft.devtestlab/schedules westeurope 1
microsoft.keyvault/vaults westeurope 1
microsoft.network/applicationsecuritygroups westeurope 2
microsoft.network/bastionhosts westeurope 1
microsoft.network/dnszones global 19
microsoft.network/loadbalancers westeurope 1
microsoft.network/networkinterfaces westeurope 15
microsoft.network/networksecuritygroups westeurope 3
microsoft.network/networkwatchers northeurope 1
microsoft.network/networkwatchers westeurope 1
microsoft.network/networkwatchers/flowlogs westeurope 1
microsoft.network/publicipaddresses westeurope 4
microsoft.network/routetables westeurope 2
microsoft.network/virtualhubs westeurope 1
microsoft.network/virtualnetworks westeurope 1
microsoft.storage/storageaccounts westeurope 3
   Download CSV semicolon | comma
ResourceType Resource Count Diagnostics capable Metrics Logs LogCategories
microsoft.compute/availabilitysets 2 False False False
microsoft.compute/disks 8 True True False
microsoft.compute/sshpublickeys 1 False False False
microsoft.compute/virtualmachines 6 True True False
microsoft.compute/virtualmachines/extensions 5 False False False
microsoft.devtestlab/schedules 1 False False False
microsoft.keyvault/vaults 1 True True True AuditEvent, AzurePolicyEvaluationDetails
microsoft.network/applicationsecuritygroups 2 False False False
microsoft.network/bastionhosts 1 True True True BastionAuditLogs
microsoft.network/dnszones 19 True True False
microsoft.network/loadbalancers 1 True True True LoadBalancerHealthEvent
microsoft.network/networkinterfaces 15 True True False
microsoft.network/networksecuritygroups 3 True False True NetworkSecurityGroupEvent, NetworkSecurityGroupRuleCounter
microsoft.network/networkwatchers 2 False False False
microsoft.network/networkwatchers/flowlogs 1 False False False
microsoft.network/publicipaddresses 4 True True True DDoSProtectionNotifications, DDoSMitigationFlowLogs, DDoSMitigationReports
microsoft.network/routetables 2 False False False
microsoft.network/virtualhubs 1 True True False
microsoft.network/virtualnetworks 1 True True True VMProtectionAlerts
microsoft.storage/storageaccounts 3 True True False
PSRule for Azure - integration paused - PSRule for Azure
   Download CSV semicolon | comma
  *Depending on the number of rows and your computer´s performance the table may respond with delay, download the csv for better filtering experience
Inheritance ScopeExcluded Exemption applies Policy DisplayName PolicyId Type Category ALZ Effect Parameters Enforcement NonCompliance Message Policies NonCmplnt Policies Compliant Resources NonCmplnt Resources Compliant Resources Conflicting Role/Assignment Managed Identity Assignment DisplayName AssignmentId AssignedBy CreatedOn CreatedBy UpdatedOn UpdatedBy
inherited mibelle-mg false false Audit resource location matches resource group location /providers/microsoft.authorization/policydefinitions/0a914e76-4921-4c19-b460-a2d36003525a BuiltIn General False audit Default 1 0 1 77 0 none Audit that the resource location matches its resource group location /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-location-match n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false false Not allowed resource types /providers/microsoft.authorization/policydefinitions/6c112d4e-5bc7-47ae-a041-ea2d9dccd749 BuiltIn General False Deny effect=Deny, listOfResourceTypesNotAllowed=Microsoft.ClassicCompute/capabilities; Microsoft.ClassicCompute/checkDomainNameAvailability; Microsoft.ClassicCompute/domainNames; Microsoft.ClassicCompute/domainNames/capabilities; Microsoft.ClassicCompute/domainNames/internalLoadBalancers; Microsoft.ClassicCompute/domainNames/serviceCertificates; Microsoft.ClassicCompute/domainNames/slots; Microsoft.ClassicCompute/domainNames/slots/roles; Microsoft.ClassicCompute/domainNames/slots/roles/metricDefinitions; Microsoft.ClassicCompute/domainNames/slots/roles/metrics; Microsoft.ClassicCompute/moveSubscriptionResources; Microsoft.ClassicCompute/operatingSystemFamilies; Microsoft.ClassicCompute/operatingSystems; Microsoft.ClassicCompute/operations; Microsoft.ClassicCompute/operationStatuses; Microsoft.ClassicCompute/quotas; Microsoft.ClassicCompute/resourceTypes; Microsoft.ClassicCompute/validateSubscriptionMoveAvailability; Microsoft.ClassicCompute/virtualMachines; Microsoft.ClassicCompute/virtualMachines/diagnosticSettings; Microsoft.ClassicCompute/virtualMachines/metricDefinitions; Microsoft.ClassicCompute/virtualMachines/metrics; Microsoft.ClassicInfrastructureMigrate/classicInfrastructureResources; Microsoft.ClassicNetwork/capabilities; Microsoft.ClassicNetwork/expressRouteCrossConnections; Microsoft.ClassicNetwork/expressRouteCrossConnections/peerings; Microsoft.ClassicNetwork/gatewaySupportedDevices; Microsoft.ClassicNetwork/networkSecurityGroups; Microsoft.ClassicNetwork/operations; Microsoft.ClassicNetwork/quotas; Microsoft.ClassicNetwork/reservedIps; Microsoft.ClassicNetwork/virtualNetworks; Microsoft.ClassicNetwork/virtualNetworks/remoteVirtualNetworkPeeringProxies; Microsoft.ClassicNetwork/virtualNetworks/virtualNetworkPeerings; Microsoft.ClassicStorage/capabilities; Microsoft.ClassicStorage/checkStorageAccountAvailability; Microsoft.ClassicStorage/disks; Microsoft.ClassicStorage/images; Microsoft.ClassicStorage/operations; Microsoft.ClassicStorage/osImages; Microsoft.ClassicStorage/osPlatformImages; Microsoft.ClassicStorage/publicImages; Microsoft.ClassicStorage/quotas; Microsoft.ClassicStorage/storageAccounts; Microsoft.ClassicStorage/storageAccounts/blobServices; Microsoft.ClassicStorage/storageAccounts/fileServices; Microsoft.ClassicStorage/storageAccounts/metricDefinitions; Microsoft.ClassicStorage/storageAccounts/metrics; Microsoft.ClassicStorage/storageAccounts/queueServices; Microsoft.ClassicStorage/storageAccounts/services; Microsoft.ClassicStorage/storageAccounts/services/diagnosticSettings; Microsoft.ClassicStorage/storageAccounts/services/metricDefinitions; Microsoft.ClassicStorage/storageAccounts/services/metrics; Microsoft.ClassicStorage/storageAccounts/tableServices; Microsoft.ClassicStorage/storageAccounts/vmImages; Microsoft.ClassicStorage/vmImages; Microsoft.ClassicSubscription/operations Default 0 0 0 0 0 none Deny the deployment of classic resources /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deny-classic-resources n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false false Audit VMs that do not use managed disks /providers/microsoft.authorization/policydefinitions/06a78e20-9358-41c9-923c-fb736d382a4d BuiltIn Compute False audit Default 0 1 0 6 0 none Deny virtual machines and virtual machine scale sets that do not use managed disk /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deny-unmanageddisk n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false false Configure Azure Activity logs to stream to specified Log Analytics workspace /providers/microsoft.authorization/policydefinitions/2465583e-4e78-4c15-b6be-a36cbc7c8b0f BuiltIn Monitoring False DeployIfNotExists effect=DeployIfNotExists, logAnalytics=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 1 0 1 0 0 Monitoring Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/dcb59c88-f014-5e17-840c-6c9aecc66286), Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/82f0c3bf-808b-5863-bf9c-231cfbf9598a) Deploy-AzActivity-Log (SPObjId: 217aa040-8eb0-451b-b81c-0b8f3d200d5a) Deploy Diagnostic Settings for Activity Log to Log Analytics workspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-platform-mg false false Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics /providers/microsoft.authorization/policydefinitions/052c180e-287d-44c3-86ef-01aeae2d9774 BuiltIn Network False DeployIfNotExists networkWatcherName=/subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourcegroups/networkwatcherrg/providers/microsoft.network/networkwatchers/networkwatcher_northeurope, networkWatcherRG=networkwatcherrg, retentionDays=1, storageId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.storage/storageaccounts/mibmgmtnetprodeunst01, vnetRegion=northeurope, workspaceRegion=westeurope, workspaceResourceId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 0 0 0 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/71689b0c-ca78-4285-9603-49a5497225d8) 97339ff59e1744678fd92dea (SPObjId: c2b8a553-ec19-42b8-8855-6edc985eaffb) Deploy-TrafficAnalytics-NorthEurope /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/97339ff59e1744678fd92dea n/a 09/04/2025 07:21:45 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 09/04/2025 07:34:08 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-platform-mg false false Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics /providers/microsoft.authorization/policydefinitions/052c180e-287d-44c3-86ef-01aeae2d9774 BuiltIn Network False DeployIfNotExists networkWatcherName=/subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourcegroups/networkwatcherrg/providers/microsoft.network/networkwatchers/networkwatcher_westeurope, networkWatcherRG=networkwatcherrg, retentionDays=1, storageId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.storage/storageaccounts/mibmgmtnetprodeuwst01, vnetRegion=westeurope, workspaceRegion=westeurope, workspaceResourceId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 1 0 1 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/21c0b216-76ff-44ef-9430-19f801e102d5) d33eb38085bf40bd860fe43b (SPObjId: 78dd5b73-2109-4a10-b2e4-6463304b4b4d) Deploy-TrafficAnalytics-WestEurope /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/d33eb38085bf40bd860fe43b n/a 06/12/2025 18:15:24 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 09/04/2025 07:24:28 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-platform-mg false false Do not allow deletion of specified resource and resource type /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/denyaction-deleteresources Custom General true DenyAction effect=DenyAction, resourceName=mibelle-mgmt-log-prod-euw-id-01, resourceType=Microsoft.ManagedIdentity/userAssignedIdentities Default 0 0 0 0 0 none Do not allow deletion of the User Assigned Managed Identity used by AMA /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/denyaction-deleteuamiama n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-platform-mg false false Subnets should be private /providers/microsoft.authorization/policydefinitions/7bca8353-aa3b-429b-904a-9229c4385837 BuiltIn Network False Audit Default 1 0 11 0 0 none Subnets should be private /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enforce-subnet-private n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
   Download CSV semicolon | comma
Inheritance ScopeExcluded PolicySet DisplayName PolicySetId Type Category ALZ Parameters Enforcement NonCompliance Message Policies NonCmplnt Policies Compliant Resources NonCmplnt Resources Compliant Resources Conflicting Role/Assignment Managed Identity Assignment DisplayName AssignmentId AssignedBy CreatedOn CreatedBy UpdatedOn UpdatedBy
inherited mibelle-mg false Audit virtual machines for Trusted Launch support /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/audit-trustedlaunch Custom Trusted Launch true Default 2 0 10 4 0 none Audit virtual machines for Trusted Launch support /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-trustedlaunch n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Unused resources driving cost should be avoided /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/audit-unusedresourcescostoptimization Custom Cost Optimization true EffectDisks=Audit, EffectPublicIpAddresses=Audit, EffectServerFarms=Audit Default 1 2 1 17 0 none Unused resources driving cost should be avoided /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-unusedresources n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Microsoft cloud security benchmark /providers/microsoft.authorization/policysetdefinitions/1f3afdf9-d0c9-4c3d-847f-89da613e70a8 BuiltIn Security Center False Default 43 24 17 4 0 none Enable Monitoring in Microsoft Defender for Cloud /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-asc-monitoring n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Enable audit category group resource logging for supported resources to Log Analytics /providers/microsoft.authorization/policysetdefinitions/f5b29bc4-feca-4cc6-a58a-772dd5e290a5 BuiltIn Monitoring False logAnalytics=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 3 0 6 0 Monitoring Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b922046a-7a3e-59da-a982-8a5b855791ce), Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/9df772a7-1ce7-5439-ab6b-5d31d69925cc) Deploy-Diag-Logs (SPObjId: 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57) Enable allLogs category group resource logging for supported resources to Log Analytics /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud /providers/microsoft.authorization/policysetdefinitions/77b391e3-2d5d-40c3-83bf-65c846b3c6a3 BuiltIn Security Center False Default 0 3 0 1 0 Security Admin (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/d730d560-adce-52b7-b10c-36a8ad16a6d3) Deploy-MDEndpointsAMA (SPObjId: 7d365a6d-a7ae-4921-beca-5ce854a76960) Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-mdendpointsama n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Enforce Azure Compute Security Benchmark compliance auditing /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-acsb Custom Guest Configuration true Default 3 2 6 0 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/6e26cd22-b41b-5611-aafc-e2c56b14c060) Enforce-ACSB (SPObjId: e1f2e80c-5329-4804-824d-f0b44713985e) Enforce Azure Compute Security Baseline compliance auditing /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/enforce-acsb n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-platform-mg false Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-aum-checkupdates Custom Security Center true assessmentMode=AutomaticByPlatform Default 0 2 0 6 0 Virtual Machine Contributor (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/51e23aa4-bdf1-5059-8efc-453852a14d5e), Azure Connected Machine Resource Administrator (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/d72b7c0f-a23a-58ed-8e0a-40f49a5b6ab3), Managed Identity Operator (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/1f97b9d8-3c21-5b8b-9b36-72e77d4a90e0) Enable-AUM-CheckUpdates (SPObjId: ce67e461-e4a3-4514-89cb-7eb8802f8f65) Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines. /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates n/a 06/12/2025 17:56:38 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-platform-mg false Enforce recommended guardrails for Azure Key Vault /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-keyvault Custom Key Vault true Default 0 0 0 0 0 none Enforce recommended guardrails for Azure Key Vault /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enforce-gr-keyvault n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Policy Assignment Limit: 0/200
0 Custom Policy definitions scoped
0 Custom PolicySet definitions scoped
0 Blueprints scoped
   Download CSV semicolon | comma
  *Depending on the number of rows and your computer´s performance the table may respond with delay, download the csv for better filtering experience
Scope Role RoleId Role Type Data Can do Role assignment Identity Displayname Identity SignInName Identity ObjectId Identity Type Applicability Applies through membership Group Details Role AssignmentId Related Policy Assignment CreatedOn CreatedBy
inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/e14ef9ac-25e8-4ee7-887a-a6576bd5229d none 11/28/2025 07:57:36 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Monitoring Contributor 749f88d5-cbae-40b8-bcfc-e573ddc772fa Builtin false False Deploy-AzActivity-Log n/a 217aa040-8eb0-451b-b81c-0b8f3d200d5a SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/dcb59c88-f014-5e17-840c-6c9aecc66286 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log (Configure Azure Activity logs to stream to specified Log Analytics workspace) 06/12/2025 17:56:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Monitoring Contributor 749f88d5-cbae-40b8-bcfc-e573ddc772fa Builtin false False Deploy-Diag-Logs n/a 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b922046a-7a3e-59da-a982-8a5b855791ce /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs (Enable audit category group resource logging for supported resources to Log Analytics) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Log Analytics Contributor 92aaf0da-9dab-42b6-94a3-d43ce8d16293 Builtin false False Deploy-AzActivity-Log n/a 217aa040-8eb0-451b-b81c-0b8f3d200d5a SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/82f0c3bf-808b-5863-bf9c-231cfbf9598a /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log (Configure Azure Activity logs to stream to specified Log Analytics workspace) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Log Analytics Contributor 92aaf0da-9dab-42b6-94a3-d43ce8d16293 Builtin false False Deploy-Diag-Logs n/a 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/9df772a7-1ce7-5439-ab6b-5d31d69925cc /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs (Enable audit category group resource logging for supported resources to Log Analytics) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Meier, Heinz-MIBELLEGROUP heinz.meier@mibelle.net 06addc33-6298-4f01-9f6b-709193f099cc User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Subs-MibelleOnline-SubscriptionOwner n/a 1bdf326c-8c66-4ba9-8c2d-83312a1ddc02 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-Reader n/a 1c529912-c479-41a1-8a03-e57256720fa4 Group direct 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser n/a 1f3ede05-4301-42b1-8c95-2be94290e93c Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Hasanow, Kilian-MIBELLEGROUP kilian.hasanow@mibelle.net 4270eb01-73cf-4e17-925e-47461737b40e User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Mibelle-AzGovWiz-prod n/a 44b03901-55d2-49a8-af3a-58228a81408c SP APP INT indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-michael.peter csa-michael.peter@MIBCloud.mail.onmicrosoft.com 460bad8a-cc4d-41dc-9ddd-f24ba491e2a6 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner n/a 52364002-4a8b-4808-b4fc-864ed5f7d50d Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Matej Paunovski CSA-matej.paunovski@MIBCloud.onmicrosoft.com 54f81d33-50db-475c-b686-4ef70aa0b4fe User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Ouaouane, Taoufik-MIBELLEGROUP taoufik.ouaouane@mibelle.net 7100d1ce-5bd7-449d-abdd-52a7218922b3 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-NetOps n/a 87e9d07b-5340-455c-b297-8bffe3b86f78 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner n/a 9b120856-d4b2-4862-95df-bedf8d5fe1c3 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-Baswaraj Marotrao Ramshette csa-baswarajmarotrao.ramshette@MIBCloud.onmicrosoft.com 9d8d246b-a1f9-4d9a-a54f-f7ae9f3af2ae User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-SecOps n/a abf39027-4cb4-4298-8951-f984eaf9cb8e Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Baumann, Jürg-MIBELLEGROUP juerg.baumann_mibellegroup.com#EXT#@MIBCloud.onmicrosoft.com bb2279b2-06ab-459a-b981-579701601f8a User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin n/a cb058f58-c629-445f-9a10-75f9fcab694e Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Philipp.Schmidt CSA-Philipp.Schmidt@MIBCloud.onmicrosoft.com e40a73c8-6655-434d-8c8b-fdc4d9213499 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Taoufik.Ouaouane csa-Taoufik.Ouaouane@mibelle.net e58ba28f-09ed-49c3-8f5e-31b05c258cde User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Adrian.Bombelka CSA-Adrian.Bombelka@MIBCloud.onmicrosoft.com e86b38a8-e5d4-4888-b09d-390dcf9a2017 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False Enforce-ACSB n/a e1f2e80c-5329-4804-824d-f0b44713985e SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/6e26cd22-b41b-5611-aafc-e2c56b14c060 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/enforce-acsb (Enforce Azure Compute Security Benchmark compliance auditing) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Security Admin fb1c8493-542b-48eb-b624-b4c8fea62acd Builtin false False Deploy-MDEndpointsAMA n/a 7d365a6d-a7ae-4921-beca-5ce854a76960 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/d730d560-adce-52b7-b10c-36a8ad16a6d3 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-mdendpointsama (Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-platform-mg Virtual Machine Contributor 9980e02c-c2be-4d73-94e8-173b1dc7cf3c Builtin false False Enable-AUM-CheckUpdates n/a ce67e461-e4a3-4514-89cb-7eb8802f8f65 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/51e23aa4-bdf1-5059-8efc-453852a14d5e /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates (Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines) 06/12/2025 17:56:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-platform-mg Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False d33eb38085bf40bd860fe43b n/a 78dd5b73-2109-4a10-b2e4-6463304b4b4d SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/21c0b216-76ff-44ef-9430-19f801e102d5 /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/d33eb38085bf40bd860fe43b (Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics) 06/12/2025 18:15:25 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-platform-mg Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False 97339ff59e1744678fd92dea n/a c2b8a553-ec19-42b8-8855-6edc985eaffb SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/71689b0c-ca78-4285-9603-49a5497225d8 /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/97339ff59e1744678fd92dea (Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics) 09/04/2025 07:21:46 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-platform-mg Azure Connected Machine Resource Administrator cd570a14-e51a-42ad-bac8-bafd67325302 Builtin false False Enable-AUM-CheckUpdates n/a ce67e461-e4a3-4514-89cb-7eb8802f8f65 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/d72b7c0f-a23a-58ed-8e0a-40f49a5b6ab3 /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates (Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines) 06/12/2025 17:56:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-platform-mg Managed Identity Operator f1a07417-d97a-45cb-824c-7a7467783830 Builtin false False Enable-AUM-CheckUpdates n/a ce67e461-e4a3-4514-89cb-7eb8802f8f65 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/1f97b9d8-3c21-5b8b-9b36-72e77d4a90e0 /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates (Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines) 06/12/2025 17:56:41 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited Tenant User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false True CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member direct /providers/microsoft.authorization/roleassignments/3f958da1-722a-4c03-8398-aab60735ecd3 none 05/07/2025 18:14:55 ObjectType: User Member, ObjectDisplayName: CSA-Jan.Stutz, ObjectSignInName: CSA-Jan.Stutz@MIBCloud.onmicrosoft.com, ObjectId: 43b3e278-6551-4566-83a8-c19abe643e64
mibelle-connectivity (edfa9f1e-5e4d-4584-ad11-e4aea6b3f880)
Highlight Subscription in HierarchyMap
Subscription Name: mibelle-connectivity
Subscription Id: edfa9f1e-5e4d-4584-ad11-e4aea6b3f880
Subscription Path: a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-connectivity-mg/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880
State: Enabled
QuotaId: PayAsYouGo_2014-09-01
Microsoft Defender for Cloud Secure Score: 39.38% (14.57 of 37 points) Video , Blog , learn
Microsoft Defender for Cloud 'Email notifications' state: n/a
Microsoft Defender for Cloud 'Email notifications' severity: n/a
Microsoft Defender for Cloud 'Email notifications' roles: n/a
Microsoft Defender for Cloud 'Email notifications' emails: n/a
   Download CSV semicolon | comma
Plan Tier
AI Free
Api Free
AppServices Free
Arm Free
CloudPosture Free
ContainerRegistry Free
Containers Free
CosmosDbs Free
Discovery Standard
Dns Free
FoundationalCspm Standard
KeyVaults Free
KubernetesService Free
OpenSourceRelationalDatabases Free
SqlServers Free
SqlServerVirtualMachines Free
StorageAccounts Free
VirtualMachines Free
No Subscription Diagnostic settings learn
0 Subscription Tags
   Resource naming and tagging decision guide learn
   Download CSV semicolon | comma
Scope TagName Count
Resource Environment 1
Resource fastpathenabled 4
Resource InterfaceType 15
Resource provider 18
Resource publisher 18
Resource template 18
No Consumption data available as switch parameter -DoAzureConsumption was not applied
8 Resource Groups | Limit: (8/980)
   Download CSV semicolon | comma
Provider State
Microsoft.Network Registered
microsoft.insights Registered
Microsoft.ResourceHealth Registered
Microsoft.GuestConfiguration Registered
Microsoft.Advisor Registered
Microsoft.Security Registered
Microsoft.Storage Registered
Microsoft.ManagedIdentity Registered
Microsoft.KeyVault Registered
Microsoft.AlertsManagement Registered
Microsoft.Fabric Registered
Microsoft.PolicyInsights Registered
Microsoft.ContainerService Registered
Microsoft.DevTestLab Registered
Microsoft.Capacity Registered
Microsoft.Compute Registered
Microsoft.Quota Registered
ArizeAi.ObservabilityEval NotRegistered
Astronomer.Astro NotRegistered
Dell.Storage NotRegistered
Dynatrace.Observability NotRegistered
GitHub.Network NotRegistered
Informatica.DataManagement NotRegistered
LambdaTest.HyperExecute NotRegistered
Liftrbasic.Samplerp NotRegistered
Microsoft.AAD NotRegistered
Microsoft.AadCustomSecurityAttributesDiagnosticSettings NotRegistered
microsoft.aadiam NotRegistered
Microsoft.Addons NotRegistered
Microsoft.ADHybridHealthService Registered
Microsoft.AgFoodPlatform NotRegistered
Microsoft.AgriculturePlatform NotRegistered
Microsoft.AnalysisServices NotRegistered
Microsoft.ApiCenter NotRegistered
Microsoft.ApiManagement NotRegistered
Microsoft.App NotRegistered
Microsoft.AppAssessment NotRegistered
Microsoft.AppComplianceAutomation NotRegistered
Microsoft.AppConfiguration NotRegistered
Microsoft.ApplicationMigration NotRegistered
Microsoft.AppLink NotRegistered
Microsoft.AppPlatform NotRegistered
Microsoft.ArcContainerStorage NotRegistered
Microsoft.Attestation NotRegistered
Microsoft.Authorization Registered
Microsoft.Automanage NotRegistered
Microsoft.Automation NotRegistered
Microsoft.AVS NotRegistered
Microsoft.AwsConnector NotRegistered
Microsoft.AzureActiveDirectory NotRegistered
Microsoft.AzureArcData NotRegistered
Microsoft.AzureBusinessContinuity NotRegistered
Microsoft.AzureDataTransfer NotRegistered
Microsoft.AzureFleet NotRegistered
Microsoft.AzureImageTestingForLinux NotRegistered
Microsoft.AzureLargeInstance NotRegistered
Microsoft.AzurePlaywrightService NotRegistered
Microsoft.AzureResilienceManagement NotRegistered
Microsoft.AzureScan NotRegistered
Microsoft.AzureSphere NotRegistered
Microsoft.AzureStack NotRegistered
Microsoft.AzureStackHCI NotRegistered
Microsoft.AzureTerraform NotRegistered
Microsoft.BackupSolutions NotRegistered
Microsoft.BareMetal NotRegistered
Microsoft.BareMetalInfrastructure NotRegistered
Microsoft.Batch NotRegistered
Microsoft.Billing Registered
Microsoft.BillingBenefits NotRegistered
Microsoft.Bing NotRegistered
Microsoft.BlockchainTokens NotRegistered
Microsoft.Blueprint NotRegistered
Microsoft.BotService NotRegistered
Microsoft.Cache NotRegistered
Microsoft.Carbon NotRegistered
Microsoft.Cdn NotRegistered
Microsoft.CertificateRegistration NotRegistered
Microsoft.ChangeSafety Registered
Microsoft.Chaos NotRegistered
Microsoft.ClassicCompute NotRegistered
Microsoft.ClassicInfrastructureMigrate NotRegistered
Microsoft.ClassicNetwork NotRegistered
Microsoft.ClassicStorage NotRegistered
Microsoft.ClassicSubscription Registered
Microsoft.CleanRoom NotRegistered
Microsoft.CloudDevicePlatform NotRegistered
Microsoft.CloudHealth NotRegistered
Microsoft.CloudShell NotRegistered
Microsoft.CloudTest NotRegistered
Microsoft.CodeSigning NotRegistered
Microsoft.CognitiveServices NotRegistered
Microsoft.Commerce Registered
Microsoft.Communication NotRegistered
Microsoft.Community NotRegistered
Microsoft.ComputeLimit NotRegistered
Microsoft.ComputeSchedule NotRegistered
Microsoft.ConfidentialLedger NotRegistered
Microsoft.Confluent NotRegistered
Microsoft.ConnectedCache NotRegistered
Microsoft.ConnectedCredentials NotRegistered
microsoft.connectedopenstack NotRegistered
Microsoft.ConnectedVehicle NotRegistered
Microsoft.ConnectedVMwarevSphere NotRegistered
Microsoft.Consumption Registered
Microsoft.ContainerInstance NotRegistered
Microsoft.ContainerRegistry NotRegistered
Microsoft.CostManagement Registered
Microsoft.CostManagementExports NotRegistered
Microsoft.CustomerLockbox NotRegistered
Microsoft.CustomProviders NotRegistered
Microsoft.D365CustomerInsights NotRegistered
Microsoft.Dashboard NotRegistered
Microsoft.DatabaseFleetManager NotRegistered
Microsoft.DatabaseWatcher NotRegistered
Microsoft.DataBox NotRegistered
Microsoft.DataBoxEdge NotRegistered
Microsoft.Databricks NotRegistered
Microsoft.Datadog NotRegistered
Microsoft.DataFactory NotRegistered
Microsoft.DataLakeAnalytics NotRegistered
Microsoft.DataLakeStore NotRegistered
Microsoft.DataMigration NotRegistered
Microsoft.DataProtection NotRegistered
Microsoft.DataReplication NotRegistered
Microsoft.DataShare NotRegistered
Microsoft.DBforMariaDB NotRegistered
Microsoft.DBforMySQL NotRegistered
Microsoft.DBforPostgreSQL NotRegistered
Microsoft.DependencyMap NotRegistered
Microsoft.DesktopVirtualization NotRegistered
Microsoft.DevCenter NotRegistered
Microsoft.DevelopmentWindows365 NotRegistered
Microsoft.DevHub NotRegistered
Microsoft.DeviceOnboarding NotRegistered
Microsoft.DeviceRegistry NotRegistered
Microsoft.Devices NotRegistered
Microsoft.DeviceUpdate NotRegistered
Microsoft.DevOpsInfrastructure NotRegistered
Microsoft.DigitalTwins NotRegistered
Microsoft.Discovery NotRegistered
Microsoft.DocumentDB NotRegistered
Microsoft.DomainRegistration NotRegistered
Microsoft.DurableTask NotRegistered
Microsoft.Easm NotRegistered
Microsoft.Edge NotRegistered
Microsoft.EdgeManagement NotRegistered
Microsoft.EdgeMarketplace NotRegistered
Microsoft.EdgeOrder NotRegistered
Microsoft.EdgeOrderPartner NotRegistered
Microsoft.EdgeZones NotRegistered
Microsoft.Elastic NotRegistered
Microsoft.ElasticSan NotRegistered
Microsoft.EnterpriseSupport NotRegistered
Microsoft.EntitlementManagement NotRegistered
Microsoft.EntraIDGovernance NotRegistered
Microsoft.EntraIdGovernanceAccelerator NotRegistered
Microsoft.ErrorAtlas NotRegistered
Microsoft.EventGrid NotRegistered
Microsoft.EventHub NotRegistered
Microsoft.Experimentation NotRegistered
Microsoft.ExtendedLocation NotRegistered
Microsoft.Features Registered
Microsoft.FileShares NotRegistered
Microsoft.FluidRelay NotRegistered
Microsoft.GCPConnector NotRegistered
Microsoft.GraphServices NotRegistered
Microsoft.HanaOnAzure NotRegistered
Microsoft.HardwareSecurityModules NotRegistered
Microsoft.HDInsight NotRegistered
Microsoft.HealthBot NotRegistered
Microsoft.HealthcareApis NotRegistered
Microsoft.HealthcareInterop NotRegistered
Microsoft.HealthDataAIServices NotRegistered
Microsoft.HealthModel NotRegistered
Microsoft.HealthPlatform NotRegistered
Microsoft.Help NotRegistered
Microsoft.HybridCloud NotRegistered
Microsoft.HybridCompute NotRegistered
Microsoft.HybridConnectivity NotRegistered
Microsoft.HybridContainerService NotRegistered
Microsoft.HybridNetwork NotRegistered
Microsoft.Impact NotRegistered
Microsoft.IntegrationSpaces NotRegistered
Microsoft.IoTCentral NotRegistered
Microsoft.IoTFirmwareDefense NotRegistered
Microsoft.IoTOperations NotRegistered
Microsoft.IoTOperationsDataProcessor NotRegistered
Microsoft.IoTSecurity NotRegistered
Microsoft.Kubernetes NotRegistered
Microsoft.KubernetesConfiguration NotRegistered
Microsoft.KubernetesRuntime NotRegistered
Microsoft.Kusto NotRegistered
Microsoft.LabServices NotRegistered
Microsoft.LoadTestService NotRegistered
Microsoft.Logic NotRegistered
Microsoft.MachineLearningServices NotRegistered
Microsoft.Maintenance NotRegistered
Microsoft.ManagedNetworkFabric NotRegistered
Microsoft.ManagedServices NotRegistered
Microsoft.Management NotRegistered
Microsoft.Maps NotRegistered
Microsoft.Marketplace NotRegistered
Microsoft.MarketplaceOrdering Registered
Microsoft.MessagingCatalog NotRegistered
Microsoft.MessagingConnectors NotRegistered
Microsoft.Migrate NotRegistered
Microsoft.Mission NotRegistered
Microsoft.Monitor NotRegistered
Microsoft.MySQLDiscovery NotRegistered
Microsoft.NetApp NotRegistered
Microsoft.NetworkCloud NotRegistered
Microsoft.NetworkFunction NotRegistered
Microsoft.NexusIdentity NotRegistered
Microsoft.NotificationHubs NotRegistered
Microsoft.Nutanix NotRegistered
Microsoft.ObjectStore NotRegistered
Microsoft.OffAzure NotRegistered
Microsoft.OffAzureSpringBoot NotRegistered
Microsoft.OnlineExperimentation NotRegistered
Microsoft.OpenEnergyPlatform NotRegistered
Microsoft.OperationalInsights NotRegistered
Microsoft.OperationsManagement NotRegistered
Microsoft.OperatorVoicemail NotRegistered
Microsoft.OracleDiscovery NotRegistered
Microsoft.Orbital NotRegistered
Microsoft.PartnerManagedConsumerRecurrence NotRegistered
Microsoft.Peering NotRegistered
Microsoft.Pki NotRegistered
Microsoft.Portal Registered
Microsoft.PortalServices NotRegistered
Microsoft.PowerBI NotRegistered
Microsoft.PowerBIDedicated NotRegistered
Microsoft.PowerPlatform NotRegistered
Microsoft.Premonition NotRegistered
Microsoft.ProfessionalService NotRegistered
Microsoft.ProviderHub NotRegistered
Microsoft.Purview NotRegistered
Microsoft.Quantum NotRegistered
Microsoft.RecommendationsService NotRegistered
Microsoft.RecoveryServices NotRegistered
Microsoft.RedHatOpenShift NotRegistered
Microsoft.Relationships NotRegistered
Microsoft.Relay NotRegistered
Microsoft.ResourceBuilder NotRegistered
Microsoft.ResourceConnector NotRegistered
Microsoft.ResourceGraph Registered
Microsoft.ResourceIntelligence Registered
Microsoft.ResourceNotifications Registered
Microsoft.Resources Registered
Microsoft.SaaS NotRegistered
Microsoft.SaaSHub NotRegistered
Microsoft.Scom NotRegistered
Microsoft.SCVMM NotRegistered
Microsoft.Search NotRegistered
Microsoft.SecretSyncController NotRegistered
Microsoft.SecurityCopilot NotRegistered
Microsoft.SecurityDetonation NotRegistered
Microsoft.SecurityInsights NotRegistered
Microsoft.SecurityPlatform NotRegistered
Microsoft.SentinelPlatformServices NotRegistered
Microsoft.SerialConsole Registered
Microsoft.ServiceBus NotRegistered
Microsoft.ServiceFabric NotRegistered
Microsoft.ServiceFabricMesh NotRegistered
Microsoft.ServiceLinker NotRegistered
Microsoft.ServiceNetworking NotRegistered
Microsoft.ServicesHub NotRegistered
Microsoft.SignalRService NotRegistered
Microsoft.Singularity NotRegistered
Microsoft.SoftwarePlan NotRegistered
Microsoft.Solutions NotRegistered
Microsoft.Sovereign NotRegistered
Microsoft.Sql NotRegistered
Microsoft.SqlVirtualMachine NotRegistered
Microsoft.StandbyPool NotRegistered
Microsoft.StorageActions NotRegistered
Microsoft.StorageCache NotRegistered
Microsoft.StorageDiscovery NotRegistered
Microsoft.StorageMover NotRegistered
Microsoft.StorageSync NotRegistered
Microsoft.StorageTasks NotRegistered
Microsoft.StreamAnalytics NotRegistered
Microsoft.Subscription NotRegistered
Microsoft.SupercomputerInfrastructure NotRegistered
microsoft.support Registered
Microsoft.SustainabilityServices NotRegistered
Microsoft.Synapse NotRegistered
Microsoft.Syntex NotRegistered
Microsoft.ToolchainOrchestrator NotRegistered
Microsoft.UpdateManager NotRegistered
Microsoft.UsageBilling NotRegistered
Microsoft.Validate NotRegistered
Microsoft.VerifiedId NotRegistered
Microsoft.VideoIndexer NotRegistered
Microsoft.VirtualMachineImages NotRegistered
microsoft.visualstudio NotRegistered
Microsoft.VMware NotRegistered
Microsoft.VoiceServices NotRegistered
Microsoft.Web NotRegistered
Microsoft.WeightsAndBiases NotRegistered
Microsoft.Windows365 NotRegistered
Microsoft.WindowsPushNotificationServices NotRegistered
Microsoft.WorkloadBuilder NotRegistered
Microsoft.Workloads NotRegistered
MongoDB.Atlas NotRegistered
Neon.Postgres NotRegistered
NewRelic.Observability NotRegistered
NGINX.NGINXPLUS NotRegistered
Oracle.Database NotRegistered
PaloAltoNetworks.Cloudngfw NotRegistered
Pinecone.VectorDb NotRegistered
PureStorage.Block NotRegistered
Qumulo.Storage NotRegistered
0 enabled Subscription Features learn
   Considerations before applying locks learn
Lock scope Lock type presence
SubscriptionCannotDelete0
SubscriptionReadOnly0
ResourceGroupCannotDelete1
ResourceGroupReadOnly0
ResourceCannotDelete0
ResourceReadOnly0
   Download CSV semicolon | comma
ResourceType Location Count
microsoft.compute/availabilitysets westeurope 2
microsoft.compute/disks westeurope 8
microsoft.compute/sshpublickeys westeurope 1
microsoft.compute/virtualmachines westeurope 6
microsoft.compute/virtualmachines/extensions westeurope 5
microsoft.devtestlab/schedules westeurope 1
microsoft.keyvault/vaults westeurope 1
microsoft.network/applicationsecuritygroups westeurope 2
microsoft.network/bastionhosts westeurope 1
microsoft.network/dnszones global 19
microsoft.network/loadbalancers westeurope 1
microsoft.network/networkinterfaces westeurope 15
microsoft.network/networksecuritygroups westeurope 3
microsoft.network/networkwatchers northeurope 1
microsoft.network/networkwatchers westeurope 1
microsoft.network/networkwatchers/flowlogs westeurope 1
microsoft.network/publicipaddresses westeurope 4
microsoft.network/routetables westeurope 2
microsoft.network/virtualhubs westeurope 1
microsoft.network/virtualnetworks westeurope 1
microsoft.storage/storageaccounts westeurope 3
   CAF - Recommended abbreviations for Azure resource types learn
   Resource details can be found in the CSV output *_ResourcesAll.csv
   Download CSV semicolon | comma
ResourceType Recommendation ResourceFriendlyName passed failed passed percentage
microsoft.compute/availabilitysets avail- Availability set 0 2 0%
microsoft.compute/disks disk, osdisk Managed disk (data), Managed disk (OS) 0 8 0%
microsoft.compute/virtualmachines vm Virtual machine 0 6 0%
microsoft.keyvault/vaults kv- Key vault 0 1 0%
microsoft.network/applicationsecuritygroups asg- Application security group (ASG) 0 2 0%
microsoft.network/bastionhosts bas- Bastion 0 1 0%
microsoft.network/dnszones dnsz- DNS 0 19 0%
microsoft.network/loadbalancers lbe-, lbi- Load balancer (external), Load balancer (internal) 0 1 0%
microsoft.network/networkinterfaces nic- Network interface (NIC) 0 15 0%
microsoft.network/networksecuritygroups nsg- Network security group (NSG) 0 3 0%
microsoft.network/networkwatchers nw- Network Watcher 0 2 0%
microsoft.network/publicipaddresses pip- Public IP address 0 4 0%
microsoft.network/routetables rt- Route table 0 2 0%
microsoft.network/virtualnetworks vnet- Virtual network 0 1 0%
microsoft.storage/storageaccounts st, stvm Storage account, VM storage account 0 3 0%
   'Azure Orphan Resources' ARG queries and workbooks GitHub
   Resource details can be found in the CSV output *_ResourcesCostOptimizationAndCleanup.csv
   Download CSV semicolon | comma
ResourceType Resource count Intent Cost Currency
microsoft.network/publicipaddresses 1 cost savings use parameter -DoAzureConsumption to show potential savings
   Download CSV semicolon | comma
ResourceType Resource Count Diagnostics capable Metrics Logs LogCategories
microsoft.compute/availabilitysets 2 False False False
microsoft.compute/disks 8 True True False
microsoft.compute/sshpublickeys 1 False False False
microsoft.compute/virtualmachines 6 True True False
microsoft.compute/virtualmachines/extensions 5 False False False
microsoft.devtestlab/schedules 1 False False False
microsoft.keyvault/vaults 1 True True True AuditEvent, AzurePolicyEvaluationDetails
microsoft.network/applicationsecuritygroups 2 False False False
microsoft.network/bastionhosts 1 True True True BastionAuditLogs
microsoft.network/dnszones 19 True True False
microsoft.network/loadbalancers 1 True True True LoadBalancerHealthEvent
microsoft.network/networkinterfaces 15 True True False
microsoft.network/networksecuritygroups 3 True False True NetworkSecurityGroupEvent, NetworkSecurityGroupRuleCounter
microsoft.network/networkwatchers 2 False False False
microsoft.network/networkwatchers/flowlogs 1 False False False
microsoft.network/publicipaddresses 4 True True True DDoSProtectionNotifications, DDoSMitigationFlowLogs, DDoSMitigationReports
microsoft.network/routetables 2 False False False
microsoft.network/virtualhubs 1 True True False
microsoft.network/virtualnetworks 1 True True True VMProtectionAlerts
microsoft.storage/storageaccounts 3 True True False
No UserAssigned Managed Identities assigned to Resources / vice versa - at all
PSRule for Azure - integration paused - PSRule for Azure
   Download CSV semicolon | comma
  *Depending on the number of rows and your computer´s performance the table may respond with delay, download the csv for better filtering experience
Inheritance ScopeExcluded Exemption applies Policy DisplayName PolicyId Type Category ALZ Effect Parameters Enforcement NonCompliance Message Policies NonCmplnt Policies Compliant Resources NonCmplnt Resources Compliant Resources Conflicting Role/Assignment Managed Identity Assignment DisplayName AssignmentId AssignedBy CreatedOn CreatedBy UpdatedOn UpdatedBy
inherited mibelle-mg false false Audit resource location matches resource group location /providers/microsoft.authorization/policydefinitions/0a914e76-4921-4c19-b460-a2d36003525a BuiltIn General False audit Default 1 0 1 77 0 none Audit that the resource location matches its resource group location /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-location-match n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false false Not allowed resource types /providers/microsoft.authorization/policydefinitions/6c112d4e-5bc7-47ae-a041-ea2d9dccd749 BuiltIn General False Deny effect=Deny, listOfResourceTypesNotAllowed=Microsoft.ClassicCompute/capabilities; Microsoft.ClassicCompute/checkDomainNameAvailability; Microsoft.ClassicCompute/domainNames; Microsoft.ClassicCompute/domainNames/capabilities; Microsoft.ClassicCompute/domainNames/internalLoadBalancers; Microsoft.ClassicCompute/domainNames/serviceCertificates; Microsoft.ClassicCompute/domainNames/slots; Microsoft.ClassicCompute/domainNames/slots/roles; Microsoft.ClassicCompute/domainNames/slots/roles/metricDefinitions; Microsoft.ClassicCompute/domainNames/slots/roles/metrics; Microsoft.ClassicCompute/moveSubscriptionResources; Microsoft.ClassicCompute/operatingSystemFamilies; Microsoft.ClassicCompute/operatingSystems; Microsoft.ClassicCompute/operations; Microsoft.ClassicCompute/operationStatuses; Microsoft.ClassicCompute/quotas; Microsoft.ClassicCompute/resourceTypes; Microsoft.ClassicCompute/validateSubscriptionMoveAvailability; Microsoft.ClassicCompute/virtualMachines; Microsoft.ClassicCompute/virtualMachines/diagnosticSettings; Microsoft.ClassicCompute/virtualMachines/metricDefinitions; Microsoft.ClassicCompute/virtualMachines/metrics; Microsoft.ClassicInfrastructureMigrate/classicInfrastructureResources; Microsoft.ClassicNetwork/capabilities; Microsoft.ClassicNetwork/expressRouteCrossConnections; Microsoft.ClassicNetwork/expressRouteCrossConnections/peerings; Microsoft.ClassicNetwork/gatewaySupportedDevices; Microsoft.ClassicNetwork/networkSecurityGroups; Microsoft.ClassicNetwork/operations; Microsoft.ClassicNetwork/quotas; Microsoft.ClassicNetwork/reservedIps; Microsoft.ClassicNetwork/virtualNetworks; Microsoft.ClassicNetwork/virtualNetworks/remoteVirtualNetworkPeeringProxies; Microsoft.ClassicNetwork/virtualNetworks/virtualNetworkPeerings; Microsoft.ClassicStorage/capabilities; Microsoft.ClassicStorage/checkStorageAccountAvailability; Microsoft.ClassicStorage/disks; Microsoft.ClassicStorage/images; Microsoft.ClassicStorage/operations; Microsoft.ClassicStorage/osImages; Microsoft.ClassicStorage/osPlatformImages; Microsoft.ClassicStorage/publicImages; Microsoft.ClassicStorage/quotas; Microsoft.ClassicStorage/storageAccounts; Microsoft.ClassicStorage/storageAccounts/blobServices; Microsoft.ClassicStorage/storageAccounts/fileServices; Microsoft.ClassicStorage/storageAccounts/metricDefinitions; Microsoft.ClassicStorage/storageAccounts/metrics; Microsoft.ClassicStorage/storageAccounts/queueServices; Microsoft.ClassicStorage/storageAccounts/services; Microsoft.ClassicStorage/storageAccounts/services/diagnosticSettings; Microsoft.ClassicStorage/storageAccounts/services/metricDefinitions; Microsoft.ClassicStorage/storageAccounts/services/metrics; Microsoft.ClassicStorage/storageAccounts/tableServices; Microsoft.ClassicStorage/storageAccounts/vmImages; Microsoft.ClassicStorage/vmImages; Microsoft.ClassicSubscription/operations Default 0 0 0 0 0 none Deny the deployment of classic resources /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deny-classic-resources n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false false Audit VMs that do not use managed disks /providers/microsoft.authorization/policydefinitions/06a78e20-9358-41c9-923c-fb736d382a4d BuiltIn Compute False audit Default 0 1 0 6 0 none Deny virtual machines and virtual machine scale sets that do not use managed disk /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deny-unmanageddisk n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false false Configure Azure Activity logs to stream to specified Log Analytics workspace /providers/microsoft.authorization/policydefinitions/2465583e-4e78-4c15-b6be-a36cbc7c8b0f BuiltIn Monitoring False DeployIfNotExists effect=DeployIfNotExists, logAnalytics=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 1 0 1 0 0 Monitoring Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/dcb59c88-f014-5e17-840c-6c9aecc66286), Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/82f0c3bf-808b-5863-bf9c-231cfbf9598a) Deploy-AzActivity-Log (SPObjId: 217aa040-8eb0-451b-b81c-0b8f3d200d5a) Deploy Diagnostic Settings for Activity Log to Log Analytics workspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-platform-mg false false Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics /providers/microsoft.authorization/policydefinitions/052c180e-287d-44c3-86ef-01aeae2d9774 BuiltIn Network False DeployIfNotExists networkWatcherName=/subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourcegroups/networkwatcherrg/providers/microsoft.network/networkwatchers/networkwatcher_northeurope, networkWatcherRG=networkwatcherrg, retentionDays=1, storageId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.storage/storageaccounts/mibmgmtnetprodeunst01, vnetRegion=northeurope, workspaceRegion=westeurope, workspaceResourceId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 0 0 0 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/71689b0c-ca78-4285-9603-49a5497225d8) 97339ff59e1744678fd92dea (SPObjId: c2b8a553-ec19-42b8-8855-6edc985eaffb) Deploy-TrafficAnalytics-NorthEurope /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/97339ff59e1744678fd92dea n/a 09/04/2025 07:21:45 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 09/04/2025 07:34:08 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-platform-mg false false Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics /providers/microsoft.authorization/policydefinitions/052c180e-287d-44c3-86ef-01aeae2d9774 BuiltIn Network False DeployIfNotExists networkWatcherName=/subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourcegroups/networkwatcherrg/providers/microsoft.network/networkwatchers/networkwatcher_westeurope, networkWatcherRG=networkwatcherrg, retentionDays=1, storageId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.storage/storageaccounts/mibmgmtnetprodeuwst01, vnetRegion=westeurope, workspaceRegion=westeurope, workspaceResourceId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 1 0 1 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/21c0b216-76ff-44ef-9430-19f801e102d5) d33eb38085bf40bd860fe43b (SPObjId: 78dd5b73-2109-4a10-b2e4-6463304b4b4d) Deploy-TrafficAnalytics-WestEurope /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/d33eb38085bf40bd860fe43b n/a 06/12/2025 18:15:24 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 09/04/2025 07:24:28 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-platform-mg false false Do not allow deletion of specified resource and resource type /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/denyaction-deleteresources Custom General true DenyAction effect=DenyAction, resourceName=mibelle-mgmt-log-prod-euw-id-01, resourceType=Microsoft.ManagedIdentity/userAssignedIdentities Default 0 0 0 0 0 none Do not allow deletion of the User Assigned Managed Identity used by AMA /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/denyaction-deleteuamiama n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-platform-mg false false Subnets should be private /providers/microsoft.authorization/policydefinitions/7bca8353-aa3b-429b-904a-9229c4385837 BuiltIn Network False Audit Default 1 0 11 0 0 none Subnets should be private /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enforce-subnet-private n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
   Download CSV semicolon | comma
Inheritance ScopeExcluded PolicySet DisplayName PolicySetId Type Category ALZ Parameters Enforcement NonCompliance Message Policies NonCmplnt Policies Compliant Resources NonCmplnt Resources Compliant Resources Conflicting Role/Assignment Managed Identity Assignment DisplayName AssignmentId AssignedBy CreatedOn CreatedBy UpdatedOn UpdatedBy
inherited mibelle-mg false Audit virtual machines for Trusted Launch support /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/audit-trustedlaunch Custom Trusted Launch true Default 2 0 10 4 0 none Audit virtual machines for Trusted Launch support /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-trustedlaunch n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Unused resources driving cost should be avoided /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/audit-unusedresourcescostoptimization Custom Cost Optimization true EffectDisks=Audit, EffectPublicIpAddresses=Audit, EffectServerFarms=Audit Default 1 2 1 17 0 none Unused resources driving cost should be avoided /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-unusedresources n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Microsoft cloud security benchmark /providers/microsoft.authorization/policysetdefinitions/1f3afdf9-d0c9-4c3d-847f-89da613e70a8 BuiltIn Security Center False Default 43 24 17 4 0 none Enable Monitoring in Microsoft Defender for Cloud /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-asc-monitoring n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Enable audit category group resource logging for supported resources to Log Analytics /providers/microsoft.authorization/policysetdefinitions/f5b29bc4-feca-4cc6-a58a-772dd5e290a5 BuiltIn Monitoring False logAnalytics=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 3 0 6 0 Monitoring Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b922046a-7a3e-59da-a982-8a5b855791ce), Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/9df772a7-1ce7-5439-ab6b-5d31d69925cc) Deploy-Diag-Logs (SPObjId: 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57) Enable allLogs category group resource logging for supported resources to Log Analytics /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud /providers/microsoft.authorization/policysetdefinitions/77b391e3-2d5d-40c3-83bf-65c846b3c6a3 BuiltIn Security Center False Default 0 3 0 1 0 Security Admin (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/d730d560-adce-52b7-b10c-36a8ad16a6d3) Deploy-MDEndpointsAMA (SPObjId: 7d365a6d-a7ae-4921-beca-5ce854a76960) Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-mdendpointsama n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Enforce Azure Compute Security Benchmark compliance auditing /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-acsb Custom Guest Configuration true Default 3 2 6 0 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/6e26cd22-b41b-5611-aafc-e2c56b14c060) Enforce-ACSB (SPObjId: e1f2e80c-5329-4804-824d-f0b44713985e) Enforce Azure Compute Security Baseline compliance auditing /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/enforce-acsb n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-platform-mg false Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-aum-checkupdates Custom Security Center true assessmentMode=AutomaticByPlatform Default 0 2 0 6 0 Virtual Machine Contributor (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/51e23aa4-bdf1-5059-8efc-453852a14d5e), Azure Connected Machine Resource Administrator (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/d72b7c0f-a23a-58ed-8e0a-40f49a5b6ab3), Managed Identity Operator (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/1f97b9d8-3c21-5b8b-9b36-72e77d4a90e0) Enable-AUM-CheckUpdates (SPObjId: ce67e461-e4a3-4514-89cb-7eb8802f8f65) Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines. /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates n/a 06/12/2025 17:56:38 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-platform-mg false Enforce recommended guardrails for Azure Key Vault /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-keyvault Custom Key Vault true Default 0 0 0 0 0 none Enforce recommended guardrails for Azure Key Vault /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enforce-gr-keyvault n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Policy Assignment Limit: 0/200
0 Custom Policy definitions scoped
0 Custom PolicySet definitions scoped
0 Blueprints assigned
0 Blueprints scoped
No Classic Administrators
   Download CSV semicolon | comma
  *Depending on the number of rows and your computer´s performance the table may respond with delay, download the csv for better filtering experience
Scope Role RoleId Role Type Data Can do Role assignment Identity Displayname Identity SignInName Identity ObjectId Identity Type Applicability Applies through membership Group Details Role AssignmentId Related Policy Assignment CreatedOn CreatedBy
inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78)
inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/e14ef9ac-25e8-4ee7-887a-a6576bd5229d none 11/28/2025 07:57:36 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78)
inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78)
inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78)
inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False SGU-MIB-RES-Azure-Magr-Mibelle-NetOps 87e9d07b-5340-455c-b297-8bffe3b86f78 Group direct
inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78)
inherited mibelle-mg [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e)
inherited mibelle-mg [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e)
inherited mibelle-mg [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e)
inherited mibelle-mg [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False SGU-MIB-RES-Azure-Magr-Mibelle-SecOps abf39027-4cb4-4298-8951-f984eaf9cb8e Group direct
inherited mibelle-mg Monitoring Contributor 749f88d5-cbae-40b8-bcfc-e573ddc772fa Builtin false False Deploy-AzActivity-Log n/a 217aa040-8eb0-451b-b81c-0b8f3d200d5a SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/dcb59c88-f014-5e17-840c-6c9aecc66286 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log (Configure Azure Activity logs to stream to specified Log Analytics workspace) 06/12/2025 17:56:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Monitoring Contributor 749f88d5-cbae-40b8-bcfc-e573ddc772fa Builtin false False Deploy-Diag-Logs n/a 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b922046a-7a3e-59da-a982-8a5b855791ce /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs (Enable audit category group resource logging for supported resources to Log Analytics) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Log Analytics Contributor 92aaf0da-9dab-42b6-94a3-d43ce8d16293 Builtin false False Deploy-AzActivity-Log n/a 217aa040-8eb0-451b-b81c-0b8f3d200d5a SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/82f0c3bf-808b-5863-bf9c-231cfbf9598a /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log (Configure Azure Activity logs to stream to specified Log Analytics workspace) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Log Analytics Contributor 92aaf0da-9dab-42b6-94a3-d43ce8d16293 Builtin false False Deploy-Diag-Logs n/a 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/9df772a7-1ce7-5439-ab6b-5d31d69925cc /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs (Enable audit category group resource logging for supported resources to Log Analytics) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Meier, Heinz-MIBELLEGROUP heinz.meier@mibelle.net 06addc33-6298-4f01-9f6b-709193f099cc User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Subs-MibelleOnline-SubscriptionOwner n/a 1bdf326c-8c66-4ba9-8c2d-83312a1ddc02 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-Reader n/a 1c529912-c479-41a1-8a03-e57256720fa4 Group direct 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser n/a 1f3ede05-4301-42b1-8c95-2be94290e93c Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Hasanow, Kilian-MIBELLEGROUP kilian.hasanow@mibelle.net 4270eb01-73cf-4e17-925e-47461737b40e User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Mibelle-AzGovWiz-prod n/a 44b03901-55d2-49a8-af3a-58228a81408c SP APP INT indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-michael.peter csa-michael.peter@MIBCloud.mail.onmicrosoft.com 460bad8a-cc4d-41dc-9ddd-f24ba491e2a6 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner n/a 52364002-4a8b-4808-b4fc-864ed5f7d50d Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Matej Paunovski CSA-matej.paunovski@MIBCloud.onmicrosoft.com 54f81d33-50db-475c-b686-4ef70aa0b4fe User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Ouaouane, Taoufik-MIBELLEGROUP taoufik.ouaouane@mibelle.net 7100d1ce-5bd7-449d-abdd-52a7218922b3 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-NetOps n/a 87e9d07b-5340-455c-b297-8bffe3b86f78 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner n/a 9b120856-d4b2-4862-95df-bedf8d5fe1c3 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-Baswaraj Marotrao Ramshette csa-baswarajmarotrao.ramshette@MIBCloud.onmicrosoft.com 9d8d246b-a1f9-4d9a-a54f-f7ae9f3af2ae User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-SecOps n/a abf39027-4cb4-4298-8951-f984eaf9cb8e Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Baumann, Jürg-MIBELLEGROUP juerg.baumann_mibellegroup.com#EXT#@MIBCloud.onmicrosoft.com bb2279b2-06ab-459a-b981-579701601f8a User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin n/a cb058f58-c629-445f-9a10-75f9fcab694e Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Philipp.Schmidt CSA-Philipp.Schmidt@MIBCloud.onmicrosoft.com e40a73c8-6655-434d-8c8b-fdc4d9213499 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Taoufik.Ouaouane csa-Taoufik.Ouaouane@mibelle.net e58ba28f-09ed-49c3-8f5e-31b05c258cde User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Adrian.Bombelka CSA-Adrian.Bombelka@MIBCloud.onmicrosoft.com e86b38a8-e5d4-4888-b09d-390dcf9a2017 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False Enforce-ACSB n/a e1f2e80c-5329-4804-824d-f0b44713985e SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/6e26cd22-b41b-5611-aafc-e2c56b14c060 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/enforce-acsb (Enforce Azure Compute Security Benchmark compliance auditing) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Security Admin fb1c8493-542b-48eb-b624-b4c8fea62acd Builtin false False Deploy-MDEndpointsAMA n/a 7d365a6d-a7ae-4921-beca-5ce854a76960 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/d730d560-adce-52b7-b10c-36a8ad16a6d3 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-mdendpointsama (Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Reservation Purchaser f7b75c60-3036-4b75-91c3-6b41c27c1689 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser 1f3ede05-4301-42b1-8c95-2be94290e93c Group direct
inherited mibelle-mg Reservation Purchaser f7b75c60-3036-4b75-91c3-6b41c27c1689 Builtin false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser (1f3ede05-4301-42b1-8c95-2be94290e93c)
inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e)
inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e)
inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e)
inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin cb058f58-c629-445f-9a10-75f9fcab694e Group direct
inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e)
inherited mibelle-platform-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3)
inherited mibelle-platform-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3)
inherited mibelle-platform-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3)
inherited mibelle-platform-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3)
inherited mibelle-platform-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner 9b120856-d4b2-4862-95df-bedf8d5fe1c3 Group direct
inherited mibelle-platform-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3)
inherited mibelle-platform-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False CSA-Philipp.Schmidt CSA-Philipp.Schmidt@MIBCloud.onmicrosoft.com e40a73c8-6655-434d-8c8b-fdc4d9213499 User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3)
inherited mibelle-platform-mg Virtual Machine Contributor 9980e02c-c2be-4d73-94e8-173b1dc7cf3c Builtin false False Enable-AUM-CheckUpdates n/a ce67e461-e4a3-4514-89cb-7eb8802f8f65 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/51e23aa4-bdf1-5059-8efc-453852a14d5e /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates (Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines) 06/12/2025 17:56:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-platform-mg Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False d33eb38085bf40bd860fe43b n/a 78dd5b73-2109-4a10-b2e4-6463304b4b4d SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/21c0b216-76ff-44ef-9430-19f801e102d5 /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/d33eb38085bf40bd860fe43b (Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics) 06/12/2025 18:15:25 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-platform-mg Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False 97339ff59e1744678fd92dea n/a c2b8a553-ec19-42b8-8855-6edc985eaffb SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/71689b0c-ca78-4285-9603-49a5497225d8 /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/97339ff59e1744678fd92dea (Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics) 09/04/2025 07:21:46 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-platform-mg Azure Connected Machine Resource Administrator cd570a14-e51a-42ad-bac8-bafd67325302 Builtin false False Enable-AUM-CheckUpdates n/a ce67e461-e4a3-4514-89cb-7eb8802f8f65 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/d72b7c0f-a23a-58ed-8e0a-40f49a5b6ab3 /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates (Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines) 06/12/2025 17:56:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-platform-mg Managed Identity Operator f1a07417-d97a-45cb-824c-7a7467783830 Builtin false False Enable-AUM-CheckUpdates n/a ce67e461-e4a3-4514-89cb-7eb8802f8f65 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/1f97b9d8-3c21-5b8b-9b36-72e77d4a90e0 /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates (Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines) 06/12/2025 17:56:41 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited Tenant User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false True CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member direct /providers/microsoft.authorization/roleassignments/3f958da1-722a-4c03-8398-aab60735ecd3 none 05/07/2025 18:14:55 ObjectType: User Member, ObjectDisplayName: CSA-Jan.Stutz, ObjectSignInName: CSA-Jan.Stutz@MIBCloud.onmicrosoft.com, ObjectId: 43b3e278-6551-4566-83a8-c19abe643e64
thisScope Sub Key Vault Administrator 00482a5a-887f-4fb3-b363-3b7fe8e74483 Builtin true False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) 5 (Usr: 5, Grp: 0, SP: 0) /subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/providers/microsoft.authorization/roleassignments/19b7e58d-a161-4789-b4e5-93a04958dba5 none 09/12/2025 09:03:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
thisScope Sub Key Vault Administrator 00482a5a-887f-4fb3-b363-3b7fe8e74483 Builtin true False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) 5 (Usr: 5, Grp: 0, SP: 0) /subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/providers/microsoft.authorization/roleassignments/19b7e58d-a161-4789-b4e5-93a04958dba5 none 09/12/2025 09:03:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
thisScope Sub Key Vault Administrator 00482a5a-887f-4fb3-b363-3b7fe8e74483 Builtin true False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) 5 (Usr: 5, Grp: 0, SP: 0) /subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/providers/microsoft.authorization/roleassignments/19b7e58d-a161-4789-b4e5-93a04958dba5 none 09/12/2025 09:03:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
thisScope Sub Key Vault Administrator 00482a5a-887f-4fb3-b363-3b7fe8e74483 Builtin true False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) 5 (Usr: 5, Grp: 0, SP: 0) /subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/providers/microsoft.authorization/roleassignments/19b7e58d-a161-4789-b4e5-93a04958dba5 none 09/12/2025 09:03:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
thisScope Sub Key Vault Administrator 00482a5a-887f-4fb3-b363-3b7fe8e74483 Builtin true False SGU-MIB-RES-Azure-Magr-Mibelle-NetOps n/a 87e9d07b-5340-455c-b297-8bffe3b86f78 Group direct 5 (Usr: 5, Grp: 0, SP: 0) /subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/providers/microsoft.authorization/roleassignments/19b7e58d-a161-4789-b4e5-93a04958dba5 none 09/12/2025 09:03:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
thisScope Sub Key Vault Administrator 00482a5a-887f-4fb3-b363-3b7fe8e74483 Builtin true False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78) 5 (Usr: 5, Grp: 0, SP: 0) /subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/providers/microsoft.authorization/roleassignments/19b7e58d-a161-4789-b4e5-93a04958dba5 none 09/12/2025 09:03:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
thisScope Sub Owner 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 Builtin false True CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member direct /subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/providers/microsoft.authorization/roleassignments/b68e29a8-1e6b-442d-95c4-f32bfa641802 none 06/10/2025 07:26:55 IsNullOrEmpty
thisScope Sub v1-custom-role-edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 3129e445-9330-52ad-1e78-065ce5aa09d0 Custom true False v1-app-registration-edfa9f1e-5e4d-4584-ad11-e4aea6b3f880 n/a bc9b95df-82ea-486e-a096-0142aabe35aa SP APP INT direct /subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/providers/microsoft.authorization/roleassignments/377a1d79-25e2-a3fd-6f09-8c9e63efe3c4 none 10/16/2025 06:52:29 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
thisScope Sub RG DNS Zone Contributor befefa01-2a29-4197-83a8-272ff33ce314 Builtin false False Mibelle-DNSMigration-prod n/a da11eb0f-75f8-40f7-9b4e-0ed2cd8924bb SP APP INT direct /subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourcegroups/mibelle-hub-net-dns-prod-rg/providers/microsoft.authorization/roleassignments/ad639b90-0c1c-4dd4-b702-8a28ee11052b none 11/24/2025 08:59:51 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
thisScope Sub RG Res Storage Blob Data Reader 2a2b9908-6ea1-4ae2-8e65-a410df84e7d1 Builtin true False pirmin Felber (Test User SAP delegation) pirmin.felber-testuser@MIBCloud.onmicrosoft.com edf1afba-e97d-4011-9ebe-4b8d3013a408 User Member direct /subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourcegroups/mibelle-hub-net-testvm-dev-rg/providers/microsoft.storage/storageaccounts/mibhubnetdst01/blobservices/default/containers/test/providers/microsoft.authorization/roleassignments/af31cd96-71e8-4d82-a564-3ad42d53b49f none 10/04/2025 18:24:18 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
thisScope Sub RG Res Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False pirmin Felber (Test User SAP delegation) pirmin.felber-testuser@MIBCloud.onmicrosoft.com edf1afba-e97d-4011-9ebe-4b8d3013a408 User Member direct /subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourcegroups/mibelle-hub-net-testvm-dev-rg/providers/microsoft.storage/storageaccounts/mibhubnetdst01/providers/microsoft.authorization/roleassignments/8bafdb8e-6392-4374-a491-0fa380edaa11 none 10/04/2025 18:16:34 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
thisScope Sub RG Res Storage Blob Delegator db58b8e5-c6ad-4a2a-8342-4190687cbf4a Builtin false False pirmin Felber (Test User SAP delegation) pirmin.felber-testuser@MIBCloud.onmicrosoft.com edf1afba-e97d-4011-9ebe-4b8d3013a408 User Member direct /subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourcegroups/mibelle-hub-net-testvm-dev-rg/providers/microsoft.storage/storageaccounts/mibhubnetdst01/providers/microsoft.authorization/roleassignments/2da98051-892b-46fa-ac3a-c3d9fe37e377 none 10/02/2025 09:30:02 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Highlight Management Group in HierarchyMap

Management Group Name: Identity

Management Group Id: mibelle-platform-identity-mg

Management Group Path: a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg

0 ManagementGroups below this scope
1 Subscriptions below this scope
Microsoft Defender for Cloud Secure Score: 60.72 Video , Blog , learn
   Download CSV semicolon | comma
Diagnostic setting Target Target Id Administrative Policy
toLa LA /subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 true true
No Consumption data available as switch parameter -DoAzureConsumption was not applied
   Download CSV semicolon | comma
ResourceType Location Count
microsoft.compute/disks westeurope 2
microsoft.compute/virtualmachines westeurope 1
microsoft.compute/virtualmachines/extensions westeurope 1
microsoft.network/networkinterfaces westeurope 1
microsoft.network/networkwatchers westeurope 1
microsoft.network/networkwatchers/flowlogs westeurope 1
microsoft.network/virtualnetworks westeurope 1
microsoft.storage/storageaccounts westeurope 1
   Download CSV semicolon | comma
ResourceType Resource Count Diagnostics capable Metrics Logs LogCategories
microsoft.compute/disks 2 True True False
microsoft.compute/virtualmachines 1 True True False
microsoft.compute/virtualmachines/extensions 1 False False False
microsoft.network/networkinterfaces 1 True True False
microsoft.network/networkwatchers 1 False False False
microsoft.network/networkwatchers/flowlogs 1 False False False
microsoft.network/virtualnetworks 1 True True True VMProtectionAlerts
microsoft.storage/storageaccounts 1 True True False
PSRule for Azure - integration paused - PSRule for Azure
   Download CSV semicolon | comma
  *Depending on the number of rows and your computer´s performance the table may respond with delay, download the csv for better filtering experience
Inheritance ScopeExcluded Exemption applies Policy DisplayName PolicyId Type Category ALZ Effect Parameters Enforcement NonCompliance Message Policies NonCmplnt Policies Compliant Resources NonCmplnt Resources Compliant Resources Conflicting Role/Assignment Managed Identity Assignment DisplayName AssignmentId AssignedBy CreatedOn CreatedBy UpdatedOn UpdatedBy
inherited mibelle-mg false false Audit resource location matches resource group location /providers/microsoft.authorization/policydefinitions/0a914e76-4921-4c19-b460-a2d36003525a BuiltIn General False audit Default 0 1 0 9 0 none Audit that the resource location matches its resource group location /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-location-match n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false false Not allowed resource types /providers/microsoft.authorization/policydefinitions/6c112d4e-5bc7-47ae-a041-ea2d9dccd749 BuiltIn General False Deny effect=Deny, listOfResourceTypesNotAllowed=Microsoft.ClassicCompute/capabilities; Microsoft.ClassicCompute/checkDomainNameAvailability; Microsoft.ClassicCompute/domainNames; Microsoft.ClassicCompute/domainNames/capabilities; Microsoft.ClassicCompute/domainNames/internalLoadBalancers; Microsoft.ClassicCompute/domainNames/serviceCertificates; Microsoft.ClassicCompute/domainNames/slots; Microsoft.ClassicCompute/domainNames/slots/roles; Microsoft.ClassicCompute/domainNames/slots/roles/metricDefinitions; Microsoft.ClassicCompute/domainNames/slots/roles/metrics; Microsoft.ClassicCompute/moveSubscriptionResources; Microsoft.ClassicCompute/operatingSystemFamilies; Microsoft.ClassicCompute/operatingSystems; Microsoft.ClassicCompute/operations; Microsoft.ClassicCompute/operationStatuses; Microsoft.ClassicCompute/quotas; Microsoft.ClassicCompute/resourceTypes; Microsoft.ClassicCompute/validateSubscriptionMoveAvailability; Microsoft.ClassicCompute/virtualMachines; Microsoft.ClassicCompute/virtualMachines/diagnosticSettings; Microsoft.ClassicCompute/virtualMachines/metricDefinitions; Microsoft.ClassicCompute/virtualMachines/metrics; Microsoft.ClassicInfrastructureMigrate/classicInfrastructureResources; Microsoft.ClassicNetwork/capabilities; Microsoft.ClassicNetwork/expressRouteCrossConnections; Microsoft.ClassicNetwork/expressRouteCrossConnections/peerings; Microsoft.ClassicNetwork/gatewaySupportedDevices; Microsoft.ClassicNetwork/networkSecurityGroups; Microsoft.ClassicNetwork/operations; Microsoft.ClassicNetwork/quotas; Microsoft.ClassicNetwork/reservedIps; Microsoft.ClassicNetwork/virtualNetworks; Microsoft.ClassicNetwork/virtualNetworks/remoteVirtualNetworkPeeringProxies; Microsoft.ClassicNetwork/virtualNetworks/virtualNetworkPeerings; Microsoft.ClassicStorage/capabilities; Microsoft.ClassicStorage/checkStorageAccountAvailability; Microsoft.ClassicStorage/disks; Microsoft.ClassicStorage/images; Microsoft.ClassicStorage/operations; Microsoft.ClassicStorage/osImages; Microsoft.ClassicStorage/osPlatformImages; Microsoft.ClassicStorage/publicImages; Microsoft.ClassicStorage/quotas; Microsoft.ClassicStorage/storageAccounts; Microsoft.ClassicStorage/storageAccounts/blobServices; Microsoft.ClassicStorage/storageAccounts/fileServices; Microsoft.ClassicStorage/storageAccounts/metricDefinitions; Microsoft.ClassicStorage/storageAccounts/metrics; Microsoft.ClassicStorage/storageAccounts/queueServices; Microsoft.ClassicStorage/storageAccounts/services; Microsoft.ClassicStorage/storageAccounts/services/diagnosticSettings; Microsoft.ClassicStorage/storageAccounts/services/metricDefinitions; Microsoft.ClassicStorage/storageAccounts/services/metrics; Microsoft.ClassicStorage/storageAccounts/tableServices; Microsoft.ClassicStorage/storageAccounts/vmImages; Microsoft.ClassicStorage/vmImages; Microsoft.ClassicSubscription/operations Default 0 0 0 0 0 none Deny the deployment of classic resources /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deny-classic-resources n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false false Audit VMs that do not use managed disks /providers/microsoft.authorization/policydefinitions/06a78e20-9358-41c9-923c-fb736d382a4d BuiltIn Compute False audit Default 0 1 0 1 0 none Deny virtual machines and virtual machine scale sets that do not use managed disk /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deny-unmanageddisk n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false false Configure Azure Activity logs to stream to specified Log Analytics workspace /providers/microsoft.authorization/policydefinitions/2465583e-4e78-4c15-b6be-a36cbc7c8b0f BuiltIn Monitoring False DeployIfNotExists effect=DeployIfNotExists, logAnalytics=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 1 0 1 0 Monitoring Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/dcb59c88-f014-5e17-840c-6c9aecc66286), Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/82f0c3bf-808b-5863-bf9c-231cfbf9598a) Deploy-AzActivity-Log (SPObjId: 217aa040-8eb0-451b-b81c-0b8f3d200d5a) Deploy Diagnostic Settings for Activity Log to Log Analytics workspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
thisScope Mg false false Management port access from the Internet should be blocked /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-mgmtports-from-internet Custom Network true Deny effect=Deny Default 0 0 0 0 0 none Management port access from the Internet should be blocked /providers/microsoft.management/managementgroups/mibelle-platform-identity-mg/providers/microsoft.authorization/policyassignments/deny-mgmtports-internet n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
thisScope Mg false false Not allowed resource types /providers/microsoft.authorization/policydefinitions/6c112d4e-5bc7-47ae-a041-ea2d9dccd749 BuiltIn General False Deny effect=Deny, listOfResourceTypesNotAllowed=Microsoft.Network/publicIPAddresses Default 0 0 0 0 0 none Deny the creation of public IP /providers/microsoft.management/managementgroups/mibelle-platform-identity-mg/providers/microsoft.authorization/policyassignments/deny-public-ip n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-platform-mg false false Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics /providers/microsoft.authorization/policydefinitions/052c180e-287d-44c3-86ef-01aeae2d9774 BuiltIn Network False DeployIfNotExists networkWatcherName=/subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourcegroups/networkwatcherrg/providers/microsoft.network/networkwatchers/networkwatcher_northeurope, networkWatcherRG=networkwatcherrg, retentionDays=1, storageId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.storage/storageaccounts/mibmgmtnetprodeunst01, vnetRegion=northeurope, workspaceRegion=westeurope, workspaceResourceId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 0 0 0 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/71689b0c-ca78-4285-9603-49a5497225d8) 97339ff59e1744678fd92dea (SPObjId: c2b8a553-ec19-42b8-8855-6edc985eaffb) Deploy-TrafficAnalytics-NorthEurope /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/97339ff59e1744678fd92dea n/a 09/04/2025 07:21:45 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 09/04/2025 07:34:08 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-platform-mg false false Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics /providers/microsoft.authorization/policydefinitions/052c180e-287d-44c3-86ef-01aeae2d9774 BuiltIn Network False DeployIfNotExists networkWatcherName=/subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourcegroups/networkwatcherrg/providers/microsoft.network/networkwatchers/networkwatcher_westeurope, networkWatcherRG=networkwatcherrg, retentionDays=1, storageId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.storage/storageaccounts/mibmgmtnetprodeuwst01, vnetRegion=westeurope, workspaceRegion=westeurope, workspaceResourceId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 1 0 1 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/21c0b216-76ff-44ef-9430-19f801e102d5) d33eb38085bf40bd860fe43b (SPObjId: 78dd5b73-2109-4a10-b2e4-6463304b4b4d) Deploy-TrafficAnalytics-WestEurope /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/d33eb38085bf40bd860fe43b n/a 06/12/2025 18:15:24 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 09/04/2025 07:24:28 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-platform-mg false false Do not allow deletion of specified resource and resource type /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/denyaction-deleteresources Custom General true DenyAction effect=DenyAction, resourceName=mibelle-mgmt-log-prod-euw-id-01, resourceType=Microsoft.ManagedIdentity/userAssignedIdentities Default 0 0 0 0 0 none Do not allow deletion of the User Assigned Managed Identity used by AMA /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/denyaction-deleteuamiama n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-platform-mg false false Subnets should be private /providers/microsoft.authorization/policydefinitions/7bca8353-aa3b-429b-904a-9229c4385837 BuiltIn Network False Audit Default 1 0 2 0 0 none Subnets should be private /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enforce-subnet-private n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
   Download CSV semicolon | comma
Inheritance ScopeExcluded PolicySet DisplayName PolicySetId Type Category ALZ Parameters Enforcement NonCompliance Message Policies NonCmplnt Policies Compliant Resources NonCmplnt Resources Compliant Resources Conflicting Role/Assignment Managed Identity Assignment DisplayName AssignmentId AssignedBy CreatedOn CreatedBy UpdatedOn UpdatedBy
inherited mibelle-mg false Audit virtual machines for Trusted Launch support /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/audit-trustedlaunch Custom Trusted Launch true Default 0 2 0 3 0 none Audit virtual machines for Trusted Launch support /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-trustedlaunch n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Unused resources driving cost should be avoided /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/audit-unusedresourcescostoptimization Custom Cost Optimization true EffectDisks=Audit, EffectPublicIpAddresses=Audit, EffectServerFarms=Audit Default 0 2 0 3 0 none Unused resources driving cost should be avoided /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-unusedresources n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Microsoft cloud security benchmark /providers/microsoft.authorization/policysetdefinitions/1f3afdf9-d0c9-4c3d-847f-89da613e70a8 BuiltIn Security Center False Default 33 23 8 2 0 none Enable Monitoring in Microsoft Defender for Cloud /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-asc-monitoring n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Enable audit category group resource logging for supported resources to Log Analytics /providers/microsoft.authorization/policysetdefinitions/f5b29bc4-feca-4cc6-a58a-772dd5e290a5 BuiltIn Monitoring False logAnalytics=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 0 0 0 0 Monitoring Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b922046a-7a3e-59da-a982-8a5b855791ce), Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/9df772a7-1ce7-5439-ab6b-5d31d69925cc) Deploy-Diag-Logs (SPObjId: 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57) Enable allLogs category group resource logging for supported resources to Log Analytics /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud /providers/microsoft.authorization/policysetdefinitions/77b391e3-2d5d-40c3-83bf-65c846b3c6a3 BuiltIn Security Center False Default 0 3 0 1 0 Security Admin (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/d730d560-adce-52b7-b10c-36a8ad16a6d3) Deploy-MDEndpointsAMA (SPObjId: 7d365a6d-a7ae-4921-beca-5ce854a76960) Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-mdendpointsama n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Enforce Azure Compute Security Benchmark compliance auditing /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-acsb Custom Guest Configuration true Default 1 2 1 0 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/6e26cd22-b41b-5611-aafc-e2c56b14c060) Enforce-ACSB (SPObjId: e1f2e80c-5329-4804-824d-f0b44713985e) Enforce Azure Compute Security Baseline compliance auditing /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/enforce-acsb n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-platform-mg false Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-aum-checkupdates Custom Security Center true assessmentMode=AutomaticByPlatform Default 0 2 0 1 0 Virtual Machine Contributor (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/51e23aa4-bdf1-5059-8efc-453852a14d5e), Azure Connected Machine Resource Administrator (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/d72b7c0f-a23a-58ed-8e0a-40f49a5b6ab3), Managed Identity Operator (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/1f97b9d8-3c21-5b8b-9b36-72e77d4a90e0) Enable-AUM-CheckUpdates (SPObjId: ce67e461-e4a3-4514-89cb-7eb8802f8f65) Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines. /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates n/a 06/12/2025 17:56:38 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-platform-mg false Enforce recommended guardrails for Azure Key Vault /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-keyvault Custom Key Vault true Default 0 0 0 0 0 none Enforce recommended guardrails for Azure Key Vault /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enforce-gr-keyvault n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Policy Assignment Limit: 2/200
0 Custom Policy definitions scoped
0 Custom PolicySet definitions scoped
0 Blueprints scoped
   Download CSV semicolon | comma
  *Depending on the number of rows and your computer´s performance the table may respond with delay, download the csv for better filtering experience
Scope Role RoleId Role Type Data Can do Role assignment Identity Displayname Identity SignInName Identity ObjectId Identity Type Applicability Applies through membership Group Details Role AssignmentId Related Policy Assignment CreatedOn CreatedBy
inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/e14ef9ac-25e8-4ee7-887a-a6576bd5229d none 11/28/2025 07:57:36 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Monitoring Contributor 749f88d5-cbae-40b8-bcfc-e573ddc772fa Builtin false False Deploy-AzActivity-Log n/a 217aa040-8eb0-451b-b81c-0b8f3d200d5a SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/dcb59c88-f014-5e17-840c-6c9aecc66286 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log (Configure Azure Activity logs to stream to specified Log Analytics workspace) 06/12/2025 17:56:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Monitoring Contributor 749f88d5-cbae-40b8-bcfc-e573ddc772fa Builtin false False Deploy-Diag-Logs n/a 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b922046a-7a3e-59da-a982-8a5b855791ce /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs (Enable audit category group resource logging for supported resources to Log Analytics) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Log Analytics Contributor 92aaf0da-9dab-42b6-94a3-d43ce8d16293 Builtin false False Deploy-AzActivity-Log n/a 217aa040-8eb0-451b-b81c-0b8f3d200d5a SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/82f0c3bf-808b-5863-bf9c-231cfbf9598a /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log (Configure Azure Activity logs to stream to specified Log Analytics workspace) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Log Analytics Contributor 92aaf0da-9dab-42b6-94a3-d43ce8d16293 Builtin false False Deploy-Diag-Logs n/a 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/9df772a7-1ce7-5439-ab6b-5d31d69925cc /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs (Enable audit category group resource logging for supported resources to Log Analytics) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Meier, Heinz-MIBELLEGROUP heinz.meier@mibelle.net 06addc33-6298-4f01-9f6b-709193f099cc User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Subs-MibelleOnline-SubscriptionOwner n/a 1bdf326c-8c66-4ba9-8c2d-83312a1ddc02 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-Reader n/a 1c529912-c479-41a1-8a03-e57256720fa4 Group direct 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser n/a 1f3ede05-4301-42b1-8c95-2be94290e93c Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Hasanow, Kilian-MIBELLEGROUP kilian.hasanow@mibelle.net 4270eb01-73cf-4e17-925e-47461737b40e User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Mibelle-AzGovWiz-prod n/a 44b03901-55d2-49a8-af3a-58228a81408c SP APP INT indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-michael.peter csa-michael.peter@MIBCloud.mail.onmicrosoft.com 460bad8a-cc4d-41dc-9ddd-f24ba491e2a6 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner n/a 52364002-4a8b-4808-b4fc-864ed5f7d50d Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Matej Paunovski CSA-matej.paunovski@MIBCloud.onmicrosoft.com 54f81d33-50db-475c-b686-4ef70aa0b4fe User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Ouaouane, Taoufik-MIBELLEGROUP taoufik.ouaouane@mibelle.net 7100d1ce-5bd7-449d-abdd-52a7218922b3 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-NetOps n/a 87e9d07b-5340-455c-b297-8bffe3b86f78 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner n/a 9b120856-d4b2-4862-95df-bedf8d5fe1c3 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-Baswaraj Marotrao Ramshette csa-baswarajmarotrao.ramshette@MIBCloud.onmicrosoft.com 9d8d246b-a1f9-4d9a-a54f-f7ae9f3af2ae User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-SecOps n/a abf39027-4cb4-4298-8951-f984eaf9cb8e Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Baumann, Jürg-MIBELLEGROUP juerg.baumann_mibellegroup.com#EXT#@MIBCloud.onmicrosoft.com bb2279b2-06ab-459a-b981-579701601f8a User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin n/a cb058f58-c629-445f-9a10-75f9fcab694e Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Philipp.Schmidt CSA-Philipp.Schmidt@MIBCloud.onmicrosoft.com e40a73c8-6655-434d-8c8b-fdc4d9213499 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Taoufik.Ouaouane csa-Taoufik.Ouaouane@mibelle.net e58ba28f-09ed-49c3-8f5e-31b05c258cde User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Adrian.Bombelka CSA-Adrian.Bombelka@MIBCloud.onmicrosoft.com e86b38a8-e5d4-4888-b09d-390dcf9a2017 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False Enforce-ACSB n/a e1f2e80c-5329-4804-824d-f0b44713985e SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/6e26cd22-b41b-5611-aafc-e2c56b14c060 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/enforce-acsb (Enforce Azure Compute Security Benchmark compliance auditing) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Security Admin fb1c8493-542b-48eb-b624-b4c8fea62acd Builtin false False Deploy-MDEndpointsAMA n/a 7d365a6d-a7ae-4921-beca-5ce854a76960 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/d730d560-adce-52b7-b10c-36a8ad16a6d3 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-mdendpointsama (Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-platform-mg Virtual Machine Contributor 9980e02c-c2be-4d73-94e8-173b1dc7cf3c Builtin false False Enable-AUM-CheckUpdates n/a ce67e461-e4a3-4514-89cb-7eb8802f8f65 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/51e23aa4-bdf1-5059-8efc-453852a14d5e /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates (Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines) 06/12/2025 17:56:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-platform-mg Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False d33eb38085bf40bd860fe43b n/a 78dd5b73-2109-4a10-b2e4-6463304b4b4d SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/21c0b216-76ff-44ef-9430-19f801e102d5 /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/d33eb38085bf40bd860fe43b (Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics) 06/12/2025 18:15:25 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-platform-mg Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False 97339ff59e1744678fd92dea n/a c2b8a553-ec19-42b8-8855-6edc985eaffb SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/71689b0c-ca78-4285-9603-49a5497225d8 /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/97339ff59e1744678fd92dea (Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics) 09/04/2025 07:21:46 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-platform-mg Azure Connected Machine Resource Administrator cd570a14-e51a-42ad-bac8-bafd67325302 Builtin false False Enable-AUM-CheckUpdates n/a ce67e461-e4a3-4514-89cb-7eb8802f8f65 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/d72b7c0f-a23a-58ed-8e0a-40f49a5b6ab3 /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates (Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines) 06/12/2025 17:56:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-platform-mg Managed Identity Operator f1a07417-d97a-45cb-824c-7a7467783830 Builtin false False Enable-AUM-CheckUpdates n/a ce67e461-e4a3-4514-89cb-7eb8802f8f65 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/1f97b9d8-3c21-5b8b-9b36-72e77d4a90e0 /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates (Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines) 06/12/2025 17:56:41 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited Tenant User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false True CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member direct /providers/microsoft.authorization/roleassignments/3f958da1-722a-4c03-8398-aab60735ecd3 none 05/07/2025 18:14:55 ObjectType: User Member, ObjectDisplayName: CSA-Jan.Stutz, ObjectSignInName: CSA-Jan.Stutz@MIBCloud.onmicrosoft.com, ObjectId: 43b3e278-6551-4566-83a8-c19abe643e64
mibelle-identity (e1dcabb1-2f79-4eb1-982d-e3df709c24aa)
Highlight Subscription in HierarchyMap
Subscription Name: mibelle-identity
Subscription Id: e1dcabb1-2f79-4eb1-982d-e3df709c24aa
Subscription Path: a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-identity-mg/e1dcabb1-2f79-4eb1-982d-e3df709c24aa
State: Enabled
QuotaId: PayAsYouGo_2014-09-01
Microsoft Defender for Cloud Secure Score: 60.71% (17 of 28 points) Video , Blog , learn
Microsoft Defender for Cloud 'Email notifications' state: n/a
Microsoft Defender for Cloud 'Email notifications' severity: n/a
Microsoft Defender for Cloud 'Email notifications' roles: n/a
Microsoft Defender for Cloud 'Email notifications' emails: n/a
   Download CSV semicolon | comma
Plan Tier
AI Free
Api Free
AppServices Free
Arm Free
CloudPosture Free
ContainerRegistry Free
Containers Free
CosmosDbs Free
Discovery Standard
Dns Free
FoundationalCspm Standard
KeyVaults Free
KubernetesService Free
OpenSourceRelationalDatabases Free
SqlServers Free
SqlServerVirtualMachines Free
StorageAccounts Free
VirtualMachines Free
   Download CSV semicolon | comma
Diagnostic setting Target Target Id Administrative Alert Autoscale Policy Recommendation ResourceHealth Security ServiceHealth
subscriptionToLa LA /subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 true true true true true true true true
0 Subscription Tags
   Resource naming and tagging decision guide learn
   Download CSV semicolon | comma
Scope TagName Count
Resource TAG-Mibellegroup-Server-Update 1
No Consumption data available as switch parameter -DoAzureConsumption was not applied
4 Resource Groups | Limit: (4/980)
   Download CSV semicolon | comma
Provider State
microsoft.insights Registered
Microsoft.Storage Registered
Microsoft.Capacity Registered
Microsoft.Compute Registered
Microsoft.ManagedIdentity Registered
Microsoft.Security Registered
Microsoft.GuestConfiguration Registered
Microsoft.PolicyInsights Registered
Microsoft.Network Registered
Microsoft.ResourceHealth Registered
Microsoft.Advisor Registered
Microsoft.DevTestLab Registered
ArizeAi.ObservabilityEval NotRegistered
Astronomer.Astro NotRegistered
Dell.Storage NotRegistered
Dynatrace.Observability NotRegistered
GitHub.Network NotRegistered
Informatica.DataManagement NotRegistered
LambdaTest.HyperExecute NotRegistered
Liftrbasic.Samplerp NotRegistered
Microsoft.AAD NotRegistered
Microsoft.AadCustomSecurityAttributesDiagnosticSettings NotRegistered
microsoft.aadiam NotRegistered
Microsoft.Addons NotRegistered
Microsoft.ADHybridHealthService Registered
Microsoft.AgFoodPlatform NotRegistered
Microsoft.AgriculturePlatform NotRegistered
Microsoft.AlertsManagement NotRegistered
Microsoft.AnalysisServices NotRegistered
Microsoft.ApiCenter NotRegistered
Microsoft.ApiManagement NotRegistered
Microsoft.App NotRegistered
Microsoft.AppAssessment NotRegistered
Microsoft.AppComplianceAutomation NotRegistered
Microsoft.AppConfiguration NotRegistered
Microsoft.ApplicationMigration NotRegistered
Microsoft.AppLink NotRegistered
Microsoft.AppPlatform NotRegistered
Microsoft.ArcContainerStorage NotRegistered
Microsoft.Attestation NotRegistered
Microsoft.Authorization Registered
Microsoft.Automanage NotRegistered
Microsoft.Automation NotRegistered
Microsoft.AVS NotRegistered
Microsoft.AwsConnector NotRegistered
Microsoft.AzureActiveDirectory NotRegistered
Microsoft.AzureArcData NotRegistered
Microsoft.AzureBusinessContinuity NotRegistered
Microsoft.AzureDataTransfer NotRegistered
Microsoft.AzureFleet NotRegistered
Microsoft.AzureImageTestingForLinux NotRegistered
Microsoft.AzureLargeInstance NotRegistered
Microsoft.AzurePlaywrightService NotRegistered
Microsoft.AzureResilienceManagement NotRegistered
Microsoft.AzureScan NotRegistered
Microsoft.AzureSphere NotRegistered
Microsoft.AzureStack NotRegistered
Microsoft.AzureStackHCI NotRegistered
Microsoft.AzureTerraform NotRegistered
Microsoft.BackupSolutions NotRegistered
Microsoft.BareMetal NotRegistered
Microsoft.BareMetalInfrastructure NotRegistered
Microsoft.Batch NotRegistered
Microsoft.Billing Registered
Microsoft.BillingBenefits NotRegistered
Microsoft.Bing NotRegistered
Microsoft.BlockchainTokens NotRegistered
Microsoft.Blueprint NotRegistered
Microsoft.BotService NotRegistered
Microsoft.Cache NotRegistered
Microsoft.Carbon NotRegistered
Microsoft.Cdn NotRegistered
Microsoft.CertificateRegistration NotRegistered
Microsoft.ChangeSafety Registered
Microsoft.Chaos NotRegistered
Microsoft.ClassicCompute NotRegistered
Microsoft.ClassicInfrastructureMigrate NotRegistered
Microsoft.ClassicNetwork NotRegistered
Microsoft.ClassicStorage NotRegistered
Microsoft.ClassicSubscription Registered
Microsoft.CleanRoom NotRegistered
Microsoft.CloudDevicePlatform NotRegistered
Microsoft.CloudHealth NotRegistered
Microsoft.CloudShell NotRegistered
Microsoft.CloudTest NotRegistered
Microsoft.CodeSigning NotRegistered
Microsoft.CognitiveServices NotRegistered
Microsoft.Commerce Registered
Microsoft.Communication NotRegistered
Microsoft.Community NotRegistered
Microsoft.ComputeLimit NotRegistered
Microsoft.ComputeSchedule NotRegistered
Microsoft.ConfidentialLedger NotRegistered
Microsoft.Confluent NotRegistered
Microsoft.ConnectedCache NotRegistered
Microsoft.ConnectedCredentials NotRegistered
microsoft.connectedopenstack NotRegistered
Microsoft.ConnectedVehicle NotRegistered
Microsoft.ConnectedVMwarevSphere NotRegistered
Microsoft.Consumption Registered
Microsoft.ContainerInstance NotRegistered
Microsoft.ContainerRegistry NotRegistered
Microsoft.ContainerService NotRegistered
Microsoft.CostManagement Registered
Microsoft.CostManagementExports NotRegistered
Microsoft.CustomerLockbox NotRegistered
Microsoft.CustomProviders NotRegistered
Microsoft.D365CustomerInsights NotRegistered
Microsoft.Dashboard NotRegistered
Microsoft.DatabaseFleetManager NotRegistered
Microsoft.DatabaseWatcher NotRegistered
Microsoft.DataBox NotRegistered
Microsoft.DataBoxEdge NotRegistered
Microsoft.Databricks NotRegistered
Microsoft.Datadog NotRegistered
Microsoft.DataFactory NotRegistered
Microsoft.DataLakeAnalytics NotRegistered
Microsoft.DataLakeStore NotRegistered
Microsoft.DataMigration NotRegistered
Microsoft.DataProtection NotRegistered
Microsoft.DataReplication NotRegistered
Microsoft.DataShare NotRegistered
Microsoft.DBforMariaDB NotRegistered
Microsoft.DBforMySQL NotRegistered
Microsoft.DBforPostgreSQL NotRegistered
Microsoft.DependencyMap NotRegistered
Microsoft.DesktopVirtualization NotRegistered
Microsoft.DevCenter NotRegistered
Microsoft.DevelopmentWindows365 NotRegistered
Microsoft.DevHub NotRegistered
Microsoft.DeviceOnboarding NotRegistered
Microsoft.DeviceRegistry NotRegistered
Microsoft.Devices NotRegistered
Microsoft.DeviceUpdate NotRegistered
Microsoft.DevOpsInfrastructure NotRegistered
Microsoft.DigitalTwins NotRegistered
Microsoft.Discovery NotRegistered
Microsoft.DocumentDB NotRegistered
Microsoft.DomainRegistration NotRegistered
Microsoft.DurableTask NotRegistered
Microsoft.Easm NotRegistered
Microsoft.Edge NotRegistered
Microsoft.EdgeManagement NotRegistered
Microsoft.EdgeMarketplace NotRegistered
Microsoft.EdgeOrder NotRegistered
Microsoft.EdgeOrderPartner NotRegistered
Microsoft.EdgeZones NotRegistered
Microsoft.Elastic NotRegistered
Microsoft.ElasticSan NotRegistered
Microsoft.EnterpriseSupport NotRegistered
Microsoft.EntitlementManagement NotRegistered
Microsoft.EntraIDGovernance NotRegistered
Microsoft.EntraIdGovernanceAccelerator NotRegistered
Microsoft.ErrorAtlas NotRegistered
Microsoft.EventGrid NotRegistered
Microsoft.EventHub NotRegistered
Microsoft.Experimentation NotRegistered
Microsoft.ExtendedLocation NotRegistered
Microsoft.Fabric NotRegistered
Microsoft.Features Registered
Microsoft.FileShares NotRegistered
Microsoft.FluidRelay NotRegistered
Microsoft.GCPConnector NotRegistered
Microsoft.GraphServices NotRegistered
Microsoft.HanaOnAzure NotRegistered
Microsoft.HardwareSecurityModules NotRegistered
Microsoft.HDInsight NotRegistered
Microsoft.HealthBot NotRegistered
Microsoft.HealthcareApis NotRegistered
Microsoft.HealthcareInterop NotRegistered
Microsoft.HealthDataAIServices NotRegistered
Microsoft.HealthModel NotRegistered
Microsoft.HealthPlatform NotRegistered
Microsoft.Help NotRegistered
Microsoft.HybridCloud NotRegistered
Microsoft.HybridCompute NotRegistered
Microsoft.HybridConnectivity NotRegistered
Microsoft.HybridContainerService NotRegistered
Microsoft.HybridNetwork NotRegistered
Microsoft.Impact NotRegistered
Microsoft.IntegrationSpaces NotRegistered
Microsoft.IoTCentral NotRegistered
Microsoft.IoTFirmwareDefense NotRegistered
Microsoft.IoTOperations NotRegistered
Microsoft.IoTOperationsDataProcessor NotRegistered
Microsoft.IoTSecurity NotRegistered
Microsoft.KeyVault NotRegistered
Microsoft.Kubernetes NotRegistered
Microsoft.KubernetesConfiguration NotRegistered
Microsoft.KubernetesRuntime NotRegistered
Microsoft.Kusto NotRegistered
Microsoft.LabServices NotRegistered
Microsoft.LoadTestService NotRegistered
Microsoft.Logic NotRegistered
Microsoft.MachineLearningServices NotRegistered
Microsoft.Maintenance NotRegistered
Microsoft.ManagedNetworkFabric NotRegistered
Microsoft.ManagedServices NotRegistered
Microsoft.Management NotRegistered
Microsoft.Maps NotRegistered
Microsoft.Marketplace NotRegistered
Microsoft.MarketplaceOrdering Registered
Microsoft.MessagingCatalog NotRegistered
Microsoft.MessagingConnectors NotRegistered
Microsoft.Migrate NotRegistered
Microsoft.Mission NotRegistered
Microsoft.Monitor NotRegistered
Microsoft.MySQLDiscovery NotRegistered
Microsoft.NetApp NotRegistered
Microsoft.NetworkCloud NotRegistered
Microsoft.NetworkFunction NotRegistered
Microsoft.NexusIdentity NotRegistered
Microsoft.NotificationHubs NotRegistered
Microsoft.Nutanix NotRegistered
Microsoft.ObjectStore NotRegistered
Microsoft.OffAzure NotRegistered
Microsoft.OffAzureSpringBoot NotRegistered
Microsoft.OnlineExperimentation NotRegistered
Microsoft.OpenEnergyPlatform NotRegistered
Microsoft.OperationalInsights NotRegistered
Microsoft.OperationsManagement NotRegistered
Microsoft.OperatorVoicemail NotRegistered
Microsoft.OracleDiscovery NotRegistered
Microsoft.Orbital NotRegistered
Microsoft.PartnerManagedConsumerRecurrence NotRegistered
Microsoft.Peering NotRegistered
Microsoft.Pki NotRegistered
Microsoft.Portal Registered
Microsoft.PortalServices NotRegistered
Microsoft.PowerBI NotRegistered
Microsoft.PowerBIDedicated NotRegistered
Microsoft.PowerPlatform NotRegistered
Microsoft.Premonition NotRegistered
Microsoft.ProfessionalService NotRegistered
Microsoft.ProviderHub NotRegistered
Microsoft.Purview NotRegistered
Microsoft.Quantum NotRegistered
Microsoft.Quota NotRegistered
Microsoft.RecommendationsService NotRegistered
Microsoft.RecoveryServices NotRegistered
Microsoft.RedHatOpenShift NotRegistered
Microsoft.Relationships NotRegistered
Microsoft.Relay NotRegistered
Microsoft.ResourceBuilder NotRegistered
Microsoft.ResourceConnector NotRegistered
Microsoft.ResourceGraph Registered
Microsoft.ResourceIntelligence Registered
Microsoft.ResourceNotifications Registered
Microsoft.Resources Registered
Microsoft.SaaS NotRegistered
Microsoft.SaaSHub NotRegistered
Microsoft.Scom NotRegistered
Microsoft.SCVMM NotRegistered
Microsoft.Search NotRegistered
Microsoft.SecretSyncController NotRegistered
Microsoft.SecurityCopilot NotRegistered
Microsoft.SecurityDetonation NotRegistered
Microsoft.SecurityInsights NotRegistered
Microsoft.SecurityPlatform NotRegistered
Microsoft.SentinelPlatformServices NotRegistered
Microsoft.SerialConsole Registered
Microsoft.ServiceBus NotRegistered
Microsoft.ServiceFabric NotRegistered
Microsoft.ServiceFabricMesh NotRegistered
Microsoft.ServiceLinker NotRegistered
Microsoft.ServiceNetworking NotRegistered
Microsoft.ServicesHub NotRegistered
Microsoft.SignalRService NotRegistered
Microsoft.Singularity NotRegistered
Microsoft.SoftwarePlan NotRegistered
Microsoft.Solutions NotRegistered
Microsoft.Sovereign NotRegistered
Microsoft.Sql NotRegistered
Microsoft.SqlVirtualMachine NotRegistered
Microsoft.StandbyPool NotRegistered
Microsoft.StorageActions NotRegistered
Microsoft.StorageCache NotRegistered
Microsoft.StorageDiscovery NotRegistered
Microsoft.StorageMover NotRegistered
Microsoft.StorageSync NotRegistered
Microsoft.StorageTasks NotRegistered
Microsoft.StreamAnalytics NotRegistered
Microsoft.Subscription NotRegistered
Microsoft.SupercomputerInfrastructure NotRegistered
microsoft.support Registered
Microsoft.SustainabilityServices NotRegistered
Microsoft.Synapse NotRegistered
Microsoft.Syntex NotRegistered
Microsoft.ToolchainOrchestrator NotRegistered
Microsoft.UpdateManager NotRegistered
Microsoft.UsageBilling NotRegistered
Microsoft.Validate NotRegistered
Microsoft.VerifiedId NotRegistered
Microsoft.VideoIndexer NotRegistered
Microsoft.VirtualMachineImages NotRegistered
microsoft.visualstudio NotRegistered
Microsoft.VMware NotRegistered
Microsoft.VoiceServices NotRegistered
Microsoft.Web NotRegistered
Microsoft.WeightsAndBiases NotRegistered
Microsoft.Windows365 NotRegistered
Microsoft.WindowsPushNotificationServices NotRegistered
Microsoft.WorkloadBuilder NotRegistered
Microsoft.Workloads NotRegistered
MongoDB.Atlas NotRegistered
Neon.Postgres NotRegistered
NewRelic.Observability NotRegistered
NGINX.NGINXPLUS NotRegistered
Oracle.Database NotRegistered
PaloAltoNetworks.Cloudngfw NotRegistered
Pinecone.VectorDb NotRegistered
PureStorage.Block NotRegistered
Qumulo.Storage NotRegistered
0 enabled Subscription Features learn
0 Resource Locks learn
   Download CSV semicolon | comma
ResourceType Location Count
microsoft.compute/disks westeurope 2
microsoft.compute/virtualmachines westeurope 1
microsoft.compute/virtualmachines/extensions westeurope 1
microsoft.network/networkinterfaces westeurope 1
microsoft.network/networkwatchers westeurope 1
microsoft.network/networkwatchers/flowlogs westeurope 1
microsoft.network/virtualnetworks westeurope 1
microsoft.storage/storageaccounts westeurope 1
   CAF - Recommended abbreviations for Azure resource types learn
   Resource details can be found in the CSV output *_ResourcesAll.csv
   Download CSV semicolon | comma
ResourceType Recommendation ResourceFriendlyName passed failed passed percentage
microsoft.compute/disks disk, osdisk Managed disk (data), Managed disk (OS) 0 2 0%
microsoft.compute/virtualmachines vm Virtual machine 0 1 0%
microsoft.network/networkinterfaces nic- Network interface (NIC) 0 1 0%
microsoft.network/networkwatchers nw- Network Watcher 0 1 0%
microsoft.network/virtualnetworks vnet- Virtual network 0 1 0%
microsoft.storage/storageaccounts st, stvm Storage account, VM storage account 0 1 0%
No cost optimization & cleanup
   Download CSV semicolon | comma
ResourceType Resource Count Diagnostics capable Metrics Logs LogCategories
microsoft.compute/disks 2 True True False
microsoft.compute/virtualmachines 1 True True False
microsoft.compute/virtualmachines/extensions 1 False False False
microsoft.network/networkinterfaces 1 True True False
microsoft.network/networkwatchers 1 False False False
microsoft.network/networkwatchers/flowlogs 1 False False False
microsoft.network/virtualnetworks 1 True True True VMProtectionAlerts
microsoft.storage/storageaccounts 1 True True False
No UserAssigned Managed Identities assigned to Resources / vice versa - at all
PSRule for Azure - integration paused - PSRule for Azure
   Download CSV semicolon | comma
  *Depending on the number of rows and your computer´s performance the table may respond with delay, download the csv for better filtering experience
Inheritance ScopeExcluded Exemption applies Policy DisplayName PolicyId Type Category ALZ Effect Parameters Enforcement NonCompliance Message Policies NonCmplnt Policies Compliant Resources NonCmplnt Resources Compliant Resources Conflicting Role/Assignment Managed Identity Assignment DisplayName AssignmentId AssignedBy CreatedOn CreatedBy UpdatedOn UpdatedBy
inherited mibelle-mg false false Audit resource location matches resource group location /providers/microsoft.authorization/policydefinitions/0a914e76-4921-4c19-b460-a2d36003525a BuiltIn General False audit Default 0 1 0 9 0 none Audit that the resource location matches its resource group location /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-location-match n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false false Not allowed resource types /providers/microsoft.authorization/policydefinitions/6c112d4e-5bc7-47ae-a041-ea2d9dccd749 BuiltIn General False Deny effect=Deny, listOfResourceTypesNotAllowed=Microsoft.ClassicCompute/capabilities; Microsoft.ClassicCompute/checkDomainNameAvailability; Microsoft.ClassicCompute/domainNames; Microsoft.ClassicCompute/domainNames/capabilities; Microsoft.ClassicCompute/domainNames/internalLoadBalancers; Microsoft.ClassicCompute/domainNames/serviceCertificates; Microsoft.ClassicCompute/domainNames/slots; Microsoft.ClassicCompute/domainNames/slots/roles; Microsoft.ClassicCompute/domainNames/slots/roles/metricDefinitions; Microsoft.ClassicCompute/domainNames/slots/roles/metrics; Microsoft.ClassicCompute/moveSubscriptionResources; Microsoft.ClassicCompute/operatingSystemFamilies; Microsoft.ClassicCompute/operatingSystems; Microsoft.ClassicCompute/operations; Microsoft.ClassicCompute/operationStatuses; Microsoft.ClassicCompute/quotas; Microsoft.ClassicCompute/resourceTypes; Microsoft.ClassicCompute/validateSubscriptionMoveAvailability; Microsoft.ClassicCompute/virtualMachines; Microsoft.ClassicCompute/virtualMachines/diagnosticSettings; Microsoft.ClassicCompute/virtualMachines/metricDefinitions; Microsoft.ClassicCompute/virtualMachines/metrics; Microsoft.ClassicInfrastructureMigrate/classicInfrastructureResources; Microsoft.ClassicNetwork/capabilities; Microsoft.ClassicNetwork/expressRouteCrossConnections; Microsoft.ClassicNetwork/expressRouteCrossConnections/peerings; Microsoft.ClassicNetwork/gatewaySupportedDevices; Microsoft.ClassicNetwork/networkSecurityGroups; Microsoft.ClassicNetwork/operations; Microsoft.ClassicNetwork/quotas; Microsoft.ClassicNetwork/reservedIps; Microsoft.ClassicNetwork/virtualNetworks; Microsoft.ClassicNetwork/virtualNetworks/remoteVirtualNetworkPeeringProxies; Microsoft.ClassicNetwork/virtualNetworks/virtualNetworkPeerings; Microsoft.ClassicStorage/capabilities; Microsoft.ClassicStorage/checkStorageAccountAvailability; Microsoft.ClassicStorage/disks; Microsoft.ClassicStorage/images; Microsoft.ClassicStorage/operations; Microsoft.ClassicStorage/osImages; Microsoft.ClassicStorage/osPlatformImages; Microsoft.ClassicStorage/publicImages; Microsoft.ClassicStorage/quotas; Microsoft.ClassicStorage/storageAccounts; Microsoft.ClassicStorage/storageAccounts/blobServices; Microsoft.ClassicStorage/storageAccounts/fileServices; Microsoft.ClassicStorage/storageAccounts/metricDefinitions; Microsoft.ClassicStorage/storageAccounts/metrics; Microsoft.ClassicStorage/storageAccounts/queueServices; Microsoft.ClassicStorage/storageAccounts/services; Microsoft.ClassicStorage/storageAccounts/services/diagnosticSettings; Microsoft.ClassicStorage/storageAccounts/services/metricDefinitions; Microsoft.ClassicStorage/storageAccounts/services/metrics; Microsoft.ClassicStorage/storageAccounts/tableServices; Microsoft.ClassicStorage/storageAccounts/vmImages; Microsoft.ClassicStorage/vmImages; Microsoft.ClassicSubscription/operations Default 0 0 0 0 0 none Deny the deployment of classic resources /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deny-classic-resources n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false false Audit VMs that do not use managed disks /providers/microsoft.authorization/policydefinitions/06a78e20-9358-41c9-923c-fb736d382a4d BuiltIn Compute False audit Default 0 1 0 1 0 none Deny virtual machines and virtual machine scale sets that do not use managed disk /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deny-unmanageddisk n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false false Configure Azure Activity logs to stream to specified Log Analytics workspace /providers/microsoft.authorization/policydefinitions/2465583e-4e78-4c15-b6be-a36cbc7c8b0f BuiltIn Monitoring False DeployIfNotExists effect=DeployIfNotExists, logAnalytics=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 1 0 1 0 Monitoring Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/dcb59c88-f014-5e17-840c-6c9aecc66286), Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/82f0c3bf-808b-5863-bf9c-231cfbf9598a) Deploy-AzActivity-Log (SPObjId: 217aa040-8eb0-451b-b81c-0b8f3d200d5a) Deploy Diagnostic Settings for Activity Log to Log Analytics workspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-platform-identity-mg false false Management port access from the Internet should be blocked /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/deny-mgmtports-from-internet Custom Network true Deny effect=Deny Default 0 0 0 0 0 none Management port access from the Internet should be blocked /providers/microsoft.management/managementgroups/mibelle-platform-identity-mg/providers/microsoft.authorization/policyassignments/deny-mgmtports-internet n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-platform-identity-mg false false Not allowed resource types /providers/microsoft.authorization/policydefinitions/6c112d4e-5bc7-47ae-a041-ea2d9dccd749 BuiltIn General False Deny effect=Deny, listOfResourceTypesNotAllowed=Microsoft.Network/publicIPAddresses Default 0 0 0 0 0 none Deny the creation of public IP /providers/microsoft.management/managementgroups/mibelle-platform-identity-mg/providers/microsoft.authorization/policyassignments/deny-public-ip n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-platform-mg false false Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics /providers/microsoft.authorization/policydefinitions/052c180e-287d-44c3-86ef-01aeae2d9774 BuiltIn Network False DeployIfNotExists networkWatcherName=/subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourcegroups/networkwatcherrg/providers/microsoft.network/networkwatchers/networkwatcher_northeurope, networkWatcherRG=networkwatcherrg, retentionDays=1, storageId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.storage/storageaccounts/mibmgmtnetprodeunst01, vnetRegion=northeurope, workspaceRegion=westeurope, workspaceResourceId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 0 0 0 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/71689b0c-ca78-4285-9603-49a5497225d8) 97339ff59e1744678fd92dea (SPObjId: c2b8a553-ec19-42b8-8855-6edc985eaffb) Deploy-TrafficAnalytics-NorthEurope /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/97339ff59e1744678fd92dea n/a 09/04/2025 07:21:45 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 09/04/2025 07:34:08 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-platform-mg false false Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics /providers/microsoft.authorization/policydefinitions/052c180e-287d-44c3-86ef-01aeae2d9774 BuiltIn Network False DeployIfNotExists networkWatcherName=/subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourcegroups/networkwatcherrg/providers/microsoft.network/networkwatchers/networkwatcher_westeurope, networkWatcherRG=networkwatcherrg, retentionDays=1, storageId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.storage/storageaccounts/mibmgmtnetprodeuwst01, vnetRegion=westeurope, workspaceRegion=westeurope, workspaceResourceId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 1 0 1 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/21c0b216-76ff-44ef-9430-19f801e102d5) d33eb38085bf40bd860fe43b (SPObjId: 78dd5b73-2109-4a10-b2e4-6463304b4b4d) Deploy-TrafficAnalytics-WestEurope /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/d33eb38085bf40bd860fe43b n/a 06/12/2025 18:15:24 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 09/04/2025 07:24:28 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-platform-mg false false Do not allow deletion of specified resource and resource type /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/denyaction-deleteresources Custom General true DenyAction effect=DenyAction, resourceName=mibelle-mgmt-log-prod-euw-id-01, resourceType=Microsoft.ManagedIdentity/userAssignedIdentities Default 0 0 0 0 0 none Do not allow deletion of the User Assigned Managed Identity used by AMA /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/denyaction-deleteuamiama n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-platform-mg false false Subnets should be private /providers/microsoft.authorization/policydefinitions/7bca8353-aa3b-429b-904a-9229c4385837 BuiltIn Network False Audit Default 1 0 2 0 0 none Subnets should be private /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enforce-subnet-private n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
   Download CSV semicolon | comma
Inheritance ScopeExcluded PolicySet DisplayName PolicySetId Type Category ALZ Parameters Enforcement NonCompliance Message Policies NonCmplnt Policies Compliant Resources NonCmplnt Resources Compliant Resources Conflicting Role/Assignment Managed Identity Assignment DisplayName AssignmentId AssignedBy CreatedOn CreatedBy UpdatedOn UpdatedBy
inherited mibelle-mg false Audit virtual machines for Trusted Launch support /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/audit-trustedlaunch Custom Trusted Launch true Default 0 2 0 3 0 none Audit virtual machines for Trusted Launch support /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-trustedlaunch n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Unused resources driving cost should be avoided /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/audit-unusedresourcescostoptimization Custom Cost Optimization true EffectDisks=Audit, EffectPublicIpAddresses=Audit, EffectServerFarms=Audit Default 0 2 0 3 0 none Unused resources driving cost should be avoided /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-unusedresources n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Microsoft cloud security benchmark /providers/microsoft.authorization/policysetdefinitions/1f3afdf9-d0c9-4c3d-847f-89da613e70a8 BuiltIn Security Center False Default 33 23 8 2 0 none Enable Monitoring in Microsoft Defender for Cloud /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-asc-monitoring n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Enable audit category group resource logging for supported resources to Log Analytics /providers/microsoft.authorization/policysetdefinitions/f5b29bc4-feca-4cc6-a58a-772dd5e290a5 BuiltIn Monitoring False logAnalytics=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 0 0 0 0 Monitoring Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b922046a-7a3e-59da-a982-8a5b855791ce), Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/9df772a7-1ce7-5439-ab6b-5d31d69925cc) Deploy-Diag-Logs (SPObjId: 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57) Enable allLogs category group resource logging for supported resources to Log Analytics /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud /providers/microsoft.authorization/policysetdefinitions/77b391e3-2d5d-40c3-83bf-65c846b3c6a3 BuiltIn Security Center False Default 0 3 0 1 0 Security Admin (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/d730d560-adce-52b7-b10c-36a8ad16a6d3) Deploy-MDEndpointsAMA (SPObjId: 7d365a6d-a7ae-4921-beca-5ce854a76960) Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-mdendpointsama n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Enforce Azure Compute Security Benchmark compliance auditing /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-acsb Custom Guest Configuration true Default 1 2 1 0 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/6e26cd22-b41b-5611-aafc-e2c56b14c060) Enforce-ACSB (SPObjId: e1f2e80c-5329-4804-824d-f0b44713985e) Enforce Azure Compute Security Baseline compliance auditing /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/enforce-acsb n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-platform-mg false Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-aum-checkupdates Custom Security Center true assessmentMode=AutomaticByPlatform Default 0 2 0 1 0 Virtual Machine Contributor (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/51e23aa4-bdf1-5059-8efc-453852a14d5e), Azure Connected Machine Resource Administrator (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/d72b7c0f-a23a-58ed-8e0a-40f49a5b6ab3), Managed Identity Operator (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/1f97b9d8-3c21-5b8b-9b36-72e77d4a90e0) Enable-AUM-CheckUpdates (SPObjId: ce67e461-e4a3-4514-89cb-7eb8802f8f65) Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines. /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates n/a 06/12/2025 17:56:38 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-platform-mg false Enforce recommended guardrails for Azure Key Vault /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-keyvault Custom Key Vault true Default 0 0 0 0 0 none Enforce recommended guardrails for Azure Key Vault /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enforce-gr-keyvault n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Policy Assignment Limit: 0/200
0 Custom Policy definitions scoped
0 Custom PolicySet definitions scoped
0 Blueprints assigned
0 Blueprints scoped
No Classic Administrators
   Download CSV semicolon | comma
  *Depending on the number of rows and your computer´s performance the table may respond with delay, download the csv for better filtering experience
Scope Role RoleId Role Type Data Can do Role assignment Identity Displayname Identity SignInName Identity ObjectId Identity Type Applicability Applies through membership Group Details Role AssignmentId Related Policy Assignment CreatedOn CreatedBy
inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78)
inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/e14ef9ac-25e8-4ee7-887a-a6576bd5229d none 11/28/2025 07:57:36 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78)
inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78)
inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78)
inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False SGU-MIB-RES-Azure-Magr-Mibelle-NetOps 87e9d07b-5340-455c-b297-8bffe3b86f78 Group direct
inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78)
inherited mibelle-mg [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e)
inherited mibelle-mg [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e)
inherited mibelle-mg [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e)
inherited mibelle-mg [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False SGU-MIB-RES-Azure-Magr-Mibelle-SecOps abf39027-4cb4-4298-8951-f984eaf9cb8e Group direct
inherited mibelle-mg Monitoring Contributor 749f88d5-cbae-40b8-bcfc-e573ddc772fa Builtin false False Deploy-AzActivity-Log n/a 217aa040-8eb0-451b-b81c-0b8f3d200d5a SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/dcb59c88-f014-5e17-840c-6c9aecc66286 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log (Configure Azure Activity logs to stream to specified Log Analytics workspace) 06/12/2025 17:56:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Monitoring Contributor 749f88d5-cbae-40b8-bcfc-e573ddc772fa Builtin false False Deploy-Diag-Logs n/a 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b922046a-7a3e-59da-a982-8a5b855791ce /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs (Enable audit category group resource logging for supported resources to Log Analytics) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Log Analytics Contributor 92aaf0da-9dab-42b6-94a3-d43ce8d16293 Builtin false False Deploy-AzActivity-Log n/a 217aa040-8eb0-451b-b81c-0b8f3d200d5a SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/82f0c3bf-808b-5863-bf9c-231cfbf9598a /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log (Configure Azure Activity logs to stream to specified Log Analytics workspace) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Log Analytics Contributor 92aaf0da-9dab-42b6-94a3-d43ce8d16293 Builtin false False Deploy-Diag-Logs n/a 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/9df772a7-1ce7-5439-ab6b-5d31d69925cc /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs (Enable audit category group resource logging for supported resources to Log Analytics) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Meier, Heinz-MIBELLEGROUP heinz.meier@mibelle.net 06addc33-6298-4f01-9f6b-709193f099cc User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Subs-MibelleOnline-SubscriptionOwner n/a 1bdf326c-8c66-4ba9-8c2d-83312a1ddc02 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-Reader n/a 1c529912-c479-41a1-8a03-e57256720fa4 Group direct 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser n/a 1f3ede05-4301-42b1-8c95-2be94290e93c Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Hasanow, Kilian-MIBELLEGROUP kilian.hasanow@mibelle.net 4270eb01-73cf-4e17-925e-47461737b40e User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Mibelle-AzGovWiz-prod n/a 44b03901-55d2-49a8-af3a-58228a81408c SP APP INT indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-michael.peter csa-michael.peter@MIBCloud.mail.onmicrosoft.com 460bad8a-cc4d-41dc-9ddd-f24ba491e2a6 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner n/a 52364002-4a8b-4808-b4fc-864ed5f7d50d Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Matej Paunovski CSA-matej.paunovski@MIBCloud.onmicrosoft.com 54f81d33-50db-475c-b686-4ef70aa0b4fe User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Ouaouane, Taoufik-MIBELLEGROUP taoufik.ouaouane@mibelle.net 7100d1ce-5bd7-449d-abdd-52a7218922b3 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-NetOps n/a 87e9d07b-5340-455c-b297-8bffe3b86f78 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner n/a 9b120856-d4b2-4862-95df-bedf8d5fe1c3 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-Baswaraj Marotrao Ramshette csa-baswarajmarotrao.ramshette@MIBCloud.onmicrosoft.com 9d8d246b-a1f9-4d9a-a54f-f7ae9f3af2ae User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-SecOps n/a abf39027-4cb4-4298-8951-f984eaf9cb8e Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Baumann, Jürg-MIBELLEGROUP juerg.baumann_mibellegroup.com#EXT#@MIBCloud.onmicrosoft.com bb2279b2-06ab-459a-b981-579701601f8a User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin n/a cb058f58-c629-445f-9a10-75f9fcab694e Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Philipp.Schmidt CSA-Philipp.Schmidt@MIBCloud.onmicrosoft.com e40a73c8-6655-434d-8c8b-fdc4d9213499 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Taoufik.Ouaouane csa-Taoufik.Ouaouane@mibelle.net e58ba28f-09ed-49c3-8f5e-31b05c258cde User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Adrian.Bombelka CSA-Adrian.Bombelka@MIBCloud.onmicrosoft.com e86b38a8-e5d4-4888-b09d-390dcf9a2017 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False Enforce-ACSB n/a e1f2e80c-5329-4804-824d-f0b44713985e SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/6e26cd22-b41b-5611-aafc-e2c56b14c060 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/enforce-acsb (Enforce Azure Compute Security Benchmark compliance auditing) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Security Admin fb1c8493-542b-48eb-b624-b4c8fea62acd Builtin false False Deploy-MDEndpointsAMA n/a 7d365a6d-a7ae-4921-beca-5ce854a76960 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/d730d560-adce-52b7-b10c-36a8ad16a6d3 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-mdendpointsama (Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Reservation Purchaser f7b75c60-3036-4b75-91c3-6b41c27c1689 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser 1f3ede05-4301-42b1-8c95-2be94290e93c Group direct
inherited mibelle-mg Reservation Purchaser f7b75c60-3036-4b75-91c3-6b41c27c1689 Builtin false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser (1f3ede05-4301-42b1-8c95-2be94290e93c)
inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e)
inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e)
inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e)
inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin cb058f58-c629-445f-9a10-75f9fcab694e Group direct
inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e)
inherited mibelle-platform-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3)
inherited mibelle-platform-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3)
inherited mibelle-platform-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3)
inherited mibelle-platform-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3)
inherited mibelle-platform-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner 9b120856-d4b2-4862-95df-bedf8d5fe1c3 Group direct
inherited mibelle-platform-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3)
inherited mibelle-platform-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False CSA-Philipp.Schmidt CSA-Philipp.Schmidt@MIBCloud.onmicrosoft.com e40a73c8-6655-434d-8c8b-fdc4d9213499 User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3)
inherited mibelle-platform-mg Virtual Machine Contributor 9980e02c-c2be-4d73-94e8-173b1dc7cf3c Builtin false False Enable-AUM-CheckUpdates n/a ce67e461-e4a3-4514-89cb-7eb8802f8f65 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/51e23aa4-bdf1-5059-8efc-453852a14d5e /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates (Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines) 06/12/2025 17:56:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-platform-mg Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False d33eb38085bf40bd860fe43b n/a 78dd5b73-2109-4a10-b2e4-6463304b4b4d SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/21c0b216-76ff-44ef-9430-19f801e102d5 /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/d33eb38085bf40bd860fe43b (Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics) 06/12/2025 18:15:25 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-platform-mg Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False 97339ff59e1744678fd92dea n/a c2b8a553-ec19-42b8-8855-6edc985eaffb SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/71689b0c-ca78-4285-9603-49a5497225d8 /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/97339ff59e1744678fd92dea (Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics) 09/04/2025 07:21:46 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-platform-mg Azure Connected Machine Resource Administrator cd570a14-e51a-42ad-bac8-bafd67325302 Builtin false False Enable-AUM-CheckUpdates n/a ce67e461-e4a3-4514-89cb-7eb8802f8f65 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/d72b7c0f-a23a-58ed-8e0a-40f49a5b6ab3 /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates (Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines) 06/12/2025 17:56:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-platform-mg Managed Identity Operator f1a07417-d97a-45cb-824c-7a7467783830 Builtin false False Enable-AUM-CheckUpdates n/a ce67e461-e4a3-4514-89cb-7eb8802f8f65 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/1f97b9d8-3c21-5b8b-9b36-72e77d4a90e0 /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates (Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines) 06/12/2025 17:56:41 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited Tenant User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false True CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member direct /providers/microsoft.authorization/roleassignments/3f958da1-722a-4c03-8398-aab60735ecd3 none 05/07/2025 18:14:55 ObjectType: User Member, ObjectDisplayName: CSA-Jan.Stutz, ObjectSignInName: CSA-Jan.Stutz@MIBCloud.onmicrosoft.com, ObjectId: 43b3e278-6551-4566-83a8-c19abe643e64
thisScope Sub v1-custom-role-e1dcabb1-2f79-4eb1-982d-e3df709c24aa 4baaded2-1ae8-d927-8341-6fc59be1ffd6 Custom true False v1-app-registration-e1dcabb1-2f79-4eb1-982d-e3df709c24aa n/a 4518b761-8764-4f6f-aaa4-abf4aee06171 SP APP INT direct /subscriptions/e1dcabb1-2f79-4eb1-982d-e3df709c24aa/providers/microsoft.authorization/roleassignments/955d2a29-0ad9-8e50-9ef7-b0f1c3f0b955 none 10/16/2025 06:56:41 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Highlight Management Group in HierarchyMap

Management Group Name: Management

Management Group Id: mibelle-platform-management-mg

Management Group Path: a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg

0 ManagementGroups below this scope
1 Subscriptions below this scope
Microsoft Defender for Cloud Secure Score: 55 Video , Blog , learn
   Download CSV semicolon | comma
Diagnostic setting Target Target Id Administrative Policy
toLa LA /subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 true true
No Consumption data available as switch parameter -DoAzureConsumption was not applied
   Download CSV semicolon | comma
ResourceType Location Count
microsoft.automation/automationaccounts westeurope 1
microsoft.automation/automationaccounts/runbooks westeurope 1
microsoft.azurearcdata/sqlserverinstances westeurope 40
microsoft.azurearcdata/sqlserverinstances/databases westeurope 296
microsoft.connectedvmwarevsphere/vcenters westeurope 1
microsoft.extendedlocation/customlocations westeurope 1
microsoft.hybridcompute/machines westeurope 116
microsoft.hybridcompute/machines/extensions westeurope 266
microsoft.hybridcompute/privatelinkscopes westeurope 1
microsoft.insights/actiongroups germanywestcentral 1
microsoft.insights/datacollectionendpoints westeurope 1
microsoft.insights/datacollectionrules westeurope 4
microsoft.insights/scheduledqueryrules westeurope 1
microsoft.insights/workbooks westeurope 1
microsoft.keyvault/vaults westeurope 1
microsoft.maintenance/maintenanceconfigurations switzerlandnorth 7
microsoft.maintenance/maintenanceconfigurations westeurope 14
microsoft.managedidentity/userassignedidentities westeurope 1
microsoft.network/networkinterfaces westeurope 1
microsoft.network/networkwatchers westeurope 1
microsoft.network/privateendpoints westeurope 1
microsoft.network/virtualnetworks westeurope 1
microsoft.operationalinsights/querypacks westeurope 1
microsoft.operationalinsights/workspaces westeurope 1
microsoft.resourceconnector/appliances westeurope 1
microsoft.storage/storageaccounts northeurope 1
microsoft.storage/storageaccounts westeurope 3
microsoft.web/certificates westeurope 1
microsoft.web/serverfarms westeurope 1
microsoft.web/sites westeurope 1
   Download CSV semicolon | comma
ResourceType Resource Count Diagnostics capable Metrics Logs LogCategories
microsoft.automation/automationaccounts 1 True True True JobLogs, JobStreams, DscNodeStatus, AuditEvent
microsoft.automation/automationaccounts/runbooks 1 False False False
microsoft.azurearcdata/sqlserverinstances 40 False False False
microsoft.azurearcdata/sqlserverinstances/databases 296 False False False
microsoft.connectedvmwarevsphere/vcenters 1 False False False
microsoft.extendedlocation/customlocations 1 False False False
microsoft.hybridcompute/machines 116 False False False
microsoft.hybridcompute/machines/extensions 266 False False False
microsoft.hybridcompute/privatelinkscopes 1 False False False
microsoft.insights/actiongroups 1 False False False
microsoft.insights/datacollectionendpoints 1 False False False
microsoft.insights/datacollectionrules 4 True True True LogErrors
microsoft.insights/scheduledqueryrules 1 False False False
microsoft.insights/workbooks 1 False False False
microsoft.keyvault/vaults 1 True True True AuditEvent, AzurePolicyEvaluationDetails
microsoft.maintenance/maintenanceconfigurations 21 False False False
microsoft.managedidentity/userassignedidentities 1 False False False
microsoft.network/networkinterfaces 1 True True False
microsoft.network/networkwatchers 1 False False False
microsoft.network/privateendpoints 1 True True False
microsoft.network/virtualnetworks 1 True True True VMProtectionAlerts
microsoft.operationalinsights/querypacks 1 False False False
microsoft.operationalinsights/workspaces 1 True True True Audit, SummaryLogs, Jobs
microsoft.resourceconnector/appliances 1 False False False
microsoft.storage/storageaccounts 4 True True False
microsoft.web/certificates 1 False
microsoft.web/serverfarms 1 True True False
microsoft.web/sites 1 True True True AppServiceHTTPLogs, AppServiceConsoleLogs, AppServiceAppLogs, AppServiceAuditLogs, AppServiceIPSecAuditLogs, AppServicePlatformLogs, AppServiceAuthenticationLogs
PSRule for Azure - integration paused - PSRule for Azure
   Download CSV semicolon | comma
  *Depending on the number of rows and your computer´s performance the table may respond with delay, download the csv for better filtering experience
Inheritance ScopeExcluded Exemption applies Policy DisplayName PolicyId Type Category ALZ Effect Parameters Enforcement NonCompliance Message Policies NonCmplnt Policies Compliant Resources NonCmplnt Resources Compliant Resources Conflicting Role/Assignment Managed Identity Assignment DisplayName AssignmentId AssignedBy CreatedOn CreatedBy UpdatedOn UpdatedBy
inherited mibelle-mg false false Audit resource location matches resource group location /providers/microsoft.authorization/policydefinitions/0a914e76-4921-4c19-b460-a2d36003525a BuiltIn General False audit Default 1 0 2 448 0 none Audit that the resource location matches its resource group location /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-location-match n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false false Not allowed resource types /providers/microsoft.authorization/policydefinitions/6c112d4e-5bc7-47ae-a041-ea2d9dccd749 BuiltIn General False Deny effect=Deny, listOfResourceTypesNotAllowed=Microsoft.ClassicCompute/capabilities; Microsoft.ClassicCompute/checkDomainNameAvailability; Microsoft.ClassicCompute/domainNames; Microsoft.ClassicCompute/domainNames/capabilities; Microsoft.ClassicCompute/domainNames/internalLoadBalancers; Microsoft.ClassicCompute/domainNames/serviceCertificates; Microsoft.ClassicCompute/domainNames/slots; Microsoft.ClassicCompute/domainNames/slots/roles; Microsoft.ClassicCompute/domainNames/slots/roles/metricDefinitions; Microsoft.ClassicCompute/domainNames/slots/roles/metrics; Microsoft.ClassicCompute/moveSubscriptionResources; Microsoft.ClassicCompute/operatingSystemFamilies; Microsoft.ClassicCompute/operatingSystems; Microsoft.ClassicCompute/operations; Microsoft.ClassicCompute/operationStatuses; Microsoft.ClassicCompute/quotas; Microsoft.ClassicCompute/resourceTypes; Microsoft.ClassicCompute/validateSubscriptionMoveAvailability; Microsoft.ClassicCompute/virtualMachines; Microsoft.ClassicCompute/virtualMachines/diagnosticSettings; Microsoft.ClassicCompute/virtualMachines/metricDefinitions; Microsoft.ClassicCompute/virtualMachines/metrics; Microsoft.ClassicInfrastructureMigrate/classicInfrastructureResources; Microsoft.ClassicNetwork/capabilities; Microsoft.ClassicNetwork/expressRouteCrossConnections; Microsoft.ClassicNetwork/expressRouteCrossConnections/peerings; Microsoft.ClassicNetwork/gatewaySupportedDevices; Microsoft.ClassicNetwork/networkSecurityGroups; Microsoft.ClassicNetwork/operations; Microsoft.ClassicNetwork/quotas; Microsoft.ClassicNetwork/reservedIps; Microsoft.ClassicNetwork/virtualNetworks; Microsoft.ClassicNetwork/virtualNetworks/remoteVirtualNetworkPeeringProxies; Microsoft.ClassicNetwork/virtualNetworks/virtualNetworkPeerings; Microsoft.ClassicStorage/capabilities; Microsoft.ClassicStorage/checkStorageAccountAvailability; Microsoft.ClassicStorage/disks; Microsoft.ClassicStorage/images; Microsoft.ClassicStorage/operations; Microsoft.ClassicStorage/osImages; Microsoft.ClassicStorage/osPlatformImages; Microsoft.ClassicStorage/publicImages; Microsoft.ClassicStorage/quotas; Microsoft.ClassicStorage/storageAccounts; Microsoft.ClassicStorage/storageAccounts/blobServices; Microsoft.ClassicStorage/storageAccounts/fileServices; Microsoft.ClassicStorage/storageAccounts/metricDefinitions; Microsoft.ClassicStorage/storageAccounts/metrics; Microsoft.ClassicStorage/storageAccounts/queueServices; Microsoft.ClassicStorage/storageAccounts/services; Microsoft.ClassicStorage/storageAccounts/services/diagnosticSettings; Microsoft.ClassicStorage/storageAccounts/services/metricDefinitions; Microsoft.ClassicStorage/storageAccounts/services/metrics; Microsoft.ClassicStorage/storageAccounts/tableServices; Microsoft.ClassicStorage/storageAccounts/vmImages; Microsoft.ClassicStorage/vmImages; Microsoft.ClassicSubscription/operations Default 0 0 0 0 0 none Deny the deployment of classic resources /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deny-classic-resources n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false false Audit VMs that do not use managed disks /providers/microsoft.authorization/policydefinitions/06a78e20-9358-41c9-923c-fb736d382a4d BuiltIn Compute False audit Default 0 0 0 0 0 none Deny virtual machines and virtual machine scale sets that do not use managed disk /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deny-unmanageddisk n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false false Configure Azure Activity logs to stream to specified Log Analytics workspace /providers/microsoft.authorization/policydefinitions/2465583e-4e78-4c15-b6be-a36cbc7c8b0f BuiltIn Monitoring False DeployIfNotExists effect=DeployIfNotExists, logAnalytics=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 1 0 1 0 0 Monitoring Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/dcb59c88-f014-5e17-840c-6c9aecc66286), Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/82f0c3bf-808b-5863-bf9c-231cfbf9598a) Deploy-AzActivity-Log (SPObjId: 217aa040-8eb0-451b-b81c-0b8f3d200d5a) Deploy Diagnostic Settings for Activity Log to Log Analytics workspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-platform-mg false false Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics /providers/microsoft.authorization/policydefinitions/052c180e-287d-44c3-86ef-01aeae2d9774 BuiltIn Network False DeployIfNotExists networkWatcherName=/subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourcegroups/networkwatcherrg/providers/microsoft.network/networkwatchers/networkwatcher_northeurope, networkWatcherRG=networkwatcherrg, retentionDays=1, storageId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.storage/storageaccounts/mibmgmtnetprodeunst01, vnetRegion=northeurope, workspaceRegion=westeurope, workspaceResourceId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 0 0 0 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/71689b0c-ca78-4285-9603-49a5497225d8) 97339ff59e1744678fd92dea (SPObjId: c2b8a553-ec19-42b8-8855-6edc985eaffb) Deploy-TrafficAnalytics-NorthEurope /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/97339ff59e1744678fd92dea n/a 09/04/2025 07:21:45 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 09/04/2025 07:34:08 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-platform-mg false false Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics /providers/microsoft.authorization/policydefinitions/052c180e-287d-44c3-86ef-01aeae2d9774 BuiltIn Network False DeployIfNotExists networkWatcherName=/subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourcegroups/networkwatcherrg/providers/microsoft.network/networkwatchers/networkwatcher_westeurope, networkWatcherRG=networkwatcherrg, retentionDays=1, storageId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.storage/storageaccounts/mibmgmtnetprodeuwst01, vnetRegion=westeurope, workspaceRegion=westeurope, workspaceResourceId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 1 0 1 0 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/21c0b216-76ff-44ef-9430-19f801e102d5) d33eb38085bf40bd860fe43b (SPObjId: 78dd5b73-2109-4a10-b2e4-6463304b4b4d) Deploy-TrafficAnalytics-WestEurope /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/d33eb38085bf40bd860fe43b n/a 06/12/2025 18:15:24 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 09/04/2025 07:24:28 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-platform-mg false false Do not allow deletion of specified resource and resource type /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/denyaction-deleteresources Custom General true DenyAction effect=DenyAction, resourceName=mibelle-mgmt-log-prod-euw-id-01, resourceType=Microsoft.ManagedIdentity/userAssignedIdentities Default 0 0 0 0 0 none Do not allow deletion of the User Assigned Managed Identity used by AMA /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/denyaction-deleteuamiama n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-platform-mg false false Subnets should be private /providers/microsoft.authorization/policydefinitions/7bca8353-aa3b-429b-904a-9229c4385837 BuiltIn Network False Audit Default 1 0 2 0 0 none Subnets should be private /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enforce-subnet-private n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
   Download CSV semicolon | comma
Inheritance ScopeExcluded PolicySet DisplayName PolicySetId Type Category ALZ Parameters Enforcement NonCompliance Message Policies NonCmplnt Policies Compliant Resources NonCmplnt Resources Compliant Resources Conflicting Role/Assignment Managed Identity Assignment DisplayName AssignmentId AssignedBy CreatedOn CreatedBy UpdatedOn UpdatedBy
inherited mibelle-mg false Audit virtual machines for Trusted Launch support /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/audit-trustedlaunch Custom Trusted Launch true Default 0 0 0 0 0 none Audit virtual machines for Trusted Launch support /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-trustedlaunch n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Unused resources driving cost should be avoided /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/audit-unusedresourcescostoptimization Custom Cost Optimization true EffectDisks=Audit, EffectPublicIpAddresses=Audit, EffectServerFarms=Audit Default 0 1 0 1 0 none Unused resources driving cost should be avoided /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-unusedresources n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Microsoft cloud security benchmark /providers/microsoft.authorization/policysetdefinitions/1f3afdf9-d0c9-4c3d-847f-89da613e70a8 BuiltIn Security Center False Default 36 19 129 40 0 none Enable Monitoring in Microsoft Defender for Cloud /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-asc-monitoring n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Enable audit category group resource logging for supported resources to Log Analytics /providers/microsoft.authorization/policysetdefinitions/f5b29bc4-feca-4cc6-a58a-772dd5e290a5 BuiltIn Monitoring False logAnalytics=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 1 2 1 2 0 Monitoring Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b922046a-7a3e-59da-a982-8a5b855791ce), Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/9df772a7-1ce7-5439-ab6b-5d31d69925cc) Deploy-Diag-Logs (SPObjId: 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57) Enable allLogs category group resource logging for supported resources to Log Analytics /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud /providers/microsoft.authorization/policysetdefinitions/77b391e3-2d5d-40c3-83bf-65c846b3c6a3 BuiltIn Security Center False Default 0 3 0 1 0 Security Admin (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/d730d560-adce-52b7-b10c-36a8ad16a6d3) Deploy-MDEndpointsAMA (SPObjId: 7d365a6d-a7ae-4921-beca-5ce854a76960) Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-mdendpointsama n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Enforce Azure Compute Security Benchmark compliance auditing /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-acsb Custom Guest Configuration true Default 1 0 114 0 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/6e26cd22-b41b-5611-aafc-e2c56b14c060) Enforce-ACSB (SPObjId: e1f2e80c-5329-4804-824d-f0b44713985e) Enforce Azure Compute Security Baseline compliance auditing /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/enforce-acsb n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-platform-mg false Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-aum-checkupdates Custom Security Center true assessmentMode=AutomaticByPlatform Default 0 2 0 116 0 Virtual Machine Contributor (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/51e23aa4-bdf1-5059-8efc-453852a14d5e), Azure Connected Machine Resource Administrator (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/d72b7c0f-a23a-58ed-8e0a-40f49a5b6ab3), Managed Identity Operator (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/1f97b9d8-3c21-5b8b-9b36-72e77d4a90e0) Enable-AUM-CheckUpdates (SPObjId: ce67e461-e4a3-4514-89cb-7eb8802f8f65) Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines. /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates n/a 06/12/2025 17:56:38 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-platform-mg false Enforce recommended guardrails for Azure Key Vault /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-keyvault Custom Key Vault true Default 3 5 1 0 0 none Enforce recommended guardrails for Azure Key Vault /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enforce-gr-keyvault n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Policy Assignment Limit: 0/200
0 Custom Policy definitions scoped
0 Custom PolicySet definitions scoped
0 Blueprints scoped
   Download CSV semicolon | comma
  *Depending on the number of rows and your computer´s performance the table may respond with delay, download the csv for better filtering experience
Scope Role RoleId Role Type Data Can do Role assignment Identity Displayname Identity SignInName Identity ObjectId Identity Type Applicability Applies through membership Group Details Role AssignmentId Related Policy Assignment CreatedOn CreatedBy
inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/e14ef9ac-25e8-4ee7-887a-a6576bd5229d none 11/28/2025 07:57:36 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Monitoring Contributor 749f88d5-cbae-40b8-bcfc-e573ddc772fa Builtin false False Deploy-AzActivity-Log n/a 217aa040-8eb0-451b-b81c-0b8f3d200d5a SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/dcb59c88-f014-5e17-840c-6c9aecc66286 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log (Configure Azure Activity logs to stream to specified Log Analytics workspace) 06/12/2025 17:56:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Monitoring Contributor 749f88d5-cbae-40b8-bcfc-e573ddc772fa Builtin false False Deploy-Diag-Logs n/a 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b922046a-7a3e-59da-a982-8a5b855791ce /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs (Enable audit category group resource logging for supported resources to Log Analytics) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Log Analytics Contributor 92aaf0da-9dab-42b6-94a3-d43ce8d16293 Builtin false False Deploy-AzActivity-Log n/a 217aa040-8eb0-451b-b81c-0b8f3d200d5a SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/82f0c3bf-808b-5863-bf9c-231cfbf9598a /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log (Configure Azure Activity logs to stream to specified Log Analytics workspace) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Log Analytics Contributor 92aaf0da-9dab-42b6-94a3-d43ce8d16293 Builtin false False Deploy-Diag-Logs n/a 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/9df772a7-1ce7-5439-ab6b-5d31d69925cc /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs (Enable audit category group resource logging for supported resources to Log Analytics) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Meier, Heinz-MIBELLEGROUP heinz.meier@mibelle.net 06addc33-6298-4f01-9f6b-709193f099cc User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Subs-MibelleOnline-SubscriptionOwner n/a 1bdf326c-8c66-4ba9-8c2d-83312a1ddc02 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-Reader n/a 1c529912-c479-41a1-8a03-e57256720fa4 Group direct 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser n/a 1f3ede05-4301-42b1-8c95-2be94290e93c Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Hasanow, Kilian-MIBELLEGROUP kilian.hasanow@mibelle.net 4270eb01-73cf-4e17-925e-47461737b40e User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Mibelle-AzGovWiz-prod n/a 44b03901-55d2-49a8-af3a-58228a81408c SP APP INT indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-michael.peter csa-michael.peter@MIBCloud.mail.onmicrosoft.com 460bad8a-cc4d-41dc-9ddd-f24ba491e2a6 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner n/a 52364002-4a8b-4808-b4fc-864ed5f7d50d Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Matej Paunovski CSA-matej.paunovski@MIBCloud.onmicrosoft.com 54f81d33-50db-475c-b686-4ef70aa0b4fe User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Ouaouane, Taoufik-MIBELLEGROUP taoufik.ouaouane@mibelle.net 7100d1ce-5bd7-449d-abdd-52a7218922b3 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-NetOps n/a 87e9d07b-5340-455c-b297-8bffe3b86f78 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner n/a 9b120856-d4b2-4862-95df-bedf8d5fe1c3 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-Baswaraj Marotrao Ramshette csa-baswarajmarotrao.ramshette@MIBCloud.onmicrosoft.com 9d8d246b-a1f9-4d9a-a54f-f7ae9f3af2ae User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-SecOps n/a abf39027-4cb4-4298-8951-f984eaf9cb8e Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Baumann, Jürg-MIBELLEGROUP juerg.baumann_mibellegroup.com#EXT#@MIBCloud.onmicrosoft.com bb2279b2-06ab-459a-b981-579701601f8a User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin n/a cb058f58-c629-445f-9a10-75f9fcab694e Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Philipp.Schmidt CSA-Philipp.Schmidt@MIBCloud.onmicrosoft.com e40a73c8-6655-434d-8c8b-fdc4d9213499 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Taoufik.Ouaouane csa-Taoufik.Ouaouane@mibelle.net e58ba28f-09ed-49c3-8f5e-31b05c258cde User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Adrian.Bombelka CSA-Adrian.Bombelka@MIBCloud.onmicrosoft.com e86b38a8-e5d4-4888-b09d-390dcf9a2017 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False Enforce-ACSB n/a e1f2e80c-5329-4804-824d-f0b44713985e SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/6e26cd22-b41b-5611-aafc-e2c56b14c060 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/enforce-acsb (Enforce Azure Compute Security Benchmark compliance auditing) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Security Admin fb1c8493-542b-48eb-b624-b4c8fea62acd Builtin false False Deploy-MDEndpointsAMA n/a 7d365a6d-a7ae-4921-beca-5ce854a76960 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/d730d560-adce-52b7-b10c-36a8ad16a6d3 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-mdendpointsama (Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-platform-mg Virtual Machine Contributor 9980e02c-c2be-4d73-94e8-173b1dc7cf3c Builtin false False Enable-AUM-CheckUpdates n/a ce67e461-e4a3-4514-89cb-7eb8802f8f65 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/51e23aa4-bdf1-5059-8efc-453852a14d5e /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates (Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines) 06/12/2025 17:56:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-platform-mg Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False d33eb38085bf40bd860fe43b n/a 78dd5b73-2109-4a10-b2e4-6463304b4b4d SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/21c0b216-76ff-44ef-9430-19f801e102d5 /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/d33eb38085bf40bd860fe43b (Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics) 06/12/2025 18:15:25 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-platform-mg Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False 97339ff59e1744678fd92dea n/a c2b8a553-ec19-42b8-8855-6edc985eaffb SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/71689b0c-ca78-4285-9603-49a5497225d8 /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/97339ff59e1744678fd92dea (Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics) 09/04/2025 07:21:46 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-platform-mg Azure Connected Machine Resource Administrator cd570a14-e51a-42ad-bac8-bafd67325302 Builtin false False Enable-AUM-CheckUpdates n/a ce67e461-e4a3-4514-89cb-7eb8802f8f65 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/d72b7c0f-a23a-58ed-8e0a-40f49a5b6ab3 /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates (Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines) 06/12/2025 17:56:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-platform-mg Managed Identity Operator f1a07417-d97a-45cb-824c-7a7467783830 Builtin false False Enable-AUM-CheckUpdates n/a ce67e461-e4a3-4514-89cb-7eb8802f8f65 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/1f97b9d8-3c21-5b8b-9b36-72e77d4a90e0 /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates (Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines) 06/12/2025 17:56:41 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited Tenant User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false True CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member direct /providers/microsoft.authorization/roleassignments/3f958da1-722a-4c03-8398-aab60735ecd3 none 05/07/2025 18:14:55 ObjectType: User Member, ObjectDisplayName: CSA-Jan.Stutz, ObjectSignInName: CSA-Jan.Stutz@MIBCloud.onmicrosoft.com, ObjectId: 43b3e278-6551-4566-83a8-c19abe643e64
inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78)
inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78)
inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78)
inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78)
inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False SGU-MIB-RES-Azure-Magr-Mibelle-NetOps 87e9d07b-5340-455c-b297-8bffe3b86f78 Group direct
inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78)
inherited mibelle-mg [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e)
inherited mibelle-mg [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e)
inherited mibelle-mg [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e)
inherited mibelle-mg [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False SGU-MIB-RES-Azure-Magr-Mibelle-SecOps abf39027-4cb4-4298-8951-f984eaf9cb8e Group direct
inherited mibelle-mg Reservation Purchaser f7b75c60-3036-4b75-91c3-6b41c27c1689 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser 1f3ede05-4301-42b1-8c95-2be94290e93c Group direct
inherited mibelle-mg Reservation Purchaser f7b75c60-3036-4b75-91c3-6b41c27c1689 Builtin false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser (1f3ede05-4301-42b1-8c95-2be94290e93c)
inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e)
inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e)
inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e)
inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin cb058f58-c629-445f-9a10-75f9fcab694e Group direct
inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e)
inherited mibelle-platform-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3)
inherited mibelle-platform-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3)
inherited mibelle-platform-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3)
inherited mibelle-platform-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3)
inherited mibelle-platform-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner 9b120856-d4b2-4862-95df-bedf8d5fe1c3 Group direct
inherited mibelle-platform-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3)
inherited mibelle-platform-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False CSA-Philipp.Schmidt CSA-Philipp.Schmidt@MIBCloud.onmicrosoft.com e40a73c8-6655-434d-8c8b-fdc4d9213499 User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3)
mibelle-management (fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b)
Highlight Subscription in HierarchyMap
Subscription Name: mibelle-management
Subscription Id: fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b
Subscription Path: a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-platform-mg/mibelle-platform-management-mg/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b
State: Enabled
QuotaId: PayAsYouGo_2014-09-01
Microsoft Defender for Cloud Secure Score: 55% (13.75 of 25 points) Video , Blog , learn
Microsoft Defender for Cloud 'Email notifications' state: n/a
Microsoft Defender for Cloud 'Email notifications' severity: n/a
Microsoft Defender for Cloud 'Email notifications' roles: n/a
Microsoft Defender for Cloud 'Email notifications' emails: n/a
   Download CSV semicolon | comma
Plan Tier
AI Free
Api Free
AppServices Free
Arm Free
CloudPosture Free
ContainerRegistry Free
Containers Free
CosmosDbs Free
Discovery Standard
Dns Free
FoundationalCspm Standard
KeyVaults Free
KubernetesService Free
OpenSourceRelationalDatabases Free
SqlServers Free
SqlServerVirtualMachines Free
StorageAccounts Free
VirtualMachines Free
No Subscription Diagnostic settings learn
0 Subscription Tags
   Resource naming and tagging decision guide learn
   Download CSV semicolon | comma
Scope TagName Count
Resource Environment 5
Resource hidden-title 1
Resource ms-resource-usage 1
Resource TAG-Mibellegroup-Server-Update 114
No Consumption data available as switch parameter -DoAzureConsumption was not applied
7 Resource Groups | Limit: (7/980)
   Download CSV semicolon | comma
Provider State
microsoft.insights Registered
Microsoft.ManagedIdentity Registered
Microsoft.OperationalInsights Registered
Microsoft.Advisor Registered
Microsoft.Security Registered
Microsoft.AlertsManagement Registered
Microsoft.Kubernetes Registered
Microsoft.ResourceConnector Registered
Microsoft.ConnectedVMwarevSphere Registered
Microsoft.ExtendedLocation Registered
Microsoft.KubernetesConfiguration Registered
Microsoft.HybridCompute Registered
Microsoft.Automation Registered
Microsoft.Network Registered
Microsoft.HybridConnectivity Registered
Microsoft.AzureArcData Registered
Microsoft.Management Registered
Microsoft.Web Registered
Microsoft.KeyVault Registered
Microsoft.CloudShell Registered
Microsoft.GuestConfiguration Registered
Microsoft.PolicyInsights Registered
Microsoft.Maintenance Registered
Microsoft.Capacity Registered
Microsoft.Storage Registered
Microsoft.Help Registered
ArizeAi.ObservabilityEval NotRegistered
Astronomer.Astro NotRegistered
Dell.Storage NotRegistered
Dynatrace.Observability NotRegistered
GitHub.Network NotRegistered
Informatica.DataManagement NotRegistered
LambdaTest.HyperExecute NotRegistered
Liftrbasic.Samplerp NotRegistered
Microsoft.AAD NotRegistered
Microsoft.AadCustomSecurityAttributesDiagnosticSettings NotRegistered
microsoft.aadiam NotRegistered
Microsoft.Addons NotRegistered
Microsoft.ADHybridHealthService Registered
Microsoft.AgFoodPlatform NotRegistered
Microsoft.AgriculturePlatform NotRegistered
Microsoft.AnalysisServices NotRegistered
Microsoft.ApiCenter NotRegistered
Microsoft.ApiManagement NotRegistered
Microsoft.App NotRegistered
Microsoft.AppAssessment NotRegistered
Microsoft.AppComplianceAutomation NotRegistered
Microsoft.AppConfiguration NotRegistered
Microsoft.ApplicationMigration NotRegistered
Microsoft.AppLink NotRegistered
Microsoft.AppPlatform NotRegistered
Microsoft.ArcContainerStorage NotRegistered
Microsoft.Attestation NotRegistered
Microsoft.Authorization Registered
Microsoft.Automanage NotRegistered
Microsoft.AVS NotRegistered
Microsoft.AwsConnector NotRegistered
Microsoft.AzureActiveDirectory NotRegistered
Microsoft.AzureBusinessContinuity NotRegistered
Microsoft.AzureDataTransfer NotRegistered
Microsoft.AzureFleet NotRegistered
Microsoft.AzureImageTestingForLinux NotRegistered
Microsoft.AzureLargeInstance NotRegistered
Microsoft.AzurePlaywrightService NotRegistered
Microsoft.AzureResilienceManagement NotRegistered
Microsoft.AzureScan NotRegistered
Microsoft.AzureSphere NotRegistered
Microsoft.AzureStack NotRegistered
Microsoft.AzureStackHCI NotRegistered
Microsoft.AzureTerraform NotRegistered
Microsoft.BackupSolutions NotRegistered
Microsoft.BareMetal NotRegistered
Microsoft.BareMetalInfrastructure NotRegistered
Microsoft.Batch NotRegistered
Microsoft.Billing Registered
Microsoft.BillingBenefits NotRegistered
Microsoft.Bing NotRegistered
Microsoft.BlockchainTokens NotRegistered
Microsoft.Blueprint NotRegistered
Microsoft.BotService NotRegistered
Microsoft.Cache NotRegistered
Microsoft.Carbon NotRegistered
Microsoft.Cdn NotRegistered
Microsoft.CertificateRegistration NotRegistered
Microsoft.ChangeSafety Registered
Microsoft.Chaos NotRegistered
Microsoft.ClassicCompute NotRegistered
Microsoft.ClassicInfrastructureMigrate NotRegistered
Microsoft.ClassicNetwork NotRegistered
Microsoft.ClassicStorage NotRegistered
Microsoft.ClassicSubscription Registered
Microsoft.CleanRoom NotRegistered
Microsoft.CloudDevicePlatform NotRegistered
Microsoft.CloudHealth NotRegistered
Microsoft.CloudTest NotRegistered
Microsoft.CodeSigning NotRegistered
Microsoft.CognitiveServices NotRegistered
Microsoft.Commerce Registered
Microsoft.Communication NotRegistered
Microsoft.Community NotRegistered
Microsoft.Compute NotRegistered
Microsoft.ComputeLimit NotRegistered
Microsoft.ComputeSchedule NotRegistered
Microsoft.ConfidentialLedger NotRegistered
Microsoft.Confluent NotRegistered
Microsoft.ConnectedCache NotRegistered
Microsoft.ConnectedCredentials NotRegistered
microsoft.connectedopenstack NotRegistered
Microsoft.ConnectedVehicle NotRegistered
Microsoft.Consumption Registered
Microsoft.ContainerInstance NotRegistered
Microsoft.ContainerRegistry NotRegistered
Microsoft.ContainerService NotRegistered
Microsoft.CostManagement Registered
Microsoft.CostManagementExports NotRegistered
Microsoft.CustomerLockbox NotRegistered
Microsoft.CustomProviders NotRegistered
Microsoft.D365CustomerInsights NotRegistered
Microsoft.Dashboard NotRegistered
Microsoft.DatabaseFleetManager NotRegistered
Microsoft.DatabaseWatcher NotRegistered
Microsoft.DataBox NotRegistered
Microsoft.DataBoxEdge NotRegistered
Microsoft.Databricks NotRegistered
Microsoft.Datadog NotRegistered
Microsoft.DataFactory NotRegistered
Microsoft.DataLakeAnalytics NotRegistered
Microsoft.DataLakeStore NotRegistered
Microsoft.DataMigration NotRegistered
Microsoft.DataProtection NotRegistered
Microsoft.DataReplication NotRegistered
Microsoft.DataShare NotRegistered
Microsoft.DBforMariaDB NotRegistered
Microsoft.DBforMySQL NotRegistered
Microsoft.DBforPostgreSQL NotRegistered
Microsoft.DependencyMap NotRegistered
Microsoft.DesktopVirtualization NotRegistered
Microsoft.DevCenter NotRegistered
Microsoft.DevelopmentWindows365 NotRegistered
Microsoft.DevHub NotRegistered
Microsoft.DeviceOnboarding NotRegistered
Microsoft.DeviceRegistry NotRegistered
Microsoft.Devices NotRegistered
Microsoft.DeviceUpdate NotRegistered
Microsoft.DevOpsInfrastructure NotRegistered
Microsoft.DevTestLab NotRegistered
Microsoft.DigitalTwins NotRegistered
Microsoft.Discovery NotRegistered
Microsoft.DocumentDB NotRegistered
Microsoft.DomainRegistration NotRegistered
Microsoft.DurableTask NotRegistered
Microsoft.Easm NotRegistered
Microsoft.Edge NotRegistered
Microsoft.EdgeManagement NotRegistered
Microsoft.EdgeMarketplace NotRegistered
Microsoft.EdgeOrder NotRegistered
Microsoft.EdgeOrderPartner NotRegistered
Microsoft.EdgeZones NotRegistered
Microsoft.Elastic NotRegistered
Microsoft.ElasticSan NotRegistered
Microsoft.EnterpriseSupport NotRegistered
Microsoft.EntitlementManagement NotRegistered
Microsoft.EntraIDGovernance NotRegistered
Microsoft.EntraIdGovernanceAccelerator NotRegistered
Microsoft.ErrorAtlas NotRegistered
Microsoft.EventGrid NotRegistered
Microsoft.EventHub NotRegistered
Microsoft.Experimentation NotRegistered
Microsoft.Fabric NotRegistered
Microsoft.Features Registered
Microsoft.FileShares NotRegistered
Microsoft.FluidRelay NotRegistered
Microsoft.GCPConnector NotRegistered
Microsoft.GraphServices NotRegistered
Microsoft.HanaOnAzure NotRegistered
Microsoft.HardwareSecurityModules NotRegistered
Microsoft.HDInsight NotRegistered
Microsoft.HealthBot NotRegistered
Microsoft.HealthcareApis NotRegistered
Microsoft.HealthcareInterop NotRegistered
Microsoft.HealthDataAIServices NotRegistered
Microsoft.HealthModel NotRegistered
Microsoft.HealthPlatform NotRegistered
Microsoft.HybridCloud NotRegistered
Microsoft.HybridContainerService NotRegistered
Microsoft.HybridNetwork NotRegistered
Microsoft.Impact NotRegistered
Microsoft.IntegrationSpaces NotRegistered
Microsoft.IoTCentral NotRegistered
Microsoft.IoTFirmwareDefense NotRegistered
Microsoft.IoTOperations NotRegistered
Microsoft.IoTOperationsDataProcessor NotRegistered
Microsoft.IoTSecurity NotRegistered
Microsoft.KubernetesRuntime NotRegistered
Microsoft.Kusto NotRegistered
Microsoft.LabServices NotRegistered
Microsoft.LoadTestService NotRegistered
Microsoft.Logic NotRegistered
Microsoft.MachineLearningServices NotRegistered
Microsoft.ManagedNetworkFabric NotRegistered
Microsoft.ManagedServices NotRegistered
Microsoft.Maps NotRegistered
Microsoft.Marketplace NotRegistered
Microsoft.MarketplaceOrdering Registered
Microsoft.MessagingCatalog NotRegistered
Microsoft.MessagingConnectors NotRegistered
Microsoft.Migrate NotRegistered
Microsoft.Mission NotRegistered
Microsoft.Monitor NotRegistered
Microsoft.MySQLDiscovery NotRegistered
Microsoft.NetApp NotRegistered
Microsoft.NetworkCloud NotRegistered
Microsoft.NetworkFunction NotRegistered
Microsoft.NexusIdentity NotRegistered
Microsoft.NotificationHubs NotRegistered
Microsoft.Nutanix NotRegistered
Microsoft.ObjectStore NotRegistered
Microsoft.OffAzure NotRegistered
Microsoft.OffAzureSpringBoot NotRegistered
Microsoft.OnlineExperimentation NotRegistered
Microsoft.OpenEnergyPlatform NotRegistered
Microsoft.OperationsManagement NotRegistered
Microsoft.OperatorVoicemail NotRegistered
Microsoft.OracleDiscovery NotRegistered
Microsoft.Orbital NotRegistered
Microsoft.PartnerManagedConsumerRecurrence NotRegistered
Microsoft.Peering NotRegistered
Microsoft.Pki NotRegistered
Microsoft.Portal Registered
Microsoft.PortalServices NotRegistered
Microsoft.PowerBI NotRegistered
Microsoft.PowerBIDedicated NotRegistered
Microsoft.PowerPlatform NotRegistered
Microsoft.Premonition NotRegistered
Microsoft.ProfessionalService NotRegistered
Microsoft.ProviderHub NotRegistered
Microsoft.Purview NotRegistered
Microsoft.Quantum NotRegistered
Microsoft.Quota NotRegistered
Microsoft.RecommendationsService NotRegistered
Microsoft.RecoveryServices NotRegistered
Microsoft.RedHatOpenShift NotRegistered
Microsoft.Relationships NotRegistered
Microsoft.Relay NotRegistered
Microsoft.ResourceBuilder NotRegistered
Microsoft.ResourceGraph Registered
Microsoft.ResourceHealth NotRegistered
Microsoft.ResourceIntelligence Registered
Microsoft.ResourceNotifications Registered
Microsoft.Resources Registered
Microsoft.SaaS NotRegistered
Microsoft.SaaSHub NotRegistered
Microsoft.Scom NotRegistered
Microsoft.SCVMM NotRegistered
Microsoft.Search NotRegistered
Microsoft.SecretSyncController NotRegistered
Microsoft.SecurityCopilot NotRegistered
Microsoft.SecurityDetonation NotRegistered
Microsoft.SecurityInsights NotRegistered
Microsoft.SecurityPlatform NotRegistered
Microsoft.SentinelPlatformServices NotRegistered
Microsoft.SerialConsole Registered
Microsoft.ServiceBus NotRegistered
Microsoft.ServiceFabric NotRegistered
Microsoft.ServiceFabricMesh NotRegistered
Microsoft.ServiceLinker NotRegistered
Microsoft.ServiceNetworking NotRegistered
Microsoft.ServicesHub NotRegistered
Microsoft.SignalRService NotRegistered
Microsoft.Singularity NotRegistered
Microsoft.SoftwarePlan NotRegistered
Microsoft.Solutions NotRegistered
Microsoft.Sovereign NotRegistered
Microsoft.Sql NotRegistered
Microsoft.SqlVirtualMachine NotRegistered
Microsoft.StandbyPool NotRegistered
Microsoft.StorageActions NotRegistered
Microsoft.StorageCache NotRegistered
Microsoft.StorageDiscovery NotRegistered
Microsoft.StorageMover NotRegistered
Microsoft.StorageSync NotRegistered
Microsoft.StorageTasks NotRegistered
Microsoft.StreamAnalytics NotRegistered
Microsoft.Subscription NotRegistered
Microsoft.SupercomputerInfrastructure NotRegistered
microsoft.support Registered
Microsoft.SustainabilityServices NotRegistered
Microsoft.Synapse NotRegistered
Microsoft.Syntex NotRegistered
Microsoft.ToolchainOrchestrator NotRegistered
Microsoft.UpdateManager NotRegistered
Microsoft.UsageBilling NotRegistered
Microsoft.Validate NotRegistered
Microsoft.VerifiedId NotRegistered
Microsoft.VideoIndexer NotRegistered
Microsoft.VirtualMachineImages NotRegistered
microsoft.visualstudio NotRegistered
Microsoft.VMware NotRegistered
Microsoft.VoiceServices NotRegistered
Microsoft.WeightsAndBiases NotRegistered
Microsoft.Windows365 NotRegistered
Microsoft.WindowsPushNotificationServices NotRegistered
Microsoft.WorkloadBuilder NotRegistered
Microsoft.Workloads NotRegistered
MongoDB.Atlas NotRegistered
Neon.Postgres NotRegistered
NewRelic.Observability NotRegistered
NGINX.NGINXPLUS NotRegistered
Oracle.Database NotRegistered
PaloAltoNetworks.Cloudngfw NotRegistered
Pinecone.VectorDb NotRegistered
PureStorage.Block NotRegistered
Qumulo.Storage NotRegistered
0 enabled Subscription Features learn
0 Resource Locks learn
   Download CSV semicolon | comma
ResourceType Location Count
microsoft.automation/automationaccounts westeurope 1
microsoft.automation/automationaccounts/runbooks westeurope 1
microsoft.azurearcdata/sqlserverinstances westeurope 40
microsoft.azurearcdata/sqlserverinstances/databases westeurope 296
microsoft.connectedvmwarevsphere/vcenters westeurope 1
microsoft.extendedlocation/customlocations westeurope 1
microsoft.hybridcompute/machines westeurope 116
microsoft.hybridcompute/machines/extensions westeurope 266
microsoft.hybridcompute/privatelinkscopes westeurope 1
microsoft.insights/actiongroups germanywestcentral 1
microsoft.insights/datacollectionendpoints westeurope 1
microsoft.insights/datacollectionrules westeurope 4
microsoft.insights/scheduledqueryrules westeurope 1
microsoft.insights/workbooks westeurope 1
microsoft.keyvault/vaults westeurope 1
microsoft.maintenance/maintenanceconfigurations switzerlandnorth 7
microsoft.maintenance/maintenanceconfigurations westeurope 14
microsoft.managedidentity/userassignedidentities westeurope 1
microsoft.network/networkinterfaces westeurope 1
microsoft.network/networkwatchers westeurope 1
microsoft.network/privateendpoints westeurope 1
microsoft.network/virtualnetworks westeurope 1
microsoft.operationalinsights/querypacks westeurope 1
microsoft.operationalinsights/workspaces westeurope 1
microsoft.resourceconnector/appliances westeurope 1
microsoft.storage/storageaccounts northeurope 1
microsoft.storage/storageaccounts westeurope 3
microsoft.web/certificates westeurope 1
microsoft.web/serverfarms westeurope 1
microsoft.web/sites westeurope 1
   CAF - Recommended abbreviations for Azure resource types learn
   Resource details can be found in the CSV output *_ResourcesAll.csv
   Download CSV semicolon | comma
ResourceType Recommendation ResourceFriendlyName passed failed passed percentage
microsoft.automation/automationaccounts aa- Automation account 0 1 0%
microsoft.hybridcompute/machines arcs- Azure Arc enabled server 0 116 0%
microsoft.insights/actiongroups ag- Azure Monitor action group 0 1 0%
microsoft.keyvault/vaults kv- Key vault 0 1 0%
microsoft.managedidentity/userassignedidentities id- Managed Identity 0 1 0%
microsoft.network/networkinterfaces nic- Network interface (NIC) 0 1 0%
microsoft.network/networkwatchers nw- Network Watcher 0 1 0%
microsoft.network/virtualnetworks vnet- Virtual network 0 1 0%
microsoft.operationalinsights/workspaces log- Log Analytics workspace 0 1 0%
microsoft.storage/storageaccounts st, stvm Storage account, VM storage account 0 4 0%
microsoft.web/serverfarms plan- App Service plan 0 1 0%
microsoft.web/sites app-, func-, ase- Web app, Function app, App Service environment 0 1 0%
No cost optimization & cleanup
   Download CSV semicolon | comma
ResourceType Resource Count Diagnostics capable Metrics Logs LogCategories
microsoft.automation/automationaccounts 1 True True True JobLogs, JobStreams, DscNodeStatus, AuditEvent
microsoft.automation/automationaccounts/runbooks 1 False False False
microsoft.azurearcdata/sqlserverinstances 40 False False False
microsoft.azurearcdata/sqlserverinstances/databases 296 False False False
microsoft.connectedvmwarevsphere/vcenters 1 False False False
microsoft.extendedlocation/customlocations 1 False False False
microsoft.hybridcompute/machines 116 False False False
microsoft.hybridcompute/machines/extensions 266 False False False
microsoft.hybridcompute/privatelinkscopes 1 False False False
microsoft.insights/actiongroups 1 False False False
microsoft.insights/datacollectionendpoints 1 False False False
microsoft.insights/datacollectionrules 4 True True True LogErrors
microsoft.insights/scheduledqueryrules 1 False False False
microsoft.insights/workbooks 1 False False False
microsoft.keyvault/vaults 1 True True True AuditEvent, AzurePolicyEvaluationDetails
microsoft.maintenance/maintenanceconfigurations 21 False False False
microsoft.managedidentity/userassignedidentities 1 False False False
microsoft.network/networkinterfaces 1 True True False
microsoft.network/networkwatchers 1 False False False
microsoft.network/privateendpoints 1 True True False
microsoft.network/virtualnetworks 1 True True True VMProtectionAlerts
microsoft.operationalinsights/querypacks 1 False False False
microsoft.operationalinsights/workspaces 1 True True True Audit, SummaryLogs, Jobs
microsoft.resourceconnector/appliances 1 False False False
microsoft.storage/storageaccounts 4 True True False
microsoft.web/certificates 1 False
microsoft.web/serverfarms 1 True True False
microsoft.web/sites 1 True True True AppServiceHTTPLogs, AppServiceConsoleLogs, AppServiceAppLogs, AppServiceAuditLogs, AppServiceIPSecAuditLogs, AppServicePlatformLogs, AppServiceAuthenticationLogs
No UserAssigned Managed Identities assigned to Resources / vice versa - at all
PSRule for Azure - integration paused - PSRule for Azure
   Download CSV semicolon | comma
  *Depending on the number of rows and your computer´s performance the table may respond with delay, download the csv for better filtering experience
Inheritance ScopeExcluded Exemption applies Policy DisplayName PolicyId Type Category ALZ Effect Parameters Enforcement NonCompliance Message Policies NonCmplnt Policies Compliant Resources NonCmplnt Resources Compliant Resources Conflicting Role/Assignment Managed Identity Assignment DisplayName AssignmentId AssignedBy CreatedOn CreatedBy UpdatedOn UpdatedBy
inherited mibelle-mg false false Audit resource location matches resource group location /providers/microsoft.authorization/policydefinitions/0a914e76-4921-4c19-b460-a2d36003525a BuiltIn General False audit Default 1 0 2 448 0 none Audit that the resource location matches its resource group location /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-location-match n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false false Not allowed resource types /providers/microsoft.authorization/policydefinitions/6c112d4e-5bc7-47ae-a041-ea2d9dccd749 BuiltIn General False Deny effect=Deny, listOfResourceTypesNotAllowed=Microsoft.ClassicCompute/capabilities; Microsoft.ClassicCompute/checkDomainNameAvailability; Microsoft.ClassicCompute/domainNames; Microsoft.ClassicCompute/domainNames/capabilities; Microsoft.ClassicCompute/domainNames/internalLoadBalancers; Microsoft.ClassicCompute/domainNames/serviceCertificates; Microsoft.ClassicCompute/domainNames/slots; Microsoft.ClassicCompute/domainNames/slots/roles; Microsoft.ClassicCompute/domainNames/slots/roles/metricDefinitions; Microsoft.ClassicCompute/domainNames/slots/roles/metrics; Microsoft.ClassicCompute/moveSubscriptionResources; Microsoft.ClassicCompute/operatingSystemFamilies; Microsoft.ClassicCompute/operatingSystems; Microsoft.ClassicCompute/operations; Microsoft.ClassicCompute/operationStatuses; Microsoft.ClassicCompute/quotas; Microsoft.ClassicCompute/resourceTypes; Microsoft.ClassicCompute/validateSubscriptionMoveAvailability; Microsoft.ClassicCompute/virtualMachines; Microsoft.ClassicCompute/virtualMachines/diagnosticSettings; Microsoft.ClassicCompute/virtualMachines/metricDefinitions; Microsoft.ClassicCompute/virtualMachines/metrics; Microsoft.ClassicInfrastructureMigrate/classicInfrastructureResources; Microsoft.ClassicNetwork/capabilities; Microsoft.ClassicNetwork/expressRouteCrossConnections; Microsoft.ClassicNetwork/expressRouteCrossConnections/peerings; Microsoft.ClassicNetwork/gatewaySupportedDevices; Microsoft.ClassicNetwork/networkSecurityGroups; Microsoft.ClassicNetwork/operations; Microsoft.ClassicNetwork/quotas; Microsoft.ClassicNetwork/reservedIps; Microsoft.ClassicNetwork/virtualNetworks; Microsoft.ClassicNetwork/virtualNetworks/remoteVirtualNetworkPeeringProxies; Microsoft.ClassicNetwork/virtualNetworks/virtualNetworkPeerings; Microsoft.ClassicStorage/capabilities; Microsoft.ClassicStorage/checkStorageAccountAvailability; Microsoft.ClassicStorage/disks; Microsoft.ClassicStorage/images; Microsoft.ClassicStorage/operations; Microsoft.ClassicStorage/osImages; Microsoft.ClassicStorage/osPlatformImages; Microsoft.ClassicStorage/publicImages; Microsoft.ClassicStorage/quotas; Microsoft.ClassicStorage/storageAccounts; Microsoft.ClassicStorage/storageAccounts/blobServices; Microsoft.ClassicStorage/storageAccounts/fileServices; Microsoft.ClassicStorage/storageAccounts/metricDefinitions; Microsoft.ClassicStorage/storageAccounts/metrics; Microsoft.ClassicStorage/storageAccounts/queueServices; Microsoft.ClassicStorage/storageAccounts/services; Microsoft.ClassicStorage/storageAccounts/services/diagnosticSettings; Microsoft.ClassicStorage/storageAccounts/services/metricDefinitions; Microsoft.ClassicStorage/storageAccounts/services/metrics; Microsoft.ClassicStorage/storageAccounts/tableServices; Microsoft.ClassicStorage/storageAccounts/vmImages; Microsoft.ClassicStorage/vmImages; Microsoft.ClassicSubscription/operations Default 0 0 0 0 0 none Deny the deployment of classic resources /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deny-classic-resources n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false false Audit VMs that do not use managed disks /providers/microsoft.authorization/policydefinitions/06a78e20-9358-41c9-923c-fb736d382a4d BuiltIn Compute False audit Default 0 0 0 0 0 none Deny virtual machines and virtual machine scale sets that do not use managed disk /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deny-unmanageddisk n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false false Configure Azure Activity logs to stream to specified Log Analytics workspace /providers/microsoft.authorization/policydefinitions/2465583e-4e78-4c15-b6be-a36cbc7c8b0f BuiltIn Monitoring False DeployIfNotExists effect=DeployIfNotExists, logAnalytics=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 1 0 1 0 0 Monitoring Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/dcb59c88-f014-5e17-840c-6c9aecc66286), Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/82f0c3bf-808b-5863-bf9c-231cfbf9598a) Deploy-AzActivity-Log (SPObjId: 217aa040-8eb0-451b-b81c-0b8f3d200d5a) Deploy Diagnostic Settings for Activity Log to Log Analytics workspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-platform-mg false false Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics /providers/microsoft.authorization/policydefinitions/052c180e-287d-44c3-86ef-01aeae2d9774 BuiltIn Network False DeployIfNotExists networkWatcherName=/subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourcegroups/networkwatcherrg/providers/microsoft.network/networkwatchers/networkwatcher_northeurope, networkWatcherRG=networkwatcherrg, retentionDays=1, storageId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.storage/storageaccounts/mibmgmtnetprodeunst01, vnetRegion=northeurope, workspaceRegion=westeurope, workspaceResourceId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 0 0 0 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/71689b0c-ca78-4285-9603-49a5497225d8) 97339ff59e1744678fd92dea (SPObjId: c2b8a553-ec19-42b8-8855-6edc985eaffb) Deploy-TrafficAnalytics-NorthEurope /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/97339ff59e1744678fd92dea n/a 09/04/2025 07:21:45 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 09/04/2025 07:34:08 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-platform-mg false false Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics /providers/microsoft.authorization/policydefinitions/052c180e-287d-44c3-86ef-01aeae2d9774 BuiltIn Network False DeployIfNotExists networkWatcherName=/subscriptions/edfa9f1e-5e4d-4584-ad11-e4aea6b3f880/resourcegroups/networkwatcherrg/providers/microsoft.network/networkwatchers/networkwatcher_westeurope, networkWatcherRG=networkwatcherrg, retentionDays=1, storageId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.storage/storageaccounts/mibmgmtnetprodeuwst01, vnetRegion=westeurope, workspaceRegion=westeurope, workspaceResourceId=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 1 0 1 0 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/21c0b216-76ff-44ef-9430-19f801e102d5) d33eb38085bf40bd860fe43b (SPObjId: 78dd5b73-2109-4a10-b2e4-6463304b4b4d) Deploy-TrafficAnalytics-WestEurope /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/d33eb38085bf40bd860fe43b n/a 06/12/2025 18:15:24 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 09/04/2025 07:24:28 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-platform-mg false false Do not allow deletion of specified resource and resource type /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policydefinitions/denyaction-deleteresources Custom General true DenyAction effect=DenyAction, resourceName=mibelle-mgmt-log-prod-euw-id-01, resourceType=Microsoft.ManagedIdentity/userAssignedIdentities Default 0 0 0 0 0 none Do not allow deletion of the User Assigned Managed Identity used by AMA /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/denyaction-deleteuamiama n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-platform-mg false false Subnets should be private /providers/microsoft.authorization/policydefinitions/7bca8353-aa3b-429b-904a-9229c4385837 BuiltIn Network False Audit Default 1 0 2 0 0 none Subnets should be private /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enforce-subnet-private n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
   Download CSV semicolon | comma
Inheritance ScopeExcluded PolicySet DisplayName PolicySetId Type Category ALZ Parameters Enforcement NonCompliance Message Policies NonCmplnt Policies Compliant Resources NonCmplnt Resources Compliant Resources Conflicting Role/Assignment Managed Identity Assignment DisplayName AssignmentId AssignedBy CreatedOn CreatedBy UpdatedOn UpdatedBy
inherited mibelle-mg false Audit virtual machines for Trusted Launch support /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/audit-trustedlaunch Custom Trusted Launch true Default 0 0 0 0 0 none Audit virtual machines for Trusted Launch support /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-trustedlaunch n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Unused resources driving cost should be avoided /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/audit-unusedresourcescostoptimization Custom Cost Optimization true EffectDisks=Audit, EffectPublicIpAddresses=Audit, EffectServerFarms=Audit Default 0 1 0 1 0 none Unused resources driving cost should be avoided /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-unusedresources n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Microsoft cloud security benchmark /providers/microsoft.authorization/policysetdefinitions/1f3afdf9-d0c9-4c3d-847f-89da613e70a8 BuiltIn Security Center False Default 36 19 129 40 0 none Enable Monitoring in Microsoft Defender for Cloud /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-asc-monitoring n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Enable audit category group resource logging for supported resources to Log Analytics /providers/microsoft.authorization/policysetdefinitions/f5b29bc4-feca-4cc6-a58a-772dd5e290a5 BuiltIn Monitoring False logAnalytics=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 1 2 1 2 0 Monitoring Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b922046a-7a3e-59da-a982-8a5b855791ce), Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/9df772a7-1ce7-5439-ab6b-5d31d69925cc) Deploy-Diag-Logs (SPObjId: 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57) Enable allLogs category group resource logging for supported resources to Log Analytics /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud /providers/microsoft.authorization/policysetdefinitions/77b391e3-2d5d-40c3-83bf-65c846b3c6a3 BuiltIn Security Center False Default 0 3 0 1 0 Security Admin (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/d730d560-adce-52b7-b10c-36a8ad16a6d3) Deploy-MDEndpointsAMA (SPObjId: 7d365a6d-a7ae-4921-beca-5ce854a76960) Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-mdendpointsama n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Enforce Azure Compute Security Benchmark compliance auditing /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-acsb Custom Guest Configuration true Default 1 0 114 0 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/6e26cd22-b41b-5611-aafc-e2c56b14c060) Enforce-ACSB (SPObjId: e1f2e80c-5329-4804-824d-f0b44713985e) Enforce Azure Compute Security Baseline compliance auditing /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/enforce-acsb n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-platform-mg false Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/deploy-aum-checkupdates Custom Security Center true assessmentMode=AutomaticByPlatform Default 0 2 0 116 0 Virtual Machine Contributor (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/51e23aa4-bdf1-5059-8efc-453852a14d5e), Azure Connected Machine Resource Administrator (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/d72b7c0f-a23a-58ed-8e0a-40f49a5b6ab3), Managed Identity Operator (/providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/1f97b9d8-3c21-5b8b-9b36-72e77d4a90e0) Enable-AUM-CheckUpdates (SPObjId: ce67e461-e4a3-4514-89cb-7eb8802f8f65) Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines. /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates n/a 06/12/2025 17:56:38 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-platform-mg false Enforce recommended guardrails for Azure Key Vault /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-guardrails-keyvault Custom Key Vault true Default 3 5 1 0 0 none Enforce recommended guardrails for Azure Key Vault /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enforce-gr-keyvault n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Policy Assignment Limit: 0/200
0 Custom Policy definitions scoped
0 Custom PolicySet definitions scoped
0 Blueprints assigned
0 Blueprints scoped
No Classic Administrators
   Download CSV semicolon | comma
  *Depending on the number of rows and your computer´s performance the table may respond with delay, download the csv for better filtering experience
Scope Role RoleId Role Type Data Can do Role assignment Identity Displayname Identity SignInName Identity ObjectId Identity Type Applicability Applies through membership Group Details Role AssignmentId Related Policy Assignment CreatedOn CreatedBy
inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78)
inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/e14ef9ac-25e8-4ee7-887a-a6576bd5229d none 11/28/2025 07:57:36 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78)
inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78)
inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78)
inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False SGU-MIB-RES-Azure-Magr-Mibelle-NetOps 87e9d07b-5340-455c-b297-8bffe3b86f78 Group direct
inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78)
inherited mibelle-mg [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e)
inherited mibelle-mg [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e)
inherited mibelle-mg [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e)
inherited mibelle-mg [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False SGU-MIB-RES-Azure-Magr-Mibelle-SecOps abf39027-4cb4-4298-8951-f984eaf9cb8e Group direct
inherited mibelle-mg Monitoring Contributor 749f88d5-cbae-40b8-bcfc-e573ddc772fa Builtin false False Deploy-AzActivity-Log n/a 217aa040-8eb0-451b-b81c-0b8f3d200d5a SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/dcb59c88-f014-5e17-840c-6c9aecc66286 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log (Configure Azure Activity logs to stream to specified Log Analytics workspace) 06/12/2025 17:56:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Monitoring Contributor 749f88d5-cbae-40b8-bcfc-e573ddc772fa Builtin false False Deploy-Diag-Logs n/a 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b922046a-7a3e-59da-a982-8a5b855791ce /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs (Enable audit category group resource logging for supported resources to Log Analytics) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Log Analytics Contributor 92aaf0da-9dab-42b6-94a3-d43ce8d16293 Builtin false False Deploy-AzActivity-Log n/a 217aa040-8eb0-451b-b81c-0b8f3d200d5a SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/82f0c3bf-808b-5863-bf9c-231cfbf9598a /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log (Configure Azure Activity logs to stream to specified Log Analytics workspace) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Log Analytics Contributor 92aaf0da-9dab-42b6-94a3-d43ce8d16293 Builtin false False Deploy-Diag-Logs n/a 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/9df772a7-1ce7-5439-ab6b-5d31d69925cc /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs (Enable audit category group resource logging for supported resources to Log Analytics) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Meier, Heinz-MIBELLEGROUP heinz.meier@mibelle.net 06addc33-6298-4f01-9f6b-709193f099cc User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Subs-MibelleOnline-SubscriptionOwner n/a 1bdf326c-8c66-4ba9-8c2d-83312a1ddc02 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-Reader n/a 1c529912-c479-41a1-8a03-e57256720fa4 Group direct 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser n/a 1f3ede05-4301-42b1-8c95-2be94290e93c Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Hasanow, Kilian-MIBELLEGROUP kilian.hasanow@mibelle.net 4270eb01-73cf-4e17-925e-47461737b40e User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Mibelle-AzGovWiz-prod n/a 44b03901-55d2-49a8-af3a-58228a81408c SP APP INT indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-michael.peter csa-michael.peter@MIBCloud.mail.onmicrosoft.com 460bad8a-cc4d-41dc-9ddd-f24ba491e2a6 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner n/a 52364002-4a8b-4808-b4fc-864ed5f7d50d Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Matej Paunovski CSA-matej.paunovski@MIBCloud.onmicrosoft.com 54f81d33-50db-475c-b686-4ef70aa0b4fe User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Ouaouane, Taoufik-MIBELLEGROUP taoufik.ouaouane@mibelle.net 7100d1ce-5bd7-449d-abdd-52a7218922b3 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-NetOps n/a 87e9d07b-5340-455c-b297-8bffe3b86f78 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner n/a 9b120856-d4b2-4862-95df-bedf8d5fe1c3 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-Baswaraj Marotrao Ramshette csa-baswarajmarotrao.ramshette@MIBCloud.onmicrosoft.com 9d8d246b-a1f9-4d9a-a54f-f7ae9f3af2ae User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-SecOps n/a abf39027-4cb4-4298-8951-f984eaf9cb8e Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Baumann, Jürg-MIBELLEGROUP juerg.baumann_mibellegroup.com#EXT#@MIBCloud.onmicrosoft.com bb2279b2-06ab-459a-b981-579701601f8a User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin n/a cb058f58-c629-445f-9a10-75f9fcab694e Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Philipp.Schmidt CSA-Philipp.Schmidt@MIBCloud.onmicrosoft.com e40a73c8-6655-434d-8c8b-fdc4d9213499 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Taoufik.Ouaouane csa-Taoufik.Ouaouane@mibelle.net e58ba28f-09ed-49c3-8f5e-31b05c258cde User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Adrian.Bombelka CSA-Adrian.Bombelka@MIBCloud.onmicrosoft.com e86b38a8-e5d4-4888-b09d-390dcf9a2017 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False Enforce-ACSB n/a e1f2e80c-5329-4804-824d-f0b44713985e SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/6e26cd22-b41b-5611-aafc-e2c56b14c060 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/enforce-acsb (Enforce Azure Compute Security Benchmark compliance auditing) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Security Admin fb1c8493-542b-48eb-b624-b4c8fea62acd Builtin false False Deploy-MDEndpointsAMA n/a 7d365a6d-a7ae-4921-beca-5ce854a76960 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/d730d560-adce-52b7-b10c-36a8ad16a6d3 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-mdendpointsama (Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Reservation Purchaser f7b75c60-3036-4b75-91c3-6b41c27c1689 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser 1f3ede05-4301-42b1-8c95-2be94290e93c Group direct
inherited mibelle-mg Reservation Purchaser f7b75c60-3036-4b75-91c3-6b41c27c1689 Builtin false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser (1f3ede05-4301-42b1-8c95-2be94290e93c)
inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e)
inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e)
inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e)
inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin cb058f58-c629-445f-9a10-75f9fcab694e Group direct
inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e)
inherited mibelle-platform-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3)
inherited mibelle-platform-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3)
inherited mibelle-platform-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3)
inherited mibelle-platform-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3)
inherited mibelle-platform-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner 9b120856-d4b2-4862-95df-bedf8d5fe1c3 Group direct
inherited mibelle-platform-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3)
inherited mibelle-platform-mg [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False CSA-Philipp.Schmidt CSA-Philipp.Schmidt@MIBCloud.onmicrosoft.com e40a73c8-6655-434d-8c8b-fdc4d9213499 User Member nested SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner (9b120856-d4b2-4862-95df-bedf8d5fe1c3)
inherited mibelle-platform-mg Virtual Machine Contributor 9980e02c-c2be-4d73-94e8-173b1dc7cf3c Builtin false False Enable-AUM-CheckUpdates n/a ce67e461-e4a3-4514-89cb-7eb8802f8f65 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/51e23aa4-bdf1-5059-8efc-453852a14d5e /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates (Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines) 06/12/2025 17:56:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-platform-mg Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False d33eb38085bf40bd860fe43b n/a 78dd5b73-2109-4a10-b2e4-6463304b4b4d SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/21c0b216-76ff-44ef-9430-19f801e102d5 /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/d33eb38085bf40bd860fe43b (Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics) 06/12/2025 18:15:25 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-platform-mg Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False 97339ff59e1744678fd92dea n/a c2b8a553-ec19-42b8-8855-6edc985eaffb SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/71689b0c-ca78-4285-9603-49a5497225d8 /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/97339ff59e1744678fd92dea (Configure virtual networks to enforce workspace, storage account and retention interval for Flow logs and Traffic Analytics) 09/04/2025 07:21:46 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-platform-mg Azure Connected Machine Resource Administrator cd570a14-e51a-42ad-bac8-bafd67325302 Builtin false False Enable-AUM-CheckUpdates n/a ce67e461-e4a3-4514-89cb-7eb8802f8f65 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/d72b7c0f-a23a-58ed-8e0a-40f49a5b6ab3 /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates (Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines) 06/12/2025 17:56:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-platform-mg Managed Identity Operator f1a07417-d97a-45cb-824c-7a7467783830 Builtin false False Enable-AUM-CheckUpdates n/a ce67e461-e4a3-4514-89cb-7eb8802f8f65 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/roleassignments/1f97b9d8-3c21-5b8b-9b36-72e77d4a90e0 /providers/microsoft.management/managementgroups/mibelle-platform-mg/providers/microsoft.authorization/policyassignments/enable-aum-checkupdates (Configure periodic checking for missing system updates on azure virtual machines and Arc-enabled virtual machines) 06/12/2025 17:56:41 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited Tenant User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false True CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member direct /providers/microsoft.authorization/roleassignments/3f958da1-722a-4c03-8398-aab60735ecd3 none 05/07/2025 18:14:55 ObjectType: User Member, ObjectDisplayName: CSA-Jan.Stutz, ObjectSignInName: CSA-Jan.Stutz@MIBCloud.onmicrosoft.com, ObjectId: 43b3e278-6551-4566-83a8-c19abe643e64
thisScope Sub [mibelle-mg] Subscription owner b3178d42-39ad-5f1c-a8a7-826cf5d3f7a0 Custom false False CSA-Selim.Aydin csa-Selim.Aydin@MIBCloud.onmicrosoft.com caa3dcbe-ca40-411a-8344-5d7a2e7fa1b7 User Member direct /subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/providers/microsoft.authorization/roleassignments/dc0de26f-e06f-4bfb-b831-b75bbdb63c59 none 06/27/2025 10:14:02 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
thisScope Sub SQL Security Manager 056cd41c-7e88-42e1-933e-88ba6a50c9c3 Builtin false False Deploy-AzSqlDb-Auditing n/a afb169da-f80a-4dd6-abf3-b7fc08efb8ae SP MI Sys direct /subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/providers/microsoft.authorization/roleassignments/ce81334b-c425-5087-9b8d-2119e050082b /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deploy-azsqldb-auditing (Configure SQL servers to have auditing enabled to Log Analytics workspace) 06/12/2025 17:56:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
thisScope Sub Owner 8e3af657-a8ff-443c-a75c-2fe8c4bcb635 Builtin false True CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member direct /subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/providers/microsoft.authorization/roleassignments/598a693f-b8f8-4beb-8cd6-6df76f1605b6 none 06/10/2025 07:28:11 IsNullOrEmpty
thisScope Sub Log Analytics Contributor 92aaf0da-9dab-42b6-94a3-d43ce8d16293 Builtin false False Deploy-AzSqlDb-Auditing n/a afb169da-f80a-4dd6-abf3-b7fc08efb8ae SP MI Sys direct /subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/providers/microsoft.authorization/roleassignments/fbb2af70-7587-52bd-b3e1-54fcdbdb7ea4 /providers/microsoft.management/managementgroups/mibelle-landingzones-mg/providers/microsoft.authorization/policyassignments/deploy-azsqldb-auditing (Configure SQL servers to have auditing enabled to Log Analytics workspace) 06/12/2025 17:56:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
thisScope Sub v1-custom-role-fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b 4295cd5f-8c43-984e-3417-b65aa1e071e1 Custom true False v1-app-registration-fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b n/a 46c6a007-6a92-4e2c-bd31-26bc55b525e9 SP APP INT direct /subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/providers/microsoft.authorization/roleassignments/e879571e-60d0-6592-13af-0c7083fe839b none 10/16/2025 07:01:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
thisScope Sub RG Res Key Vault Secrets Officer b86a8fe4-44ce-4948-aee5-eccb2c155cd7 Builtin true False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member direct /subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-aztools-prod-rg/providers/microsoft.keyvault/vaults/mibmgmtaztoolspeuwkv01/providers/microsoft.authorization/roleassignments/a0b645af-25c6-4b05-8a89-947b83f4c2d5 none 07/01/2025 22:33:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
thisScope Sub RG Res Key Vault Secrets Officer b86a8fe4-44ce-4948-aee5-eccb2c155cd7 Builtin true False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member direct /subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-aztools-prod-rg/providers/microsoft.keyvault/vaults/mibmgmtaztoolspeuwkv01/providers/microsoft.authorization/roleassignments/ad224ff9-38cc-4564-a106-664bb61651a6 none 07/01/2025 22:33:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Highlight Management Group in HierarchyMap

Management Group Name: Sandbox

Management Group Id: mibelle-sandbox-mg

Management Group Path: a31c3d92-e630-40f3-9c32-d0c510db197f/mibelle-mg/mibelle-sandbox-mg

0 ManagementGroups below this scope
0 Subscriptions below this scope
Microsoft Defender for Cloud Secure Score: n/a Video , Blog , learn
   Download CSV semicolon | comma
Diagnostic setting Target Target Id Administrative Policy
toLa LA /subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 true true
No Consumption data available as switch parameter -DoAzureConsumption was not applied 0 ResourceTypes (all Subscriptions below this scope)
0 ResourceTypes (1st party) Diagnostics capable (all Subscriptions below this scope)
PSRule for Azure - integration paused - PSRule for Azure
   Download CSV semicolon | comma
  *Depending on the number of rows and your computer´s performance the table may respond with delay, download the csv for better filtering experience
Inheritance ScopeExcluded Exemption applies Policy DisplayName PolicyId Type Category ALZ Effect Parameters Enforcement NonCompliance Message Policies NonCmplnt Policies Compliant Resources NonCmplnt Resources Compliant Resources Conflicting Role/Assignment Managed Identity Assignment DisplayName AssignmentId AssignedBy CreatedOn CreatedBy UpdatedOn UpdatedBy
inherited mibelle-mg false false Audit resource location matches resource group location /providers/microsoft.authorization/policydefinitions/0a914e76-4921-4c19-b460-a2d36003525a BuiltIn General False audit Default 0 0 0 0 0 none Audit that the resource location matches its resource group location /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-location-match n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false false Not allowed resource types /providers/microsoft.authorization/policydefinitions/6c112d4e-5bc7-47ae-a041-ea2d9dccd749 BuiltIn General False Deny effect=Deny, listOfResourceTypesNotAllowed=Microsoft.ClassicCompute/capabilities; Microsoft.ClassicCompute/checkDomainNameAvailability; Microsoft.ClassicCompute/domainNames; Microsoft.ClassicCompute/domainNames/capabilities; Microsoft.ClassicCompute/domainNames/internalLoadBalancers; Microsoft.ClassicCompute/domainNames/serviceCertificates; Microsoft.ClassicCompute/domainNames/slots; Microsoft.ClassicCompute/domainNames/slots/roles; Microsoft.ClassicCompute/domainNames/slots/roles/metricDefinitions; Microsoft.ClassicCompute/domainNames/slots/roles/metrics; Microsoft.ClassicCompute/moveSubscriptionResources; Microsoft.ClassicCompute/operatingSystemFamilies; Microsoft.ClassicCompute/operatingSystems; Microsoft.ClassicCompute/operations; Microsoft.ClassicCompute/operationStatuses; Microsoft.ClassicCompute/quotas; Microsoft.ClassicCompute/resourceTypes; Microsoft.ClassicCompute/validateSubscriptionMoveAvailability; Microsoft.ClassicCompute/virtualMachines; Microsoft.ClassicCompute/virtualMachines/diagnosticSettings; Microsoft.ClassicCompute/virtualMachines/metricDefinitions; Microsoft.ClassicCompute/virtualMachines/metrics; Microsoft.ClassicInfrastructureMigrate/classicInfrastructureResources; Microsoft.ClassicNetwork/capabilities; Microsoft.ClassicNetwork/expressRouteCrossConnections; Microsoft.ClassicNetwork/expressRouteCrossConnections/peerings; Microsoft.ClassicNetwork/gatewaySupportedDevices; Microsoft.ClassicNetwork/networkSecurityGroups; Microsoft.ClassicNetwork/operations; Microsoft.ClassicNetwork/quotas; Microsoft.ClassicNetwork/reservedIps; Microsoft.ClassicNetwork/virtualNetworks; Microsoft.ClassicNetwork/virtualNetworks/remoteVirtualNetworkPeeringProxies; Microsoft.ClassicNetwork/virtualNetworks/virtualNetworkPeerings; Microsoft.ClassicStorage/capabilities; Microsoft.ClassicStorage/checkStorageAccountAvailability; Microsoft.ClassicStorage/disks; Microsoft.ClassicStorage/images; Microsoft.ClassicStorage/operations; Microsoft.ClassicStorage/osImages; Microsoft.ClassicStorage/osPlatformImages; Microsoft.ClassicStorage/publicImages; Microsoft.ClassicStorage/quotas; Microsoft.ClassicStorage/storageAccounts; Microsoft.ClassicStorage/storageAccounts/blobServices; Microsoft.ClassicStorage/storageAccounts/fileServices; Microsoft.ClassicStorage/storageAccounts/metricDefinitions; Microsoft.ClassicStorage/storageAccounts/metrics; Microsoft.ClassicStorage/storageAccounts/queueServices; Microsoft.ClassicStorage/storageAccounts/services; Microsoft.ClassicStorage/storageAccounts/services/diagnosticSettings; Microsoft.ClassicStorage/storageAccounts/services/metricDefinitions; Microsoft.ClassicStorage/storageAccounts/services/metrics; Microsoft.ClassicStorage/storageAccounts/tableServices; Microsoft.ClassicStorage/storageAccounts/vmImages; Microsoft.ClassicStorage/vmImages; Microsoft.ClassicSubscription/operations Default 0 0 0 0 0 none Deny the deployment of classic resources /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deny-classic-resources n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false false Audit VMs that do not use managed disks /providers/microsoft.authorization/policydefinitions/06a78e20-9358-41c9-923c-fb736d382a4d BuiltIn Compute False audit Default 0 0 0 0 0 none Deny virtual machines and virtual machine scale sets that do not use managed disk /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deny-unmanageddisk n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false false Configure Azure Activity logs to stream to specified Log Analytics workspace /providers/microsoft.authorization/policydefinitions/2465583e-4e78-4c15-b6be-a36cbc7c8b0f BuiltIn Monitoring False DeployIfNotExists effect=DeployIfNotExists, logAnalytics=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 0 0 0 0 Monitoring Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/dcb59c88-f014-5e17-840c-6c9aecc66286), Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/82f0c3bf-808b-5863-bf9c-231cfbf9598a) Deploy-AzActivity-Log (SPObjId: 217aa040-8eb0-451b-b81c-0b8f3d200d5a) Deploy Diagnostic Settings for Activity Log to Log Analytics workspace /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
   Download CSV semicolon | comma
Inheritance ScopeExcluded PolicySet DisplayName PolicySetId Type Category ALZ Parameters Enforcement NonCompliance Message Policies NonCmplnt Policies Compliant Resources NonCmplnt Resources Compliant Resources Conflicting Role/Assignment Managed Identity Assignment DisplayName AssignmentId AssignedBy CreatedOn CreatedBy UpdatedOn UpdatedBy
inherited mibelle-mg false Audit virtual machines for Trusted Launch support /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/audit-trustedlaunch Custom Trusted Launch true Default 0 0 0 0 0 none Audit virtual machines for Trusted Launch support /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-trustedlaunch n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Unused resources driving cost should be avoided /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/audit-unusedresourcescostoptimization Custom Cost Optimization true EffectDisks=Audit, EffectPublicIpAddresses=Audit, EffectServerFarms=Audit Default 0 0 0 0 0 none Unused resources driving cost should be avoided /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/audit-unusedresources n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Microsoft cloud security benchmark /providers/microsoft.authorization/policysetdefinitions/1f3afdf9-d0c9-4c3d-847f-89da613e70a8 BuiltIn Security Center False Default 0 0 0 0 0 none Enable Monitoring in Microsoft Defender for Cloud /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-asc-monitoring n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Enable audit category group resource logging for supported resources to Log Analytics /providers/microsoft.authorization/policysetdefinitions/f5b29bc4-feca-4cc6-a58a-772dd5e290a5 BuiltIn Monitoring False logAnalytics=/subscriptions/fb0ff3e5-3fb1-4b00-b48a-67b4cc6dcc0b/resourcegroups/mibelle-mgmt-prod-rg/providers/microsoft.operationalinsights/workspaces/mibelle-mgmt-log-prod-euw-log-01 Default 0 0 0 0 0 Monitoring Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b922046a-7a3e-59da-a982-8a5b855791ce), Log Analytics Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/9df772a7-1ce7-5439-ab6b-5d31d69925cc) Deploy-Diag-Logs (SPObjId: 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57) Enable allLogs category group resource logging for supported resources to Log Analytics /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud /providers/microsoft.authorization/policysetdefinitions/77b391e3-2d5d-40c3-83bf-65c846b3c6a3 BuiltIn Security Center False Default 0 0 0 0 0 Security Admin (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/d730d560-adce-52b7-b10c-36a8ad16a6d3) Deploy-MDEndpointsAMA (SPObjId: 7d365a6d-a7ae-4921-beca-5ce854a76960) Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-mdendpointsama n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg false Enforce Azure Compute Security Benchmark compliance auditing /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-acsb Custom Guest Configuration true Default 0 0 0 0 0 Contributor (/providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/6e26cd22-b41b-5611-aafc-e2c56b14c060) Enforce-ACSB (SPObjId: e1f2e80c-5329-4804-824d-f0b44713985e) Enforce Azure Compute Security Baseline compliance auditing /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/enforce-acsb n/a 06/12/2025 17:56:37 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
thisScope Mg false Enforce policies in the Sandbox Landing Zone /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policysetdefinitions/enforce-alz-sandbox Custom Sandbox true listOfResourceTypesNotAllowed=microsoft.network/expressroutecircuits; microsoft.network/expressroutegateways; microsoft.network/expressrouteports; microsoft.network/virtualwans; microsoft.network/virtualhubs; microsoft.network/vpngateways; microsoft.network/p2svpngateways; microsoft.network/vpnsites; microsoft.network/virtualnetworkgateways Default 0 0 0 0 0 none Enforce ALZ Sandbox Guardrails /providers/microsoft.management/managementgroups/mibelle-sandbox-mg/providers/microsoft.authorization/policyassignments/enforce-alz-sandbox n/a 06/12/2025 17:56:36 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
Policy Assignment Limit: 1/200
0 Custom Policy definitions scoped
0 Custom PolicySet definitions scoped
0 Blueprints scoped
   Download CSV semicolon | comma
  *Depending on the number of rows and your computer´s performance the table may respond with delay, download the csv for better filtering experience
Scope Role RoleId Role Type Data Can do Role assignment Identity Displayname Identity SignInName Identity ObjectId Identity Type Applicability Applies through membership Group Details Role AssignmentId Related Policy Assignment CreatedOn CreatedBy
inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/e14ef9ac-25e8-4ee7-887a-a6576bd5229d none 11/28/2025 07:57:36 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Monitoring Contributor 749f88d5-cbae-40b8-bcfc-e573ddc772fa Builtin false False Deploy-AzActivity-Log n/a 217aa040-8eb0-451b-b81c-0b8f3d200d5a SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/dcb59c88-f014-5e17-840c-6c9aecc66286 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log (Configure Azure Activity logs to stream to specified Log Analytics workspace) 06/12/2025 17:56:40 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Monitoring Contributor 749f88d5-cbae-40b8-bcfc-e573ddc772fa Builtin false False Deploy-Diag-Logs n/a 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b922046a-7a3e-59da-a982-8a5b855791ce /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs (Enable audit category group resource logging for supported resources to Log Analytics) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Log Analytics Contributor 92aaf0da-9dab-42b6-94a3-d43ce8d16293 Builtin false False Deploy-AzActivity-Log n/a 217aa040-8eb0-451b-b81c-0b8f3d200d5a SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/82f0c3bf-808b-5863-bf9c-231cfbf9598a /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-azactivity-log (Configure Azure Activity logs to stream to specified Log Analytics workspace) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Log Analytics Contributor 92aaf0da-9dab-42b6-94a3-d43ce8d16293 Builtin false False Deploy-Diag-Logs n/a 5d93ca23-ce8b-410e-aa31-fc3d9f45dd57 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/9df772a7-1ce7-5439-ab6b-5d31d69925cc /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-diag-logs (Enable audit category group resource logging for supported resources to Log Analytics) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Meier, Heinz-MIBELLEGROUP heinz.meier@mibelle.net 06addc33-6298-4f01-9f6b-709193f099cc User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Subs-MibelleOnline-SubscriptionOwner n/a 1bdf326c-8c66-4ba9-8c2d-83312a1ddc02 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-Reader n/a 1c529912-c479-41a1-8a03-e57256720fa4 Group direct 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser n/a 1f3ede05-4301-42b1-8c95-2be94290e93c Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Hasanow, Kilian-MIBELLEGROUP kilian.hasanow@mibelle.net 4270eb01-73cf-4e17-925e-47461737b40e User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Mibelle-AzGovWiz-prod n/a 44b03901-55d2-49a8-af3a-58228a81408c SP APP INT indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-michael.peter csa-michael.peter@MIBCloud.mail.onmicrosoft.com 460bad8a-cc4d-41dc-9ddd-f24ba491e2a6 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-MibelleLandingZone-SubscriptionOwner n/a 52364002-4a8b-4808-b4fc-864ed5f7d50d Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Matej Paunovski CSA-matej.paunovski@MIBCloud.onmicrosoft.com 54f81d33-50db-475c-b686-4ef70aa0b4fe User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Ouaouane, Taoufik-MIBELLEGROUP taoufik.ouaouane@mibelle.net 7100d1ce-5bd7-449d-abdd-52a7218922b3 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-NetOps n/a 87e9d07b-5340-455c-b297-8bffe3b86f78 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-MibellePlatform-SubscriptionOwner n/a 9b120856-d4b2-4862-95df-bedf8d5fe1c3 Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-Baswaraj Marotrao Ramshette csa-baswarajmarotrao.ramshette@MIBCloud.onmicrosoft.com 9d8d246b-a1f9-4d9a-a54f-f7ae9f3af2ae User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-SecOps n/a abf39027-4cb4-4298-8951-f984eaf9cb8e Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False Baumann, Jürg-MIBELLEGROUP juerg.baumann_mibellegroup.com#EXT#@MIBCloud.onmicrosoft.com bb2279b2-06ab-459a-b981-579701601f8a User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin n/a cb058f58-c629-445f-9a10-75f9fcab694e Group indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Philipp.Schmidt CSA-Philipp.Schmidt@MIBCloud.onmicrosoft.com e40a73c8-6655-434d-8c8b-fdc4d9213499 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Taoufik.Ouaouane csa-Taoufik.Ouaouane@mibelle.net e58ba28f-09ed-49c3-8f5e-31b05c258cde User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Reader acdd72a7-3385-48ef-bd42-f606fba81ae7 Builtin false False CSA-Adrian.Bombelka CSA-Adrian.Bombelka@MIBCloud.onmicrosoft.com e86b38a8-e5d4-4888-b09d-390dcf9a2017 User Member indirect SGU-MIB-RES-Azure-Magr-Mibelle-Reader (1c529912-c479-41a1-8a03-e57256720fa4) 23 (Usr: 15, Grp: 7, SP: 1) /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/b1a9f6c8-a33a-4e3d-b272-7932b5386795 none 07/04/2025 22:16:51 ObjectType: SP App EXT, ObjectDisplayName: MS-PIM, ObjectSignInName: n/a, ObjectId: af67da1d-12ad-4208-b083-29f1cf6ce9a3 (r)
inherited mibelle-mg Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False Enforce-ACSB n/a e1f2e80c-5329-4804-824d-f0b44713985e SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/6e26cd22-b41b-5611-aafc-e2c56b14c060 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/enforce-acsb (Enforce Azure Compute Security Benchmark compliance auditing) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited mibelle-mg Security Admin fb1c8493-542b-48eb-b624-b4c8fea62acd Builtin false False Deploy-MDEndpointsAMA n/a 7d365a6d-a7ae-4921-beca-5ce854a76960 SP MI Sys direct /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/roleassignments/d730d560-adce-52b7-b10c-36a8ad16a6d3 /providers/microsoft.management/managementgroups/mibelle-mg/providers/microsoft.authorization/policyassignments/deploy-mdendpointsama (Configure multiple Microsoft Defender for Endpoint integration settings with Microsoft Defender for Cloud) 06/12/2025 17:56:39 ObjectType: User Member, ObjectDisplayName: CSA-Pirmin.felber, ObjectSignInName: csa-pirmin.felber@MIBCloud.onmicrosoft.com, ObjectId: 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5
inherited Tenant User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false True CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member direct /providers/microsoft.authorization/roleassignments/3f958da1-722a-4c03-8398-aab60735ecd3 none 05/07/2025 18:14:55 ObjectType: User Member, ObjectDisplayName: CSA-Jan.Stutz, ObjectSignInName: CSA-Jan.Stutz@MIBCloud.onmicrosoft.com, ObjectId: 43b3e278-6551-4566-83a8-c19abe643e64
inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78)
inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78)
inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78)
inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78)
inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False SGU-MIB-RES-Azure-Magr-Mibelle-NetOps 87e9d07b-5340-455c-b297-8bffe3b86f78 Group direct
inherited mibelle-mg [mibelle-mg] Network management (NetOps) 0092515f-720c-5190-860b-a0a1cbef25d9 Custom false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-NetOps (87e9d07b-5340-455c-b297-8bffe3b86f78)
inherited mibelle-mg [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e)
inherited mibelle-mg [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False CSA-Jan.Stutz CSA-Jan.Stutz@MIBCloud.onmicrosoft.com 43b3e278-6551-4566-83a8-c19abe643e64 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e)
inherited mibelle-mg [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-SecOps (abf39027-4cb4-4298-8951-f984eaf9cb8e)
inherited mibelle-mg [mibelle-mg] Security operations (SecOps) 4babf2a1-8e97-55be-aab2-b055636bcd43 Custom false False SGU-MIB-RES-Azure-Magr-Mibelle-SecOps abf39027-4cb4-4298-8951-f984eaf9cb8e Group direct
inherited mibelle-mg Reservation Purchaser f7b75c60-3036-4b75-91c3-6b41c27c1689 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser 1f3ede05-4301-42b1-8c95-2be94290e93c Group direct
inherited mibelle-mg Reservation Purchaser f7b75c60-3036-4b75-91c3-6b41c27c1689 Builtin false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-RervationPurchaser (1f3ede05-4301-42b1-8c95-2be94290e93c)
inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e)
inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False csa-silvan.buehler csa-silvan.buehler@MIBCloud.onmicrosoft.com 3bdc8531-5824-4ddc-82b1-dc494b4a1022 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e)
inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e)
inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin cb058f58-c629-445f-9a10-75f9fcab694e Group direct
inherited mibelle-mg User Access Administrator 18d7d88d-d35e-4fb5-a5c3-7773c20a72d9 Builtin false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member nested SGU-MIB-RES-Azure-Magr-Mibelle-UserAccessAdmin (cb058f58-c629-445f-9a10-75f9fcab694e)
thisScope MG Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False CSA-Heinz.Meier csa-heinz.meier@MIBCloud.onmicrosoft.com 2f4a309a-5870-443e-97e1-fd8b38a54b4c User Member nested SGU-MIB-RES-Azure-Magr-MibelleSandbox-Contributor (51d1767f-b653-445e-b81b-7796472cd8b4)
thisScope MG Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False CSA-Pirmin.felber csa-pirmin.felber@MIBCloud.onmicrosoft.com 4671cf05-bc4f-42ef-89d5-6bcb983ec3b5 User Member nested SGU-MIB-RES-Azure-Magr-MibelleSandbox-Contributor (51d1767f-b653-445e-b81b-7796472cd8b4)
thisScope MG Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False SGU-MIB-RES-Azure-Magr-MibelleSandbox-Contributor 51d1767f-b653-445e-b81b-7796472cd8b4 Group direct
thisScope MG Contributor b24988ac-6180-42a0-ab88-20f7382dd24c Builtin false False csa-kilian.hasanow csa-kilian.hasanow@MIBCloud.onmicrosoft.com e3fdf6d4-adb5-4024-be8c-e6639ae9ba02 User Member nested SGU-MIB-RES-Azure-Magr-MibelleSandbox-Contributor (51d1767f-b653-445e-b81b-7796472cd8b4)
0 Subscriptions linked