🔒 Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided AZ-104 Domain 1
Domain 1 — Module 5 of 6 83%
5 of 27 overall

AZ-104 Study Guide

Domain 1: Manage Azure Identities and Governance

  • Microsoft Entra ID: Your Identity Foundation Free
  • Users, Groups & Licenses Free
  • RBAC: Who Can Do What in Azure Free
  • Subscriptions, Resource Groups & Management Groups Free
  • Azure Policy & Resource Locks Free
  • Tags, Cost Management & Azure Advisor Free

Domain 2: Implement and Manage Storage

  • Storage Accounts & Redundancy
  • Securing Storage: Keys, SAS & Firewalls
  • Blob Containers & Storage Tiers
  • Blob Lifecycle, Versioning & Soft Delete
  • Azure Files: Shares, Snapshots & Recovery

Domain 3: Deploy and Manage Azure Compute Resources

  • ARM Templates & Bicep: Infrastructure as Code
  • Virtual Machines: Create & Configure Free
  • VM Disks, Encryption & Migration
  • Availability Sets, Zones & Scale Sets
  • Containers: ACR, ACI & Container Apps
  • App Service Plans & Scaling
  • App Service: Slots, Certificates & Networking

Domain 4: Implement and Manage Virtual Networking

  • Virtual Networks & Subnets
  • VNet Peering & User-Defined Routes
  • NSGs & Application Security Groups
  • Azure Bastion, Service & Private Endpoints
  • Azure DNS & Load Balancers

Domain 5: Monitor and Maintain Azure Resources

  • Azure Monitor: Metrics & Logs
  • Alerts, Insights & Network Watcher
  • Azure Backup & Vaults
  • Azure Site Recovery & Disaster Recovery

AZ-104 Study Guide

Domain 1: Manage Azure Identities and Governance

  • Microsoft Entra ID: Your Identity Foundation Free
  • Users, Groups & Licenses Free
  • RBAC: Who Can Do What in Azure Free
  • Subscriptions, Resource Groups & Management Groups Free
  • Azure Policy & Resource Locks Free
  • Tags, Cost Management & Azure Advisor Free

Domain 2: Implement and Manage Storage

  • Storage Accounts & Redundancy
  • Securing Storage: Keys, SAS & Firewalls
  • Blob Containers & Storage Tiers
  • Blob Lifecycle, Versioning & Soft Delete
  • Azure Files: Shares, Snapshots & Recovery

Domain 3: Deploy and Manage Azure Compute Resources

  • ARM Templates & Bicep: Infrastructure as Code
  • Virtual Machines: Create & Configure Free
  • VM Disks, Encryption & Migration
  • Availability Sets, Zones & Scale Sets
  • Containers: ACR, ACI & Container Apps
  • App Service Plans & Scaling
  • App Service: Slots, Certificates & Networking

Domain 4: Implement and Manage Virtual Networking

  • Virtual Networks & Subnets
  • VNet Peering & User-Defined Routes
  • NSGs & Application Security Groups
  • Azure Bastion, Service & Private Endpoints
  • Azure DNS & Load Balancers

Domain 5: Monitor and Maintain Azure Resources

  • Azure Monitor: Metrics & Logs
  • Alerts, Insights & Network Watcher
  • Azure Backup & Vaults
  • Azure Site Recovery & Disaster Recovery
Domain 1: Manage Azure Identities and Governance Free ⏱ ~13 min read

Azure Policy & Resource Locks

Policies enforce rules across your Azure environment automatically. Resource locks prevent accidental deletion. Together, they're your governance safety net — the Azure equivalent of Group Policy on steroids.

What is Azure Policy?

☕ Simple explanation

Azure Policy is like a set of rules for your entire Azure environment.

If you’ve used Group Policy on-prem, this is the cloud equivalent — but instead of controlling desktop settings, it controls Azure resources. You can say things like “no one can create VMs larger than Standard_D4s_v3” or “every resource must have a CostCenter tag” or “storage accounts must use encryption.”

Policies can audit (flag non-compliant resources), deny (block creation of non-compliant resources), or remediate (fix existing resources automatically).

Azure Policy is a governance service that evaluates Azure resources against a set of rules (policy definitions). Policies are written in JSON and define conditions and effects. When a resource is created, updated, or audited, the policy engine evaluates it against all assigned policies.

Key concepts: A policy definition describes the rule. A policy assignment applies it to a scope (management group, subscription, or resource group). A policy initiative (also called a policy set) bundles multiple definitions for easier management. Compliance reports show which resources meet or violate assigned policies.

Policy effects include: Audit, AuditIfNotExists, Deny, DeployIfNotExists, Modify, Append, Disabled, and Manual. The exam heavily tests understanding of these effects.

Policy definitions, assignments, and initiatives

The workflow:

  1. Choose or create a policy definition — what rule to enforce
  2. Assign it to a scope — where the rule applies
  3. Set parameters — configure the rule (e.g., which regions are allowed)
  4. Monitor compliance — check which resources comply

Policy initiative = a bundle of related policy definitions. Instead of assigning 15 individual policies for security compliance, assign one initiative that contains all 15.

TermWhat It IsExample
Policy definitionA single rule”Allowed locations: UK South, UK West”
Policy assignmentApplying a rule to a scopeAssign “Allowed locations” to Production subscription
Policy initiativeA bundle of definitions”CIS Benchmark” (contains 50+ definitions)
Policy parametersConfigurable inputsThe list of allowed locations
Compliance stateDoes a resource pass?Compliant, Non-compliant, Exempt

Policy effects explained

The effect determines what happens when a resource violates the policy:

Azure Policy effects — know when each applies
EffectWhen EvaluatedWhat Happens
DenyAt resource creation/updateBlocks the operation — the resource can't be created or modified
AuditOn existing and new resourcesFlags as non-compliant but allows the operation
AuditIfNotExistsWhen a related resource is missingFlags non-compliance (e.g., VM without diagnostic extension)
DeployIfNotExistsWhen a related resource is missingAutomatically deploys the missing resource
ModifyAt resource creation/updateAdds, changes, or removes tags or properties
AppendAt resource creation/updateAdds properties (e.g., adding a tag value)
DisabledNeverThe policy is turned off (useful for testing)
💡 Exam tip: Deny vs Audit

Deny blocks creation of non-compliant resources. Audit allows creation but marks them as non-compliant. A common exam scenario: “The company wants to track which storage accounts don’t use encryption, but don’t want to block existing deployments.” Answer: Audit (not Deny).

DeployIfNotExists is the auto-remediation effect — it can automatically deploy a resource (like a diagnostic extension) when it’s missing. The exam loves this one.

Real-world: Meridian Financial's policy strategy

Meridian Financial assigns policies at the management group level:

  • Deny: “Allowed locations” — only UK South and UK West (data sovereignty)
  • Deny: “Allowed VM sizes” — prevents anyone from deploying expensive GPU VMs
  • Audit: “Require tags” — flags resources missing the CostCenter tag
  • DeployIfNotExists: “Deploy diagnostic settings” — auto-enables logging on all VMs
  • Initiative: “Azure Security Benchmark” — 200+ definitions for security compliance

Their compliance dashboard shows 94% compliance across 12 subscriptions. The 6% non-compliant are legacy resources being remediated.

Resource locks

Resource locks prevent accidental modification or deletion of critical resources. They’re simpler than policies — just two types.

ReadOnly vs Delete locks
FeatureReadOnly LockDelete Lock
Can read the resource?YesYes
Can modify the resource?NoYes
Can delete the resource?NoNo
Use caseProduction resources that must never changeResources that can be updated but not deleted

Key facts about locks:

  • Locks are inherited — a lock on a resource group applies to all resources inside
  • Locks apply regardless of RBAC — even Owners can’t delete a locked resource (they must remove the lock first)
  • Only Owners and User Access Administrators can create or delete locks
  • Locks work at: subscription, resource group, or individual resource level
💡 Exam tip: Lock inheritance

If you place a Delete lock on a resource group, you cannot delete ANY resource in that group — even individual resources. The lock must be removed from the resource group first. This catches many exam candidates off guard.

Also: a ReadOnly lock on a storage account prevents listing access keys (which effectively blocks key-based data access). However, data-plane operations using Entra ID RBAC or existing SAS tokens may still work. The management-plane vs data-plane distinction matters here.

Question

What is the difference between a policy definition and a policy initiative?

Click or press Enter to reveal answer

Answer

A policy definition is a single rule (e.g., 'allowed locations'). A policy initiative (policy set) is a bundle of related policy definitions grouped together for easier assignment and management (e.g., 'CIS Benchmark' containing 50+ individual policies).

Click to flip back

Question

What does the DeployIfNotExists policy effect do?

Click or press Enter to reveal answer

Answer

It automatically deploys a related resource when it's missing. For example, if a VM doesn't have a diagnostic extension installed, the policy can automatically deploy it. This provides auto-remediation of compliance gaps.

Click to flip back

Question

Who can remove a resource lock in Azure?

Click or press Enter to reveal answer

Answer

Only users with the Owner or User Access Administrator role can create or remove locks. Even Contributors (who can manage resources) cannot remove locks. This is by design — locks override RBAC permissions.

Click to flip back

Question

What are the two types of resource locks?

Click or press Enter to reveal answer

Answer

ReadOnly (prevents both modification and deletion — the resource becomes immutable) and Delete (prevents deletion but allows modifications). Both types are inherited by child resources.

Click to flip back

Knowledge check

Knowledge Check

Alex applied a 'Deny' policy that restricts VM creation to UK South and UK West regions. A developer tries to create a VM in East US. What happens?

Knowledge Check

Meridian Financial placed a Delete lock on their production resource group. A team member (with Owner role) tries to delete a VM inside that resource group. What happens?

Knowledge Check

CloudFirst Labs wants to ensure all new storage accounts have encryption enabled, but they don't want to block existing accounts that might not have it yet. They want a compliance report showing which accounts need updating. Which policy effect should they use?

🎬 Video coming soon

← Previous

Subscriptions, Resource Groups & Management Groups

Next →

Tags, Cost Management & Azure Advisor

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.