Monday, July 19, 2021

thumbnail

Manage Governance via Azure Policy

Objectives

In this lab, we will:

  • Task 1: Create and assign tags via the Azure portal
  • Task 2: Enforce tagging via an Azure policy
  • Task 3: Apply tagging via an Azure policy

Task 1: Assign tags via the Azure portal

In this task, you will create and assign a tag to an Azure resource group via the Azure portal.

  1. In the Azure portal, start a PowerShell session within the Cloud Shell.

    If this is the first time you are starting Cloud Shell and you are presented with the You have no storage mounted message, select the subscription you are using in this lab, and click Create storage.

  2. From the Cloud Shell pane, run the following to identify the name of the storage account used by Cloud Shell:

    powershell
    df
  3. In the output of the command, note the first part of the fully qualified path designating the Cloud Shell home drive mount (marked here as xxxxxxxxxxxxxx:

    //xxxxxxxxxxxxxx.file.core.windows.net/cloudshell   (..)  /usr/csuser/clouddrive
  4. In the Azure portal, search and select Storage accounts and, in the list of the storage accounts, click the entry representing the storage account you identified in the previous step.

  5. On the storage account blade, click the link representing the name of the resource group containing the storage account.

    [!note] note what resource group the storage account is in, you'll need it later in the lab.

  6. On the resource group blade, click Tags.

  7. Create a tag with the following settings and save your change:

    SettingValue
    NameRole
    ValueInfra
  8. Navigate back to the storage account blade. Review the Overview information and note that the new tag was not automatically assigned to the storage account.

Task 2: Enforce tagging via an Azure policy

In this task, you will assign the built-in Require a tag and its value on resources policy to the resource group and evaluate the outcome.

  1. In the Azure portal, search for and select Policy.

  2. In the Authoring section, click Definitions. Take a moment to browse through the list of built-in policy definitions that are available for you to use. List all built-in policies that involve the use of tags by selecting the Tags entry (and de-selecting all other entries) in the Category drop-down list.

  3. Click the entry representing the Require a tag and its value on resources built-in policy and review its definition.

  4. On the Require a tag and its value on resources built-in policy definition blade, click Assign.

  5. Specify the Scope by clicking the ellipsis button and selecting the following values:

    SettingValue
    Subscriptionthe name of the Azure subscription you are using in this lab
    Resource Groupthe name of the resource group containing the Cloud Shell account you identified in the previous task

    A scope determines the resources or resource groups where the policy assignment takes effect. You could assign policies on the management group, subscription, or resource group level. You also have the option of specifying exclusions, such as individual subscriptions, resource groups, or resources (depending on the assignment scope).

  6. Configure the Basics properties of the assignment by specifying the following settings (leave others with their defaults):

    SettingValue
    Assignment nameRequire Role tag with Infra value
    DescriptionRequire Role tag with Infra value for all resources in the Cloud Shell resource group
    Policy enforcementEnabled

    The Assignment name is automatically populated with the policy name you selected, but you can change it. You can also add an optional DescriptionAssigned by is automatically populated based on the user name creating the assignment.

  7. Click Next and set Parameters to the following values:

    SettingValue
    Tag NameRole
    Tag ValueInfra
  8. Click Next and review the Remediation tab. Leave the Create a Managed Identity checkbox unchecked.

    This setting can be used when the policy or initiative includes the deployIfNotExists or Modify effect.

  9. Click Review + Create and then click Create.

    Now you will verify that the new policy assignment is in effect by attempting to create another Azure Storage account in the resource group without explicitly adding the required tag.

    It might take between 5 and 15 minutes for the policy to take effect.

  10. Navigate back to the blade of the resource group hosting the storage account used for the Cloud Shell home drive, which you identified in the previous task.

  11. On the resource group blade, click + Add and then + Marketplace.

  12. On the New blade, search for and select Storage account, and click Create.

  13. On the Basics tab of the Create storage account blade, verify that you are using the Resource Group that the Policy was applied to and specify the following settings (leave others with their defaults), click Review + create and then click Create:

    SettingValue
    Storage account nameany globally unique combination of between 3 and 24 lower case letters and digits, starting with a letter
  14. Once you create the deployment, you should see the Deployment failed message in the Notifications list of the portal. From the Notifications list, navigate to the deployment overview and click the Deployment failed. Click here for details message to identify the reason for the failure.

    Verify whether the error message states that the resource deployment was disallowed by the policy.

    By clicking the Raw Error tab, you can find more details about the error, including the name of the role definition Require Role tag with Infra value. The deployment failed because the storage account you attempted to create did not have a tag named Role with its value set to Infra.

Task 3: Apply tagging via an Azure policy

In this task, we will use a different policy definition to remediate any non-compliant resources.

  1. In the Azure portal, search for and select Policy.

  2. In the Authoring section, click Assignments.

  3. In the list of assignments, right click the ellipsis icon in the row representing the Require Role tag with Infra value policy assignment and use the Delete assignment menu item to delete the assignment.

  4. Click Assign policy and specify the Scope by clicking the ellipsis button and selecting the following values:

    SettingValue
    Subscriptionthe name of the Azure subscription you are using in this lab
    Resource Groupthe name of the resource group containing the Cloud Shell account you identified in the first task
  5. To specify the Policy definition, click the ellipsis button and then search for and select Inherit a tag from the resource group if missing.

  6. Configure the remaining Basics properties of the assignment by specifying the following settings (leave others with their defaults):

    SettingValue
    Assignment nameInherit the Role tag and its Infra value from the Cloud Shell resource group if missing
    DescriptionInherit the Role tag and its Infra value from the Cloud Shell resource group if missing
    Policy enforcementEnabled
  7. Click Next and set Parameters to the following values:

    SettingValue
    Tag NameRole
  8. Click Next and, on the Remediation tab, configure the following settings (leave others with their defaults):

    SettingValue
    Create a remediation taskenabled
    Policy to remediateInherit a tag from the resource group if missing

    This policy definition includes the Modify effect.

  9. Click Review + Create and then click Create.

    To verify that the new policy assignment is in effect, you will create another Azure Storage account in the same resource group without explicitly adding the required tag.

    It might take between 5 and 15 minutes for the policy to take effect.

  10. Navigate back to the blade of the resource group hosting the storage account used for the Cloud Shell home drive, which you identified in the first task.

  11. On the resource group blade, click + Add and + Marketplace.

  12. On the New blade, search for and select Storage account, and click Create.

  13. On the Basics tab of the Create storage account blade, verify that you are using the Resource Group that the Policy was applied to and specify the following settings (leave others with their defaults) and click Review + create:

    SettingValue
    Storage account nameany globally unique combination of between 3 and 24 lower case letters and digits, starting with a letter
  14. Verify that this time the validation passed and click Create.

  15. Once the new storage account is provisioned, click Go to resource button and, on the Overview blade of the newly created storage account, note that the tag Role with the value Infra has been automatically assigned to the resource.

Clean up resources

Remember to remove any newly created Azure resources that you no longer use.

Removing unused resources ensures you will not see unexpected charges, although keep in mind that Azure policies do not incur extra cost.

  1. In the portal, search for and select Policy.

  2. In the Authoring section, click Assignments, click the ellipsis icon to the right of the assignment you created in the previous task and click Delete assignment.

  3. In the portal, search for and select Storage accounts.

  4. In the list of storage accounts, select the resource group corresponding to the storage account you created in the last task of this lab. Select Tags and click Delete (Trash can to the right) to the Role:Infra tag and press Save.

  5. In the portal, again search for and select Storage accounts or use the menu at the top to select Storage accounts

  6. In the list of storage accounts, select the storage account you created in the last task of this lab, click Delete, when prompted for the confirmation, in the Confirm delete type yes and click Delete.

Review

In this lab, you have:

  • Created and assigned tags via the Azure portal
  • Enforced tagging via an Azure policy
  • Applied tagging via an Azure policy

Sunday, July 18, 2021

thumbnail

Manage Azure Active Directory Identities

Objectives

In this lab, you will:

  • Task 1: Create and configure Azure AD users
  • Task 2: Create Azure AD groups with assigned and dynamic membership
  • Task 3: Create an Azure Active Directory (AD) tenant
  • Task 4: Manage Azure AD guest users

Task 1: Create and configure Azure AD users

In this task, you will create and configure Azure AD users.

If you have previously used the Trial license for Azure AD Premium on this Azure AD Tenant you will need a new Azure AD Tenant or perform the Task 2 after Task 3 in that new Azure AD tenant.

  1. Sign in to the https://portal.azure.com.

  2. In the Azure portal, search for and select Azure Active Directory.

  3. On the Azure Active Directory blade, scroll down to the Manage section, click User settings, and review available configuration options.

  4. On the Azure Active Directory blade, in the Manage section, click Users, and then click your user account to display its Profile settings.

  5. Click edit, in the Settings section, set Usage location to United States and click save to apply the change.

    This is necessary in order to assign an Azure AD Premium P2 license to your user account later in this lab.

  6. Navigate back to the Users - All users blade, and then click + New user.

  7. Create a new user with the following settings (leave others with their defaults):

    SettingValue
    User nameaz104-01a-aaduser1
    Nameaz104-01a-aaduser1
    Let me create the passwordenabled
    Initial passwordPa55w.rd124
    Usage locationUnited States
    Job titleCloud Administrator
    DepartmentIT

    Copy to clipboard the full User Principal Name (user name plus domain). You will need it later in this task.

  8. In the list of users, click the newly created user account to display its blade.

  9. Review the options available in the Manage section and note that you can identify the Azure AD roles assigned to the user account as well as the user account's permissions to Azure resources.

  10. In the Manage section, click Assigned roles, then click + Add assignment button and assign the User administrator role to az104-01a-aaduser1.

    You also have the option of assigning Azure AD roles when provisioning a new user.

  11. Open an InPrivate browser window and sign in to the https://portal.azure.com using the newly created user account. When prompted to update the password, change the password for the user to Pa55w.rd1234.

    Rather than typing the user name (including the domain name), you can paste the content of Clipboard.

  12. In the InPrivate browser window, in the Azure portal, search for and select Azure Active Directory.

    While this user account can access the Azure Active Directory tenant, it does not have any access to Azure resources. This is expected, since such access would need to be granted explicitly by using Azure Role-Based Access Control.

  13. In the InPrivate browser window, on the Azure AD blade, scroll down to the Manage section, click User settings, and note that you do not have permissions to modify any configuration options.

  14. In the InPrivate browser window, on the Azure AD blade, in the Manage section, click Users, and then click + New user.

  15. Create a new user with the following settings (leave others with their defaults):

    SettingValue
    User nameaz104-01a-aaduser2
    Nameaz104-01a-aaduser2
    Let me create the passwordenabled
    Initial passwordPa55w.rd124
    Usage locationUnited States
    Job titleSystem Administrator
    DepartmentIT
  16. Sign out as the az104-01a-aaduser1 user from the Azure portal and close the InPrivate browser window.

Task 2: Create Azure AD groups with assigned and dynamic membership

In this task, you will create Azure Active Directory groups with assigned and dynamic membership.

  1. Back in the Azure portal where you are signed in with your user account, navigate back to the Overview blade of the Azure AD tenant and, in the Manage section, click Licenses.

    Azure AD Premium P1 or P2 licenses are required in order to implement dynamic groups.

  2. In the Manage section, click All products.

  3. Click + Try/Buy and activate the free trial of Azure AD Premium P2.

  4. Refresh the browser window to verify that the activation was successful.

  5. From the Licenses - All products blade, select the Azure Active Directory Premium P2 entry, and assign all license options of Azure AD Premium P2 to your user account and the two newly created user accounts.

  6. In the Azure portal, navigate back to the Azure AD tenant blade and click Groups.

  7. Use the + New group button to create a new group with the following settings:

    SettingValue
    Group typeSecurity
    Group nameIT Cloud Administrators
    Group descriptionContoso IT cloud administrators
    Membership typeDynamic User

    If the Membership type drop-down list is grayed out, wait a few minutes and refresh the browser page.

  8. Click Add dynamic query.

  9. On the Configure Rules tab of the Dynamic membership rules blade, create a new rule with the following settings:

    SettingValue
    PropertyjobTitle
    OperatorEquals
    ValueCloud Administrator
  10. Save the rule and, back on the New Group blade, click Create.

  11. Back on the Groups - All groups blade of the Azure AD tenant, click the + New group button and create a new group with the following settings:

    SettingValue
    Group typeSecurity
    Group nameIT System Administrators
    Group descriptionContoso IT system administrators
    Membership typeDynamic User
  12. Click Add dynamic query.

  13. On the Configure Rules tab of the Dynamic membership rules blade, create a new rule with the following settings:

    SettingValue
    PropertyjobTitle
    OperatorEquals
    ValueSystem Administrator
  14. Save the rule and, back on the New Group blade, click Create.

  15. Back on the Groups - All groups blade of the Azure AD tenant, click the + New group button, and create a new group with the following settings:

    SettingValue
    Group typeSecurity
    Group nameIT Lab Administrators
    Group descriptionContoso IT Lab administrators
    Membership typeAssigned
  16. Click No members selected.

  17. From the Add members blade, search and select the IT Cloud Administrators and IT System Administrators groups and, back on the New Group blade, click Create.

  18. Back on the Groups - All groups blade, click the entry representing the IT Cloud Administrators group and, on then display its Members blade. Verify that the az104-01a-aaduser1 appears in the list of group members.

    You might experience delays with updates of the dynamic membership groups. To expedite the update, navigate to the group blade, display its Dynamic membership rules blade, Edit the rule listed in the Rule syntax textbox by adding a whitespace at the end, and Save the change.

  19. Navigate back to the Groups - All groups blade, click the entry representing the IT System Administrators group and, on then display its Members blade. Verify that the az104-01a-aaduser2 appears in the list of group members.

Task 3: Create an Azure Active Directory (AD) tenant

In this task, you will create a new Azure AD tenant.

  1. In the Azure portal, search for and select Azure Active Directory.

  2. Click + Create a tenant and specify the following setting:

    SettingValue
    Directory typeAzure Active Directory
  3. Click Next : Configuration

    SettingValue
    Organization nameContoso Lab
    Initial domain nameany valid DNS name consisting of lower case letters and digits and starting with a letter
    Country/RegionUnited States

    The Initial domain name should not be a legitimate name that potentially matches your organization or another. The green check mark in the Initial domain name text box will indicate that the domain name you typed in is valid and unique.

  4. Click Review + create and then click Create.

  5. Display the blade of the newly created Azure AD tenant by using the Click here to navigate to your new tenant: Contoso Lab link or the Directory + Subscription button (directly to the right of the Cloud Shell button) in the Azure portal toolbar.

Task 4: Manage Azure AD guest users.

In this task, you will create Azure AD guest users and grant them access to resources in an Azure subscription.

  1. In the Azure portal displaying the Contoso Lab Azure AD tenant, in the Manage section, click Users, and then click + New user.

  2. Create a new user with the following settings (leave others with their defaults):

    SettingValue
    User nameaz104-01b-aaduser1
    Nameaz104-01b-aaduser1
    Let me create the passwordenabled
    Initial passwordPa55w.rd124
    Job titleSystem Administrator
    DepartmentIT
  3. Click on the newly created profile.

    Copy to clipboard the full User Principal Name (user name plus domain). You will need it later in this task.

  4. Switch back to your default Azure AD tenant by using the Directory + Subscription button (directly to the right of the Cloud Shell button) in the Azure portal toolbar.

  5. Navigate back to the Users - All users blade, and then click + New guest user.

  6. Create a new guest user with the following settings (leave others with their defaults):

    SettingValue
    Nameaz104-01b-aaduser1
    Email addressthe User Principal Name you copied earlier in this task
    Usage locationUnited States
    Job titleLab Administrator
    DepartmentIT
  7. Click Invite.

  8. Back on the Users - All users blade, click the entry representing the newly created guest user account.

  9. On the az104-01b-aaduser1 - Profile blade, click Groups.

  10. Click + Add membership and add the guest user account to the IT Lab Administrators group.

Clean up resources

Remember to remove any newly created Azure resources that you no longer use. Removing unused resources ensures you will not incur unexpected costs. While, in this case, there are no additional charges associated with Azure Active Directory tenants and their objects, you might want to consider removing the user accounts, the group accounts, and the Azure Active Directory tenant you created in this lab.

  1. In the Azure Portal search for Azure Active Directory in the search bar. Within Azure Active Directory under Manage select Licenses. Once at Licenses under Manage select All Products and then select Azure Active Directory Premium P2 item in the list. Proceed by then selecting Licensed Users. Select the user accounts az104-01a-aaduser1 and az104-01a-aaduser2 to which you assigned licenses in this lab, click Remove license, and, when prompted to confirm, click OK.

  2. In the Azure portal, navigate to the Users - All users blade, click the entry representing the az104-01b-aaduser1 guest user account, on the az104-01b-aaduser1 - Profile blade click Delete, and, when prompted to confirm, click OK.

  3. Repeat the same sequence of steps to delete the remaining user accounts you created in this lab.

  4. Navigate to the Groups - All groups blade, select the groups you created in this lab, click Delete, and, when prompted to confirm, click OK.

  5. In the Azure portal, display the blade of the Contoso Lab Azure AD tenant by using the Directory + Subscription button (directly to the right of the Cloud Shell button) in the Azure portal toolbar.

  6. Navigate to the Users - All users blade, click the entry representing the az104-01b-aaduser1 user account, on the az104-01b-aaduser1 - Profile blade click Delete, and, when prompted to confirm, click OK.

  7. Navigate to the Contoso Lab - Overview blade of the Contoso Lab Azure AD tenant, click Delete tenant, on the Delete tenant 'Contoso Lab' blade, click the Get permission to delete Azure resources link, on the Properties blade of Azure Active Directory, set Access management for Azure resources to Yes and click Save.

  8. Sign out from the Azure portal and sign in back.

  9. Navigate back to the Delete tenant 'Contoso Lab' blade and click Delete.

You will have to wait for the trial license expiration before you can delete the tenant. This does not incur any additional cost.

Review

In this lab, you have:

  • Created and configured Azure AD users
  • Created Azure AD groups with assigned and dynamic membership
  • Created an Azure Active Directory (AD) tenant
  • Managed Azure AD guest users

Friday, July 16, 2021

thumbnail

Manage Subscriptions and RBAC

Objectives

In this lab, you will:

  • Task 1: Implement Management Groups
  • Task 2: Create custom RBAC roles
  • Task 3: Assign RBAC roles

Task 1: Implement Management Groups

In this task, you will create and configure management groups.

  1. Sign in to the https://portal.azure.com.

  2. Search for and select Management groups to navigate to the Management groups blade.

  3. Review the messages at the top of the Management groups blade. If you are seeing the message stating You are registered as a directory admin but do not have the necessary permissions to access the root management group, perfom the following sequence of steps:

    1. In the Azure portal, search for and select Azure Active Directory.

    2. On the blade displaying properties of your Azure Active Directory tenant, in the vertical menu on the left side, in the Manage section, select Properties.

    3. On the Properties blade of your your Azure Active Directory tenant, in the Access management for Azure resources section, select Yes and then select Save.

    4. Navigate back to the Management groups blade, and select Refresh.

  4. On the Management groups blade, click + Add.

    If you have not previously created Management Groups, select Start using management groups

  5. Create a management group with the following settings:

    SettingValue
    Management group IDaz104-02-mg1
    Management group display nameaz104-02-mg1
  6. In the list of management groups, click the entry representing the newly created management group.

  7. On the az104-02-mg1 blade, click Subscriptions.

  8. On the az104-02-mg1 | Subscriptions blade, click + Add, on the Add subscription blade, in the Subscription drop-down list, seletc the subscription you are using in this lab and click Save.

    On the az104-02-mg1 | Subscriptions blade, copy the ID of your Azure subscription into Clipboard. You will need it in the next task.

Task 2: Create custom RBAC roles

In this task, you will create a definition of a custom RBAC role.

  1. From the lab computer, open the file \Allfiles\Labs\02\az104-02a-customRoleDefinition.json in Notepad and review its content:

    json
    { "Name": "Support Request Contributor (Custom)", "IsCustom": true, "Description": "Allows to create support requests", "Actions": [ "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.Support/*" ], "NotActions": [ ], "AssignableScopes": [ "/providers/Microsoft.Management/managementGroups/az104-02-mg1", "/subscriptions/SUBSCRIPTION_ID" ] }
  2. Replace the SUBSCRIPTION_ID placeholder in the JSON file with the subscription ID you copied into Clipboard and save the change.

  3. In the Azure portal, open Cloud Shell pane by clicking on the toolbar icon directly to the right of the search textbox.

  4. If prompted to select either Bash or PowerShell, select PowerShell.

    If this is the first time you are starting Cloud Shell and you are presented with the You have no storage mounted message, select the subscription you are using in this lab, and click Create storage.

  5. In the toolbar of the Cloud Shell pane, click the Upload/Download files icon, in the drop-down menu click Upload, and upload the file \Allfiles\Labs\02\az104-02a-customRoleDefinition.json into the Cloud Shell home directory.

  6. From the Cloud Shell pane, run the following to create the custom role definition:

    powershell
    New-AzRoleDefinition -InputFile $HOME/az104-02a-customRoleDefinition.json
  7. Close the Cloud Shell pane.

Task 3: Assign RBAC roles

In this task, you will create an Azure Active Directory user, assign the RBAC role you created in the previous task to that user, and verify that the user can perform the task specified in the RBAC role definition.

  1. In the Azure portal, search for and select Azure Active Directory, on the Azure Active Directory blade, click Users, and then click + New user.

  2. Create a new user with the following settings (leave others with their defaults):

    SettingValue
    User nameaz104-02-aaduser1
    Nameaz104-02-aaduser1
    Let me create the passwordenabled
    Initial passwordPa55w.rd1234

    Copy to clipboard the full User name. You will need it later in this lab.

  3. In the Azure portal, navigate back to the az104-02-mg1 management group and display its details.

  4. Click Access control (IAM), click + Add followed by Role assignment, and assign the Support Request Contributor (Custom) role to the newly created user account.

  5. Open an InPrivate browser window and sign in to the https://portal.azure.com using the newly created user account. When prompted to update the password, change the password for the user.

    Rather than typing the user name, you can paste the content of Clipboard.

  6. In the InPrivate browser window, in the Azure portal, search and select Resource groups to verify that the az104-02-aaduser1 user can see all resource groups.

  7. In the InPrivate browser window, in the Azure portal, search and select All resources to verify that the az104-02-aaduser1 user cannot see any resources.

  8. In the InPrivate browser window, in the Azure portal, search and select Help + support and then click + New support request.

  9. In the InPrivate browser window, on the Basic tab of the Help + support - New support request blade, type Service and subscription limits in the Summary field and select the Service and subscription limits (quotas) issue type. Note that the subscription you are using in this lab is listed in the Subscription drop-down list.

    The presence of the subscription you are using in this lab in the Subscription drop-down list indicates that the account you are using has the permissions required to create the subscription-specific support request.

    If you do not see the Service and subscription limits (quotas) option, sign out from the Azure portal and sign in back.

  10. Do not continue with creating the support request. Instead, sign out as the az104-02-aaduser1 user from the Azure portal and close the InPrivate browser window.

Clean up resources

Remember to remove any newly created Azure resources that you no longer use.

Removing unused resources ensures you will not see unexpected charges, although, resources created in this lab do not incur extra cost.

  1. In the Azure portal, search for and select Azure Active Directory, on the Azure Active Directory blade, click Users.

  2. On the Users - All users blade, click az104-02-aaduser1.

  3. On the az104-02-aaduser1 - Profile blade, copy the value of Object ID attribute.

  4. In the Azure portal, start a PowerShell session within the Cloud Shell.

  5. From the Cloud Shell pane, run the following to remove the assignment of the custom role definition (replace the [object_ID] placeholder with the value of the object ID attribute of the az104-02-aaduser1 Azure Active Directory user account you copied earlier in this task):

    powershell
    $scope = (Get-AzRoleAssignment -RoleDefinitionName 'Support Request Contributor (Custom)').Scope Remove-AzRoleAssignment -ObjectId '[object_ID]' -RoleDefinitionName 'Support Request Contributor (Custom)' -Scope $scope
  6. From the Cloud Shell pane, run the following to remove the custom role definition:

    powershell
    Remove-AzRoleDefinition -Name 'Support Request Contributor (Custom)' -Force
  7. In the Azure portal, navigate back to the Users - All users blade of the Azure Active Directory, and delete the az104-02-aaduser1 user account.

  8. In the Azure portal, navigate back to the Management groups blade.

  9. On the Management groups blade, select the ellipsis icon next to your subscription under the az104-02-mg1 management group and select Move to move the subscription to the Tenant Root management group.

[!note] It is likely that the target management group is the Tenant Root management group, unless you created a custom management group hierarchy before running this lab.

  1. Select Refresh to verify that the subscription has successfully moved to the Tenant Root management group.

  2. Navigate back to the Management groups blade, right click the ellipsis icon to the right of the az104-02-mg1 management group and click Delete.

Powered by Blogger.