As a Global Administrator in Microsoft Entra ID, you might not automatically have access to all Azure resources, including the ability to create Azure Policies or manage Virtual Networks. This can occur if your role assignments do not include the necessary permissions for those specific resources.
To resolve this issue, you can elevate your access to gain permissions for all Azure subscriptions and management groups in your tenant. When you elevate your access, you will be assigned the User Access Administrator role at the root scope, which allows you to view all resources and assign access in any subscription or management group. After making the necessary changes, it is recommended to remove this elevated access.
If you continue to face issues, ensure that you have the appropriate role assignments that include write permissions for the resources you are trying to manage.
References: