Skip to content

Commit 385e693

Browse files
committed
updates
1 parent c0534f3 commit 385e693

File tree

1 file changed

+3
-4
lines changed

1 file changed

+3
-4
lines changed

articles/ai-services/cognitive-services-data-loss-prevention.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Data loss prevention
33
description: Azure AI services data loss prevention capabilities allow customers to configure the list of outbound URLs their Azure AI services resources are allowed to access. This configuration creates another level of control for customers to prevent data loss.
44
author: gclarkmt
55
ms.author: gregc
6-
ms.date: 5/19/2025
6+
ms.date: 09/09/2025
77
ms.service: azure-ai-services
88
ms.topic: how-to
99
ms.custom:
@@ -21,12 +21,10 @@ Before you make a request, you need an Azure account and an Azure AI services su
2121

2222
## Access control guidance for Azure AI Services
2323

24-
* You can limit inbound and outbound access to AI services by implementing a [network security perimeter](/azure/private-link/network-security-perimeter-concepts). For additional information on how to implement a network security perimeter for Azure AI Services, see [Add network security perimeter (preview) to Azure AI Services](../ai-foundry/openai/how-to/network-security-perimeter.md).
24+
* You can limit inbound and outbound access to Azure OpenAI by implementing a [network security perimeter](/azure/private-link/network-security-perimeter-concepts). For additional information on how to implement a network security perimeter for Azure AI Services, see [Add network security perimeter (preview) to Azure OpenAI](../ai-foundry/openai/how-to/network-security-perimeter.md). For additional information on how to implement a network security perimeter for Azure AI Foundry-based projects, see [Add Azure AI Foundry to a network security perimeter (preview)](../ai-foundry/how-to/add-foundry-to-network-security-perimeter.md).
2525

2626
* Define the permitted FQDNs for outbound connections from the AI services resource and apply egress controls accordingly using the information in this guide.
2727

28-
* If you want to restrict outbound access for your AI Services resource that's hosted publically and using role-based or key-based access, then restrict outbound access to the list of FQDNs using the `allowedFqdnList` property. But if you want to restrict inbound and outbound for your AI Services resource that's hosted publically and using role-based access only, then restrict outbound access using a network security perimeter. For more information, see [Add an Azure OpenAI service to a network security perimeter (preview)](../ai-foundry/openai/how-to/network-security-perimeter.md).
29-
3028
## Enabling data loss prevention
3129

3230
There are two parts to enable data loss prevention. First, the resource property `restrictOutboundNetworkAccess` must be set to `true`. When this is set to true, you also need to provide the list of approved URLs. The list of URLs is added to the `allowedFqdnList` property. The `allowedFqdnList` property contains an array of comma-separated URLs.
@@ -103,6 +101,7 @@ There are two parts to enable data loss prevention. First, the resource property
103101
The following services support data loss prevention configuration:
104102
105103
* Azure OpenAI
104+
* Azure AI Foundry (Foundry-based projects)
106105
* Azure AI Vision
107106
* Content Moderator
108107
* Custom Vision

0 commit comments

Comments
 (0)