Skip to content

Commit 001e8e2

Browse files
committed
Feedback.
1 parent 8a14383 commit 001e8e2

File tree

1 file changed

+14
-14
lines changed

1 file changed

+14
-14
lines changed
Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Prevent managed disks from being imported or exported
3-
description: Prevent managed disks from being imported or exported
2+
title: Restrict managed disks from being imported or exported
3+
description: Restrict managed disks from being imported or exported
44
author: roygara
55
ms.service: azure-disk-storage
66
ms.topic: conceptual
@@ -12,18 +12,6 @@ ms.author: rogarana
1212

1313
This article provides an overview of your options for preventing your Azure managed disks from being imported or exported.
1414

15-
## Configure the Network access policy
16-
17-
Each managed disk and snapshot has its own NetworkAccessPolicy parameter, that can prevent the resource from being exported. You can use the [Azure CLI](/cli/azure/disk?view=azure-cli-latest#az-disk-update) or [Azure PowerShell module](/powershell/module/az.compute/new-azdiskconfig?view=azps-10.1.0) to set the parameter to **DenyAll**, which prevents the resource from being exported.
18-
19-
## Azure policy
20-
21-
[Configure an Azure Policy](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F8426280e-b5be-43d9-979e-653d12a08638) to disable public network access to your managed disks.
22-
23-
## Private links
24-
25-
You can use private endpoints to restrict the upload and download of managed disks and more securely access data over a private link from clients on your Azure virtual network. The private endpoint uses an IP address from the virtual network address space for your managed disks. Network traffic between clients on their virtual network and managed disks only traverses over the virtual network and a private link on the Microsoft backbone network, eliminating exposure from the public internet. To learn more, see either the [portal](disks-enable-private-links-for-import-export-portal.md) or [CLI](linux/disks-export-import-private-links-cli.md) articles.
26-
2715
## Custom role
2816

2917
To limit the number of people who can import or export managed disks or snapshots using Azure RBAC, create a [custom RBAC role](../role-based-access-control/custom-roles-powershell.md) that doesn't have the following permissions:
@@ -38,3 +26,15 @@ Any custom role without those permissions can't upload or download managed disks
3826
## Azure AD authentication
3927

4028
If you're using Azure Active Directory (Azure AD) to control resource access, you can also use it to restrict uploading of Azure managed disks. When a user attempts to upload a disk, Azure validates the identity of the requesting user in Azure AD, and confirms that user has the required permissions. To learn more, see either the [PowerShell](windows/disks-upload-vhd-to-managed-disk-powershell.md#secure-uploads-with-azure-ad) or [CLI](linux/disks-upload-vhd-to-managed-disk-cli.md#secure-uploads-with-azure-ad) articles.
29+
30+
## Private links
31+
32+
You can use private endpoints to restrict the upload and download of managed disks and more securely access data over a private link from clients on your Azure virtual network. The private endpoint uses an IP address from the virtual network address space for your managed disks. Network traffic between clients on their virtual network and managed disks only traverses over the virtual network and a private link on the Microsoft backbone network, eliminating exposure from the public internet. To learn more, see either the [portal](disks-enable-private-links-for-import-export-portal.md) or [CLI](linux/disks-export-import-private-links-cli.md) articles.
33+
34+
## Azure policy
35+
36+
[Configure an Azure Policy](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F8426280e-b5be-43d9-979e-653d12a08638) to disable public network access to your managed disks.
37+
38+
## Configure the Network access policy
39+
40+
Each managed disk and snapshot has its own NetworkAccessPolicy parameter, that can prevent the resource from being exported. You can use the [Azure CLI](/cli/azure/disk?view=azure-cli-latest#az-disk-update) or [Azure PowerShell module](/powershell/module/az.compute/new-azdiskconfig) to set the parameter to **DenyAll**, which prevents the resource from being exported.

0 commit comments

Comments
 (0)