Skip to content

Commit 01af847

Browse files
authored
Update architecture-connections.md
------- cc: @batamig
1 parent 979ece6 commit 01af847

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/defender-for-iot/organizations/architecture-connections.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -59,9 +59,9 @@ The following image shows how you can connect your sensors to the Defender for I
5959

6060
:::image type="content" source="media/architecture-connections/proxy-chaining.png" alt-text="Diagram of a proxy connection using proxy chaining." border="false":::
6161

62-
This method supports connecting your sensors without direct internet access, using an SSL-encrypted tunnel to transfer data from the sensor to the service endpoint via proxy servers. The proxy server doesn't perform any data inspection, analysis, or caching.
62+
This method supports connecting your sensors with either direct internet access, private VPN or ExpressRoute, the sensor will establish an SSL-encrypted tunnel to transfer data from the sensor to the service endpoint via multiple proxy servers. The proxy server doesn't perform any data inspection, analysis, or caching.
6363

64-
With a proxy chaining method, Defender for IoT doesn't support your proxy service. It's the customer's responsibility to set up and maintain the proxy service.
64+
It is the customer's responsibility to set up and maintain third-party proxy services with proxy chaining; Microsoft does not provide support for them.
6565

6666
For more information, see [Connect via proxy chaining](connect-sensors.md#connect-via-proxy-chaining).
6767

@@ -73,7 +73,7 @@ The following image shows how you can connect your sensors to the Defender for I
7373

7474
With direct connections:
7575

76-
- Any sensors connected to Azure data centers directly over the internet have a secure and encrypted connection to the Azure data centers. Transport Layer Security (TLS1.2/AES-256) provides *always-on* communication between the sensor and Azure resources.
76+
- Any sensors connected to Azure data centers directly over the internet or Azure ExpressRoute have a secure and encrypted connection to the Azure data centers. Transport Layer Security (TLS1.2/AES-256) provides *always-on* communication between the sensor and Azure resources.
7777

7878
- The sensor initiates all connections to the Azure portal. Initiating connections only from the sensor protects internal network devices from unsolicited inbound connections, but also means that you don't need to configure any inbound firewall rules.
7979

0 commit comments

Comments
 (0)