Skip to content

Commit 0e2bce6

Browse files
authored
Merge pull request #98560 from memildin/asc-melvyn-daily
Tiny tweaks
2 parents aecbdcb + 36935cd commit 0e2bce6

File tree

3 files changed

+3
-3
lines changed

3 files changed

+3
-3
lines changed

articles/security-center/recommendations-network.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ For an explanation of how to find these and how to resolve them, see [here](secu
3535
DDoS Protection Standard should be enabled|Protect virtual networks containing applications with public IPs by enabling DDoS protection service standard. DDoS protection enables mitigation of network volumetric and protocol attacks.|High|10|Virtual network|
3636
|IP forwarding on your virtual machine should be disabled|Disable IP forwarding. When IP forwarding is enabled on a virtual machine's NIC, the machine can receive traffic addressed to other destinations. IP forwarding is rarely required (for example, when using the VM as a network virtual appliance), and therefore, this should be reviewed by the network security team.|Medium|10|Virtual machine|
3737
|Web Application should only be accessible over HTTPS|Enable "HTTPS only" access for web applications. Use of HTTPS ensures server/service authentication and protects data in transit from network layer eavesdropping attacks.|Medium|20|Web application|
38-
|Just-in-time network access control should be applied on virtual machines|Apply just-in-time (JIT ) virtual machine (VM) access control to permanently lock down access to selected ports, and enable authorized users to open them, via JIT, for a limited amount of time only.|High|20|Virtual machine|
38+
|Just-in-time network access control should be applied on virtual machines|Apply just-in-time (JIT) virtual machine (VM) access control to permanently lock down access to selected ports, and enable authorized users to open them, via JIT, for a limited amount of time only.|High|20|Virtual machine|
3939
|Function Apps should only be accessible over HTTPS|Enable "HTTPS only" access for function apps. Use of HTTPS ensures server/service authentication and protects data in transit from network layer eavesdropping attacks.|Medium|20|Function app|
4040
|Secure transfer to storage accounts should be enabled|Enable secure transfer to storage accounts. Secure transfer is an option that forces your storage account to accept requests only from secure connections (HTTPS). Use of HTTPS ensures authentication between the server and the service and protects data in transit from network layer attacks, such as man-in-the-middle, eavesdropping, and session-hijacking.|High|20|Storage account|
4141

articles/security-center/security-center-cross-tenant-management.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ The views and actions are basically the same. Here are some examples:
4747
- **Remediate recommendations**: Monitor and remediate a [recommendation](security-center-recommendations.md) for many resources from various tenants at one time. You can then immediately tackle the vulnerabilities that present the highest risk across all tenants.
4848
- **Manage Alerts**: Detect [alerts](security-center-alerts-overview.md) throughout the different tenants. Take action on resources that are out of compliance with actionable [remediation steps](security-center-managing-and-responding-alerts.md).
4949

50-
- **Manage advanced cloud defense features and more**: Manage the various threat detection and protection services, such as [Just-in-time (JIT) VM access](security-center-just-in-time.md), [Adaptive Network Hardening](security-center-adaptive-network-hardening.md), [adaptive application controls](security-center-adaptive-application.md), and more.
50+
- **Manage advanced cloud defense features and more**: Manage the various threat detection and protection services, such as [just-in-time (JIT) VM access](security-center-just-in-time.md), [Adaptive Network Hardening](security-center-adaptive-network-hardening.md), [adaptive application controls](security-center-adaptive-application.md), and more.
5151

5252
## Next steps
5353
This article explains how cross-tenant management works in Security Center. To learn more about Security Center, see the following:

articles/security-center/security-center-just-in-time.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -172,7 +172,7 @@ For your convenience, you can connect to a VM using JIT directly from within the
172172

173173
To make it easy to roll out just-in-time access across your VMs, you can set a VM to allow only just-in-time access directly from within the VM.
174174

175-
1. Go to the [Azure portal](https://ms.portal.azure.com). Search for and select **Virtual machines**.
175+
1. From the [Azure portal](https://ms.portal.azure.com), search for and select **Virtual machines**.
176176
2. Select the virtual machine you want to limit to just-in-time access.
177177
3. In the menu, select **Configuration**.
178178
4. Under **Just-in-time-access**, select **Enable just-in-time policy**.

0 commit comments

Comments
 (0)