Skip to content

Commit 0e2e3f4

Browse files
committed
edit
1 parent 9237038 commit 0e2e3f4

File tree

1 file changed

+6
-2
lines changed

1 file changed

+6
-2
lines changed

articles/dns/dns-security-policy.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,8 @@ A security policy can only apply to VNets in the same region. You can create any
4141

4242
![Screenshot of the list of DNS security policies.](./media/dns-security-policy/policy-list.png)
4343

44-
Keep in mind that >the policy:VNet relationship is 1:N. When you associate a VNet with a security policy (via virtual network links), that VNet can't then be associated with another security policy. A single DNS security policy can be associated with multiple VNets in the same region.
44+
> [!IMPORTANT]
45+
> The **policy:VNet** relationship is **1:N**. When you associate a VNet with a security policy (via virtual network links), that VNet can't then be associated with another security policy. A single DNS security policy can be associated with multiple VNets in the same region.
4546
4647
## DNS traffic rules
4748

@@ -53,7 +54,7 @@ To display DNS traffic rules in the Azure portal, select a DNS security policy a
5354

5455
- Rules are processed in order of **Priority** in the range 100-65000. Lower numbers are higher priority.
5556
* If a domain name is blocked in a lower priority rule, and the same domain is allowed in a higher priority rule, the domain name is allowed.
56-
* Rule priority takes precedence over the number of labels in a domain name. If contoso.com is allowed in a higher priority rule, then sub.contoso.com is allowed, even if sub.contoso.com is blocked in a lower priority rule.
57+
* Rules follow the DNS hierarchy. If contoso.com is allowed in a higher priority rule, then sub.contoso.com is allowed, even if sub.contoso.com is blocked in a lower priority rule.
5758
- You can dynamically add and delete rules from the list. Be sure to **Save** after editing rules in the portal.
5859
- During preview, up to 10 traffic rules are allowed per security policy. This limit will be increased to 100 for general availability.
5960
- Multiple **DNS Domain Lists** are allowed per rule. You must have at least one DNS domain list.
@@ -81,6 +82,9 @@ You can associate a domain list to multiple DNS traffic rules in different secur
8182

8283
![Screenshot of domains inside a domain list.](./media/dns-security-policy/domain-list-detailed.png)
8384

85+
> [!IMPORTANT]
86+
> Be careful when creating wildcard domain lists. For example, if you create a domain list that applies to all domains (by entering `.` as the DNS domain) and then configure a DNS traffic rule to block queries to this domain list, you can prevent required services from working.
87+
8488
When viewing a DNS domain list in the Azure portal, you can also select **Settings** > **Associated DNS Traffic Rules** to see a list of all traffic rules and the associated DNS security policies that reference the DNS domain list.
8589

8690
![Screenshot of associated domain list traffic rules.](./media/dns-security-policy/domain-list-traffic-rules.png)

0 commit comments

Comments
 (0)