Skip to content

Commit 0fda144

Browse files
committed
edit
1 parent 0cd4417 commit 0fda144

File tree

1 file changed

+3
-1
lines changed

1 file changed

+3
-1
lines changed

articles/dns/dns-security-policy.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,6 @@ To display DNS traffic rules in the Azure portal, select a DNS security policy a
5656
* If a domain name is blocked in a lower priority rule, and the same domain is allowed in a higher priority rule, the domain name is allowed.
5757
* Rules follow the DNS hierarchy. If contoso.com is allowed in a higher priority rule, then sub.contoso.com is allowed, even if sub.contoso.com is blocked in a lower priority rule.
5858
- You can dynamically add and delete rules from the list. Be sure to **Save** after editing rules in the portal.
59-
- During preview, up to 10 traffic rules are allowed per security policy. This limit will be increased to 100 for general availability.
6059
- Multiple **DNS Domain Lists** are allowed per rule. You must have at least one DNS domain list.
6160
- Each rule is associated with one of three **Traffic Actions**: **Allow**, **Block**, or **Alert**.
6261
* **Allow**: Permit the query to the associated domain lists and log the query.
@@ -107,6 +106,9 @@ Virtual network restrictions:
107106
- DNS security policies can only be applied to VNets in the same region as the DNS security policy.
108107
- You can link one security policy per VNet. A single security policy can be associated to multiple VNets.
109108

109+
DNS traffic rule restrictions:
110+
- During preview, up to 10 traffic rules are allowed per security policy. This limit will be increased to 100 for general availability.
111+
110112
## Related content
111113

112114
- [How to filter and view DNS traffic (Preview)](dns-traffic-log-how-to.md).

0 commit comments

Comments
 (0)