You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/private-link/create-network-security-perimeter-cli.md
+12-3Lines changed: 12 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,23 +5,27 @@ author: mbender-ms
5
5
ms.author: mbender
6
6
ms.service: azure-private-link
7
7
ms.topic: quickstart
8
-
ms.date: 09/16/2024
8
+
ms.date: 10/30/2024
9
9
#CustomerIntent: As a network administrator, I want to create a network security perimeter for an Azure resource using Azure CLI, so that I can control the network traffic to and from the resource.
10
10
---
11
11
12
-
# Quickstart: Create a network security perimeter - Azure CLI
12
+
# Quickstart: Create a network security perimeter - Azure CLI~
13
13
14
14
Get started with network security perimeter by creating a network security perimeter for an Azure key vault using Azure CLI. A [network security perimeter](network-security-perimeter-concepts.md) allows [Azure PaaS (PaaS)](./network-security-perimeter-concepts.md#onboarded-private-link-resources)resources to communicate within an explicit trusted boundary. Next, You create and update a PaaS resources association in a network security perimeter profile. Then you create and update network security perimeter access rules. When you're finished, you delete all resources created in this quickstart.
Copy file name to clipboardExpand all lines: articles/private-link/network-security-perimeter-diagnostic-logs.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -40,7 +40,7 @@ You can store the diagnostic logs in the following locations:
40
40
|**Service**|**Description**|
41
41
| --- | --- |
42
42
|**Log Analytic workspace**| Log Analytic workspaces are recommended since they allow you to use the predefined queries, visualizations, and set alerts based on specific log conditions. |
43
-
|**Azure Storage account**| Storage accounts are best used for logs when logs are stored for a longer duration and reviewed when needed. |
43
+
|**Azure Storage account**| Storage accounts are best used for logs when logs are stored for a longer duration and reviewed when needed. |
44
44
|**Azure Event Hubs**| Event hubs are a great option for integrating with other security information and event management (SIEM) tools to get alerts on your resources. |
0 commit comments