You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-government/documentation-government-ase-disa-cap.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -36,11 +36,11 @@ However, since DISA advertises a default route out the ExpressRoute circuit, the
36
36
You will need to create new routes in the UDR for the management addresses in order to keep the ASE healthy. For Azure Government ranges see [App Service Environment management addresses](https://docs.microsoft.com/azure/app-service/environment/management-addresses
37
37
)
38
38
39
-
Rule 1: 23.97.29.209 --> Internet
40
-
Rule 2: 23.97.0.17 --> Internet
41
-
Rule 3: 23.97.16.184 --> Internet
42
-
Rule 4: 13.72.180.105 --> Internet
43
-
Rule 5: 13.72.53.37 --> Internet
39
+
*Rule 1: 23.97.29.209 --> Internet
40
+
*Rule 2: 23.97.0.17 --> Internet
41
+
*Rule 3: 23.97.16.184 --> Internet
42
+
*Rule 4: 13.72.180.105 --> Internet
43
+
*Rule 5: 13.72.53.37 --> Internet
44
44
45
45
Make sure the UDR is applied to the subnet your ASE is deployed to.
46
46
@@ -56,16 +56,16 @@ The images below describe the default NSG rules created during the ASE creation.
56
56
57
57
### Service Endpoints
58
58
59
-
Depending what storage you are using you will be required to enable Service Endpoints for SQL and Azure Storage to access them without going back down to the DISA BCAP. You also need to enable EventHub Service Endpoint for ASE logs.
59
+
Depending on the storage you use, you will be required to enable Service Endpoints for SQL and Azure Storage to access them without going back down to the DISA BCAP. You also need to enable EventHub Service Endpoint for ASE logs. [Learn more](https://docs.microsoft.com/azure/app-service/environment/network-info#service-endpoints).
60
60
61
61
## FAQs
62
62
63
-
*Some configuration changes may take some time to take effect. Allow for several hours for changes to routing, NSGs, ASE Health, etc. to propagate and take effect, or optionally you can reboot the ASE.
63
+
Some configuration changes may take some time to take effect. Allow for several hours for changes to routing, NSGs, ASE Health, etc. to propagate and take effect, or optionally you can reboot the ASE.
64
64
65
65
## Resource manager template sample
66
66
67
67
> [!NOTE]
68
-
>In order to deploy non-RFC 1918 IP addresses in the portal you must pre-stage the VNet and Subnet for the ASE. You can use a Resource Manager Template to deploy the ASE with non-RFC1918 IPs as well.
68
+
> In order to deploy non-RFC 1918 IP addresses in the portal you must pre-stage the VNet and Subnet for the ASE. You can use a Resource Manager Template to deploy the ASE with non-RFC1918 IPs as well.
Copy file name to clipboardExpand all lines: articles/cost-management-billing/manage/mpa-request-ownership.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -135,7 +135,7 @@ Azure Marketplace products which are available for subscriptions that are manage
135
135
136
136
### Azure Reservations transfer
137
137
138
-
Azure Reservations don't automatically move with subscriptions.Either you can keep the Reservation in EAfor other subscriptions or [cancel the Reservation](https://docs.microsoft.com/azure/cost-management-billing/reservations/exchange-and-refund-azure-reservations) and parnter can repurchase in CSP.
138
+
Azure Reservations don't automatically move with subscriptions.Either you can keep the Reservation in EAfor other subscriptions or [cancel the Reservation](https://docs.microsoft.com/azure/cost-management-billing/reservations/exchange-and-refund-azure-reservations) and partner can repurchase in CSP.
Copy file name to clipboardExpand all lines: articles/data-factory/connector-azure-sql-database.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -138,7 +138,7 @@ To use a service principal-based Azure AD application token authentication, foll
138
138
4. Grant the service principal needed permissions as you normally do for SQL users or others. Run the following code. For more options, see [this document](https://docs.microsoft.com/sql/relational-databases/system-stored-procedures/sp-addrolemember-transact-sql?view=sql-server-2017).
ALTER ROLE [role name] ADD MEMBER [your application name];
142
142
```
143
143
144
144
5. Configure an Azure SQL Database linked service in Azure Data Factory.
@@ -185,7 +185,7 @@ To use managed identity authentication, follow these steps.
185
185
3. Grant the Data Factory managed identity needed permissions as you normally do for SQL users and others. Run the following code. For more options, see [this document](https://docs.microsoft.com/sql/relational-databases/system-stored-procedures/sp-addrolemember-transact-sql?view=sql-server-2017).
186
186
187
187
```sql
188
-
EXEC sp_addrolemember [role name], [your Data Factory name];
188
+
ALTER ROLE [role name] ADD MEMBER [your Data Factory name];
189
189
```
190
190
191
191
4. Configure an Azure SQL Database linked service in Azure Data Factory.
Copy file name to clipboardExpand all lines: articles/security-center/azure-kubernetes-service-integration.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,7 +31,7 @@ Together, these two tools form the best cloud-native Kubernetes security offerin
31
31
32
32
Using the two services together provides:
33
33
34
-
***Security recommendations** - Security Center identifies your AKS resources and categorizes them: from clusters to individual virtual machines. You can then view security recommendations per resource. For more information, see the containers recommendations in the [reference list of recommendations](recommendations-reference.md#recs-computeapp).
34
+
***Security recommendations** - Security Center identifies your AKS resources and categorizes them: from clusters to individual virtual machines. You can then view security recommendations per resource. For more information, see the containers recommendations in the [reference list of recommendations](recommendations-reference.md#recs-containers).
35
35
36
36
***Environment hardening** - Security Center constantly monitors the configuration of your Kubernetes clusters and Docker configurations. It then generates security recommendations that reflect industry standards.
37
37
@@ -57,4 +57,4 @@ To learn more about Security Center's container security features, see:
57
57
58
58
*[Integration with Azure Container Registry](azure-container-registry-integration.md)
59
59
60
-
*[Data management at Microsoft](https://www.microsoft.com/trust-center/privacy/data-management) - Describes the data policies of Microsoft services (including Azure, Intune, and Office 365), details of Microsoft's data management, and the retention policies that affect your data
60
+
*[Data management at Microsoft](https://www.microsoft.com/trust-center/privacy/data-management) - Describes the data policies of Microsoft services (including Azure, Intune, and Office 365), details of Microsoft's data management, and the retention policies that affect your data
0 commit comments