Skip to content

Commit 18f5588

Browse files
authored
Merge pull request #97750 from svchandramohan/patch-31
Redundant lines
2 parents c1ab5f8 + cd83071 commit 18f5588

File tree

1 file changed

+0
-5
lines changed

1 file changed

+0
-5
lines changed

articles/purview/concept-best-practices-network.md

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -105,11 +105,6 @@ When you're scanning a data source in Microsoft Purview, you need to provide a c
105105

106106
## Option 2: Use private endpoints
107107

108-
You can use [Azure private endpoints](../private-link/private-endpoint-overview.md) for your Microsoft Purview accounts. This option is useful if you need to do either of the following:
109-
110-
- Scan Azure infrastructure as a service (IaaS) and PaaS data sources inside Azure virtual networks and on-premises data sources through a private connection.
111-
- Allow users on a virtual network to securely access Microsoft Purview over [Azure Private Link](../private-link/private-link-overview.md).
112-
113108
Similar to other PaaS solutions, Microsoft Purview does not support deploying directly into a virtual network. So you can't use certain networking features with the offering's resources, such as network security groups, route tables, or other network-dependent appliances such as Azure Firewall. Instead, you can use private endpoints that can be enabled on your virtual network. You can then disable public internet access to securely connect to Microsoft Purview.
114109

115110
You must use private endpoints for your Microsoft Purview account if you have any of the following requirements:

0 commit comments

Comments
 (0)