Skip to content

Commit 1b7cd58

Browse files
authored
Update private-endpoint.md
details around internet tag and service tag
1 parent e0dd029 commit 1b7cd58

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/app-service/networking/private-endpoint.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ From the security perspective:
4343
- The NIC of the Private Endpoint cannot have an NSG associated
4444
- The Subnet that hosts the Private Endpoint can have an NSG associated, but you must disable the network policies enforcement for the Private Endpoint see [this article] [disablesecuritype]. As a result, you cannot filter by any NSG the access to your Private Endpoint.
4545
- When you enable Private Endpoint to your Web App, the [access restrictions][accessrestrictions] configuration of the Web App is not evaluated.
46-
- You can reduce data exfiltration from the vnet by removing all NSG rules where destination is Internet Tag, but adding a Service Endpoint in your subnet will allow you to reach any Web App hosted in the same stamp and exposed to Internet.
46+
- You can reduce data exfiltration from the vnet by removing all NSG rules where destination is tag Internet or Azure services, but adding a Service Endpoint in your subnet will allow you to reach any Web App hosted in the same stamp and exposed to Internet.
4747

4848
Private Endpoint for Web App is available for tier PremiumV2, and Isolated with an external ASE.
4949

0 commit comments

Comments
 (0)