Skip to content

Commit 1cf5062

Browse files
authored
Update packet-capture-manage.md
1 parent 69ea4d7 commit 1cf5062

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

articles/network-watcher/packet-capture-manage.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ In this article, you learn how to use the Azure Network Watcher [packet capture]
2727

2828
- An Azure storage account with VM outbound TCP connectivity to it over port `443`. If you don't have a storage account, see [Create a storage account using the Azure portal](../storage/common/storage-account-create.md?tabs=azure-portal&toc=/azure/network-watcher/toc.json).
2929
- The storage account must be accessible from the subnet of the target virtual machine or scale set. For more information, see [Configure Azure Storage firewalls and virtual networks](../storage/common/storage-network-security.md?tabs=azure-portal&toc=/azure/network-watcher/toc.json).
30-
- The storage account key access must be enabled to allow requests using shared access signatures (SAS) from Network Watcher.
30+
- The storage account key access must be enabled to allow requests from Network Watcher using a shared access signatures (SAS) token.
3131

3232
- Sign in to the [Azure portal](https://portal.azure.com) with your Azure account.
3333

@@ -41,7 +41,7 @@ In this article, you learn how to use the Azure Network Watcher [packet capture]
4141

4242
- An Azure storage account with VM outbound TCP connectivity to it over port `443`. If you don't have a storage account, see [Create a storage account using PowerShell](../storage/common/storage-account-create.md?tabs=azure-powershell&toc=/azure/network-watcher/toc.json).
4343
- The storage account must be accessible from the subnet of the target virtual machine or scale set. For more information, see [Configure Azure Storage firewalls and virtual networks](../storage/common/storage-network-security.md?tabs=azure-powershell&toc=/azure/network-watcher/toc.json).
44-
- The storage account key access must be enabled to allow requests using shared access signatures (SAS) from Network Watcher.
44+
- The storage account key access must be enabled to allow requests from Network Watcher using a shared access signatures (SAS) token.
4545

4646
- Azure Cloud Shell or Azure PowerShell.
4747

@@ -59,7 +59,7 @@ In this article, you learn how to use the Azure Network Watcher [packet capture]
5959

6060
- An Azure storage account with VM outbound TCP connectivity to it over port `443`. If you don't have a storage account, see [Create a storage account using the Azure CLI](../storage/common/storage-account-create.md?tabs=azure-cli&toc=/azure/network-watcher/toc.json).
6161
- The storage account must be accessible from the subnet of the target virtual machine or scale set. For more information, see [Configure Azure Storage firewalls and virtual networks](../storage/common/storage-network-security.md?tabs=azure-cli&toc=/azure/network-watcher/toc.json).
62-
- The storage account key access must be enabled to allow requests using shared access signatures (SAS) from Network Watcher.
62+
- The storage account key access must be enabled to allow requests from Network Watcher using a shared access signatures (SAS) token.
6363

6464
- Azure Cloud Shell or Azure CLI.
6565

@@ -70,9 +70,9 @@ In this article, you learn how to use the Azure Network Watcher [packet capture]
7070
---
7171

7272
> [!NOTE]
73-
> Azure creates a Network Watcher instance in the virtual machine's region if Network Watcher wasn't enabled for that region. For more information, see [Enable or disable Azure Network Watcher](network-watcher-create.md).
74-
75-
If a network security group is associated to the network interface, or subnet that the network interface is in, ensure that rules exist to allow outbound connectivity over the previous ports. Similarly, ensure outbound connectivity over the previous ports when adding user-defined routes to your network.
73+
> - Azure creates a Network Watcher instance in the virtual machine's region if Network Watcher wasn't enabled for that region. For more information, see [Enable or disable Azure Network Watcher](network-watcher-create.md).
74+
>
75+
> - If a network security group is associated to the network interface, or subnet that the network interface is in, ensure that rules exist to allow outbound connectivity. Similarly, ensure outbound connectivity when adding user-defined routes to your network.
7676
7777
## Start a packet capture
7878

0 commit comments

Comments
 (0)