Skip to content

Commit 22b1059

Browse files
committed
Final content improvements
1 parent 2bf9c02 commit 22b1059

File tree

3 files changed

+7
-5
lines changed

3 files changed

+7
-5
lines changed

articles/storage/common/storage-network-security-manage-exceptions.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,8 @@ For a complete list of trusted Azure services, see [Trusted Azure services](stor
4343
4444
3. Configure the exceptions for the storage account network rules:
4545
46-
```powershell Update-AzStorageAccountNetworkRuleSet -ResourceGroupName "myresourcegroup" -Name "mystorageaccount" -Bypass AzureServices,Metrics,Logging
46+
```powershell
47+
Update-AzStorageAccountNetworkRuleSet -ResourceGroupName "myresourcegroup" -Name "mystorageaccount" -Bypass AzureServices,Metrics,Logging
4748
```
4849
4950
4. Remove the exceptions from the storage account network rules:
@@ -64,7 +65,8 @@ For a complete list of trusted Azure services, see [Trusted Azure services](stor
6465
6566
3. Configure the exceptions for the storage account network rules:
6667
67-
```azurecli az storage account update --resource-group "myresourcegroup" --name "mystorageaccount" --bypass Logging Metrics AzureServices
68+
```azurecli
69+
az storage account update --resource-group "myresourcegroup" --name "mystorageaccount" --bypass Logging Metrics AzureServices
6870
```
6971
7072
4. Remove the exceptions from the storage account network rules:

articles/storage/common/storage-network-security-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ Where possible, create private links to your storage account to secure access th
2828

2929
## Public endpoints
3030

31-
The *public endpoint* of your storage account is accessed through a public IP address. If you use only private endpoints, then you should disable all traffic to the storage account's public IP address. If some clients use a private link, or you choose not to use private endpoints for cost or other reasons, then you can secure the public endpoint of your storage account by using firewall rules or by adding your storage account to a network security perimeter.
31+
The *public endpoint* of your storage account is accessed through a public IP address. You can secure the public endpoint of your storage account by using firewall rules or by adding your storage account to a network security perimeter.
3232

3333
### Firewall rules
3434

articles/storage/common/storage-network-security.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.author: normesta
1515

1616
Azure Storage firewall rules provide granular control over network access to your storage account's public endpoint. By default, storage accounts allow connections from any network, but you can restrict access by configuring network rules that define which sources can connect to your storage account.
1717

18-
You can configure four types of network access rules:
18+
You can configure four types of network rules:
1919

2020
- **Virtual network rules**: Allow traffic from specific subnets within Azure Virtual Networks
2121
- **IP network rules**: Allow traffic from specific public IP address ranges
@@ -25,7 +25,7 @@ You can configure four types of network access rules:
2525
When network rules are configured, only traffic from explicitly allowed sources can access your storage account through its public endpoint. All other traffic is denied.
2626

2727
> [!NOTE]
28-
> Network rules control network-level access but don't replace authentication and authorization requirements. Clients from allowed sources must still meet the authorization requirements of the storage account. To learn more about account authorization, see [Authorize access to data in Azure Storage](../common/authorize-data-access.md).
28+
> Clients that make requests from allowed sources must also meet the authorization requirements of the storage account. To learn more about account authorization, see [Authorize access to data in Azure Storage](../common/authorize-data-access.md).
2929
3030
<a id="grant-access-from-a-virtual-network"></a>
3131
<a id="azure-storage-cross-region-service-endpoints"></a>

0 commit comments

Comments
 (0)