Skip to content

Commit 279b252

Browse files
committed
updated acrolinx.
1 parent 1e576f3 commit 279b252

File tree

2 files changed

+11
-11
lines changed

2 files changed

+11
-11
lines changed

articles/ddos-protection/ddos-optimization-guide.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ When designing your architecture, balance security requirements with financial c
1818
- What's the spending pattern for DDoS protection across your workloads?
1919
- How will you maximize protection investment through better resource selection and utilization?
2020

21-
A cost-optimized DDoS protection strategy isn't always the lowest cost option. You'll need to balance security effectiveness with financial efficiency. Tactical cost-cutting can create security vulnerabilities. To achieve long-term protection and financial responsibility, create a strategy with [risk-based prioritization](/azure/well-architected/cost-optimization/principles), continuous monitoring, and repeatable processes.
21+
A cost-optimized DDoS protection strategy isn't always the lowest cost option. You need to balance security effectiveness with financial efficiency. Tactical cost-cutting can create security vulnerabilities. To achieve long-term protection and financial responsibility, create a strategy with [risk-based prioritization](/azure/well-architected/cost-optimization/principles), continuous monitoring, and repeatable processes.
2222

2323
Start with the recommended approaches and justify the benefits for your security requirements. After you set your strategy, use these principles through regular assessment and optimization cycles. For comprehensive guidance on cost management, see [Azure Cost Management documentation](/azure/cost-management-billing/) and the [Azure pricing calculator](https://azure.microsoft.com/pricing/calculator/).
2424

@@ -71,7 +71,7 @@ Protection needs change as your infrastructure evolves. Set up continuous monito
7171
| **Set up cost alerts** when DDoS protection spending approaches predefined budget thresholds. | Proactive notifications prevent budget overruns and enable timely adjustments to protection strategy. You can respond to cost increases before they impact other initiatives. To create cost alerts, see [Monitor usage and spending with cost alerts in Cost Management](/azure/cost-management-billing/costs/cost-mgt-alerts-monitor-usage-spending). |
7272
| **Conduct quarterly reviews** of protected resources and their business criticality to identify optimization opportunities. | Regular reviews ensure protection investments remain aligned with business priorities. You can identify resources that no longer need protection or require upgraded protection based on changing importance. |
7373
| **Monitor attack patterns** and protection effectiveness to optimize coverage decisions. [View alerts in Microsoft Defender for Cloud](ddos-view-alerts-defender-for-cloud.md) and utilize [DDoS Protection logs in Log Analytics workspace](ddos-view-diagnostic-logs.md). | Understanding actual threat patterns enables data-driven protection decisions. You can adjust protection levels based on real attack data rather than theoretical risks. |
74-
| **Track protection ROI and implement lifecycle management** using [cost management best practices](/azure/cost-management-billing/costs/cost-analysis-common-uses) to measure value and decommission unnecessary protection. | ROI measurement demonstrates protection value and guides future investment decisions. Regular cleanup of inactive or non-critical resources prevents spending growth that doesn't align with business value while freeing budget for higher-priority resources. |
74+
| **Track protection ROI and implement lifecycle management** using [cost management best practices](/azure/cost-management-billing/costs/cost-analysis-common-uses) to measure value and decommission unnecessary protection. | ROI measurement demonstrates protection value and guides future investment decisions. Regular cleanup of inactive or noncritical resources prevents spending growth that doesn't align with business value while freeing budget for higher-priority resources. |
7575

7676
## Next steps
7777

articles/ddos-protection/ddos-pricing-guide.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ Let's assume you have only one subscription in your tenant. If you create a Netw
4040

4141
In this same scenario with 10 Public IP addresses, if you enable IP Protection for each Public IP address, you're billed per protected IP resource.
4242

43-
Under this scenario, it's more cost effective to enable IP Protection for each Public IP address. For environments with more than 15 Public IP addresses, it's more cost effective to create a Network Protection plan.
43+
Under this scenario, its more cost effective to enable IP Protection for each Public IP address. For environments with more than 15 Public IP addresses, it's more cost effective to create a Network Protection plan.
4444

4545
**Cost comparison analysis:**
4646
- Network Protection: Fixed monthly cost for up to 100 IP addresses
@@ -53,11 +53,11 @@ This scenario illustrates cost benefits for large organizations with multiple su
5353

5454
#### Multiple subscriptions with Network Protection
5555

56-
An enterprise has 3 subscriptions with the following public IP distribution:
56+
An enterprise has three subscriptions with the following public IP distribution:
5757
- Subscription A: 25 public IPs (production workloads)
5858
- Subscription B: 15 public IPs (staging environment)
5959
- Subscription C: 8 public IPs (development environment)
60-
- **Total: 48 public IPs across 3 subscriptions**
60+
- **Total: 48 public IPs across three subscriptions**
6161

6262
With Network Protection, you create one plan that covers all subscriptions under the tenant:
6363
- Cost: Single monthly Network Protection plan fee (covers up to 100 IPs across all subscriptions)
@@ -94,15 +94,15 @@ This scenario shows cost implications for applications with fluctuating public I
9494

9595
Consider an e-commerce platform that scales during peak seasons:
9696

97-
#### Regular operations (9 months)
97+
#### Regular operations (nine months)
9898
- 8 public IPs needed
99-
- IP Protection cost: Per-IP rate × 8 resources × 9 months
99+
- IP Protection cost: Per-IP rate × eight resources × nine months
100100

101-
#### Peak season (3 months)
101+
#### Peak season (three months)
102102
- 25 public IPs needed during holiday season
103103
- Two options:
104-
1. **IP Protection**: Per-IP rate × 25 resources × 3 months
105-
2. **Temporary Network Protection**: Monthly plan rate × 3 months
104+
1. **IP Protection**: Per-IP rate × 25 resources × three months
105+
2. **Temporary Network Protection**: Monthly plan rate × three months
106106

107107
**Annual cost comparison analysis:**
108108
- IP Protection only: Higher total cost due to linear scaling during peak periods
@@ -121,7 +121,7 @@ Network Protection provides additional value beyond basic DDoS mitigation that s
121121
### Cost Protection Guarantee
122122
Network Protection includes a cost protection guarantee that provides service credits for additional Azure costs incurred during a documented DDoS attack. This includes:
123123
- Data transfer costs from scale-out operations
124-
- Additional compute costs for auto-scaling responses
124+
- Additional compute costs for autoscaling responses
125125
- Other documented Azure service costs directly attributable to DDoS attacks
126126

127127
### DDoS Rapid Response (DRR)

0 commit comments

Comments
 (0)