You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/ddos-protection/ddos-optimization-guide.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,7 @@ When designing your architecture, balance security requirements with financial c
18
18
- What's the spending pattern for DDoS protection across your workloads?
19
19
- How will you maximize protection investment through better resource selection and utilization?
20
20
21
-
A cost-optimized DDoS protection strategy isn't always the lowest cost option. You'll need to balance security effectiveness with financial efficiency. Tactical cost-cutting can create security vulnerabilities. To achieve long-term protection and financial responsibility, create a strategy with [risk-based prioritization](/azure/well-architected/cost-optimization/principles), continuous monitoring, and repeatable processes.
21
+
A cost-optimized DDoS protection strategy isn't always the lowest cost option. You need to balance security effectiveness with financial efficiency. Tactical cost-cutting can create security vulnerabilities. To achieve long-term protection and financial responsibility, create a strategy with [risk-based prioritization](/azure/well-architected/cost-optimization/principles), continuous monitoring, and repeatable processes.
22
22
23
23
Start with the recommended approaches and justify the benefits for your security requirements. After you set your strategy, use these principles through regular assessment and optimization cycles. For comprehensive guidance on cost management, see [Azure Cost Management documentation](/azure/cost-management-billing/) and the [Azure pricing calculator](https://azure.microsoft.com/pricing/calculator/).
24
24
@@ -71,7 +71,7 @@ Protection needs change as your infrastructure evolves. Set up continuous monito
71
71
|**Set up cost alerts** when DDoS protection spending approaches predefined budget thresholds. | Proactive notifications prevent budget overruns and enable timely adjustments to protection strategy. You can respond to cost increases before they impact other initiatives. To create cost alerts, see [Monitor usage and spending with cost alerts in Cost Management](/azure/cost-management-billing/costs/cost-mgt-alerts-monitor-usage-spending). |
72
72
|**Conduct quarterly reviews** of protected resources and their business criticality to identify optimization opportunities. | Regular reviews ensure protection investments remain aligned with business priorities. You can identify resources that no longer need protection or require upgraded protection based on changing importance. |
73
73
|**Monitor attack patterns** and protection effectiveness to optimize coverage decisions. [View alerts in Microsoft Defender for Cloud](ddos-view-alerts-defender-for-cloud.md) and utilize [DDoS Protection logs in Log Analytics workspace](ddos-view-diagnostic-logs.md). | Understanding actual threat patterns enables data-driven protection decisions. You can adjust protection levels based on real attack data rather than theoretical risks. |
74
-
|**Track protection ROI and implement lifecycle management** using [cost management best practices](/azure/cost-management-billing/costs/cost-analysis-common-uses) to measure value and decommission unnecessary protection. | ROI measurement demonstrates protection value and guides future investment decisions. Regular cleanup of inactive or non-critical resources prevents spending growth that doesn't align with business value while freeing budget for higher-priority resources. |
74
+
|**Track protection ROI and implement lifecycle management** using [cost management best practices](/azure/cost-management-billing/costs/cost-analysis-common-uses) to measure value and decommission unnecessary protection. | ROI measurement demonstrates protection value and guides future investment decisions. Regular cleanup of inactive or noncritical resources prevents spending growth that doesn't align with business value while freeing budget for higher-priority resources. |
Copy file name to clipboardExpand all lines: articles/ddos-protection/ddos-pricing-guide.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -40,7 +40,7 @@ Let's assume you have only one subscription in your tenant. If you create a Netw
40
40
41
41
In this same scenario with 10 Public IP addresses, if you enable IP Protection for each Public IP address, you're billed per protected IP resource.
42
42
43
-
Under this scenario, it's more cost effective to enable IP Protection for each Public IP address. For environments with more than 15 Public IP addresses, it's more cost effective to create a Network Protection plan.
43
+
Under this scenario, its more cost effective to enable IP Protection for each Public IP address. For environments with more than 15 Public IP addresses, it's more cost effective to create a Network Protection plan.
44
44
45
45
**Cost comparison analysis:**
46
46
- Network Protection: Fixed monthly cost for up to 100 IP addresses
@@ -53,11 +53,11 @@ This scenario illustrates cost benefits for large organizations with multiple su
53
53
54
54
#### Multiple subscriptions with Network Protection
55
55
56
-
An enterprise has 3 subscriptions with the following public IP distribution:
56
+
An enterprise has three subscriptions with the following public IP distribution:
57
57
- Subscription A: 25 public IPs (production workloads)
58
58
- Subscription B: 15 public IPs (staging environment)
59
59
- Subscription C: 8 public IPs (development environment)
60
-
-**Total: 48 public IPs across 3 subscriptions**
60
+
-**Total: 48 public IPs across three subscriptions**
61
61
62
62
With Network Protection, you create one plan that covers all subscriptions under the tenant:
63
63
- Cost: Single monthly Network Protection plan fee (covers up to 100 IPs across all subscriptions)
@@ -94,15 +94,15 @@ This scenario shows cost implications for applications with fluctuating public I
94
94
95
95
Consider an e-commerce platform that scales during peak seasons:
2.**Temporary Network Protection**: Monthly plan rate × 3 months
104
+
1.**IP Protection**: Per-IP rate × 25 resources × three months
105
+
2.**Temporary Network Protection**: Monthly plan rate × three months
106
106
107
107
**Annual cost comparison analysis:**
108
108
- IP Protection only: Higher total cost due to linear scaling during peak periods
@@ -121,7 +121,7 @@ Network Protection provides additional value beyond basic DDoS mitigation that s
121
121
### Cost Protection Guarantee
122
122
Network Protection includes a cost protection guarantee that provides service credits for additional Azure costs incurred during a documented DDoS attack. This includes:
123
123
- Data transfer costs from scale-out operations
124
-
- Additional compute costs for auto-scaling responses
124
+
- Additional compute costs for autoscaling responses
125
125
- Other documented Azure service costs directly attributable to DDoS attacks
0 commit comments