Skip to content

Commit 2c65305

Browse files
authored
Merge pull request #294615 from halkazwini/nw-policy
Network Watcher screenshot reduction - policy articles
2 parents 0212383 + 5e102e1 commit 2c65305

File tree

10 files changed

+12
-12
lines changed

10 files changed

+12
-12
lines changed
Binary file not shown.
Binary file not shown.
57 KB
Loading
Binary file not shown.
Binary file not shown.
Binary file not shown.

articles/network-watcher/nsg-flow-logs-policy-portal.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -33,11 +33,11 @@ To audit your flow logs using the built-in policy, follow these steps:
3333

3434
1. Select **Assignments**, and then select **Assign policy**.
3535

36-
:::image type="content" source="./media/nsg-flow-logs-policy-portal/assign-policy.png" alt-text="Screenshot of selecting the button for assigning a policy in the Azure portal.":::
36+
:::image type="content" source="./media/assign-policy.png" alt-text="Screenshot of selecting the button for assigning a policy in the Azure portal." lightbox="./media/assign-policy.png":::
3737

3838
1. Select the ellipsis (**...**) next to **Scope** to choose your Azure subscription that has the network security groups that you want the policy to audit. You can also choose the resource group that has the network security groups. After you make your selections, choose the **Select** button.
3939

40-
:::image type="content" source="./media/nsg-flow-logs-policy-portal/policy-scope.png" alt-text="Screenshot of selecting the scope of the policy in the Azure portal." lightbox="./media/nsg-flow-logs-policy-portal/policy-scope.png":::
40+
:::image type="content" source="./media/policy-scope.png" alt-text="Screenshot of selecting the scope of the policy in the Azure portal." lightbox="./media/policy-scope.png":::
4141

4242
1. Select the ellipsis (**...**) next to **Policy definition** to choose the built-in policy that you want to assign. Enter *flow log* in the search box, and then select the **Built-in** filter. From the search results, select **Flow logs should be configured for every network security group**, and then select **Add**.
4343

@@ -73,11 +73,11 @@ To assign the *deployIfNotExists* policy:
7373

7474
1. Select **Assignments**, and then select **Assign policy**.
7575

76-
:::image type="content" source="./media/nsg-flow-logs-policy-portal/assign-policy.png" alt-text="Screenshot of selecting the button for assigning a policy in the Azure portal.":::
76+
:::image type="content" source="./media/assign-policy.png" alt-text="Screenshot of selecting the button for assigning a policy in the Azure portal." lightbox="./media/assign-policy.png":::
7777

7878
1. Select the ellipsis (**...**) next to **Scope** to choose your Azure subscription that has the network security groups that you want the policy to audit. You can also choose the resource group that has the network security groups. After you make your selections, choose the **Select** button.
7979

80-
:::image type="content" source="./media/nsg-flow-logs-policy-portal/policy-scope.png" alt-text="Screenshot of selecting the scope of the policy in the Azure portal." lightbox="./media/nsg-flow-logs-policy-portal/policy-scope.png":::
80+
:::image type="content" source="./media/policy-scope.png" alt-text="Screenshot of selecting the scope of the policy in the Azure portal." lightbox="./media/policy-scope.png":::
8181

8282
1. Select the ellipsis (**...**) next to **Policy definition** to choose the built-in policy that you want to assign. Enter *flow log* in the search box, and then select the **Built-in** filter. From the search results, select **Deploy a flow log resource with target network security group**, and then select **Add**.
8383

articles/network-watcher/traffic-analytics-policy-portal.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -31,11 +31,11 @@ To audit your flow logs by using the built-in policy:
3131

3232
1. Select **Assignments**, then select on **Assign Policy**.
3333

34-
:::image type="content" source="./media/traffic-analytics-policy-portal/assign-policy.png" alt-text="Screenshot of selecting Assign policy button in the Azure portal.":::
34+
:::image type="content" source="./media/assign-policy.png" alt-text="Screenshot of selecting Assign policy button in the Azure portal." lightbox="./media/assign-policy.png":::
3535

3636
1. Select the ellipsis **...** next to **Scope** to choose your Azure subscription that has the flow logs that you want the policy to audit. You can also choose the resource group that has the flow logs. After you made your selections, select **Select** button.
3737

38-
:::image type="content" source="./media/traffic-analytics-policy-portal/policy-scope.png" alt-text="Screenshot of selecting the scope of the policy in the Azure portal." lightbox="./media/traffic-analytics-policy-portal/policy-scope.png":::
38+
:::image type="content" source="./media/policy-scope.png" alt-text="Screenshot of selecting the scope of the policy in the Azure portal." lightbox="./media/policy-scope.png":::
3939

4040
1. Select the ellipsis **...** next to **Policy definition** to choose the built-in policy that you want to assign. Enter *traffic analytics* in the search box, and select **Built-in** filter. From the search results, select **Network Watcher flow logs should have traffic analytics enabled** and then select **Add**.
4141

@@ -81,11 +81,11 @@ To assign any of the *deployIfNotExists* two policies, follow these steps:
8181

8282
1. Select **Assignments**, and then select on **Assign policy**.
8383

84-
:::image type="content" source="./media/traffic-analytics-policy-portal/assign-policy.png" alt-text="Screenshot of selecting Assign policy button in the Azure portal.":::
84+
:::image type="content" source="./media/assign-policy.png" alt-text="Screenshot of selecting Assign policy button in the Azure portal." lightbox="./media/assign-policy.png":::
8585

8686
1. Select the ellipsis **...** next to **Scope** to choose your Azure subscription that has the flow logs that you want the policy to audit. You can also choose the resource group that has the flow logs. After you make your selections, choose the **Select** button.
8787

88-
:::image type="content" source="./media/traffic-analytics-policy-portal/policy-scope.png" alt-text="Screenshot of selecting the scope of the policy in the Azure portal." lightbox="./media/traffic-analytics-policy-portal/policy-scope.png":::
88+
:::image type="content" source="./media//policy-scope.png" alt-text="Screenshot of selecting the scope of the policy in the Azure portal." lightbox="./media/policy-scope.png":::
8989

9090
1. Select the ellipsis **...** next to **Policy definition** to choose the built-in policy that you want to assign. Enter *traffic analytics* in the search box, and select the **Built-in** filter. From the search results, select **Configure network security groups to use specific workspace, storage account and flow log retention policy for traffic analytics** and then select **Add**.
9191

articles/network-watcher/vnet-flow-logs-policy.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -38,11 +38,11 @@ To audit your flow logs using the built-in policy, follow these steps:
3838

3939
1. Select **Assignments**, and then select **Assign policy**.
4040

41-
:::image type="content" source="./media/vnet-flow-logs-policy/assign-policy.png" alt-text="Screenshot that shows how to assign a policy in the Azure portal.":::
41+
:::image type="content" source="./media/assign-policy.png" alt-text="Screenshot that shows how to assign a policy in the Azure portal." lightbox="./media/assign-policy.png":::
4242

4343
1. Select the ellipsis (**...**) next to **Scope** to choose your Azure subscription that has the virtual networks that you want to check using the policy. You can also choose the resource group that has the virtual networks. After you make your selections, select the **Select** button.
4444

45-
:::image type="content" source="./media/vnet-flow-logs-policy/policy-scope.png" alt-text="Screenshot that shows how to define the scope of the policy in the Azure portal." lightbox="./media/vnet-flow-logs-policy/policy-scope.png":::
45+
:::image type="content" source="./media/policy-scope.png" alt-text="Screenshot that shows how to define the scope of the policy in the Azure portal." lightbox="./media/policy-scope.png":::
4646

4747
1. Select the ellipsis (**...**) next to **Policy definition** to choose the built-in policy that you want to assign. Enter ***flow log*** in the search box, and then select the **Built-in** filter. From the search results, select **Audit flow logs configuration for every virtual network**, and then select **Add**.
4848

@@ -81,11 +81,11 @@ To assign the *deployIfNotExists* policy, follow these steps:
8181

8282
1. Select **Assignments**, and then select **Assign policy**.
8383

84-
:::image type="content" source="./media/vnet-flow-logs-policy/assign-policy.png" alt-text="Screenshot that shows how to assign a policy in the Azure portal.":::
84+
:::image type="content" source="./media/assign-policy.png" alt-text="Screenshot that shows how to assign a policy in the Azure portal." lightbox="./media/assign-policy.png":::
8585

8686
1. Select the ellipsis (**...**) next to **Scope** to choose your Azure subscription that has the virtual networks that you want to check using the policy. You can also choose the resource group that has the virtual networks. After you make your selections, select the **Select** button.
8787

88-
:::image type="content" source="./media/vnet-flow-logs-policy/policy-scope.png" alt-text="Screenshot that shows how to define the scope of the policy in the Azure portal." lightbox="./media/vnet-flow-logs-policy/policy-scope.png":::
88+
:::image type="content" source="./media/policy-scope.png" alt-text="Screenshot that shows how to define the scope of the policy in the Azure portal." lightbox="./media/policy-scope.png":::
8989

9090
1. Select the ellipsis (**...**) next to **Policy definition** to choose the built-in policy that you want to assign. Enter ***flow log*** in the search box, and then select the **Built-in** filter. From the search results, select **Deploy a flow log resource with target virtual network**, and then select **Add**.
9191

0 commit comments

Comments
 (0)