You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -223,9 +221,10 @@ The equivalent command is also [available via the Azure CLI](https://docs.micros
223
221
az lock create \
224
222
--lock-type "<lock level>" \
225
223
--name "<lock name>" \
226
-
--resource-name "<zone name"> \
227
-
--namespace "Microsoft.Network/privateDnsZones" \
228
-
--resource-group "<resource group name>
224
+
--resource-name "<zone name>" \
225
+
--namespace "Microsoft.Network" \
226
+
--resource-type "privateDnsZones" \
227
+
--resource-group "<resource group name>"
229
228
```
230
229
### Protecting individual records
231
230
@@ -234,7 +233,7 @@ To prevent an existing DNS record set against modification, apply a ReadOnly loc
234
233
> [!NOTE]
235
234
> Applying a CanNotDelete lock to a record set is not an effective control. It prevents the record set from being deleted, but it does not prevent it from being modified. Permitted modifications include adding and removing records from the record set, including removing all records to leave an empty record set. This has the same effect as deleting the record set from a DNS resolution viewpoint.
236
235
237
-
Record set level resource locks can currently only be configured using Azure PowerShell or Azure CLI. They aren't supported in the Azure portal.
236
+
Record set level resource locks can currently only be configured using Azure PowerShell. They aren't supported in the Azure portal or Azure CLI.
Another option to prevent accidental zone deletion is by using a custom role. This role ensures the accounts used to manage your zones don't have zone delete permissions.
302
273
303
274
When you do need to delete a zone, you can enforce a two-step delete:
0 commit comments