Skip to content

Commit 6114d3e

Browse files
committed
feshness and acro review
1 parent e911bb0 commit 6114d3e

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

articles/firewall-manager/rule-hierarchy.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: firewall-manager
55
author: vhorne
66
ms.service: firewall-manager
77
ms.topic: how-to
8-
ms.date: 11/17/2022
8+
ms.date: 03/12/2024
99
ms.author: victorh
1010
ms.custom: FY23 content-maintenance
1111
---
@@ -52,18 +52,18 @@ Custom roles are defined for each application team. The role defines operations
5252

5353
Use the following high-level procedure to define custom roles:
5454

55-
1. Get the subscription:
55+
1. Get the subscription.
5656

5757
`Select-AzSubscription -SubscriptionId xxxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxxxx`
58-
2. Run the following command:
58+
2. Run the following command.
5959

6060
`Get-AzProviderOperation "Microsoft.Support/*" | FT Operation, Description -AutoSize`
6161
3. Use the Get-AzRoleDefinition command to output the Reader role in JSON format.
6262

6363
`Get-AzRoleDefinition -Name "Reader" | ConvertTo-Json | Out-File C:\CustomRoles\ReaderSupportRole.json`
6464
4. Open the ReaderSupportRole.json file in an editor.
6565

66-
The following shows the JSON output. For information about the different properties, see [Azure custom roles](../role-based-access-control/custom-roles.md).
66+
Here's the JSON output. For information about the different properties, see [Azure custom roles](../role-based-access-control/custom-roles.md).
6767

6868
```json
6969
{
@@ -87,11 +87,11 @@ Use the following high-level procedure to define custom roles:
8787
`*/read", "Microsoft.Network/*/read", "Microsoft.Network/firewallPolicies/ruleCollectionGroups/write`
8888

8989
operation to the **Actions** property. Be sure to include a comma after the read operation. This action allows the user to create and update rule collection groups.
90-
6. In **AssignableScopes**, add your subscription ID with the following format:
90+
6. In **AssignableScopes**, add your subscription ID with the following format.
9191

9292
`/subscriptions/xxxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxxxx`
9393

94-
You must add explicit subscription IDs, otherwise you won't be allowed to import the role into your subscription.
94+
You must add explicit subscription IDs. Otherwise, you aren't allowed to import the role into your subscription.
9595
7. Delete the **Id** property line and change the **IsCustom** property to true.
9696
8. Change the **Name** and **Description** properties to *AZFM Rule Collection Group Author* and *Users in this role can edit Firewall Policy rule collection groups*
9797

@@ -154,7 +154,7 @@ Firewall Policy with custom roles now provides selective access to firewall poli
154154
Users don’t have permissions to:
155155
- Delete the Azure Firewall or firewall policy.
156156
- Update firewall policy hierarchy or DNS settings or threat intelligence.
157-
- Update firewall policy where they are not members of AZFM Rule Collection Group Author group.
157+
- Update firewall policy where they aren't members of AZFM Rule Collection Group Author group.
158158

159159
Security administrators can use base policy to enforce guardrails and block certain types of traffic (for example ICMP) as required by their enterprise.
160160

0 commit comments

Comments
 (0)