Skip to content

Commit 62d65e2

Browse files
committed
remove screenshots
1 parent f2d6ecc commit 62d65e2

File tree

6 files changed

+0
-21
lines changed

6 files changed

+0
-21
lines changed

articles/virtual-network-manager/how-to-block-high-risk-ports.md

Lines changed: 0 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -46,8 +46,6 @@ In this section, you deploy a Virtual Network Manager instance with the Security
4646

4747
1. On the *Basics* tab, enter or select the information for your organization:
4848

49-
:::image type="content" source="media/how-to-block-high-risk-ports/network-manager-basics-thumb.png" alt-text="Screenshot of Create a network manager Basics page." lightbox="media/how-to-block-high-risk-ports/network-manager-basics.png":::
50-
5149
| Setting | Value |
5250
| ------- | ----- |
5351
| Subscription | Select the subscription you want to deploy Azure Virtual Network Manager to. |
@@ -69,7 +67,6 @@ With your virtual network manager created, you now create a network group contai
6967
1. On the *Network groups* page, select the network group you created.
7068
1. Select **Add**, under **Static Membership** to manually add all the VNets.
7169
1. On the **Add static members** page, select all of the virtual networks you wish to include, and select **Add**.
72-
:::image type="content" source="media/how-to-block-high-risk-ports/add-members-manual-network-group.png" alt-text="Screenshot of Add Static Members page showing manual selection of virtual networks.":::
7370

7471
## Create a security admin configuration for all virtual networks
7572

@@ -78,27 +75,16 @@ It’s time to construct our security admin rules within a configuration in orde
7875
1. Select **Configurations** under *Settings* and then select **+ Create**.
7976
1. Select **Security configuration** from the drop-down menu.
8077
1. On the **Basics** tab, enter a *Name* to identify this security configuration and select **Next: Rule collections**.
81-
82-
:::image type="content" source="./media/how-to-block-network-traffic-portal/security-configuration-name.png" alt-text="Screenshot of security configuration name field.":::
83-
8478
1. Select **+ Add** from the *Add a security configuration page*.
85-
8679
1. Enter a *Name* to identify this rule collection and then select the *Target network groups* you want to apply the set of rules to. The target group is the network group containing all of your virtual networks.
8780

88-
:::image type="content" source="./media/how-to-block-network-traffic-portal/rule-collection-target.png" alt-text="Screenshot of rule collection name and target network groups.":::
89-
9081
## Add a security rule for denying high-risk network traffic
9182

9283
In this section, you define the security rule to block high-risk network traffic to all virtual networks. When assigning priority, keep in mind future exception rules. Set the priority so that exception rules are applied over this rule.
9384

9485
1. Select **+ Add** under **Security admin rules**.
95-
96-
:::image type="content" source="./media/how-to-block-network-traffic-portal/add-rule-button.png" alt-text="Screenshot of add a rule button.":::
97-
9886
1. Enter the information needed to define your security rule, then select **Add** to add the rule to the rule collection.
9987

100-
:::image type="content" source="./media/how-to-block-high-risk-ports/add-deny-rule.png" alt-text="Screenshot of add a rule page.":::
101-
10288
| Setting | Value |
10389
| ------- | ----- |
10490
| Name | Enter a rule name. |
@@ -119,11 +105,7 @@ In this section, you define the security rule to block high-risk network traffic
119105
| Destination port | Enter a single port number or a port range such as (1024-65535). When defining more than one port or port ranges, separate them using a comma. To specify any port, enter *. Enter **3389** for this example. |
120106

121107
1. Repeat steps 1-3 again if you want to add more rules to the rule collection.
122-
123108
1. Once you're satisfied with all the rules you wanted to create, select **Add** to add the rule collection to the security admin configuration.
124-
125-
:::image type="content" source="./media/how-to-block-network-traffic-portal/save-rule-collection.png" alt-text="Screenshot of a rule collection.":::
126-
127109
1. Then select **Review + Create** and **Create** to complete the security configuration.
128110

129111
## Deploy a security admin configuration for blocking network traffic
@@ -135,9 +117,6 @@ In this section, the rules created take effect when you deploy the security admi
135117
:::image type="content" source="./media/how-to-block-network-traffic-portal/deploy-configuration.png" alt-text="Screenshot of deploy a configuration button.":::
136118

137119
1. Select the **Include security admin in your goal state** checkbox and choose the security configuration you created in the last section from the dropdown menu. Then choose the region(s) you would like to deploy this configuration to.
138-
139-
:::image type="content" source="./media/how-to-block-network-traffic-portal/deploy-security-configuration.png" alt-text="Screenshot of deploy a security configuration page.":::
140-
141120
1. Select **Next** and **Deploy** to deploy the security admin configuration.
142121

143122
## Create a network group for traffic exception rule
-1.01 KB
Loading

0 commit comments

Comments
 (0)