You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -103,7 +103,7 @@ This preview doesn't support the following services, operations, and protocols o
103
103
-[Lifecycle management](../blobs/lifecycle-management-overview.md) for Azure Blob Storage
104
104
-[SSH File transfer protocol (SFTP)](../blobs/secure-file-transfer-protocol-support.md) over Azure Blob Storage
105
105
- Network file system (NFS) protocol with [Azure Blob Storage](../blobs/network-file-system-protocol-support.md) and [Azure Files](../files/files-nfs-protocol.md).
106
-
- Server message block (SMB) protocol with Azure Files can only be achieved thru IP allowlisting at this time.
106
+
- Server message block (SMB) protocol with Azure Files can only be achieved through IP allowlisting at this time.
We recommend you don't enable Network Security Perimeter if you need to use any of these services, operations, or protocols. This is to prevent any potential data loss or data exfiltration risk.
@@ -152,19 +152,13 @@ You must set the default rule to **deny**, or network rules have no effect. Howe
152
152
153
153
2. In the service menu, under **Security + networking**, select **Networking**.
3.Choose what network access is enabled through the storage account's public endpoint:
156
156
157
-
4. Choose what network access is enabled through the storage account's public endpoint:
157
+
- Select either **Enabled from all networks** or **Enabled from selected virtual networks and IP addresses**. If you select the second option, you'll be prompted to add virtual networks and IP address ranges.
158
158
159
-
- To allow inbound and outbound access with the option to restrict inbound access to specific virtual networks and IP addresses, select **Enable**. Then select either **Enable from all networks** or **Enable from selected networks**. If you select the second option, you'll be prompted to save and configure your settings. Select **Save + Configure**, and you'll be directed to the resource settings page to add virtual networks and IP addresses.
159
+
- To restrict inbound access while allowing outbound access, select **Disabled**.
160
160
161
-
- To restrict inbound access while allowing outbound access, select **Disable**.
162
-
163
-
- To restrict inbound and outbound access using a Network Security Perimeter, select **Secure by perimeter**.
164
-
165
-
5. Select **Save** to apply your changes.
166
-
167
-
6. If you selected **Secure by perimeter**, then you'll need to [associate a network perimeter](#associate-a-network-security-perimeter-with-a-storage-account) with your storage account.
161
+
4. Select **Save** to apply your changes.
168
162
169
163
<aid="powershell"></a>
170
164
@@ -218,9 +212,6 @@ You must set the default rule to **deny**, or network rules have no effect. Howe
218
212
219
213
---
220
214
221
-
> [!CAUTION]
222
-
> By design, access to a storage account from trusted services takes the highest precedence over other network access restrictions. If you set **Public network access** to **Disabled** after previously setting it to **Enabled from selected virtual networks and IP addresses**, any [resource instances](#grant-access-from-azure-resource-instances) and [exceptions](#manage-exceptions) that you previously configured, including [Allow Azure services on the trusted services list to access this storage account](#grant-access-to-trusted-azure-services), will remain in effect. As a result, those resources and services might still have access to the storage account.
223
-
224
215
## Grant access from a virtual network
225
216
226
217
You can configure storage accounts to allow access only from specific subnets. The allowed subnets can belong to a virtual network in the same subscription or a different subscription, including those that belong to a different Microsoft Entra tenant. With [cross-region service endpoints](#azure-storage-cross-region-service-endpoints), the allowed subnets can also be in different regions from the storage account.
@@ -264,19 +255,13 @@ If you want to enable access to your storage account from a virtual network or s
264
255
265
256
2. In the service menu, under **Security + networking**, select **Networking**.
266
257
267
-
3. Check that you've chosen to enable public network access from selected networks. Under **Resource settings**, select **Manage**. If you haven't enabled public network access from selected networks, then resource settings won't be in effect, and the **Manage** option won't be available.
258
+
3. Check that you've chosen to enable public network access from selected virtual networksand IP addresses.
268
259
269
-
4. To allow select virtual networks to connect to your storage account using service endpoints, select **+ Add a virtual network**. Then select either **Add existing virtual network** or **Add new virtual network**.
260
+
4. To grant access to a virtual network by using a new network rule, under **Virtual networks**, select **Add existing virtual network**. Select the **Virtual networks** and **Subnets** options, and then select **Add**. To create a new virtual network and grant it access, select **Add new virtual network**. Provide the necessary information to create the new virtual network, and then select **Create**. Currently, only virtual networks that belong to the same Microsoft Entra tenant appear for selection during rule creation. To grant access to a subnet in a virtual network that belongs to another tenant, use PowerShell, the Azure CLI, or REST API.
270
261
271
-
5. To add an existing virtual network, select the subscription, virtual network, and subnets, and then select **Add**. Currently, only virtual networks that belong to the same Microsoft Entra tenant appear for selection during rule creation. To grant access to a subnet in a virtual network that belongs to another tenant, use PowerShell, the Azure CLI, or REST APIs.
262
+
5. To remove a virtual network or subnet rule, select the ellipsis (**...**) to open the context menu for the virtual network or subnet, and then select **Remove**.
272
263
273
-
6. To create a new virtual network and subnet and grant it access, provide the necessary information and then select **Create**.
274
-
275
-
7. Add any IP addresses that you want to be able to access your storage account.
276
-
277
-
8. Check any of the exception boxes that apply to your use case.
278
-
279
-
9. Select **Save** to apply your changes.
264
+
6. Select **Save** to apply your changes.
280
265
281
266
> [!IMPORTANT]
282
267
> If you delete a subnet that's included in a network rule, it will be removed from the network rules for the storage account. If you create a new subnet by the same name, it won't have access to the storage account. To allow access, you must explicitly authorize the new subnet in the network rules for the storage account.
@@ -390,9 +375,9 @@ You can manage IP network rules for storage accounts through the Azure portal, P
390
375
391
376
2. In the service menu, under **Security + networking**, select **Networking**.
392
377
393
-
3. Check that you've chosen to enable public network access from selected networks. Under **Resource settings**, select **Manage**. If you haven't enabled public network access from selected networks, then resource settings won't be in effect, and the **Manage** option won't be available.
378
+
3. Check that you've chosen to enable public network access from selected virtual networksand IP addresses.
394
379
395
-
4. To grant access to an internet IP range, enter the IP address or address range (in CIDR format) under **IP Addresses**.
380
+
4. To grant access to an internet IP range, enter the IP address or address range (in CIDR format) under **Firewall** > **Address Range**.
396
381
397
382
5. To remove an IP network rule, select the delete icon (:::image type="icon" source="media/storage-network-security/delete-icon.png":::) next to the address range.
398
383
@@ -472,7 +457,7 @@ You can manage IP network rules for storage accounts through the Azure portal, P
472
457
473
458
## Grant access from Azure resource instances
474
459
475
-
In some cases, an application might depend on Azure resources that can't be isolated through a virtual network or an IP address rule. But you still want to secure and restrict storage account access to only your application's Azure resources. You can configure storage accounts to allow access to specific resource instances of trusted Azure services by creating a resource instance rule. This will specify resource instances that will have access to your storage account based on their system-assigned managed identity.
460
+
In some cases, an application might depend on Azure resources that can't be isolated through a virtual network or an IP address rule. But you still want to secure and restrict storage account access to only your application's Azure resources. You can configure storage accounts to allow access to specific resource instances of trusted Azure services by creating a resource instance rule.
476
461
477
462
The Azure role assignments of the resource instance determine the types of operations that a resource instance can perform on storage account data. Resource instances must be from the same tenant as your storage account, but they can belong to any subscription in the tenant.
478
463
@@ -486,7 +471,7 @@ You can add or remove resource network rules in the Azure portal:
486
471
487
472
3. In the service menu, under **Security + networking**, select **Networking**.
488
473
489
-
4. Check that you've chosen to enable public network access from selected networks. Under **Resource settings**, select **Manage**. If you haven't enabled public network access from selected networks, then resource settings won't be in effect, and the **Manage** option won't be available.
474
+
4. Check that you've chosen to enable public network access from selected virtual networksand IP addresses.
490
475
491
476
5. Scroll down to find **Resource instances**. In the **Resource type** dropdown list, select the resource type of your resource instance.
492
477
@@ -708,7 +693,7 @@ To learn more about working with storage analytics, see [Use Azure Storage analy
708
693
709
694
2. In the service menu, under **Security + networking**, select **Networking**.
710
695
711
-
3. Check that you've chosen to enable public network access from selected networks. Under **Resource settings**, select **Manage**. If you haven't enabled public network access from selected networks, then resource settings won't be in effect, and the **Manage** option won't be available.
696
+
3. Check that you've chosen to enable public network access from selected virtual networksand IP addresses.
712
697
713
698
4. Under **Exceptions**, select the exceptions that you want to grant.
714
699
@@ -762,5 +747,5 @@ To learn more about working with storage analytics, see [Use Azure Storage analy
762
747
763
748
## Next steps
764
749
765
-
Learn more about [Azure network service endpoints](../../virtual-network/virtual-network-service-endpoints-overview.md).
766
-
Dig deeper into [security recommendations for Azure Blob storage](../blobs/security-recommendations.md).
750
+
- Learn more about [Azure network service endpoints](../../virtual-network/virtual-network-service-endpoints-overview.md).
751
+
- Dig deeper into [security recommendations for Azure Blob storage](../blobs/security-recommendations.md).
0 commit comments