You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
DDoS Protection Standard customers now have access to [Rapid Response team](https://azure.microsoft.com/blog/ddos-protection-attack-analytics-rapid-response/) during an active attack. DRR can help with attack investigation, custom mitigations during an attack, and post-attack analysis.
43
+
DDoS Protection Standard customers have access to [Rapid Response team](https://azure.microsoft.com/blog/ddos-protection-attack-analytics-rapid-response/) during an active attack. DRR can help with attack investigation, custom mitigations during an attack, and post-attack analysis.
44
44
45
45
### SLA guarantee and cost protection
46
46
DDoS Protection Standard service is covered by 99.99% SLA, and cost protection provides resource credits for scale out during a documented attack. For more information, see [SLA for Azure DDoS Protection](https://azure.microsoft.com/support/legal/sla/ddos-protection/v1_0/).
47
47
48
48
## Featured partner scenarios
49
-
The following are three key benefits you can derive by integrating with the Azure DDoS Protection Standard:
49
+
The following are key benefits you can derive by integrating with the Azure DDoS Protection Standard:
50
50
51
51
- Partner’s offered service (load balancer, web application firewall, firewall, etc.) to their customers are automatically protected (white labeled) by Azure DDoS Protection Standard in the backend.
52
52
- Partners have access to Azure DDoS Protection Standard attack analytics and telemetry that they can integrate with their own products, offering a unified customer experience.
@@ -61,11 +61,11 @@ Following steps are required for partners to configure integration with Azure DD
61
61
1. Create a DDoS Protection Plan in your desired (partner) subscription. For step-by-step instructions, see [Create a DDoS Standard Protection plan](manage-ddos-protection.md#create-a-ddos-protection-plan).
62
62
> [!NOTE]
63
63
> Only 1 DDoS Protection Plan needs to be created for a given tenant.
64
-
2. Deploy a service with public endpoint in your required (partner) subscriptions such as - load balancer, firewalls, web application firewall.
64
+
2. Deploy a service with public endpoint in your (partner) subscriptions such as - load balancer, firewalls, web application firewall.
65
65
3. Enable Azure DDoS Protection Standard on the virtual network of the service that has public endpoints using DDoS Protection Plan created in the first step. For stpe-by-step instructions, see [Enable DDoS Standard Protection plan](manage-ddos-protection.md#enable-ddos-for-an-existing-virtual-network)
66
66
> [!IMPORTANT]
67
67
> Once Azure DDoS Protection Standard is enabled on a virtual network, all public IPs within that virtual network are automatically protected. The origin of these public IPs can either be within Azure (client subscription), or, outside of Azure.
68
-
4. Optionally, integrate Azure DDoS Protection Standard telemetry and attack analytics in your application specific customer facing. For more information about using telemetry, see [Use DDoS Protection telemetry](manage-ddos-protection.md#use-ddos-protection-telemetry). For more information about configuring attack analytics, see [Configure DDoS attack analytics](manage-ddos-protection.md#configure-ddos-attack-analytics)
68
+
4. Optionally, integrate Azure DDoS Protection Standard telemetry and attack analytics in your application specific customer facing dashboard. For more information about using telemetry, see [Use DDoS Protection telemetry](manage-ddos-protection.md#use-ddos-protection-telemetry). For more information about configuring attack analytics, see [Configure DDoS attack analytics](manage-ddos-protection.md#configure-ddos-attack-analytics)
0 commit comments