Skip to content

Commit 700f16a

Browse files
committed
updates
1 parent b4b7beb commit 700f16a

File tree

1 file changed

+13
-10
lines changed

1 file changed

+13
-10
lines changed

articles/private-link/network-security-perimeter-diagnostic-logs.md

Lines changed: 13 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: mbender-ms
66
ms.author: mbender
77
ms.service: azure-private-link
88
ms.topic: concept-article
9-
ms.date: 03/25/2025
9+
ms.date: 05/16/2025
1010
ms.custom: references_regions, ignite-2024
1111
#CustomerIntent: As a network administrator, I want to enable diagnostic logging for Network Security Perimeter, so that I can monitor and analyze the network traffic to and from my resources.
1212
---
@@ -23,17 +23,20 @@ Access logs categories for a network security perimeter are based on the results
2323

2424
| **Log category** | **Description** | **Applicable to Modes** |
2525
| --- | --- | --- |
26-
| **NspPublicInboundPerimeterRulesAllowed** | Inbound access is allowed based on network security perimeter access rules. | Learning/Enforced |
26+
| **NspPublicInboundPerimeterRulesAllowed** | Inbound access is allowed based on network security perimeter access rules. | Transition/Enforced |
2727
| **NspPublicInboundPerimeterRulesDenied** | Public inbound access denied by network security perimeter. | Enforced |
28-
| **NspPublicOutboundPerimeterRulesAllowed** | Outbound access is allowed based on network security perimeter access rules. | Learning/Enforced |
28+
| **NspPublicOutboundPerimeterRulesAllowed** | Outbound access is allowed based on network security perimeter access rules. | Transition/Enforced |
2929
| **NspPublicOutboundPerimeterRulesDenied** | Public outbound access denied by network security perimeter. | Enforced |
30-
| **NspOutboundAttempt** | Outbound attempt within network security perimeter. | Learning/Enforced |
31-
| **NspIntraPerimeterInboundAllowed** | Inbound access within perimeter is allowed. | Learning/Enforced |
32-
| **NspPublicInboundResourceRulesAllowed** | When network security perimeter rules deny, inbound access is allowed based on PaaS resource rules. | Learning |
33-
| **NspPublicInboundResourceRulesDenied** | When network security perimeter rules deny, inbound access denied by PaaS resource rules. | Learning |
34-
| **NspPublicOutboundResourceRulesAllowed** | When network security perimeter rules deny, outbound access allowed based on PaaS resource rules. | Learning |
35-
| **NspPublicOutboundResourceRulesDenied** | When network security perimeter rules deny, outbound access denied by PaaS resource rules. | Learning |
36-
| **NspPrivateInboundAllowed** | Private endpoint traffic is allowed. | Learning/Enforced |
30+
| **NspOutboundAttempt** | Outbound attempt within network security perimeter. | Transition/Enforced |
31+
| **NspIntraPerimeterInboundAllowed** | Inbound access within perimeter is allowed. | Transition/Enforced |
32+
| **NspPublicInboundResourceRulesAllowed** | When network security perimeter rules deny, inbound access is allowed based on PaaS resource rules. | Transition |
33+
| **NspPublicInboundResourceRulesDenied** | When network security perimeter rules deny, inbound access denied by PaaS resource rules. | Transition |
34+
| **NspPublicOutboundResourceRulesAllowed** | When network security perimeter rules deny, outbound access allowed based on PaaS resource rules. | Transition |
35+
| **NspPublicOutboundResourceRulesDenied** | When network security perimeter rules deny, outbound access denied by PaaS resource rules. | Transition |
36+
| **NspPrivateInboundAllowed** | Private endpoint traffic is allowed. | Transition/Enforced |
37+
38+
> [!NOTE]
39+
> The available access modes for a network security perimeter are **Transition** and **Enforced**. The **Transition** mode was previously named **Learning** mode.You may continue to see references to **Learning** mode in some instances.
3740
3841
## Logging destination options for access logs
3942

0 commit comments

Comments
 (0)