You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/machine-learning/how-to-prevent-data-loss-exfiltration.md
+27-27Lines changed: 27 additions & 27 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -46,7 +46,31 @@ Use the form at [https://forms.office.com/r/1TraBek7LV](https://forms.office.com
46
46
> [!TIP]
47
47
> It may take one to two weeks to allowlist your subscription.
48
48
49
-
## 2. Allow inbound and outbound network traffic
49
+
## 2. Create the service endpoint policy
50
+
51
+
1. From the [Azure portal](https://portal.azure.com), add a new __Service Endpoint Policy__. On the __Basics__ tab, provide the required information and then select __Next__.
52
+
1. On the __Policy definitions__ tab, perform the following actions:
53
+
1. Select __+ Add a resource__, and then provide the following information:
54
+
55
+
<!-- > [!TIP]
56
+
> * At least one storage account resource must be listed in the policy.
57
+
> * If you are adding multiple storage accounts, and the _default storage account_ for your workspace is configured with a private endpoint, you do not need to include it in the policy. -->
58
+
59
+
*__Service__: Microsoft.Storage
60
+
*__Scope__: Select the scope as __Single account__ to limit the network traffic to one storage account.
61
+
*__Subscription__: The Azure subscription that contains the storage account.
62
+
*__Resource group__: The resource group that contains the storage account.
63
+
*__Resource__: The default storage account of your workspace.
64
+
65
+
Select __Add__ to add the resource information.
66
+
1. Select __+ Add an alias__, and then select `/services/Azure/MachineLearning` as the __Server Alias__ value. Select __Add__ to add the alias.
67
+
68
+
> [!NOTE]
69
+
> The Azure CLI and Azure PowerShell do not provide support for adding an alias to the policy.
70
+
71
+
1. Select __Review + Create__, and then select __Create__.
72
+
73
+
## 3. Allow inbound and outbound network traffic
50
74
51
75
### Inbound
52
76
@@ -87,36 +111,12 @@ __Allow__ outbound traffic over __TCP port 443__ to the following FQDNs. Replace
87
111
88
112
For more information, see [How to secure training environments](how-to-secure-training-vnet.md) and [Configure inbound and outbound network traffic](how-to-access-azureml-behind-firewall.md).
89
113
90
-
## 3. Enable storage endpoint for the subnet
114
+
## 4. Enable storage endpoint for the subnet
91
115
92
116
1. From the [Azure portal](https://portal.azure.com), select the __Azure Virtual Network__ for your Azure ML workspace.
93
117
1. From the left of the page, select __Subnets__ and then select the subnet that contains your compute cluster/instance resources.
94
118
1. In the form that appears, expand the __Services__ dropdown and then __enable Microsoft.Storage__. Select __Save__ to save these changes.
95
-
96
-
## 4. Create the service endpoint policy
97
-
98
-
1. From the [Azure portal](https://portal.azure.com), add a new __Service Endpoint Policy__. On the __Basics__ tab, provide the required information and then select __Next__.
99
-
1. On the __Policy definitions__ tab, perform the following actions:
100
-
1. Select __+ Add a resource__, and then provide the following information:
101
-
102
-
> [!TIP]
103
-
> * At least one storage account resource must be listed in the policy.
104
-
> * If you are adding multiple storage accounts, and the _default storage account_ for your workspace is configured with a private endpoint, you do not need to include it in the policy.
105
-
106
-
*__Service__: Microsoft.Storage
107
-
*__Scope__: Select the scope. For example, select __Single account__ if you want to limit the network traffic to one storage account.
108
-
*__Subscription__: The Azure subscription that contains the storage account.
109
-
*__Resource group__: The resource group that contains the storage account.
110
-
*__Resource__: The storage account.
111
-
112
-
Select __Add__ to add the resource information.
113
-
1. Select __+ Add an alias__, and then select `/services/Azure/MachineLearning` as the __Server Alias__ value. Select __Add__ to add the alias.
114
-
115
-
> [!NOTE]
116
-
> The Azure CLI and Azure PowerShell do not provide support for adding an alias to the policy.
117
-
118
-
1. Select __Review + Create__, and then select __Create__.
119
-
119
+
1. Apply the service endpoint policy to your workspace subnet.
Copy file name to clipboardExpand all lines: includes/machine-learning-public-internet-access.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,6 +25,7 @@ Azure Machine Learning requires both inbound and outbound access to the public i
25
25
| Outbound | 443 | MicrosoftContainerRegistry.region</br>**Note** that this tag has a dependency on the **AzureFrontDoor.FirstParty** tag | Access docker images provided by Microsoft. Setup of the Azure Machine Learning router for Azure Kubernetes Service. |
26
26
| Outbound | 443 | AzureMonitor | Used to log monitoring and metrics to App Insights and Azure Monitor. |
27
27
| Outbound | 443 | Keyvault.region | Access the key vault for the Azure Batch service. Only needed if your workspace was created with the [hbi_workspace](/python/api/azureml-core/azureml.core.workspace%28class%29#create-name--auth-none--subscription-id-none--resource-group-none--location-none--create-resource-group-true--sku--basic---friendly-name-none--storage-account-none--key-vault-none--app-insights-none--container-registry-none--cmk-keyvault-none--resource-cmk-uri-none--hbi-workspace-false--default-cpu-compute-target-none--default-gpu-compute-target-none--exist-ok-false--show-output-true-) flag enabled. |
28
+
| Outbound | 5831 | AzureMachineLearning | Communication with Azure Machine Learning for compute instances. |
28
29
29
30
> [!TIP]
30
31
> If you need the IP addresses instead of service tags, use one of the following options:
0 commit comments